Advertisement

Intelligence and Security Informatics

Second Symposium on Intelligence and Security Informatics, ISI 2004, Tucson, AZ, USA, June 10-11, 2004. Proceedings

  • Hsinchun Chen
  • Reagan Moore
  • Daniel D. Zeng
  • John Leavitt

Part of the Lecture Notes in Computer Science book series (LNCS, volume 3073)

Table of contents

  1. Front Matter
  2. Full Papers

    1. Bioterrorism and Disease Informatics

      1. Li-Chiou Chen, Boris Kaminsky, Tiffany Tummino, Kathleen M. Carley, Elizabeth Casman, Douglas Fridsma et al.
        Pages 1-16
      2. Donald J. Berndt, Sunil Bhat, John W. Fisher, Alan R. Hevner, James Studnicki
        Pages 17-27
      3. Daniel Zeng, Hsinchun Chen, Chunju Tseng, Catherine Larson, Millicent Eidson, Ivan Gotham et al.
        Pages 28-41
    2. Data Access Control, Privacy, and Trust Management

      1. Zhengyou Xia, Yichuan Jiang, Yiping Zhong, Shiyong Zhang
        Pages 42-55
      2. Yichuan Jiang, Zhengyou Xia, Yiping Zhong, Shiyong Zhang
        Pages 56-65
      3. Gang Liang, Sudarshan S. Chawathe
        Pages 66-82
    3. Data Management and Mining

      1. Jenq-Haur Wang, Chien-Chung Huang, Jei-Wen Teng, Lee-Feng Chien
        Pages 100-113
      2. Edna Reid, Jialun Qin, Wingyan Chung, Jennifer Xu, Yilu Zhou, Rob Schumaker et al.
        Pages 125-145
      3. Alan Demers, Johannes Gehrke, Mirek Riedewald
        Pages 146-162
    4. Deception Detection

      1. Jinwei Cao, Ming Lin, Amit Deokar, Judee K. Burgoon, Janna M. Crews, Mark Adkins
        Pages 163-175
      2. Hung-Ching Chen, Mark Goldberg, Malik Magdon-Ismail
        Pages 176-186
    5. Information Assurance and Infrastructure Protection

      1. Joon S. Park, Shuyuan Mary Ho
        Pages 201-213
      2. William J. Tolone, David Wilson, Anita Raja, Wei-ning Xiang, Huili Hao, Stuart Phelps et al.
        Pages 214-225
    6. Monitoring and Surveillance

      1. Ahmet Çamtepe, Mukkai S. Krishnamoorthy, Bülent Yener
        Pages 252-265
      2. Jason Bengel, Susan Gauch, Eera Mittur, Rajan Vijayaraghavan
        Pages 266-277
      3. Naren Kodali, Csilla Farkas, Duminda Wijesekera
        Pages 278-296
      4. Petros Drineas, Mukkai S. Krishnamoorthy, Michael D. Sofka, Bülent Yener
        Pages 297-306
      5. Csilla Farkas, Thomas C. Wingfield, James B. Michael, Duminda Wijesekera
        Pages 307-321
    7. Security Policies and Evaluation

    8. Social Network Analysis

      1. Jennifer Xu, Byron Marshall, Siddharth Kaza, Hsinchun Chen
        Pages 359-377
      2. Jeff Baumes, Mark Goldberg, Malik Magdon-Ismail, William Al Wallace
        Pages 378-389
  3. Short Papers

    1. Deception Detection

      1. Douglas P. Twitchell, Jay F. Nunamaker Jr., Judee K. Burgoon
        Pages 403-410
      2. Joey F. George, David P. Biros, Mark Adkins, Judee K. Burgoon, Jay F. Nunamaker Jr.
        Pages 411-417
    2. Data/Text Management and Mining

      1. Donald Brown, Jason Dalton, Heidi Hoyle
        Pages 426-435
      2. Alexander Dolotov, Mary Strickler
        Pages 436-448
    3. Information Assurance and Infrastructure Protection

      1. Homa Atabakhsh, Catherine Larson, Tim Petersen, Chuck Violette, Hsinchun Chen
        Pages 467-475
      2. Myung-Kyu Yi, Chong-Sun Hwang
        Pages 476-483
      3. Svetlana Symonenko, Elizabeth D. Liddy, Ozgur Yilmazel, Robert Del Zoppo, Eric Brown, Matt Downey
        Pages 492-500
  4. Extended Abstracts for Posters

    1. Eric Hughes, Amy Kazura, Arnie Rosenthal
      Pages 508-509
    2. Robert H. Warren, Christopher Leurer
      Pages 510-511
    3. Raj Sharman, Himabindu Challapalli, Raghav H. Rao, Shambhu Upadhyaya
      Pages 512-513
    4. Eungki Park, Jung-Taek Seo, Eul Gyu Im, Cheol-Won Lee
      Pages 514-515
    5. Susan M. Merritt, Allen Stix, Judith E. Sullivan
      Pages 516-517
    6. Yufeng Chen, Yabo Dong, Dongming Lu, Zhengtao Xiang
      Pages 518-519
  5. Panel Discussion Papers

    1. James O. Ellis III
      Pages 520-525
    2. Rohan Gunaratna
      Pages 526-530

About these proceedings

Keywords

E-Mail IT security Internet architecture bioinformatics crime analysis deception detection information system information technology intelligence intelligence security national security organization security informatics vulnerability analysis

Editors and affiliations

  • Hsinchun Chen
    • 1
  • Reagan Moore
    • 2
  • Daniel D. Zeng
    • 3
  • John Leavitt
    • 4
  1. 1.Department of Management Information Systems, Eller College of Management,The University of ArizonaUSA
  2. 2.San Diego Supercomputer CenterLa JollaUSA
  3. 3.MIS DepartmentUniversity of ArizonaTucsonUSA
  4. 4.Tucson Police DepartmentTucsonUSA

Bibliographic information

  • DOI https://doi.org/10.1007/b98042
  • Copyright Information Springer-Verlag Berlin Heidelberg 2004
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-22125-8
  • Online ISBN 978-3-540-25952-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Pharma
Automotive
Chemical Manufacturing
Biotechnology
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Energy, Utilities & Environment
Aerospace
Engineering