By Topic

Intelligence and Security Informatics, 2008. ISI 2008. IEEE International Conference on

Date 17-20 June 2008

Filter Results

Displaying Results 1 - 25 of 90
  • ISI 2008 Preface Welcome Message from Conference Co-chairs

    Publication Year: 2008, Page(s):ix - x
    Request permission for commercial reuse | PDF file iconPDF (136 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Program Chairs

    Publication Year: 2008, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (113 KB) | HTML iconHTML
    Freely Available from IEEE
  • ISI 2008 Conference Organizers

    Publication Year: 2008
    Request permission for commercial reuse | PDF file iconPDF (120 KB)
    Freely Available from IEEE
  • ISI 2008 Program Committee

    Publication Year: 2008, Page(s):xv - xvii
    Request permission for commercial reuse | PDF file iconPDF (118 KB)
    Freely Available from IEEE
  • IEEE ISI 2008 Sponsors

    Publication Year: 2008, Page(s): xviii
    Request permission for commercial reuse | PDF file iconPDF (972 KB)
    Freely Available from IEEE
  • IEEE ISI 2008 Detailed Program

    Publication Year: 2008, Page(s):xix - xxiii
    Request permission for commercial reuse | PDF file iconPDF (198 KB) | HTML iconHTML
    Freely Available from IEEE
  • Countering terrorism

    Publication Year: 2008, Page(s): xxiv
    Request permission for commercial reuse | PDF file iconPDF (161 KB)
    Freely Available from IEEE
  • Cyber crime and challenges for crime investigation in the information era

    Publication Year: 2008, Page(s):xxv - xxvi
    Request permission for commercial reuse | PDF file iconPDF (167 KB)
    Freely Available from IEEE
  • Homeland security data mining using social network analysis

    Publication Year: 2008, Page(s): xxvii
    Cited by:  Papers (1)
    Request permission for commercial reuse | PDF file iconPDF (162 KB)
    Freely Available from IEEE
  • Data mining for security applications: Mining concept-drifting data streams to detect peer to peer botnet traffic

    Publication Year: 2008, Page(s):xxix - xxx
    Cited by:  Papers (1)
    Request permission for commercial reuse | PDF file iconPDF (185 KB) | HTML iconHTML
    Freely Available from IEEE
  • Probabilistic frameworks for privacy-aware data mining

    Publication Year: 2008, Page(s):xxxi - xxxii
    Request permission for commercial reuse | PDF file iconPDF (180 KB)
    Freely Available from IEEE
  • Data mining for social network analysis

    Publication Year: 2008, Page(s):xxxiii - xxxiv
    Cited by:  Papers (5)
    Request permission for commercial reuse | PDF file iconPDF (180 KB) | HTML iconHTML
    Freely Available from IEEE
  • Social Computing: Fundamentals and applications

    Publication Year: 2008, Page(s):xxxv - xxxviii
    Request permission for commercial reuse | PDF file iconPDF (277 KB) | HTML iconHTML
    Freely Available from IEEE
  • Intelligent pattern recognition and biometrics

    Publication Year: 2008, Page(s):xxxix - xl
    Request permission for commercial reuse | PDF file iconPDF (199 KB)
    Freely Available from IEEE
  • Real time intrusion prediction, detection and prevention programs

    Publication Year: 2008, Page(s):xli - xlii
    Request permission for commercial reuse | PDF file iconPDF (179 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2008, Page(s):iii - viii
    Request permission for commercial reuse | PDF file iconPDF (193 KB)
    Freely Available from IEEE
  • Analysis of cyberactivism: A case study of online free Tibet activities

    Publication Year: 2008, Page(s):1 - 6
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (758 KB) | HTML iconHTML

    Cyberactivism refers to the use of the Internet to advocate vigorous or intentional actions to bring about social or political change. Cyberactivism analysis aims to improve the understanding of cyber activists and their online communities. In this paper, we present a case study of online Free Tibet activities. For web site analysis, we use the inlink and outlink information of five selected seed ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Developing ideological networks using social network analysis and writeprints: A case study of the international Falun Gong movement

    Publication Year: 2008, Page(s):7 - 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (771 KB) | HTML iconHTML

    The convenience of the Internet has made it possible for activist groups to easily form alliances through their Websites to appeal to wider audience and increase their impact. In this study, we investigate the potential of using social network analysis (SNA) and Writeprints to discover the fusion of activitst ideas on the Internet, focusing on the Falun Gong movement. We find that network visualiz... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detecting deception in testimony

    Publication Year: 2008, Page(s):13 - 18
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (208 KB) | HTML iconHTML

    Several models for deception in text, based on changes in usage frequency of certain classes of words, have been proposed. These are empirically derived from settings in which individuals are asked to lie or be truthful in freeform text. We consider the problem of detecting deception in testimony, where the content generated must necessarily be responsive to questions, where there is the opportuni... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Subverting prediction in adversarial settings

    Publication Year: 2008, Page(s):19 - 24
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (283 KB) | HTML iconHTML

    We show that two mainstream prediction techniques, support vector machines and decision trees, are easily subverted by inserting carefully-chosen training records. Furthermore, the relationship between the properties of the inserted record(s) and the regions for which the predictor will subsequently misclassify can be inferred, so desired misclassifications can be forced. In adversarial settings, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analyzing content development and visualizing social interactions in Web forum

    Publication Year: 2008, Page(s):25 - 30
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1596 KB) | HTML iconHTML

    Web forums provide platforms for any Internet users around the world to communicate with each other and express their opinions. In many of the discussions in Web forums, it involves issues related to terrorism and crime. Some participants are even using the platform to propagandize their ideology or recruit members to commit crime. In this work, we propose a Web forum analysis system to analyze th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Link analysis based on webpage co-occurrence mining - a case study on a notorious gang leader in Taiwan

    Publication Year: 2008, Page(s):31 - 34
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (673 KB) | HTML iconHTML

    The rapid development and integration of computer and communication technology have made the Internet one of the major media for communication. Nowadays, the Internet and world-wide-web (WWW) are used in every facet of modern society. This research proposes to develop a link analysis method based on Web page co-occurrence mining. The Google Internet search engine is used to gather Web pages releva... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A study on early decision making in objectionable web content classification

    Publication Year: 2008, Page(s):35 - 39
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (387 KB) | HTML iconHTML

    This study proposed early decision heuristics for objectionable content classification using an inverse chi-square classifier. The experimental results indicated that only examining the title plus 10% of a Web pagepsilas content can cost-effectively achieve an average precision of 93%. More importantly, the F1 measure achieved its best when the title plus 60% of the body was examined. T... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Information sharing and privacy protection of terrorist or criminal social networks

    Publication Year: 2008, Page(s):40 - 45
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (418 KB) | HTML iconHTML

    Terrorist or criminal social network analysis is helpful for intelligence and law enforcement force in investigation. However, individual agency usually has part of the complete terrorist or criminal social network and therefore some crucial knowledge is not able to be extracted. Sharing information between different agencies will make such social network analysis more effective; unfortunately, it... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A framework for privacy-preserving cluster analysis

    Publication Year: 2008, Page(s):46 - 51
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (294 KB) | HTML iconHTML

    Releasing person-specific data could potentially reveal sensitive information of individuals. k-anonymization is a promising privacy protection mechanism in data publishing. Though substantial research has been conducted on k-anonymization and its extensions in recent years, few of them consider releasing data for a specific purpose of data analysis. This paper presents a practical data publishing... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.