Intelligence and Security Informatics

Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007. Proceedings

  • Editors
  • Christopher C. Yang
  • Daniel Zeng
  • Michael Chau
  • Kuiyu Chang
  • Qing Yang
  • Xueqi Cheng
  • Jue Wang
  • Fei-Yue Wang
  • Hsinchun Chen
Conference proceedings PAISI 2007

Part of the Lecture Notes in Computer Science book series (LNCS, volume 4430)

Table of contents

  1. Front Matter
  2. Keynote

  3. Long Papers

    1. Crime Analysis

      1. Christopher C. Yang, Torbun D. Ng, Jau-Hwang Wang, Chih-Ping Wei, Hsinchun Chen
        Pages 21-33
      2. Yungchang Ku, Ying-Chieh Chen, Kuo-Ching Wu, Chaochang Chiu
        Pages 34-45
    2. Emergency Response and Surveillance

      1. Ickjai Lee, Reece Pershouse, Peter Phillips, Chris Christensen
        Pages 58-69
      2. Yujun Zheng, Jinquan Wang, Jinyun Xue
        Pages 70-81
      3. Huimin Qian, Yaobin Mao, Jason Geng, Zhiquan Wang
        Pages 82-93
    3. Intrusion Detection

      1. Haiguang Chen, Peng Han, Xi Zhou, Chuanshan Gao
        Pages 105-116
      2. Li Jin, Zhengding Lu
        Pages 117-128
      3. Yang Li, Bin-Xing Fang, Li Guo, You Chen
        Pages 141-151
    4. Network Security

      1. Zhi-tang Li, Jie Lei, Li Wang, Dong Li, Yang-ming Ma
        Pages 160-171
      2. Shejie Lu, Jun Li, Zhiyuan Liu, Guohua Cui
        Pages 184-195
      3. Yu Fu, Cong Jin, Chuanxiang Ma
        Pages 208-219
  4. Short Papers

    1. Data and Text Mining

      1. Kuiyu Chang, Qi He, Ridzwan Aminuddin, Ridzwan Suri, Ee-Peng Lim
        Pages 220-225
      2. Rong Qian, Wei Zhang, Bingru Yang
        Pages 226-231
      3. C. X. Wei, X. B. Cao, Y. W. Xu, Hong Qiao, Fei-Yue Wang
        Pages 232-237
    2. Cybercrime and Information Access and Security

      1. Yungchang Ku, Yuchi Chen, Chaochang Chiu
        Pages 238-243
      2. Yuan-Fa Chen, Sandy Yu-Lan Yeh, Kuo-Ching Wu
        Pages 251-256
      3. Jianjiang Lu, Jinpeng Wang, Yafei Zhang, Bo Zhou, Yanhui Li, Zhuang Miao
        Pages 262-268
    3. Intrusion Detection

      1. Hyun-A Park, Dong Hoon Lee, Jongin Lim, Sang Hyun Cho
        Pages 269-274
      2. Baowen Zhang, Jing Zhang, Ning Zhou, Mingang Chen
        Pages 275-281
      3. Yong Deng, Jia Xiong, Ping Fu
        Pages 282-287
    4. Network Security

      1. Mi Wen, Ling Dong, Yanfei Zheng, Kefei Chen
        Pages 288-294
      2. Leyi Shi, Chunfu Jia, Shuwang Lü, Zhenhua Liu
        Pages 295-300
      3. Eul Gyu Im, Jung Sik Kim, In Woo Noh, Hyun Jun Jang
        Pages 301-306
  5. Posters

    1. Terrorism Informatics and Crime Analysis

      1. Daniel Zeng, Li Zhang, Donghua Wei, Fei-Yue Wang
        Pages 307-308
      2. Jau-Hwang Wang, Jiing-Long Jow, You-Lu Liao, Tyan-muh Tsai, Garfield Hung
        Pages 309-310
      3. Qihong Liu, Changjie Tang, Shaojie Qiao, Qiwei Liu, Fenlian Wen
        Pages 311-313
      4. Qiudan Li, Yaodong Li, Huiguang He, Guanggang Geng, Yuanping Zhu, Chunheng Wang
        Pages 314-315
    2. Network Security and Intrusion Detection

      1. Wenji Mao, Daniel Zeng, Li Zhang, Donghua Wei, Fei-Yue Wang
        Pages 321-322
      2. Hao Tu, Zhi-tang Li, Bin Liu
        Pages 323-324
      3. Young-Gab Kim, Jongin Lim
        Pages 325-326
      4. Ki-Yoon Kim, Hyoung-Kee Choi
        Pages 327-328
  6. Back Matter

About these proceedings


Intelligence and security informatics (ISI) is concerned with the study of the development and use of advanced information technologies and systems for national, international, and societal security-related applications. The annual IEEE International Conference series on ISI was started in 2003 and the first four meetings were held in the United States. In 2006, the Workshop on ISI (http://isi. se. cuhk. edu. hk/2006/) was held in Singapore in conjunction with the Pacific Asia Conference on Knowledge Discovery and Data Mining, with over 100 contributors and participants from all over the world. These past ISI conferences have brought together academic researchers, law enforcement and intelligence experts, information technology consultants, and practitioners to discuss their research and practice related to various ISI topics including ISI data management, data and text mining for ISI applications, terrorism informatics, deception and intent detection, terrorist and criminal social network analysis, public health and bio-security, crime analysis, cyber-infrastructure protection, transportation infrastructure security, policy studies and evaluation, and information assurance, among others. We continued this stream of ISI conferences by organizing the 2007 Pacific Asia Workshop on ISI (PAISI 2007) to especially provide a stimulating forum for ISI researchers in Pacific Asia and other regions of the world to exchange ideas and report research progress. PAISI 2007 was hosted by the Chinese Academy of Sciences, the University of Arizona, and the Chinese University of Hong Kong.


Distributed Denial of Service IT Internet access control computer crime crime analysis emergency response homeland security information security intelligence informatics intrusion detection monitor privacy security trust

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2007
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science Computer Science (R0)
  • Print ISBN 978-3-540-71548-1
  • Online ISBN 978-3-540-71549-8
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Finance, Business & Banking
IT & Software