Intelligence and Security Informatics
Springer Berlin (Verlag)
978-3-540-89899-3 (ISBN)
Abstracts of Plenary Talks.- Intelligent Social Network Modeling and Analysis for Security Informatics.- Nature Inspired Online Real Risk Assessment Models for Security Systems.- Homeland Security Data Mining Using Social Network Analysis.- Criminal and Social Network Analysis.- The Automatic Identification and Prioritisation of Criminal Networks from Police Crime Data.- An Information Theory Approach to Identify Sets of Key Players.- Locating Key Actors in Social Networks Using Bayes' Posterior Probability Framework.- Computational Modeling of Criminal Activity.- Intelligence Analysis and Knowledge Discovery.- SPYWatch, Overcoming Linguistic Barriers in Information Management.- Dissecting the Meaning of an Encrypted Message: An Approach to Discovering the Goals of an Adversary.- Buzz Monitoring in Word Space.- Web-Based Intelligence Monitoring and Analysis.- Nuclear Threat Detection Via the Nuclear Web and Dark Web: Framework and Preliminary Study.- Mapping Dark Web Geolocation.- Jihadi Video and Auto-radicalisation: Evidence from an Exploratory YouTube Study.- Privacy Protection, Access Control, and Digital Rights Management.- Access Control of Federated Information Systems.- Designing Information Systems Which Manage or Avoid Privacy Incidents.- Secure Computation for Privacy Preserving Biometric Data Retrieval and Authentication.- Digital Audio Watermarking for Copyright Protection Based on Multiwavelet Transform.- Problem Analyses and Recommendations in DRM Security Policies.- Malware and Intrusion Detection.- A Distributed Framework for the Detection of New Worm-Related Malware.- Optimization of NIDS Placement for Protection of Intercommunicating Critical Infrastructures.- Unknown Malcode Detection Using OPCODE Representation.- Surveillance and CrisisManagement.- Mobile and Stationary Sensors for Local Surveillance: System Architecture and Applications.- Fuzzy Distributed Workflows for Crisis Management Decision Makers.- Reconfigurable Radio Systems for Public Safety Based on Low-Cost Platforms.- An Information Systems Design Theory for Supporting WMD Knowledge Reachback.- Rampart: A Service and Agent-Based Architecture for Anti-Terrorism Planning and Resource Allocation.- Posters.- Evaluative Word Locations in Semantic Networks from News Stories about Al Qaeda and Implications for Optimal Communication Messages in Anti-terrorism Campaigns.- Methodology for Experimental ICT Industrial and Critical Infrastructure Security Tests.
Erscheint lt. Verlag | 24.11.2008 |
---|---|
Reihe/Serie | Information Systems and Applications, incl. Internet/Web, and HCI | Lecture Notes in Computer Science |
Zusatzinfo | XI, 277 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 445 g |
Themenwelt | Mathematik / Informatik ► Informatik ► Theorie / Studium |
Mathematik / Informatik ► Informatik ► Web / Internet | |
Informatik ► Weitere Themen ► Hardware | |
Schlagworte | Access Control • Audio Watermarking • biometrics • classification • Clustering • collaborative computing • Computersicherheit • crime analysis • Criminal Networks • dark Web • Data Mining • DRM • emergency response • Epidemic models • Hardcover, Softcover / Informatik, EDV/Internet • HC/Informatik, EDV/Internet • Homeland Security • Information Security • Knowledge Discovery • malware detection • Monitoring • Multi-agent Systems • Multi-Party Computation • national security • Natural Language Processing • Network Security • privacy • public safety • secure computation • security • Semantic networks • service-oriented architectures • Social Networks • Surveillance |
ISBN-10 | 3-540-89899-9 / 3540898999 |
ISBN-13 | 978-3-540-89899-3 / 9783540898993 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich