Intelligence and Security Informatics
IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, GA, USA, May 19-20, 2005, Proceedings
Editors: Kantor, P., Muresan, G., Roberts, F., Zeng, D., Wang, F.-Y., Chen, H., Merkle, R. (Eds.)
Free PreviewBuy this book
- About this book
-
Intelligence and security informatics (ISI) can be broadly defined as the study of the development and use of advanced information technologies and systems for national and international security-related applications, through an integrated technological, organizational, and policy-based approach. In the past few years, ISI research has experienced tremendous growth and attracted substantial interest from academic researchers in related fields as well as practitioners from both government agencies and industry. The first two meetings (ISI 2003 and ISI 2004) in the ISI symposium and conference series were held in Tucson, Arizona, in 2003 and 2004, respectively. They provided a stimulating intellectual forum for discussion among previously disparate communities: academic researchers in information technologies, computer science, public policy, and social studies; local, state, and federal law enforcement and intelligence experts; and information technology industry consultants and practitioners. Building on the momentum of these ISI meetings and with sponsorship by the IEEE, we held the IEEE International Conference on Intelligence and Security Informatics (ISI 2005) in May 2005 in Atlanta, Georgia. In addition to the established and emerging ISI research topics covered at past ISI meetings, ISI 2005 included a new track on Terrorism Informatics, which is a new stream of terrorism research leveraging the latest advances in social science methodologies, and information technologies and tools. ISI 2005 was jointly hosted by Rutgers, the State University of New Jersey; the University of Arizona (UA); and the Georgia Institute of Technology (GATECH).
- Table of contents (49 chapters)
-
-
Collusion Set Detection Through Outlier Discovery
Pages 1-13
-
Digging in the Details: A Case Study in Network Data Mining
Pages 14-26
-
Efficient Identification of Overlapping Communities
Pages 27-36
-
Event-Driven Document Selection for Terrorism Information Extraction
Pages 37-48
-
Link Analysis Tools for Intelligence and Counterterrorism
Pages 49-59
-
Table of contents (49 chapters)
Recommended for you

Bibliographic Information
- Bibliographic Information
-
- Book Title
- Intelligence and Security Informatics
- Book Subtitle
- IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, GA, USA, May 19-20, 2005, Proceedings
- Editors
-
- Paul Kantor
- Gheorghe Muresan
- Fred Roberts
- Daniel Zeng
- Frei-Yue Wang
- Hsinchun Chen
- Ralph Merkle
- Series Title
- Information Systems and Applications, incl. Internet/Web, and HCI
- Series Volume
- 3495
- Copyright
- 2005
- Publisher
- Springer-Verlag Berlin Heidelberg
- Copyright Holder
- Springer-Verlag Berlin Heidelberg
- eBook ISBN
- 978-3-540-32063-0
- DOI
- 10.1007/b136511
- Softcover ISBN
- 978-3-540-25999-2
- Edition Number
- 1
- Number of Pages
- XVIII, 678
- Topics