Intelligence and Security Informatics

IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, GA, USA, May 19-20, 2005. Proceedings

  • Paul Kantor
  • Gheorghe Muresan
  • Fred Roberts
  • Daniel D. Zeng
  • Fei-Yue Wang
  • Hsinchun Chen
  • Ralph C. Merkle
Conference proceedings ISI 2005

Part of the Lecture Notes in Computer Science book series (LNCS, volume 3495)

Table of contents

  1. Front Matter
  2. Long Papers

    1. Data and Text Mining

      1. Vandana P. Janeja, Vijayalakshmi Atluri, Jaideep Vaidya, Nabil R. Adam
        Pages 1-13
      2. John Galloway, Simeon J. Simoff
        Pages 14-26
      3. Jeffrey Baumes, Mark Goldberg, Malik Magdon-Ismail
        Pages 27-36
      4. Zhen Sun, Ee-Peng Lim, Kuiyu Chang, Teng-Kwee Ong, Rohan Kumar Gunaratna
        Pages 37-48
      5. Antonio Badia, Mehmed Kantardzic
        Pages 49-59
      6. Xiaohua Hu, Illhoi Yoo, Peter Rumm, Michael Atwood
        Pages 60-71
      7. Justin Zhan, Stan Matwin, LiWu Chang
        Pages 72-80
    2. Infrastructure Protection and Emergency Response

      1. Rui Chen, Raj Sharman, H. Raghav Rao, Shambhu Upadhyaya
        Pages 81-98
      2. Ram Dantu, Prakash Kolan
        Pages 115-126
      3. Ram Dantu, João W. Cangussu, Janos Turi
        Pages 127-138
    3. Information Management

    4. Deception Detection and Authorship Analysis

      1. Ahmed Abbasi, Hsinchun Chen
        Pages 183-197
      2. Thomas O. Meservy, Matthew L. Jensen, John Kruse, Judee K. Burgoon, Jay F. Nunamaker
        Pages 198-208
      3. Moshe Koppel, Jonathan Schler, Kfir Zigdon
        Pages 209-217
    5. Monitoring and Surveillance

      1. Ambareen Siraj, Rayford B. Vaughn
        Pages 218-230
      2. Yuval Elovici, Bracha Shapira, Mark Last, Omer Zaafrany, Menahem Friedman, Moti Schneider et al.
        Pages 244-255
      3. Evrim Acar, Seyit A. Çamtepe, Mukkai S. Krishnamoorthy, Bülent Yener
        Pages 256-268
      4. Yosef A. Solewicz, Moshe Koppel
        Pages 269-279
    6. Terrorism Informatics

      1. Jialun Qin, Jennifer J. Xu, Daning Hu, Marc Sageman, Hsinchun Chen
        Pages 287-304
      2. David Davis, Allison Frendak-Blume, Jennifer Wheeler, Alexander E. R. Woodcock, Clarence Worrell III
        Pages 305-315
      3. Laura Dugan, Gary LaFree, Alex R. Piquero
        Pages 340-361
  3. Short Papers

    1. Data and Text Mining

      1. Alan G. Wang, Homa Atabakhsh, Tim Petersen, Hsinchun Chen
        Pages 368-373
      2. Ozgur Yilmazel, Svetlana Symonenko, Niranjan Balasubramanian, Elizabeth D. Liddy
        Pages 381-388
      3. Qing Tao, Gao-Wei Wu, Fei-Yue Wang, Jue Wang
        Pages 395-401
    2. Information Management and Sharing

      1. Edna Reid, Jialun Qin, Yilu Zhou, Guanpi Lai, Marc Sageman, Gabriel Weimann et al.
        Pages 402-411
      2. Paul Jen-Hwa Hu, Daniel Zeng, Hsinchun Chen, Catherine Larson, Wei Chang, Chunju Tseng
        Pages 412-417
      3. Dmitri Roussinov, Jose Antonio Robles-Flores
        Pages 418-421
      4. Guoray Cai, Alan M. MacEachren, Isaac Brewer, Mike McNeese, Rajeev Sharma, Sven Fuhrmann
        Pages 429-435
      5. Clive Best, Erik Van der Goot, Monica de Paola
        Pages 436-447
    3. Copyright and Privacy Protection

      1. Haifeng Li, Shuxun Wang, Weiwei Song, Quan Wen
        Pages 448-453
      2. William Zhu, Clark Thomborson, Fei-Yue Wang
        Pages 454-458
      3. Shuting Xu, Jun Zhang, Dianwei Han, Jie Wang
        Pages 459-464
    4. Deception Detection

      1. Lina Zhou, Simon Lutterbie
        Pages 465-470
      2. Douglas P. Twitchell, Nicole Forsgren, Karl Wiers, Judee K. Burgoon, Jay F. Nunmaker
        Pages 471-478
    5. Information Security and Intrusion Detection

      1. Seok Won Lee, Robin A. Gandhi, Gail-Joon Ahn, Deepak S. Yavagal
        Pages 479-485
      2. Boanerges Aleman-Meza, Phillip Burns, Matthew Eavenson, Devanand Palaniswami, Amit Sheth
        Pages 486-491
      3. Gregory Conti, Mustaque Ahamad, Robert Norback
        Pages 492-497
      4. Pradeep Kumar, M. Venkateswara Rao, P. Radha Krishna, Raju S. Bapi, Arijit Laha
        Pages 498-504

About these proceedings


Intelligence and security informatics (ISI) can be broadly defined as the study of the development and use of advanced information technologies and systems for national and international security-related applications, through an integrated technological, organizational, and policy-based approach. In the past few years, ISI research has experienced tremendous growth and attracted substantial interest from academic researchers in related fields as well as practitioners from both government agencies and industry. The first two meetings (ISI 2003 and ISI 2004) in the ISI symposium and conference series were held in Tucson, Arizona, in 2003 and 2004, respectively. They provided a stimulating intellectual forum for discussion among previously disparate communities: academic researchers in information technologies, computer science, public policy, and social studies; local, state, and federal law enforcement and intelligence experts; and information technology industry consultants and practitioners. Building on the momentum of these ISI meetings and with sponsorship by the IEEE, we held the IEEE International Conference on Intelligence and Security Informatics (ISI 2005) in May 2005 in Atlanta, Georgia. In addition to the established and emerging ISI research topics covered at past ISI meetings, ISI 2005 included a new track on Terrorism Informatics, which is a new stream of terrorism research leveraging the latest advances in social science methodologies, and information technologies and tools. ISI 2005 was jointly hosted by Rutgers, the State University of New Jersey; the University of Arizona (UA); and the Georgia Institute of Technology (GATECH).


DOM Internet access control biometrics crime analysis data security deception detection homeland security identity information security infrastructure security intelligence informatics privacy security security informatics

Editors and affiliations

  • Paul Kantor
    • 1
  • Gheorghe Muresan
    • 2
  • Fred Roberts
    • 3
  • Daniel D. Zeng
    • 4
  • Fei-Yue Wang
    • 5
  • Hsinchun Chen
    • 6
  • Ralph C. Merkle
    • 7
  1. 1.Department of Library and Information ScienceRutgers University 
  2. 2.School of Communication, Information and Library StudiesRutgers UniversityNew BrunswickUSA
  3. 3.Artificial SolutionsHamburgGermany
  4. 4.MIS DepartmentUniversity of ArizonaTucsonUSA
  5. 5.Institute of AutomationChinese Academy of SciencesBeijingChina
  6. 6.Department of Management Information Systems, Eller College of ManagementThe University of ArizonaUSA
  7. 7.College of Computing, Georgia Tech Information Security CenterGeorgia Institute of TechnologyAtlantaUSA

Bibliographic information

Industry Sectors
Chemical Manufacturing
IT & Software
Consumer Packaged Goods
Finance, Business & Banking
Energy, Utilities & Environment