Intelligence and Security Informatics

IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006. Proceedings

  • Sharad Mehrotra
  • Daniel D. Zeng
  • Hsinchun Chen
  • Bhavani Thuraisingham
  • Fei-Yue Wang
Conference proceedings ISI 2006

Part of the Lecture Notes in Computer Science book series (LNCS, volume 3975)

Table of contents

  1. Front Matter
  2. Long Papers

    1. Intelligence Analysis and Knowledge Discovery

      1. Clive Best, Bruno Pouliquen, Ralf Steinberger, Erik Van der Goot, Ken Blackler, Flavio Fuart et al.
        Pages 26-34
      2. Leonidas Deligiannidis, Amit P. Sheth, Boanerges Aleman-Meza
        Pages 48-59
      3. Ahmed Abbasi, Hsinchun Chen
        Pages 60-71
      4. Olcay Kursun, Anna Koufakou, Bing Chen, Michael Georgiopoulos, Kenneth M. Reynolds, Ron Eaglin
        Pages 72-82
      5. David Newman, Chaitanya Chemudugunta, Padhraic Smyth, Mark Steyvers
        Pages 93-104
    2. Access Control, Privacy, and Cyber Trust

      1. HyangChang Choi, SeungYong Lee, HyungHyo Lee
        Pages 129-140
      2. Artak Amirbekyan, V. Estivill-Castro
        Pages 141-153
      3. Jianming He, Wesley W. Chu, Zhenyu (Victor) Liu
        Pages 154-165
    3. Surveillance and Emergency Response

      1. Xiaolei Li, Jiawei Han, Sangkyum Kim
        Pages 166-177
      2. Chen Bo, Bin Xing Fang, Xiao Chun Yun
        Pages 178-189
      3. SzeWang Fong, David B. Skillicorn, D. Roussinov
        Pages 190-200
      4. J. Baumes, M. Goldberg, M. Hayvanovych, M. Magdon-Ismail, W. Wallace, M. Zaki
        Pages 201-212
      5. Evrim Acar, Seyit A. Çamtepe, Bülent Yener
        Pages 213-224
      6. Jamie L. Griffiths, Donald J. Berndt, Alan R. Hevner
        Pages 225-236
      7. Vidhya Balasubramanian, Daniel Massaguer, Sharad Mehrotra, Nalini Venkatasubramanian
        Pages 237-248
      8. Ping Yan, Daniel Zeng, Hsinchun Chen
        Pages 249-260
    4. Infrastructure Protection and Cyber Security

      1. Wei Wei, Yabo Dong, Dongming Lu, Guang Jin, Honglan Lao
        Pages 261-271
      2. Yan Zhai, Peng Ning, Jun Xu
        Pages 272-284
      3. Kapil Kumar Gupta, Baikunth Nath, Kotagiri Ramamohanarao, Ashraf U. Kazi
        Pages 285-296
      4. Fangfang Liu, Yan Chi, Yuliang Shi
        Pages 297-307
      5. Siddharth Kaza, Yuan Wang, Hsinchun Chen
        Pages 308-318
      6. Saket Anand, David Madigan, Richard Mammone, Saumitr Pathak, Fred Roberts
        Pages 319-330
    5. Terrorism Informatics and Countermeasures

      1. Christopher C. Yang, Nan Liu, Marc Sageman
        Pages 331-342
      2. Christopher C. Yang, Xiaodong Shi, Chih-Ping Wei
        Pages 343-354
      3. Jennifer Xu, Hsinchun Chen, Yilu Zhou, Jialun Qin
        Pages 367-376
      4. Nasrullah Memon, Henrik Legind Larsen
        Pages 389-400
      5. Laura Dugan, Gary LaFree, Heather Fogg
        Pages 407-419
    6. Emerging Applications

      1. Uwe Glässer, Sarah Rastkar, Mona Vajihollahi
        Pages 420-431
      2. Adnan Khashman, Akram A. Garad
        Pages 432-439
  3. Short Papers

    1. Data Analysis, Knowledge Discovery, and Information Dissemination

      1. Yu Chen, Wesley W. Chu
        Pages 452-458
      2. Olivier De Vel, Nianjun Liu, Terry Caelli, Tiberio S. Caetano
        Pages 459-465
      3. Eric A. Bier, Edward W. Ishak, Ed Chi
        Pages 466-472
      4. Yair Neuman, Liran Elihay, Meni Adler, Yoav Goldberg, Amir Viner
        Pages 473-478
      5. G. Alan Wang, Hsinchun Chen, Homa Atabakhsh
        Pages 479-484
      6. Danilo Reis, Adriano Melo, André L. V. Coelho, Vasco Furtado
        Pages 485-491
      7. Amit Mathew, Amit Sheth, Leonidas Deligiannidis
        Pages 492-497
      8. Jau-Hwang Wang, Tianjun Fu, Hong-Ming Lin, Hsinchun Chen
        Pages 498-503
      9. Christie Fuller, David P. Biros, Mark Adkins, Judee K. Burgoon, Jay F. Nunamaker Jr., Steven Coulon
        Pages 504-509

About these proceedings


In the past few years, intelligence and security informatics (ISI) research, which is concerned with the study of the development and use of advanced information te- nologies and systems for national and international security-related applications, has experienced tremendous growth and attracted substantial interest from academic - searchers in related fields as well as practitioners from both government agencies and industry. The ISI community is maturing, and a core set of research methodologies and technical approaches has emerged and is becoming the underpinning of ISI research. The first two meetings (ISI 2003 and ISI 2004) in the ISI symposium and conf- ence series were held in Tucson, Arizona. With sponsorship by the IEEE Intelligent Transportation Systems Society, ISI 2005 was held in Atlanta, Georgia. Building on the momentum of these ISI meetings, we held ISI 2006 in San Diego, California, in May 2006. In addition to the established and emerging ISI technical research topics, ISI 2006 included a track on terrorism informatics, which is a new stream of terrorism research leveraging the latest advances in social science methodologies, and infor- tion technologies and tools.


Distributed Denial of Service E-Mail Ubiquitous Computing access control biometrics collaborative computing deception detection identity information processing information technology knowledge management monitori organization privacy robot

Editors and affiliations

  • Sharad Mehrotra
    • 1
  • Daniel D. Zeng
    • 2
  • Hsinchun Chen
    • 3
  • Bhavani Thuraisingham
    • 4
  • Fei-Yue Wang
    • 5
  1. 1.School of Information and Computer ScienceUniversity of CaliforniaIrvine
  2. 2.MIS DepartmentUniversity of ArizonaTucsonUSA
  3. 3.Department of Management Information Systems, Eller College of ManagementThe University of ArizonaUSA
  4. 4.University of Texas at Dallas 
  5. 5.Chinese Academy of SciencesBeijingChina

Bibliographic information

Industry Sectors
IT & Software
Finance, Business & Banking