Intelligence and Security Informatics: IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, GA, USA, May 19-20, 2005, Proceedings / Edition 1

Paperback (Print)
Buy New
Buy New from
Used and New from Other Sellers
Used and New from Other Sellers
from $29.99
Usually ships in 1-2 business days
(Save 82%)
Other sellers (Paperback)
  • All (12) from $29.99   
  • New (8) from $100.50   
  • Used (4) from $29.99   


This book constitutes the refereed proceedings of the IEEE International Conference on Intelligence and Security Informatics, ISI 2005, held in Atlanta, GA, USA in May 2005.

The 28 revised full papers, 34 revised short papers, and 32 poster abstracts presented were carefully reviewed and selected for inclusion in the book. The papers are organized in topical sections on data and text mining, infrastructure protection and emergency response, information management and security education, deception detection and authorship analysis, monitoring and surveillance, and terrorism informatics.

Read More Show Less

Product Details

Table of Contents

Long Papers.- Collusion Set Detection Through Outlier Discovery.- Digging in the Details: A Case Study in Network Data Mining.- Efficient Identification of Overlapping Communities.- Event-Driven Document Selection for Terrorism Information Extraction.- Link Analysis Tools for Intelligence and Counterterrorism.- Mining Candidate Viruses as Potential Bio-terrorism Weapons from Biomedical Literature.- Private Mining of Association Rules.- Design Principles of Coordinated Multi-incident Emergency Response Systems.- Multi-modal Biometrics with PKI Technologies for Border Control Applications.- Risk Management Using Behavior Based Bayesian Networks.- Sensitivity Analysis of an Attack Containment Model.- Toward a Target-Specific Method of Threat Assessment.- Incident and Casualty Databases as a Tool for Understanding Low-Intensity Conflicts.- Integrating Private Databases for Data Analysis.- Applying Authorship Analysis to Arabic Web Content.- Automatic Extraction of Deceptive Behavioral Cues from Video.- Automatically Determining an Anonymous Author’s Native Language.- A Cognitive Model for Alert Correlation in a Distributed Environment.- Beyond Keyword Filtering for Message and Conversation Detection.- Content-Based Detection of Terrorists Browsing the Web Using an Advanced Terror Detection System (ATDS).- Modeling and Multiway Analysis of Chatroom Tensors.- Selective Fusion for Speaker Verification in Surveillance.- A New Conceptual Framework to Resolve Terrorism’s Root Causes.- Analyzing Terrorist Networks: A Case Study of the Global Salafi Jihad Network.- A Conceptual Model of Counterterrorist Operations.- Measuring Success in Countering Terrorism: Problems and Pitfalls.- Mapping the Contemporary Terrorism Research Domain: Researchers, Publications, and Institutions Analysis.- Testing a Rational Choice Model of Airline Hijackings.- Short Papers.- Analysis of Three Intrusion Detection System Benchmark Datasets Using Machine Learning Algorithms.- Discovering Identity Problems: A Case Study.- Efficient Discovery of New Information in Large Text Databases.- Leveraging One-Class SVM and Semantic Analysis to Detect Anomalous Content.- LSI-Based Taxonomy Generation: The Taxonomist System.- Some Marginal Learning Algorithms for Unsupervised Problems.- Collecting and Analyzing the Presence of Terrorists on the Web: A Case Study of Jihad Websites.- Evaluating an Infectious Disease Information Sharing and Analysis System.- How Question Answering Technology Helps to Locate Malevolent Online Content.- Information Supply Chain: A Unified Framework for Information-Sharing.- Map-Mediated GeoCollaborative Crisis Management.- Thematic Indicators Derived from World News Reports.- A Novel Watermarking Algorithm Based on SVD and Zernike Moments.- A Survey of Software Watermarking.- Data Distortion for Privacy Protection in a Terrorist Analysis System.- Deception Across Cultures: Bottom-Up and Top-Down Approaches.- Detecting Deception in Synchronous Computer-Mediated Communication Using Speech Act Profiling.- Active Automation of the DITSCAP.- An Ontological Approach to the Document Access Problem of Insider Threat.- Filtering, Fusion and Dynamic Information Presentation: Towards a General Information Firewall.- Intrusion Detection System Using Sequence and Set Preserving Metric.- The Multi-fractal Nature of Worm and Normal Traffic at Individual Source Level.- Learning Classifiers for Misuse Detection Using a Bag of System Calls Representation.- A Jackson Network-Based Model for Quantitative Analysis of Network Security.- Biomonitoring, Phylogenetics and Anomaly Aggregation Systems.- CODESSEAL: Compiler/FPGA Approach to Secure Applications.- Computational Tool in Infrastructure Emergency Total Evacuation Analysis.- Performance Study of a Compiler/Hardware Approach to Embedded Systems Security.- A Secured Mobile Phone Based on Embedded Fingerprint Recognition Systems.- Connections in the World of International Terrorism.- Forecasting Terrorism: Indicators and Proven Analytic Techniques.- Forecasting Terrorist Groups’ Warfare: ‘Conventional’ to CBRN.- The Qualitative Challenge of Insurgency Informatics.- The Application of PROACT® RCA to Terrorism/Counter Terrorism Related Events.- Extended Abstracts for Posters and Demos.- A Group Decision-Support Method for Search and Rescue Based on Markov Chain.- A New Relationship Form in Data Mining.- A Study of ”Root Causes of Conflict” Using Latent Semantic Analysis.- An Empirical Study on Dynamic Effects on Deception Detection.- Anti Money Laundering Reporting and Investigation – Sorting the Wheat from the Chaff.- Application of Latent Semantic Indexing to Processing of Noisy Text.- Detecting Misuse of Information Retrieval Systems Using Data Mining Techniques.- Mining Schemas in Semistructured Data Using Fuzzy Decision Trees.- More Than a Summary: Stance-Shift Analysis.- Principal Component Analysis (PCA) for Data Fusion and Navigation of Mobile Robots.- BioPortal: Sharing and Analyzing Infectious Disease Information.- DIANE: Revolutionizing the Way We Collect, Analyze, and Share Information.- Processing High-Speed Intelligence Feeds in Real-Time.- Question Answer TARA: A Terrorism Activity Resource Application.- Template Based Semantic Similarity for Security Applications.- The Dark Web Portal Project: Collecting and Analyzing the Presence of Terrorist Groups on the Web.- Toward an ITS Specific Knowledge Engine.- A Blind Image Watermarking Using for Copyright Protection and Tracing.- Towards an Effective Wireless Security Policy for Sensitive Organizations.- A Taxonomy of Cyber Attacks on 3G Networks.- An Adaptive Approach to Handle DoS Attack for Web Services.- An Architecture for Network Security Using Feedback Control.- Defending a Web Browser Against Spying with Browser Helper Objects.- Dynamic Security Service Negotiation to Ensure Security for Information Sharing on the Internet.- Enhancing Spatial Database Access Control by Eliminating the Covert Topology Channel.- Gathering Digital Evidence in Response to Information Security Incidents.- On the QP Algorithm in Software Watermarking.- On the Use of Opaque Predicates in Mobile Agent Code Obfuscation.- Secure Contents Distribution Using Flash Memory Technology.- Infrastructure Protection and Emergency Response.- Background Use of Sensitive Information to Aid in Analysis of Non-sensitive Data on Threats and Vulnerabilities.- Securing Grid-Based Critical Infrastructures.- The Safety Alliance of Cushing – A Model Example of Cooperation as an Effective Counterterrorism Tool.- Surveillance, Border Protection, and Transportation Systems.- A Framework for Global Monitoring and Security Assistance Based on IPv6 and Multimedia Data Mining Techniques.- An Agent-Based Framework for a Traffic Security Management System.- Application of a Decomposed Support Vector Machine Algorithm in Pedestrian Detection from a Moving Vehicle.- Application of Cooperative Co-evolution in Pedestrian Detection Systems.- Biometric Fingerprints Based Radio Frequency Identification.- BorderSafe: Cross-Jurisdictional Information Sharing, Analysis, and Visualization.

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star


4 Star


3 Star


2 Star


1 Star


Your Rating:

Your Name: Create a Pen Name or

Barnes & Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation


  • - By submitting a review, you grant to Barnes & and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Terms of Use.
  • - Barnes & reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)