By Topic

2009 IEEE International Conference on Intelligence and Security Informatics

8-11 June 2009

Filter Results

Displaying Results 1 - 25 of 79
  • IEEE ISI 2009 welcome message from conference co-chairs

    Publication Year: 2009, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (43 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Program Chairs

    Publication Year: 2009, Page(s): ii
    Request permission for commercial reuse | PDF file iconPDF (41 KB) | HTML iconHTML
    Freely Available from IEEE
  • ISI 2009 conference organizers

    Publication Year: 2009, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (39 KB)
    Freely Available from IEEE
  • ISI 2009 Program Committee

    Publication Year: 2009, Page(s):iv - v
    Request permission for commercial reuse | PDF file iconPDF (43 KB)
    Freely Available from IEEE
  • IEEE ISI 2009 sponsors

    Publication Year: 2009, Page(s): vi
    Request permission for commercial reuse | PDF file iconPDF (68 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2009, Page(s):vii - xii
    Request permission for commercial reuse | PDF file iconPDF (75 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2009, Page(s):xiii - xviii
    Request permission for commercial reuse | PDF file iconPDF (60 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2009, Page(s): xix
    Request permission for commercial reuse | PDF file iconPDF (533 KB)
    Freely Available from IEEE
  • On the mitigation of bioterrorism through game theory

    Publication Year: 2009, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (451 KB) | HTML iconHTML

    Bioterrorism represents a serious threat to the security of civilian populations. The nature of an epidemic requires careful consideration of all possible vectors over which an infection can spread. Our work takes the SIR model and creates a detailed hybridization of existing simulations to allow a large search space to be explored. We then create a Stackelberg game to evaluate all possibilities w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Stability of individual and group behavior in a blog network

    Publication Year: 2009, Page(s):7 - 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (227 KB) | HTML iconHTML

    This work experimentally examines different notions of stability of the behavior of individuals and groups in a network of blogs. Our experiments are conducted on data collected from LiveJournal. All stability notions aim to locate stable behavior within an individual's area, which is defined in a variety of manners. Our experiments confirm an earlier observation of the highly dynamic nature of th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Observation of network structure in Amazon.com

    Publication Year: 2009, Page(s):13 - 18
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1739 KB) | HTML iconHTML

    Amazon.com is among the largest bookstores on the Internet. It provides the sales rank of each book. Our hypothesis is as follows: if a book has low sales rank (i.e., it is well-sold), the related book also has a low sales rank. In the small world principle, if a network is connected, any two nodes are connected with relatively small number of links. If this hypothesis is true, any book can link t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Social network classification incorporating link type values

    Publication Year: 2009, Page(s):19 - 24
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (107 KB) | HTML iconHTML

    Classification of nodes in a social network and its applications to security informatics have been extensively studied in the past. However, previous work generally does not consider the types of links (e.g., whether a person is friend or a close friend) that connect social networks members for classification purposes. Here, we propose modified Naive Bayes Classification schemes to make use of the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mining top-k and bottom-k correlative crime patterns through graph representations

    Publication Year: 2009, Page(s):25 - 30
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (896 KB) | HTML iconHTML

    Crime activities are geospatial phenomena and as such are geospatially, thematically and temporally correlated. Thus, crime datasets must be interpreted and analyzed in conjunction with various factors that can contribute to the formulation of crime. Discovering these correlations allows a deeper insight into the complex nature of criminal behavior. We introduce a graph based dataset representatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Factors influencing Bloggers' perceived indentifiability

    Publication Year: 2009, Page(s):31 - 36
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (86 KB) | HTML iconHTML

    Prior research found that the majority of blogs are personal and relational in nature where bloggers reveal intimate information about themselves and target their public posts to their off-line social networks. These personal-journal style blogs expose their authors to potential privacy risks. Bloggers may choose to conceal their identities to mitigate the privacy concerns or disclose their identi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Prediction of past unsolved terrorist attacks

    Publication Year: 2009, Page(s):37 - 42
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (161 KB) | HTML iconHTML

    In this study, a novel model is proposed to predict perpetuators of some terrorist events which are remain unsolved. The CPM learns from similarities between terrorist attacks and their crime attributes then puts them in appropriate clusters. Solved and unsolved attacks are gathered in the same - all linked to each other - ldquoumbrellardquo clusters; then CPM classifies all related terrorist even... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hardening adversarial prediction with anomaly tracking

    Publication Year: 2009, Page(s):43 - 48
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (418 KB) | HTML iconHTML

    Predictors are often regarded as black boxes that treat all incoming records exactly the same, regardless of whether or not they resemble those from which the predictor was built. This is inappropriate, especially in adversarial settings where rare but unusual records are of critical importance and some records might occur because of deliberate attempts to subvert the entire process. We suggest th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Supporting data exploration in databases

    Publication Year: 2009, Page(s):49 - 54
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (449 KB) | HTML iconHTML

    We propose a solution to the problem of exploring large, complex data sets in a (relational) database by a human user. In a nutshell, our proposed solution is to develop the tools to support data exploration and browsing in an organized manner. We introduce: (a) an organization of data around the idea of defining distances on data sets, to reflect the intuitive notion of data that is (closely) rel... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Change point detection based on call detail records

    Publication Year: 2009, Page(s):55 - 60
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (121 KB) | HTML iconHTML

    In this paper we propose a method for combining wavelet denoising and sequential approach for detecting change points on mobile phone based on detailed call records. The Minmax method is used to estimate the thresholds of frequency and call duration for denoising. This work is useful to enhance homeland security, detecting unwanted calls (e.g., spam) and commercial purposes. For validation of our ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Gender difference analysis of political web forums: An experiment on an international islamic women's forum

    Publication Year: 2009, Page(s):61 - 64
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (71 KB) | HTML iconHTML

    As an important type of social media, the political Web forum has become a major communication channel for people to discuss and debate political, cultural and social issues. Although the Internet has a male-dominated history, more and more women have started to share their concerns and express opinions through online discussion boards and Web forums. This paper presents an automated approach to g... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Web opinions analysis with scalable distance-based clustering

    Publication Year: 2009, Page(s):65 - 70
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (226 KB) | HTML iconHTML

    Due to the advance of Web 2.0 technologies, a large volume of Web opinions are available in computer-mediated communication sites such as forums and blogs. Many of these Web opinions involve terrorism and crime related issues. For instances, some terrorist groups may use Web forums to propagandize their ideology, some may post threaten messages, and some criminals may recruit members or identify v... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dark web forums portal: Searching and analyzing jihadist forums

    Publication Year: 2009, Page(s):71 - 76
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (215 KB) | HTML iconHTML

    With the advent of Web 2.0, the Web is acting as a platform which enables end-user content generation. As a major type of social media in Web 2.0, Web forums facilitate intensive interactions among participants. International Jihadist groups often use Web forums to promote violence and distribute propaganda materials. These Dark Web forums are heterogeneous and widely distributed. Therefore, how t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The software EBox: Integrated information for situational awareness

    Publication Year: 2009, Page(s):77 - 82
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1410 KB) | HTML iconHTML

    This paper describes the development of the ldquoEBoxrdquo, a system that provides integrated access to a wide variety of information sources relevant to providing situational awareness during emergency response situations. The EBox exemplifies a novel information integration approach in which both pre-existing data and real-time information streams are obtained from multiple sources and are rapid... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Voronoi-based model for emergency planning using sequential-scan algorithms

    Publication Year: 2009, Page(s):83 - 88
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (887 KB) | HTML iconHTML

    We propose efficient and effective sequential-scan algorithms for intelligent emergency planning, spatial analysis and disaster decision support through the use of Voronoi Tessellations. We propose a modified distance transform algorithm to include complex primitives (point, line and area), Minkowski metrics, different weights, obstacles and higher-order Voronoi diagrams. Illustrated examples demo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A game theory approach for the reallocation of security forces against terrorist diversionary attacks

    Publication Year: 2009, Page(s):89 - 94
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (119 KB) | HTML iconHTML

    Terrorists tend to coordinate multiple raids which, combined with diversionary attacks are designed to divert the attention of the security forces, causing them to take a longer time to respond. This in turn enables the terrorists to cause more casualties at their primary target. It is important to efficiently reallocate the available security forces to meet these terrorist attacks, especially whe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Supporting emergent knowledge and team communication in police investigations

    Publication Year: 2009, Page(s):95 - 100
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (375 KB) | HTML iconHTML

    This paper focuses on police investigations conducted by small teams of officers as they usually work on solving violent crimes. Collaboration and communication are important aspects as well as connecting pieces of information that become known to the officers over time. This is an important application domain of knowledge management, and in particular hypertext. We present a prototypic applicatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.