Skip to main content
  • Conference proceedings
  • © 2007

Intelligence and Security Informatics

Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 4430)

Part of the book sub series: Information Systems and Applications, incl. Internet/Web, and HCI (LNISA)

Conference series link(s): PAISI: Pacific-Asia Workshop on Intelligence and Security Informatics

Conference proceedings info: PAISI 2007.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (42 papers)

  1. Front Matter

  2. Long Papers

    1. Crime Analysis

      1. Analyzing and Visualizing Gray Web Forum Structure
        • Christopher C. Yang, Torbun D. Ng, Jau-Hwang Wang, Chih-Ping Wei, Hsinchun Chen
        Pages 21-33
      2. An Empirical Analysis of Online Gaming Crime Characteristics from 2002 to 2004
        • Yungchang Ku, Ying-Chieh Chen, Kuo-Ching Wu, Chaochang Chiu
        Pages 34-45
    2. Emergency Response and Surveillance

      1. What-if Emergency Management System: A Generalized Voronoi Diagram Approach
        • Ickjai Lee, Reece Pershouse, Peter Phillips, Chris Christensen
        Pages 58-69
      2. Agent Based Framework for Emergency Rescue and Assistance Planning
        • Yujun Zheng, Jinquan Wang, Jinyun Xue
        Pages 70-81
      3. Object Tracking with Self-updating Tracking Window
        • Huimin Qian, Yaobin Mao, Jason Geng, Zhiquan Wang
        Pages 82-93
    3. Intrusion Detection

      1. Lightweight Anomaly Intrusion Detection in Wireless Sensor Networks
        • Haiguang Chen, Peng Han, Xi Zhou, Chuanshan Gao
        Pages 105-116
      2. ASITL: Adaptive Secure Interoperation Using Trust-Level
        • Li Jin, Zhengding Lu
        Pages 117-128
      3. TCM-KNN Algorithm for Supervised Network Intrusion Detection
        • Yang Li, Bin-Xing Fang, Li Guo, You Chen
        Pages 141-151
    4. Network Security

      1. Towards Identifying True Threat from Network Security Data
        • Zhi-tang Li, Jie Lei, Li Wang, Dong Li, Yang-ming Ma
        Pages 160-171
      2. A Secure Data Transmission Protocol for Mobile Ad Hoc Networks
        • Shejie Lu, Jun Li, Zhiyuan Liu, Guohua Cui
        Pages 184-195
      3. A Novel Relational Database Watermarking Algorithm
        • Yu Fu, Cong Jin, Chuanxiang Ma
        Pages 208-219
  3. Short Papers

    1. Data and Text Mining

      1. Anticipatory Event Detection for Bursty Events
        • Kuiyu Chang, Qi He, Ridzwan Aminuddin, Ridzwan Suri, Ee-Peng Lim
        Pages 220-225

Other Volumes

  1. Intelligence and Security Informatics

About this book

Intelligence and security informatics (ISI) is concerned with the study of the development and use of advanced information technologies and systems for national, international, and societal security-related applications. The annual IEEE International Conference series on ISI was started in 2003 and the first four meetings were held in the United States. In 2006, the Workshop on ISI (http://isi. se. cuhk. edu. hk/2006/) was held in Singapore in conjunction with the Pacific Asia Conference on Knowledge Discovery and Data Mining, with over 100 contributors and participants from all over the world. These past ISI conferences have brought together academic researchers, law enforcement and intelligence experts, information technology consultants, and practitioners to discuss their research and practice related to various ISI topics including ISI data management, data and text mining for ISI applications, terrorism informatics, deception and intent detection, terrorist and criminal social network analysis, public health and bio-security, crime analysis, cyber-infrastructure protection, transportation infrastructure security, policy studies and evaluation, and information assurance, among others. We continued this stream of ISI conferences by organizing the 2007 Pacific Asia Workshop on ISI (PAISI 2007) to especially provide a stimulating forum for ISI researchers in Pacific Asia and other regions of the world to exchange ideas and report research progress. PAISI 2007 was hosted by the Chinese Academy of Sciences, the University of Arizona, and the Chinese University of Hong Kong.

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access