2012 IEEE International Conference on Intelligence and Security Informatics

11-14 June 2012

Filter Results

Displaying Results 1 - 25 of 60
  • [Front cover]

    Publication Year: 2012, Page(s):c1 - c4
    Request permission for commercial reuse | PDF file iconPDF (645 KB)
    Freely Available from IEEE
  • ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities [frontmatter]

    Publication Year: 2012, Page(s):i - xvi
    Request permission for commercial reuse | PDF file iconPDF (29116 KB)
    Freely Available from IEEE
  • Cloud-enabled data sharing model

    Publication Year: 2012, Page(s):1 - 6
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (436 KB) | HTML iconHTML

    Database-as-a-Service is becoming more and more popular for many organizations. Storing data on the cloud can significantly reduce costs in terms of maintenance costs and initial investment costs. But due to data privacy and security concerns, many companies are still reluctant to use outsourced database service. In this paper, we present a solution to protect data privacy on the cloud, at the sam... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A game theory approach to deception strategy in computer mediated communication

    Publication Year: 2012, Page(s):7 - 11
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (542 KB) | HTML iconHTML

    Many computer-based communication media offer visual anonymity. As a result, detecting online deception tends to be more difficult relative to traditional non-mediated communication. The state of the art research on online deception has focused on using linear statistical approaches to identifying behavioral differences between deceivers and truth-tellers. However, deception behaviors are not line... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Impact of anti-phishing tool performance on attack success rates

    Publication Year: 2012, Page(s):12 - 17
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1815 KB) | HTML iconHTML

    Phishing website-based attacks continue to present significant problems for individual and enterprise-level security, including identity theft, malware, and viruses. While the performance of anti-phishing tools has improved considerably, it is unclear how effective such tools are at protecting users. In this study, an experiment involving over 400 participants was used to evaluate the impact of an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Predictive defense against evolving adversaries

    Publication Year: 2012, Page(s):18 - 23
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (696 KB) | HTML iconHTML

    Adaptive adversaries are a primary concern in several domains, including cyber defense, border security, counterterrorism, and fraud prevention, and consequently there is great interest in developing defenses that maintain their effectiveness in the presence of evolving adversary strategies and tactics. This paper leverages the coevolutionary relationship between attackers and defenders to derive ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Securing cyberspace: Identifying key actors in hacker communities

    Publication Year: 2012, Page(s):24 - 29
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (673 KB) | HTML iconHTML

    As the computer becomes more ubiquitous throughout society, the security of networks and information technologies is a growing concern. Recent research has found hackers making use of social media platforms to form communities where sharing of knowledge and tools that enable cybercriminal activity is common. However, past studies often report only generalized community behaviors and do not scrutin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An efficient secure comparison protocol

    Publication Year: 2012, Page(s):30 - 35
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (473 KB) | HTML iconHTML

    We propose a new efficient cryptography-based secure comparison protocol for comparing secrets that are additively split between two parties. Our solution, based on homomorphic cryptosystems, needs 2N + 6 invocations of secure multiplications when the two secrets are numbers in the range [0; 2N); previous solutions required 12N + O(1) secure multiplications. The protocol provides substa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Spatio-temporal modeling of criminal incidents using geographic, demographic, and twitter-derived information

    Publication Year: 2012, Page(s):36 - 41
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (888 KB) | HTML iconHTML

    Personal and property crimes create large economic losses within the United States. To prevent crimes, law enforcement agencies model the spatio-temporal pattern of criminal incidents. In this paper, we present a new modeling process that combines two of our recently developed approaches for modeling criminal incidents. The first component of the process is the spatio-temporal generalized additive... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Outlier detection using semantic sensors

    Publication Year: 2012, Page(s):42 - 47
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4503 KB) | HTML iconHTML

    We describe a technique that calculates the expected relationships among attributes from training data, and uses this to generate anomaly scores reflecting the intuition that a record with anomalous values for related attributes is more anomalous than one with anomalous values for unrelated attributes. The expected relations among attributes are calculated in two ways: using a data-dependent proje... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An active binocular integrated system for intelligent robot vision

    Publication Year: 2012, Page(s):48 - 53
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4650 KB) | HTML iconHTML

    Rescue robots possessing human-like active binocular systems would allow high quality remote control by 3D viewing and stable robot vision. However, this type of system has not been researched thoroughly because it is difficult to control, and there are few accurate integrated eye motion control models. In this paper, we propose an integrated eye motion control system for a rescue robot, which int... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Police patrol district design using agent-based simulation and GIS

    Publication Year: 2012, Page(s):54 - 59
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (944 KB) | HTML iconHTML

    Police patrols play an important role in public safety. The patrol district design is an important factor affecting the patrol performances, such as average response time and workload variation. The redistricting procedure can be described as partitioning smaller geographical units into several larger districts with the constraints of contiguity and compactness. The size of the possible sample spa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Structural analysis of online criminal social networks

    Publication Year: 2012, Page(s):60 - 65
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (794 KB) | HTML iconHTML

    Over the last decade, a sophisticated underground economy has emerged over the Internet in which cybercriminals collaborate and trade different goods and services. This study takes a unique approach towards understanding the functioning of the underground economy by focusing on the social dynamics between the cybercriminals. Using anonymized private messaging records from four underground forums f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Leveraging sociological models for prediction I: Inferring adversarial relationships

    Publication Year: 2012, Page(s):66 - 71
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (507 KB) | HTML iconHTML

    There is considerable interest in developing techniques for predicting human behavior, for instance to enable emerging contentious situations to be anticipated or permit the nature of ongoing but “hidden” activities to be inferred. A promising approach to this problem is to collect appropriate empirical data and then apply machine learning methods to the data to generate the predicti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Leveraging sociological models for prediction II: Early warning for complex contagions

    Publication Year: 2012, Page(s):72 - 77
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (480 KB) | HTML iconHTML

    There is considerable interest in developing techniques for predicting human behavior, and a promising approach to this problem is to collect phenomenon-relevant empirical data and then apply machine learning methods to these data to form predictions. This two-part paper shows that the performance of such learning algorithms often can be improved substantially by leveraging sociological models in ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scalable sentiment classification across multiple Dark Web Forums

    Publication Year: 2012, Page(s):78 - 83
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (777 KB) | HTML iconHTML

    This study examines several approaches to sentiment classification in the Dark Web Forum Portal, and opportunities to transfer classifiers and text features across multiple forums to improve scalability and performance. Although sentiment classifiers typically perform poorly when transferred across domains, experimentation reveals the devised approaches offer performance equivalent to the traditio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Machine learning for the automatic identification of terrorist incidents in worldwide news media

    Publication Year: 2012, Page(s):84 - 89
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1138 KB) | HTML iconHTML

    The RAND Database of Worldwide Terrorism Incidents (RDWTI) seeks to index information about all terrorist incidents that occur and are mentioned in worldwide news media, providing a useful resource for policy researchers and decision makers. We examined automated classification methods that could be used to identify news articles about terrorist incidents, thus enabling analysts to read a smaller ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Rebel with many causes: A computational model of insurgency

    Publication Year: 2012, Page(s):90 - 95
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (521 KB) | HTML iconHTML

    Attempts to model insurgency have suffered from several obstacles. Qualitative research may be vague and conflicting, while quantitative research is limited due to the difficulties of collecting sufficient data in war and inferring complex relationships. We propose an innovative combination of Fuzzy Cognitive Maps and Cellular Automata to capture this complexity. Our approach is computational, thu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Partially supervised learning for radical opinion identification in hate group web forums

    Publication Year: 2012, Page(s):96 - 101
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (820 KB) | HTML iconHTML

    Web forums are frequently used as platforms for the exchange of information and opinions, as well as propaganda dissemination. But online content can be misused when the information being distributed, such as radical opinions, is unsolicited or inappropriate. However, radical opinion is highly hidden and distributed in Web forums, while non-radical content is unspecific and topically more diverse.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Phishing website detection using Latent Dirichlet Allocation and AdaBoost

    Publication Year: 2012, Page(s):102 - 107
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (863 KB) | HTML iconHTML

    One of the ways criminals steal identity in the cyberspace is using phishing. Attackers host phishing websites that resemble a legitimate website and entice users to click on hyperlinks which directs them to these fake websites. Attackers use these fake sites to capture personal information such as login, passwords and social security numbers from innocent victims, which they later use to commit c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An event-driven SIR model for topic diffusion in web forums

    Publication Year: 2012, Page(s):108 - 113
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (710 KB) | HTML iconHTML

    Social media is being increasingly used as a communication channel. Among social media, web forums, where people in online communities disseminate and receive information by interaction, provide a good environment to examine information diffusion. In this research, we aim to understand the mechanisms and properties of the information diffusion in the web forum. For that, we model topic-level infor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Acquiring netizen group's opinions for modeling food safety events

    Publication Year: 2012, Page(s):114 - 119
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (455 KB) | HTML iconHTML

    Food safety events are typical public security events that draw great public concern. In food safety events, millions of netizens pay close attention to the event, express their opinions online and thus influence the decisions of government or food producers. Modeling netizen groups, especially the dynamics of their opinions in these events, can help us understand the mechanism and evolvement of s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Agile detection of framing rhetoric in social media

    Publication Year: 2012, Page(s):120 - 122
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (399 KB) | HTML iconHTML

    A frame in social theory is a schema of interpretation that individuals rely upon to understand and respond to events. Collective action frames are persuasive communications constructed during mobilization campaigns, frequently to call attention to a perceived problem or issue, itemize steps to resolve the issue, and motivate others regarding the issue's urgency and the importance of taking action... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Click frauds and price determination models

    Publication Year: 2012, Page(s):123 - 125
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (383 KB) | HTML iconHTML

    Click fraud (CF) has become a serious problem in the online advertising, making the anti-CF issue quite important. In this paper, we analyze the effects of the price determination model on the CF situations in online advertising. Our theoretical results show that the flat-rate model can induce more click frauds than the real-time-bidding model. Our finding is validated with a real advertising data... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exploratory experiments to identify fake websites by using features from the network stack

    Publication Year: 2012, Page(s):126 - 128
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (316 KB) | HTML iconHTML

    Users on the web are unknowingly becoming more susceptible to scams from cyber deviants and malicious websites. There has been much work in the identification of malicious websites using application layer features based on content (HTML, images, links, etc.) and a plethora of classification techniques. However, there has been little work on using features from the other layers in the Open Systems ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.