Buch, Englisch, Band 2665, 390 Seiten, Paperback, Format (B × H): 155 mm x 233 mm, Gewicht: 1270 g
First NSF/NIJ Symposium, ISI 2003, Tucson, AZ, USA, June 2-3, 2003, Proceedings
Buch, Englisch, Band 2665, 390 Seiten, Paperback, Format (B × H): 155 mm x 233 mm, Gewicht: 1270 g
Reihe: Lecture Notes in Computer Science
ISBN: 978-3-540-40189-6
Verlag: Springer Berlin Heidelberg
Zielgruppe
Professional/practitioner
Autoren/Hrsg.
Fachgebiete
- Rechtswissenschaften Wirtschaftsrecht Medienrecht Telekommunikationsrecht, IT-Recht, Internetrecht
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Kryptographie, Datenverschlüsselung
- Mathematik | Informatik EDV | Informatik Technische Informatik Systemverwaltung & Management
- Mathematik | Informatik EDV | Informatik Informatik Künstliche Intelligenz Wissensbasierte Systeme, Expertensysteme
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Datenkompression, Dokumentaustauschformate
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Zeichen- und Zahlendarstellungen
- Sozialwissenschaften Soziologie | Soziale Arbeit Soziologie Allgemein
- Mathematik | Informatik EDV | Informatik Technische Informatik Externe Speicher & Peripheriegeräte
- Mathematik | Informatik EDV | Informatik EDV & Informatik Allgemein Rechtliche Aspekte der EDV
Weitere Infos & Material
Full Papers.- Using Support Vector Machines for Terrorism Information Extraction.- Criminal Incident Data Association Using the OLAP Technology.- Names: A New Frontier in Text Mining.- Web-Based Intelligence Reports System.- Authorship Analysis in Cybercrime Investigation.- Behavior Profiling of Email.- Detecting Deception through Linguistic Analysis.- A Longitudinal Analysis of Language Behavior of Deception in E-mail.- Evacuation Planning: A Capacity Constrained Routing Approach.- Locating Hidden Groups in Communication Networks Using Hidden Markov Models.- Automatic Construction of Cross-Lingual Networks of Concepts from the Hong Kong SAR Police Department.- Decision Based Spatial Analysis of Crime.- CrimeLink Explorer: Using Domain Knowledge to Facilitate Automated Crime Association Analysis.- A Spatio Temporal Visualizer for Law Enforcement.- Tracking Hidden Groups Using Communications.- Examining Technology Acceptance by Individual Law Enforcement Officers: An Exploratory Study.- “Atrium” — A Knowledge Model for Modern Security Forces in the Information and Terrorism Age.- Untangling Criminal Networks: A Case Study.- Addressing the Homeland Security Problem: A Collaborative Decision-Making Framework.- Collaborative Workflow Management for Interagency Crime Analysis.- COPLINK Agent: An Architecture for Information Monitoring and Sharing in Law Enforcement.- Active Database Systems for Monitoring and Surveillance.- Integrated “Mixed” Networks Security Monitoring — A Proposed Framework.- Bioterrorism Surveillance with Real-Time Data Warehousing.- Short Papers.- Privacy Sensitive Distributed Data Mining from Multi-party Data.- ProGenIE: Biographical Descriptions for Intelligence Analysis.- Scalable Knowledge Extraction from Legacy Sources with SEEK.-“TalkPrinting”: Improving Speaker Recognition by Modeling Stylistic Features.- Emergent Semantics from Users’ Browsing Paths.- Designing Agent99 Trainer: A Learner-Centered, Web-Based Training System for Deception Detection.- Training Professionals to Detect Deception.- An E-mail Monitoring System for Detecting Outflow of Confidential Documents.- Intelligence and Security Informatics: An Information Economics Perspective.- An International Perspective on Fighting Cybercrime.- Extended Abstracts for Posters.- Hiding Traversal of Tree Structured Data from Untrusted Data Stores.- Criminal Record Matching Based on the Vector Space Model.- Database Support for Exploring Criminal Networks.- Hiding Data and Code Security for Application Hosting Infrastructure.- Secure Information Sharing and Information Retrieval Infrastructure with GridIR.- Semantic Hacking and Intelligence and Security Informatics.