Skip to main content
Book cover

Intelligence and Security Informatics

IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, GA, USA, May 19-20, 2005, Proceedings

  • Conference proceedings
  • © 2005

Overview

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 3495)

Included in the following conference series:

Conference proceedings info: ISI 2005.

This is a preview of subscription content, log in via an institution to check access.

Access this book

eBook USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

Table of contents (100 papers)

  1. Long Papers

    1. Data and Text Mining

    2. Infrastructure Protection and Emergency Response

    3. Information Management

    4. Deception Detection and Authorship Analysis

    5. Monitoring and Surveillance

Other volumes

  1. Intelligence and Security Informatics

Keywords

About this book

Intelligence and security informatics (ISI) can be broadly defined as the study of the development and use of advanced information technologies and systems for national and international security-related applications, through an integrated technological, organizational, and policy-based approach. In the past few years, ISI research has experienced tremendous growth and attracted substantial interest from academic researchers in related fields as well as practitioners from both government agencies and industry. The first two meetings (ISI 2003 and ISI 2004) in the ISI symposium and conference series were held in Tucson, Arizona, in 2003 and 2004, respectively. They provided a stimulating intellectual forum for discussion among previously disparate communities: academic researchers in information technologies, computer science, public policy, and social studies; local, state, and federal law enforcement and intelligence experts; and information technology industry consultants and practitioners. Building on the momentum of these ISI meetings and with sponsorship by the IEEE, we held the IEEE International Conference on Intelligence and Security Informatics (ISI 2005) in May 2005 in Atlanta, Georgia. In addition to the established and emerging ISI research topics covered at past ISI meetings, ISI 2005 included a new track on Terrorism Informatics, which is a new stream of terrorism research leveraging the latest advances in social science methodologies, and information technologies and tools. ISI 2005 was jointly hosted by Rutgers, the State University of New Jersey; the University of Arizona (UA); and the Georgia Institute of Technology (GATECH).

Editors and Affiliations

  • Department of Library and Information Science, Rutgers University,  

    Paul Kantor

  • School of Communication, Information and Library Studies, Rutgers University, New Brunswick, USA

    Gheorghe Muresan

  • Artificial Solutions, Hamburg, Germany

    Fred Roberts

  • MIS Department, University of Arizona, Tucson, USA

    Daniel D. Zeng

  • Institute of Automation, Chinese Academy of Sciences, Beijing, China

    Fei-Yue Wang

  • Department of Management Information Systems, Eller College of Management, The University of Arizona, USA

    Hsinchun Chen

  • College of Computing, Georgia Tech Information Security Center, Georgia Institute of Technology, Atlanta, USA

    Ralph C. Merkle

Bibliographic Information

Publish with us