Intelligence and Security Informatics



Similar documents
NATIONAL SECURITY CRITICAL MISSION AREAS AND CASE STUDIES

Jiexun Li, Ph.D. College of Information Science and Technology, Drexel University, Philadelphia, PA

AN INTELLIGENT ANALYSIS OF CRIME DATA USING DATA MINING & AUTO CORRELATION MODELS

Data Mining for Digital Forensics

FEATURE SPECIFIC CRIMINAL MAPPING USING DATA MINING TECHNIQUES AND GENERALIZED GAUSSIUN MIXTURE MODEL

Keywords cosine similarity, correlation, standard deviation, page count, Enron dataset

A Proposed Data Mining Model to Enhance Counter- Criminal Systems with Application on National Security Crimes

The Board of Directors

DATA MINING AND EXPERT SYSTEMS IN LAW ENFORCEMENT AGENCIES

Analysis of Fraud Detection Using WEKA Tool

Workshop on Internet and BigData Finance (WIBF)

Crime Hotspots Analysis in South Korea: A User-Oriented Approach

A New Method for Traffic Forecasting Based on the Data Mining Technology with Artificial Intelligent Algorithms

FXIC Shanghai 2014 Event Agenda

Design call center management system of e-commerce based on BP neural network and multifractal

Lihui Lin present Tsinghua University, School of Economics and Management Associate Professor, Department of Management Science and Engineering

MINFS544: Business Network Data Analytics and Applications

Web Crime Mining by Means of Data Mining Techniques

Fraud Detection with MATLAB Ian McKenna, Ph.D.

IMPROVING BUSINESS PROCESS MODELING USING RECOMMENDATION METHOD

Virginia Commonwealth University Premedical Graduate Certificate Program Class of 2015

Tracking System for GPS Devices and Mining of Spatial Data

Kaiquan Xu, Associate Professor, Nanjing University. Kaiquan Xu

The University of Jordan

Program 2014 Tsinghua-Sanya Workshop on Big Data: Opportunities, Challenges and Innovations Dec. 27 Dec. 30, 2014 Sanya, China

A Dynamic Approach to Extract Texts and Captions from Videos

SU Qiang Professor

Internet of Things for Smart Crime Detection

Inner Classification of Clusters for Online News

IBM Technology in Public Safety

E-Life: Web-Enabled Convergence of Commerce, Work, and Social Life

Development of a Web-based Information Service Platform for Protected Crop Pests

1 Results from Prior Support

Data Mining Algorithms and Techniques Research in CRM Systems

Task Area 1: IT Services for Biomedical Research, Health Sciences, and Healthcare

88 MAYNARD COOPER & GALE ATTORNEYS LISTED IN THE 2016 BEST LAWYERS IN AMERICA

Process Planning and Scheduling for Distributed Manufacturing

Xianjun Geng. Master of Engineering (Pattern Recognition & Intelligent System), July 1999

LIST OF ATTORNEYS PRACTICING CRIMINAL LAW

Design of Electronic Medical Record System Based on Cloud Computing Technology

Data Mining Approaches to Criminal Career Analysis

Data Mining Governance for Service Oriented Architecture

Modelling Architecture for Multimedia Data Warehouse

Introduction to Data Mining and Machine Learning Techniques. Iza Moise, Evangelos Pournaras, Dirk Helbing

Contents. Part I. The Context for Public Health Informatics. Part II. The Science of Public Health Informatics. Foreword. Series Preface.

A Cloud Computing-Based ERP System under The Cloud Manufacturing

Big Data Analytics in Mobile Environments

Editorial Board. for the English edition of. The Clinical Practice of Chinese Medicine Series

Apply On-Line Analytical Processing (OLAP)With Data Mining For Clinical Decision Support

Classification of Instant Messaging Communications for Forensics Analysis

System Behavior Analysis by Machine Learning

Detecting Suspicion Information on the Web Using Crime Data Mining Techniques

Reinventing Business Intelligence through Big Data

MULTI AGENT-BASED DISTRIBUTED DATA MINING

Capability Service Management System for Manufacturing Equipments in

OHIO PEACE OFFICER TRAINING COMMISSION SCHOOL CALENDAR. Sinclair Criminal Justice Training Academy BAS 15 JUNE 13, 2015 TO DECEMBER 11, 2015

en fi lm af Zhang Yang instruktøren bag den kinesiske fi lmperle Badeanstalten Premiere 31. oktober

Data Mining and Business Intelligence CIT-6-DMB. Faculty of Business 2011/2012. Level 6

University of Melbourne. Sesto Eric. University of New South Wales Medicine 42. University of Queensland. University of Melbourne Science 41

Setting the Standard for Safe City Projects in the United States

шли Information Visualization in Data Mining and Knowledge Discovery Edited by digimine, Inc. University of Massachusetts, Lowell

CRIMINAL JURY CALENDAR

The 2 nd Hong Kong Public Relations Awards 2014 Now Calling For Entry

Finding similar case subset and hotspot detection in felonious data set using data mining algorithms: Weighted Clustering and classification

Colorado School of Mines Computer Vision Professor William Hoff

Big Data Storage Architecture Design in Cloud Computing

Research of Smart Space based on Business Intelligence

Log Analysis of Academic Digital Library: User Query Patterns

An Efficiency Keyword Search Scheme to improve user experience for Encrypted Data in Cloud

COMPLETION OF THE REORGANISATION CONTINUING CONNECTED TRANSACTIONS BETWEEN NEW WORLD INFRASTRUCTURE LIMITED AND PACIFIC PORTS COMPANY LIMITED

A Multi-layer Tree Model for Enterprise Vulnerability Management

Introduction to Text Mining and Semantics. Seth Grimes -- President, Alta Plana

Big Data Classification: Problems and Challenges in Network Intrusion Prediction with Machine Learning

Technical Program 研 讨 会 程 序 手 册

SPATIAL DATA CLASSIFICATION AND DATA MINING

RESEARCH INTERESTS Modeling and Simulation, Complex Systems, Biofabrication, Bioinformatics

Customer Relationship Management using Adaptive Resonance Theory

BUSINESS INTELLIGENCE

Method of Fault Detection in Cloud Computing Systems

HHSN W 1 QSSI - Quality Software Services, Inc

(IEEE Standards Coordinating Committee on Transportation)

Social Data Science for Intelligent Cities

The Commons China Law and Business Mission

MATHEMATICAL LOGIC FOR COMPUTER SCIENCE

SURENDRA SARNIKAR. 820 N Washington Ave, EH7 sarnikar@acm.org Madison, SD Phone:

Table of Contents. Introduction 2. Beware of Hackers 3. Protection against Malicious Software 9. Self Defence for Cyber Security 14

International Journal of Scientific & Engineering Research, Volume 5, Issue 4, April ISSN

A Study on Integrating Business Intelligence into E-Business

Secure semantic based search over cloud

Curriculum Vitae RESEARCH INTERESTS EDUCATION. SELECTED PUBLICATION Journal. Current Employment: (August, 2012 )

Conceptual Integrated CRM GIS Framework

Transcription:

Hsinchun Chen Richard Miranda Daniel D. Zeng Chris Demchak Jenny Schroeder Therani Madhusudan (Eds.) 2008 AGI-Information Management Consultants May be used for personal purporses only or by libraries associated to dandelon.com network. Intelligence and Security Informatics First NSF/NIJ Symposium, ISI 2003 Tucson, AZ, USA, June 2-3, 2003 Proceedings Springer

Table of Contents Part I: Full Papers Using Support Vector Machines for Terrorism Information Extraction 1 Aixin Sun, Myo-Myo Naing, Ee-Peng Lim, Wai Lam Criminal Incident Data Association Using the OLAP Technology 13 Song Lin, Donald E. Brown Names: A New Frontier in Text Mining 27 Frankie Potman, Paul Thompson Web-Based Intelligence Reports System 39 Alexander Dolotov, Mary Strickler Authorship Analysis in Cybercrime Investigation 59 Rong Zheng, Yi Qin, Zan Huang, Hsinchun Chen Deception Detection Behavior Profiling of Email 74 Salvatore J. Stolfo, Shlomo Hershkop, Ke Wang, Olivier Nimeskern, Chia-WeiHu \ Detecting Deception through Linguistic Analysis 91 Judee K. Burgoon, J.P. Blair, Tiantian Qin, Jay F. Nunamaker, Jr A Longitudinal Analysis of Language Behavior of Deception in E-mail... 102 Lina Zhou, Judee K. Burgoon, Douglas P. Twitchell Analytical Techniques Evacuation Planning: A Capacity Constrained Routing Approach Qingsong Lu, Yan Huang, Shashi Shekhar Ill Locating Hidden Groups in Communication Networks Using Hidden Markov Models 126 Malik Mag don-ismail, Mark Goldberg, William Wallace, David Siebecker

XII Table of Contents Automatic Construction of Cross-Lingual Networks of Concepts from the Hong Kong SAR Police Department 138 Kar Wing Li, Christopher C. Yang Decision Based Spatial Analysis of Crime 153 Yifei Xue, Donald E. Brown Visualization CrimeLink Explorer: Using Domain Knowledge to Facilitate Automated Crime Association Analysis 168 Jennifer Schroeder, Jennifer Xu, Hsinchun Chen A Spatio Temporal Visualizer for Law Enforcement 181 Ty Buetow, Luis Chaboya, Christopher O'Toole, Tom Cushna, Damien Daspit, Tim Petersen, Homa Atabakhsh, Hsinchun Chen Tracking Hidden Groups Using Communications 195 Sudarshan S. Chawathe Knowledge Management and Adoption Examining Technology Acceptance by Individual Law Enforcement Officers: An Exploratory Study 209 Paul Jen-Hwa Hu, Chienting Lin, Hsinchun Chen "Atrium" - A Knowledge Model for Modern Security Forces in the Information and Terrorism Age 223 Chris C. Demchak Untangling Criminal Networks: A Case Study 232 Jennifer Xu, Hsinchun Chen Collaborative Systems and Methodologies Addressing the Homeland Security Problem: A Collaborative Decision-Making Framework 249 T.S. Raghu, R. Ramesh, Andrew B. Whinston Collaborative Workflow Management for Interagency Crime Analysis... 266 J. Leon Zhao, Henry H. Bi, Hsinchun Chen COPLINK Agent: An Architecture for Information Monitoring and Sharing in Law Enforcement 281 Daniel Zeng, Hsinchun Chen, Damien Daspit, Fu Shan, Suresh Nandiraju, Michael Chau, Chienting Lin

Table of Contents XIII Monitoring and Surveillance Active Database Systems for Monitoring and Surveillance 296 Antonio Badia Integrated "Mixed" Networks Security Monitoring - A Proposed Framework 308 William T. Scherer, Leah L. Spradley, Marc H. Evans Bioterrorism Surveillance with Real-Time Data Warehousing 322 Donald J. Berndt, Alan R. Hevner, James Studnicki Part II: Short Papers Privacy Sensitive Distributed Data Mining from Multi-party Data 336 Hillol Kargupta, Kun Liu, Jessica Ryan PROGENIE: Biographical Descriptions for Intelligence Analysis 343 Pablo A. Duboue, Kathleen R. McKeown, Vasileios Hatzivassiloglou Scalable Knowledge Extraction from Legacy Sources with SEEK 346 Joachim Hammer, William O'Brien, Mark Schmalz "TalkPrinting": Improving Speaker Recognition by Modeling Stylistic Features 350 Sachin Kajarekar, Kemal Sonmez, Ludana Ferrer, Venkata Gadde, Anand Venkataraman, Elizabeth Shriberg, Andreas Stolcke, Harry Bratt Emergent Semantics from Users' Browsing Paths 355 D. V. Sreenath, W.I. Grosky, F. Fotouhi Deception Detection Designing Agent99 Trainer: A Learner-Centered, Web-Based Training System for Deception Detection 358 Jinwei Cao, Janna M. Crews, Ming Lin, Judee Burgoon, Jay F. Nunamaker Training Professionals to Detect Deception 366 Joey F. George, David P. Biros, Judee K. Burgoon, Jay F. Nunamaker, Jr. An E-mail Monitoring System for Detecting Outflow of Confidential Documents 371 Bogju Lee, Youna Park

XIV Table of Contents Methodologies and Applications Intelligence and Security Informatics: An Information Economics Perspective 375 Lihui Lin, Xianjun Geng, Andrew B. Whinston An International Perspective on Fighting Cybercrime 379 Weiping Chang, Wingyan Chung, Hsinchun Chen, Shihchieh Chou Part III: Extended Abstracts for Posters Hiding Traversal of Tree Structured Data from Untrusted Data Stores 385 Ping Lin, K. Selcuk Candan Criminal Record Matching Based on the Vector Space Model 386 Jau-Hwang Wang, Bill T. Lin, Ching-Chin Shieh, Peter S. Deng Database Support for Exploring Criminal Networks 387 M.N. Smith, P.J.H. King Hiding Data and Code Security for Application Hosting Infrastructure 388 Ping Lin, K. Selcuk Candan, Rida Bazzi, Zhichao Liu Security Informatics Secure Information Sharing and Information Retrieval Infrastructure with GridIR 389 Gregory B. Newby, Kevin Gamiel Semantic Hacking and Intelligence and Security Informatics 390 Paul Thompson Author Index 391