Notice bibliographique
- Notice
Type(s) de contenu et mode(s) de consultation : Texte noté : électronique
Auteur(s) : Symposium on Intelligence and Security Informatics (2 ; 2004 ; Tucson, Ariz)
Titre(s) : Intelligence and security informatics [Texte électronique] : Second Symposium on Intelligence and Security Informatics, ISI 2004, Tucson, AZ, USA, June 10-11, 2004 : proceedings / Hsinchun Chen [and others] (eds.)
Publication : Berlin ; New York : Springer, 2004
Description matérielle : 1 online resource (xv, 536 pages)
Collection : Lecture notes in computer science ; 3073
Note(s) : Includes bibliographical references and index
This book constitutes the refereed proceedings of the Second Symposium on Intelligence
and Security Informatics, ISI 2004, held in Tucson, AZ, USA in June 2004. The 29 revised
full papers and 12 revised short papers presented together with 6 extended abstracts
of posters and 3 panel discussion summaries were carefully reviewed and selected for
inclusion in the book. The papers are organized in topical sections on bioterrorism
and disease informatics; data access, privacy, and trust management; data management
and mining; deception detection; information assurance and infrastructure protection;
monitoring and surveillance; security policies and evaluation; and social network
analysis
Autre(s) auteur(s) : Chen, Hsinchun. Fonction indéterminée
Autre(s) forme(s) du titre :
- Autre forme du titre : ISI 2004
Sujet(s) : Informatique
Systèmes d'exploitation (ordinateurs)
Systèmes informatiques -- Mesures de sûreté
Exploration de données
Informatique documentaire
Systèmes experts (informatique)
Sécurité nationale
Informatique -- Droit
Culture numérique
États-Unis
Indice(s) Dewey :
006.33 (23e éd.) = Systèmes à base de connaissances
Identifiants, prix et caractéristiques : ISBN 9783540259527
Identifiant de la notice : ark:/12148/cb446842456
Notice n° :
FRBNF44684245
(notice reprise d'un réservoir extérieur)
Table des matières : Full Papers ; Aligning Simulation Models of Smallpox Outbreaks ; Data Analytics for
Bioterrorism Surveillance ; West Nile Virus and Botulism Portal: A Case Study in
Infectious Disease Informatics ; A Novel Policy and Information Flow Security Model
for Active Network ; A Novel Autonomous Trust Management Model for Mobile Agents
; Privacy-Preserving Inter-database Operations ; Finding Unusual Correlation Using
Matrix Decompositions ; Generating Concept Hierarchies from Text for Intelligence
Analysis ; Interactive Query Languages for Intelligence Tasks ; Terrorism Knowledge
Discovery Project: A Knowledge Discovery Approach to Addressing the Threats of Terrorism
; The Architecture of the Cornell Knowledge Broker ; Computer-Based Training for
Deception Detection: What Users Want? ; Identifying Multi-ID Users in Open Forums
; Self-efficacy, Training Effectiveness, and Deception Detection: A Longitudinal
Study of Lie Detection Training ; Composite Role-Based Monitoring (CRB