Intelligence and Security Informatics

Techniques and Applications

  • 0 Ratings
  • 1 Want to read
  • 0 Currently reading
  • 0 Have read
Not in Library

My Reading Lists:

Create a new list

Check-In

×Close
Add an optional check-in date. Check-in dates are used to track yearly reading goals.
Today

  • 0 Ratings
  • 1 Want to read
  • 0 Currently reading
  • 0 Have read

Buy this book

Last edited by ImportBot
February 26, 2022 | History

Intelligence and Security Informatics

Techniques and Applications

  • 0 Ratings
  • 1 Want to read
  • 0 Currently reading
  • 0 Have read

Intelligence and Security Informatics: Second Symposium on Intelligence and Security Informatics, ISI 2004, Tucson, AZ, USA, June 10-11, 2004. Proceedings
Author: Hsinchun Chen, Reagan Moore, Daniel D. Zeng, John Leavitt
Published by Springer Berlin Heidelberg
ISBN: 978-3-540-22125-8
DOI: 10.1007/b98042

Table of Contents:

  • Aligning Simulation Models of Smallpox Outbreaks
  • Data Analytics for Bioterrorism Surveillance
  • West Nile Virus and Botulism Portal: A Case Study in Infectious Disease Informatics
  • A Novel Policy and Information Flow Security Model for Active Network
  • A Novel Autonomous Trust Management Model for Mobile Agents
  • Privacy-Preserving Inter-database Operations
  • Finding Unusual Correlation Using Matrix Decompositions
  • Generating Concept Hierarchies from Text for Intelligence Analysis
  • Interactive Query Languages for Intelligence Tasks
  • Terrorism Knowledge Discovery Project: A Knowledge Discovery Approach to Addressing the Threats of Terrorism
  • The Architecture of the Cornell Knowledge Broker
  • Computer-Based Training for Deception Detection: What Users Want?
  • Identifying Multi-ID Users in Open Forums
  • Self-efficacy, Training Effectiveness, and Deception Detection: A Longitudinal Study of Lie Detection Training
  • Composite Role-Based Monitoring (CRBM) for Countering Insider Threats
  • Critical Infrastructure Integration Modeling and Simulation
  • Mining Normal and Intrusive Activity Patterns for Computer Intrusion Detection
  • The Optimal Deployment of Filters to Limit Forged Address Attacks in Communication Networks
  • A Tool for Internet Chatroom Surveillance
  • ChatTrack: Chat Room Topic Detection Using Classification

Publish Date
Publisher
Springer
Pages
476

Buy this book

Previews available in: English

Book Details


Edition Notes

Source title: Intelligence and Security Informatics: Techniques and Applications (Studies in Computational Intelligence)

Classifications

Library of Congress
TA329-348

The Physical Object

Format
paperback
Number of pages
476

ID Numbers

Open Library
OL27960837M
ISBN 10
3642088708
ISBN 13
9783642088704

Community Reviews (0)

Feedback?
No community reviews have been submitted for this work.

Lists

This work does not appear on any lists.

History

Download catalog record: RDF / JSON / OPDS | Wikipedia citation
February 26, 2022 Edited by ImportBot import existing book
April 26, 2020 Created by ImportBot Imported from amazon.com record