Intelligence and security informatics (ISI) is concerned with the study of the development and use of advanced information technologies and systems for national, international, and societal security-related applications. The annual IEEE International Conference series on ISI was started in 2003 and the first four meetings were held in the United States. In 2006, the Workshop on ISI (http://isi. se. cuhk. edu. hk/2006/) was held in Singapore in conjunction with the Pacific Asia Conference on Knowledge Discovery and Data Mining, with over 100 contributors and participants from all over the world. These past ISI conferences have brought together academic researchers, law enforcement and intelligence experts, information technology consultants, and practitioners to discuss their research and practice related to various ISI topics including ISI data management, data and text mining for ISI applications, terrorism informatics, deception and intent detection, terrorist and criminal social network analysis, public health and bio-security, crime analysis, cyber-infrastructure protection, transportation infrastructure security, policy studies and evaluation, and information assurance, among others. We continued this stream of ISI conferences by organizing the 2007 Pacific Asia Workshop on ISI (PAISI 2007) to especially provide a stimulating forum for ISI researchers in Pacific Asia and other regions of the world to exchange ideas and report research progress. PAISI 2007 was hosted by the Chinese Academy of Sciences, the University of Arizona, and the Chinese University of Hong Kong.
Author(s): Hsinchun Chen (auth.), Christopher C. Yang, Daniel Zeng, Michael Chau, Kuiyu Chang, Qing Yang, Xueqi Cheng, Jue Wang, Fei-Yue Wang, Hsinchun Chen (eds.)
Series: Lecture Notes in Computer Science 4430
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2007
Language: English
Pages: 332
Tags: Information Systems Applications (incl.Internet); Information Storage and Retrieval; Computer Communication Networks; Computers and Society; Legal Aspects of Computing; Management of Computing and Information Systems
Front Matter....Pages -
Exploring Extremism and Terrorism on the Web: The Dark Web Project....Pages 1-20
Analyzing and Visualizing Gray Web Forum Structure....Pages 21-33
An Empirical Analysis of Online Gaming Crime Characteristics from 2002 to 2004....Pages 34-45
Detecting Cyber Security Threats in Weblogs Using Probabilistic Models....Pages 46-57
What-if Emergency Management System: A Generalized Voronoi Diagram Approach....Pages 58-69
Agent Based Framework for Emergency Rescue and Assistance Planning....Pages 70-81
Object Tracking with Self-updating Tracking Window....Pages 82-93
A Case-Based Evolutionary Group Decision Support Method for Emergency Response....Pages 94-104
Lightweight Anomaly Intrusion Detection in Wireless Sensor Networks....Pages 105-116
ASITL: Adaptive Secure Interoperation Using Trust-Level....Pages 117-128
A RT0-Based Compliance Checker Model for Automated Trust Negotiation....Pages 129-140
TCM-KNN Algorithm for Supervised Network Intrusion Detection....Pages 141-151
Research on Hidden Markov Model for System Call Anomaly Detection....Pages 152-159
Towards Identifying True Threat from Network Security Data....Pages 160-171
Security Assessment for Application Network Services Using Fault Injection....Pages 172-183
A Secure Data Transmission Protocol for Mobile Ad Hoc Networks....Pages 184-195
Defending DDoS Attacks Using Hidden Markov Models and Cooperative Reinforcement Learning....Pages 196-207
A Novel Relational Database Watermarking Algorithm....Pages 208-219
Anticipatory Event Detection for Bursty Events....Pages 220-225
Community Detection in Scale-Free Networks Based on Hypergraph Model....Pages 226-231
The Treelike Assembly Classifier for Pedestrian Detection....Pages 232-237
A Proposed Data Mining Approach for Internet Auction Fraud Detection....Pages 238-243
Trends in Computer Crime and Cybercrime Research During the Period 1974-2006: A Bibliometric Approach....Pages 244-250
The Study of Government Website Information Disclosure in Taiwan....Pages 251-256
Informed Recognition in Software Watermarking....Pages 257-261
An Inference Control Algorithm for RDF(S) Repository....Pages 262-268
PPIDS: Privacy Preserving Intrusion Detection System....Pages 269-274
Evaluating the Disaster Defense Ability of Information Systems....Pages 275-281
Airline Safety Evaluation Based on Fuzzy TOPSIS....Pages 282-287
A Framework for Proving the Security of Data Transmission Protocols in Sensor Network....Pages 288-294
Port and Address Hopping for Active Cyber-Defense....Pages 295-300
A Hybrid Model for Worm Simulations in a Large Network....Pages 301-306
A Web Portal for Terrorism Activities in China....Pages 307-308
An Overview of Telemarketing Fraud Problems and Countermeasures in Taiwan....Pages 309-310
Mining the Core Member of Terrorist Crime Group Based on Social Network Analysis....Pages 311-313
Providing Personalized Services for HWME System by Item-Based Collaborative Filtering....Pages 314-315
An Intelligent Agent-Oriented System for Integrating Network Security Devices and Handling Large Amount of Security Events....Pages 316-317
Link Analysis-Based Detection of Anomalous Communication Patterns....Pages 318-320
Social Modeling and Reasoning for Security Informatics....Pages 321-322
Detecting Botnets by Analyzing DNS Traffic....Pages 323-324
HMM-Based Approach for Evaluating Risk Propagation....Pages 325-326
A Symptom-Based Taxonomy for an Early Detection of Network Attacks....Pages 327-328
Back Matter....Pages -