did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9783540401896

Intelligence and Security Informatics: First Nsf/Nij Symposium, Isi 2003, Tucson, Az, Usa, June 2-3, 2003 : Proceedings

by ; ; ; ; ;
  • ISBN13:

    9783540401896

  • ISBN10:

    354040189X

  • Format: Paperback
  • Copyright: 2003-05-01
  • Publisher: Springer Verlag
  • Purchase Benefits
List Price: $129.00 Save up to $110.44
  • Digital
    $40.22
    Add to Cart

    DURATION
    PRICE

Supplemental Materials

What is included with this book?

Summary

This book constitutes the refereed proceedings of the First NSF/NIJ Symposium on Intelligence and Security Informatics, ISI 2003, held in Tucson, AZ, USA in June 2003. The 24 revised full papers and 16 revised short papers presented were carefully reviewed and selected for inclusion in the book. The papers are organized in topical sections on data management and data mining, deception detection, analytical techniques, for crime detection, visualization, knowledge management and adoption, collaborative systems and methodologies, and monitoring and surveillance.

Table of Contents

Using Support Vector Machines for Terrorism Information Extractionp. 1
Criminal Incident Data Association Using the OLAP Technologyp. 13
Names: A New Frontier in Text Miningp. 27
Web-Based Intelligence Reports Systemp. 39
Authorship Analysis in Cybercrime Investigationp. 59
Behavior Profiling of Emailp. 74
Detecting Deception through Linguistic Analysisp. 91
A Longitudinal Analysis of Language Behavior of Deception in E-mailp. 102
Evacuation Planning: A Capacity Constrained Routing Approachp. 111
Locating Hidden Groups in Communication Networks Using Hidden Markov Modelsp. 126
Automatic Construction of Cross-Lingual Networks of Concepts from the Hong Kong SAR Police Departmentp. 138
Decision Based Spatial Analysis of Crimep. 153
CrimeLink Explorer: Using Domain Knowledge to Facilitate Automated Crime Association Analysisp. 168
A Spatio Temporal Visualizer for Law Enforcementp. 181
Tracking Hidden Groups Using Communicationsp. 195
Examining Technology Acceptance by Individual Law Enforcement Officers: An Exploratory Studyp. 209
"Atrium" - A Knowledge Model for Modern Security Forces in the Information and Terrorism Agep. 223
Untangling Criminal Networks: A Case Studyp. 232
Addressing the Homeland Security Problem: A Collaborative Decision-Making Frameworkp. 249
Collaborative Workflow Management for Interagency Crime Analysisp. 266
COPLINK Agent: An Architecture for Information Monitoring and Sharing in Law Enforcementp. 281
Active Database Systems for Monitoring and Surveillancep. 296
Integrated "Mixed" Networks Security Monitoring - A Proposed Frameworkp. 308
Bioterrorism Surveillance with Real-Time Data Warehousingp. 322
Privacy Sensitive Distributed Data Mining from Multi-party Datap. 336
ProGenIE: Biographical Descriptions for Intelligence Analysisp. 343
Scalable Knowledge Extraction from Legacy Sources with SEEKp. 346
"TalkPrinting": Improving Speaker Recognition by Modeling Stylistic Featuresp. 350
Emergent Semantics from Users' Browsing Pathsp. 355
Designing Agent99 Trainer: A Learner-Centered, Web-Based Training System for Deception Detectionp. 358
Training Professionals to Detect Deceptionp. 366
An E-mail Monitoring System for Detecting Outflow of Confidential Documentsp. 371
Intelligence and Security Informatics: An Information Economics Perspectivep. 375
An International Perspective on Fighting Cybercrimep. 379
Hiding Traversal of Tree Structured Data from Untrusted Data Storesp. 385
Criminal Record Matching Based on the Vector Space Modelp. 386
Database Support for Exploring Criminal Networksp. 387
Hiding Data and Code Security for Application Hosting Infrastructurep. 388
Secure Information Sharing and Information Retrieval Infrastructure with GridIRp. 389
Semantic Hacking and Intelligence and Security Informaticsp. 390
Author Indexp. 391
Table of Contents provided by Blackwell. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program