Intelligence and Security Informatics

Second Symposium on Intelligence and Security Informatics, ISI 2004, Tucson, AZ, USA, June 10-11, 2004, Proceedings (Lecture Notes in Computer Science)

1 edition
  • 0 Ratings
  • 1 Want to read
  • 0 Currently reading
  • 0 Have read

My Reading Lists:

Create a new list

Check-In

×Close
Add an optional check-in date. Check-in dates are used to track yearly reading goals.
Today

  • 0 Ratings
  • 1 Want to read
  • 0 Currently reading
  • 0 Have read

Buy this book

Last edited by ImportBot
October 16, 2023 | History

Intelligence and Security Informatics

Second Symposium on Intelligence and Security Informatics, ISI 2004, Tucson, AZ, USA, June 10-11, 2004, Proceedings (Lecture Notes in Computer Science)

1 edition
  • 0 Ratings
  • 1 Want to read
  • 0 Currently reading
  • 0 Have read

Intelligence and Security Informatics: Second Symposium on Intelligence and Security Informatics, ISI 2004, Tucson, AZ, USA, June 10-11, 2004. Proceedings
Author: Hsinchun Chen, Reagan Moore, Daniel D. Zeng, John Leavitt
Published by Springer Berlin Heidelberg
ISBN: 978-3-540-22125-8
DOI: 10.1007/b98042

Table of Contents:

  • Aligning Simulation Models of Smallpox Outbreaks
  • Data Analytics for Bioterrorism Surveillance
  • West Nile Virus and Botulism Portal: A Case Study in Infectious Disease Informatics
  • A Novel Policy and Information Flow Security Model for Active Network
  • A Novel Autonomous Trust Management Model for Mobile Agents
  • Privacy-Preserving Inter-database Operations
  • Finding Unusual Correlation Using Matrix Decompositions
  • Generating Concept Hierarchies from Text for Intelligence Analysis
  • Interactive Query Languages for Intelligence Tasks
  • Terrorism Knowledge Discovery Project: A Knowledge Discovery Approach to Addressing the Threats of Terrorism
  • The Architecture of the Cornell Knowledge Broker
  • Computer-Based Training for Deception Detection: What Users Want?
  • Identifying Multi-ID Users in Open Forums
  • Self-efficacy, Training Effectiveness, and Deception Detection: A Longitudinal Study of Lie Detection Training
  • Composite Role-Based Monitoring (CRBM) for Countering Insider Threats
  • Critical Infrastructure Integration Modeling and Simulation
  • Mining Normal and Intrusive Activity Patterns for Computer Intrusion Detection
  • The Optimal Deployment of Filters to Limit Forged Address Attacks in Communication Networks
  • A Tool for Internet Chatroom Surveillance
  • ChatTrack: Chat Room Topic Detection Using Classification

Publish Date
Publisher
Springer
Language
English
Pages
536

Buy this book

Previews available in: English

Book Details


First Sentence

"Numerical simulation models can be used to estimate the impact of large-scale biological attacks and to design or select appropriate response strategies."

Classifications

Library of Congress
Q334-342QA76.76.A65Q, QA76.76.E95 S9175 2004

The Physical Object

Format
Paperback
Number of pages
536
Dimensions
9.1 x 6.1 x 1.3 inches
Weight
1.8 pounds

ID Numbers

Open Library
OL9054756M
Internet Archive
intelligencesecu0000symp
ISBN 10
3540221255
ISBN 13
9783540221258
LCCN
2004106662
OCLC/WorldCat
55746394
Goodreads
377576

Community Reviews (0)

Feedback?
No community reviews have been submitted for this work.

Lists

This work does not appear on any lists.

History

Download catalog record: RDF / JSON
October 16, 2023 Edited by ImportBot import existing book
February 26, 2022 Edited by ImportBot import existing book
August 1, 2020 Edited by ImportBot import existing book
July 1, 2019 Edited by MARC Bot import existing book
July 30, 2014 Created by ImportBot import new book