Amazon cover image
Image from Amazon.com

Intelligence and security informatics : international workshop, WISI 2006, Singapore, April 9, 2006 : proceedings / Hsinchun Chen [and others] (eds.).

By: WISI 2006 (2006 : Singapore)Contributor(s): Chen, HsinchunMaterial type: TextTextSeries: Serienbezeichnung | Lecture notes in computer science ; 3917.Publication details: Berlin ; New York : Springer-Verlag, ©2006. Description: 1 online resource (xii, 186 pages) : illustrationsContent type: text Media type: computer Carrier type: online resourceISBN: 9783540333623; 3540333622; 3540333614; 9783540333616Other title: WISI 2006Subject(s): Computer crimes -- Investigation -- Data processing -- Congresses | National security -- Data processing -- Congresses | Computer security -- Data processing -- Congresses | Data mining -- Congresses | Expert systems (Computer science) -- Congresses | Systèmes experts (Informatique) -- Congrès | Exploration de données (Informatique) -- Congrès | Sécurité informatique -- Congrès | TRUE CRIME -- White Collar Crime | National security -- Data processing | Computer security -- Data processing | Data mining | Expert systems (Computer science) | Systèmes experts (informatique) | Exploration de données (Informatique) | Sécurité informatique | Computer crimes -- Investigation -- Data processing | Informatique | Data mining | Expert systems (Computer science) | National security -- Data processing | computers | samenleving | society | informatieontsluiting | information retrieval | informatieopslag | information storage | informatiesystemen | information systems | internet | recht | law | computerwetenschappen | computer sciences | computernetwerken | computer networks | Information and Communication Technology (General) | Informatie- en communicatietechnologie (algemeen)Genre/Form: Electronic books. | Conference papers and proceedings. Additional physical formats: Print version:: Intelligence and security informatics.DDC classification: 363.259680285 LOC classification: HV8079.C65 | W57 2006Other classification: TP182-532 Online resources: Click here to access online
Contents:
Keynote speech: Data mining for security applications / Bhavani M. Thuraisingham -- Web and text mining for terrorism informatics -- Cyber crime analysis -- Network security -- Crime data mining -- Posters.
Summary: Intelligence and security informatics (ISI) can be broadly defined as the study of the development and use of advanced information technologies and systems for national and international security-related applications. The First and Second Symposiums on ISI were held in Tucson, Arizona, in 2003 and 2004, respectively. In 2005, the IEEE International Conference on ISI was held in Atlanta, Georgia. These ISI conferences brought together academic researchers, law enforcement and intelligence experts, information technology consultants and practitioners to discuss their research and practice related to various ISI topics including ISI data management, data and text mining for ISI applications, terrorism informatics, deception detection, terrorist and criminal social network analysis, crime analysis, monitoring and surveillance, policy studies and evaluation, and information assurance, among others. We continued these stream of ISI conferences by organizing the Workshop on Intelligence and Security Informatics (WISI 2006) in conjunction with the Pacific Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2006). WISI 2006 provided a stimulating forum for ISI researchers in Pacific Asia and other regions of the world to exchange ideas and report research progress. WISI 2006 was hosted by the Chinese University of Hong Kong, the University of Arizona, the Nanyang Technological University, and the Chinese Academy of Sciences. The one-day program included one keynote speech, four refereed paper sessions, two invited sessions and a poster reception.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
eBook eBook e-Library

Electronic Book@IST

EBook Available
Total holds: 0

"Workshop on Intelligence and Security Informatics (WISI 2006) [held] in conjunction with the Pacific Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2006)"--Preface

Includes bibliographical references and index.

Keynote speech: Data mining for security applications / Bhavani M. Thuraisingham -- Web and text mining for terrorism informatics -- Cyber crime analysis -- Network security -- Crime data mining -- Posters.

Print version record.

Intelligence and security informatics (ISI) can be broadly defined as the study of the development and use of advanced information technologies and systems for national and international security-related applications. The First and Second Symposiums on ISI were held in Tucson, Arizona, in 2003 and 2004, respectively. In 2005, the IEEE International Conference on ISI was held in Atlanta, Georgia. These ISI conferences brought together academic researchers, law enforcement and intelligence experts, information technology consultants and practitioners to discuss their research and practice related to various ISI topics including ISI data management, data and text mining for ISI applications, terrorism informatics, deception detection, terrorist and criminal social network analysis, crime analysis, monitoring and surveillance, policy studies and evaluation, and information assurance, among others. We continued these stream of ISI conferences by organizing the Workshop on Intelligence and Security Informatics (WISI 2006) in conjunction with the Pacific Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2006). WISI 2006 provided a stimulating forum for ISI researchers in Pacific Asia and other regions of the world to exchange ideas and report research progress. WISI 2006 was hosted by the Chinese University of Hong Kong, the University of Arizona, the Nanyang Technological University, and the Chinese Academy of Sciences. The one-day program included one keynote speech, four refereed paper sessions, two invited sessions and a poster reception.

Powered by Koha