By Topic

Intelligence and Security Informatics, 2007 IEEE

Date 23-24 May 2007

Filter Results

Displaying Results 1 - 25 of 85
  • [Front cover]

    Publication Year: 2007 , Page(s): i
    Save to Project icon | Request Permissions | PDF file iconPDF (411 KB)  
    Freely Available from IEEE
  • [Breaker page]

    Publication Year: 2007 , Page(s): ii
    Save to Project icon | Request Permissions | PDF file iconPDF (531 KB)  
    Freely Available from IEEE
  • [Commentary]

    Publication Year: 2007 , Page(s): iii - iv
    Save to Project icon | Request Permissions | PDF file iconPDF (131 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Contributor listings

    Publication Year: 2007
    Save to Project icon | Request Permissions | PDF file iconPDF (27 KB)  
    Freely Available from IEEE
  • Contributor listings

    Publication Year: 2007 , Page(s): vi - viii
    Save to Project icon | Request Permissions | PDF file iconPDF (115 KB)  
    Freely Available from IEEE
  • [Society related material]

    Publication Year: 2007 , Page(s): ix - x
    Save to Project icon | Request Permissions | PDF file iconPDF (93 KB)  
    Freely Available from IEEE
  • [Commentary]

    Publication Year: 2007 , Page(s): xi
    Save to Project icon | Request Permissions | PDF file iconPDF (76 KB)  
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2007 , Page(s): xiii - xvii
    Save to Project icon | Request Permissions | PDF file iconPDF (295 KB)  
    Freely Available from IEEE
  • Sequential Decision Making Algorithms for Port of Entry Inspection: Overcoming Computational Challenges

    Publication Year: 2007 , Page(s): 1 - 7
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (671 KB) |  | HTML iconHTML  

    Following work of Stroud and Saeger and Anand et al., we formulate a port of entry inspection sequencing task as a problem of finding an optimal binary decision tree for an appropriate Boolean decision function. We report on new algorithms that are more efficient computationally than those presented by Stroud and Saeger and Anand et al. We achieve these efficiencies through a combination of specif... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using Digital Chains of Custody on Constrained Devices to Verify Evidence

    Publication Year: 2007 , Page(s): 8 - 15
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (2737 KB) |  | HTML iconHTML  

    A digital chain of custody is an account documenting digital data at a particular place and time. This paper gives a method of validating and authenticating a digital chain of custody using an algorithm by Jakobsson and by providing a new algorithm that compliments Jakobsson's algorithm. Our method assumes specialized hardware. The physical hardware is assumed to be memory and processor constraine... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Approach for Discovering and Handling Crisis in a Service-Oriented Environment

    Publication Year: 2007 , Page(s): 16 - 24
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (6851 KB) |  | HTML iconHTML  

    In an emergency situation failure to respond in a timely manner poses a significant threat. Data needed for timely response comes from various sources and sensors. These individual data streams when viewed in isolation may appear irrelevant, however, when analyzed collectively may identify potential threats. An effective and timely response also requires collaboration and information sharing among... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Quick Group Decision-making Planning Method for Emergency Response

    Publication Year: 2007 , Page(s): 25 - 31
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (3803 KB) |  | HTML iconHTML  

    To support the group decision-making in emergency response, it is important to research on how to reach consensus quickly and reliably in the procedure of group decision-making. This paper proposes a new planning method to improve the efficiency of group decision-making based on Markov chain model and uses a real case example of New Orleans Hurricane Katrina to illustrate the usefulness and effect... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Architecture for an Automatic Customized Warning System

    Publication Year: 2007 , Page(s): 32 - 39
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (4615 KB) |  | HTML iconHTML  

    Public communication during natural and man-made disasters is a key issue that must be addressed to protect lives and properties. The choice of the best protective actions to take depends on a global situation-awareness that is not available to the general public. Emergency personnel and public authorities have the duty to inform the population before, during and after catastrophic events to suppo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic Social Network Analysis of a Dark Network: Identifying Significant Facilitators

    Publication Year: 2007 , Page(s): 40 - 46
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1860 KB) |  | HTML iconHTML  

    "Dark Networks" refer to various illegal and covert social networks like criminal and terrorist networks. These networks evolve over time with the formation and dissolution of links to survive control efforts by authorities. Previous studies have shown that the link formation process in such networks is influenced by a set of facilitators. However, there have been few empirical evaluations to dete... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Dynamic Social Network Software Platform for Counter-Terrorism Decision Support

    Publication Year: 2007 , Page(s): 47 - 54
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (4410 KB) |  | HTML iconHTML  

    DynNetSim is a dynamic network software platform for modeling and analyzing social and other networks as they evolve over time. DynNetSim combines stochastic modeling with a behavioral simulation framework that synthesizes system dynamics and computational agent paradigms. The resulting framework provides a holistic depiction of networks responding to influences of environmental forces, trends, an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Terrorism and Crime Related Weblog Social Network: Link, Content Analysis and Information Visualization

    Publication Year: 2007 , Page(s): 55 - 58
    Cited by:  Papers (12)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1555 KB) |  | HTML iconHTML  

    A Weblog is a Web site where entries are made in diary style, maintained by its sole author - a blogger, and displayed in a reverse chronological order. Due to the freedom and convenience of publishing in Weblogs, this form of media provides an ideal environment as a propaganda platform for terrorist groups to promote their ideologies and as an operation platform for organizing crimes. In this wor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Deployment of DNIDS in Social Networks

    Publication Year: 2007 , Page(s): 59 - 65
    Cited by:  Papers (4)  |  Patents (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (2199 KB) |  | HTML iconHTML  

    Internet users form social networks as they communicate with each other. Computer worms and viruses exploit these social networks in order to propagate to other users. In this paper we present a new framework aimed at slowing down or even preventing the propagation of computer worms and viruses in social networks. In the first part of the framework a social network has to be derived for a given co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Framework for an Adaptive Intrusion Detection System using Bayesian Network

    Publication Year: 2007 , Page(s): 66 - 70
    Cited by:  Papers (4)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1344 KB) |  | HTML iconHTML  

    The goal of a network-based intrusion detection system (IDS) is to identify malicious behavior that targets a network and its resources. Intrusion detection parameters are numerous and in many cases they present uncertain and imprecise causal relationships which can affect attack types. A Bayesian Network (BN) is known as graphical modeling tool used to model decision problems containing uncertain... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Classification of Attributes and Behavior in Risk Management Using Bayesian Networks

    Publication Year: 2007 , Page(s): 71 - 74
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (2392 KB) |  | HTML iconHTML  

    Security administration is an uphill task to implement in an enterprise network providing secured corporate services. With the slew of patches being released by network component vendors, system administrators require a barrage of tools for analyzing the risk due to vulnerabilities in those components. In addition, criticalities in patching some end hosts raises serious security issues about the n... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fine-Grained Reputation-based Routing in Wireless Ad Hoc Networks

    Publication Year: 2007 , Page(s): 75 - 78
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (4960 KB) |  | HTML iconHTML  

    Mobile ad-hoc networks (MANETs) are the best choice for instant networks when no fixed infrastructure is available. MANETs can support applications in a variety of areas like emergency assistance and inter-vehicle communications. Most developed wireless ad-hoc routing protocols are designed to discover and maintain an active path from source to destination with an assumption that every node is fri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Organizing Hot-Spot Police Patrol Routes

    Publication Year: 2007 , Page(s): 79 - 86
    Cited by:  Papers (11)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (868 KB) |  | HTML iconHTML  

    We address the problem of planning patrol routes to maximize coverage of important locations (hot spots) at minimum cost (length of patrol route). We model a road network using an edge-weighted graph in which edges represent streets, vertices represent intersections, and weights represent importance of the corresponding streets. We describe efficient methods that use this input to determine the mo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Host Architecture for Automobile License Plate Recognition

    Publication Year: 2007 , Page(s): 87 - 94
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (6565 KB) |  | HTML iconHTML  

    Automobile license plate recognition (ALPR) is becoming increasingly important to homeland security and law enforcement. There are a number of commercial vendors with tag recognition hardware and software in the ALPR market. Many of these vendors have developed open tag recognition solutions that run on laptop PCs with commodity video-capture devices as peripherals. Such PC-based solutions are qui... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Layered Dempster-Shafer Approach to Scenario Construction and Analysis

    Publication Year: 2007 , Page(s): 95 - 102
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (7363 KB) |  | HTML iconHTML  

    The ability to support creation and parallel analysis of competing scenarios is perhaps the greatest single challenge for today's intelligence analysis systems. Dempster-Shafer theory provides an evidentiary reasoning methodology for scenario construction and analysis that offers potential advantages when compared to other approaches such as Bayesian nets as it places less conceptual load on the a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Forecasting Terrorist Groups' Warfare: Conventional to CBRN

    Publication Year: 2007 , Page(s): 103 - 106
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (284 KB) |  | HTML iconHTML  

    To forecast the spectrum of warfare that a terrorist group is likely to conduct against a specific adversary, this paper proposes an indications and warning (I&W) methodology to comprehensively and systematically map significant indicators that need to be assessed, weighed, and correlated. A key proposition in this paper is that to adequately assess the likelihood and magnitude of the types of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Host Based Intrusion Detection using Machine Learning

    Publication Year: 2007 , Page(s): 107 - 114
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (3403 KB) |  | HTML iconHTML  

    Detecting unknown malicious code (malcode) is a challenging task. Current common solutions, such as anti-virus tools, rely heavily on prior explicit knowledge of specific instances of malcode binary code signatures. During the time between its appearance and an update being sent to anti-virus tools, a new worm can infect many computers and cause significant damage. We present a new host-based intr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.