2009 IEEE International Conference on Intelligence and Security Informatics最新文献

筛选
英文 中文
Topic-based web page recommendation using tags 基于主题的网页推荐使用标签
2009 IEEE International Conference on Intelligence and Security Informatics Pub Date : 2009-06-08 DOI: 10.1109/ISI.2009.5137324
Jing Peng, D. Zeng
{"title":"Topic-based web page recommendation using tags","authors":"Jing Peng, D. Zeng","doi":"10.1109/ISI.2009.5137324","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137324","url":null,"abstract":"Collaborative tagging sites allow users to save and annotate their favorite web contents with tags. These tags provide a novel source of information for collaborative filtering. This paper proposes a probabilistic approach to leverage information embedded in tags to improve the effectiveness of Web page recommendation in a social information management context. In our approach, the probability of a Web page visit by a user is estimated by summing up the relevance of this Web page to this user's tags, and then those pages with the highest probabilities are recommended. Experiments using two real-world collaborative tagging datasets show that our algorithms outperform the common collaborative filtering methods.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124416142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Applying graph-based anomaly detection approaches to the discovery of insider threats 应用基于图的异常检测方法来发现内部威胁
2009 IEEE International Conference on Intelligence and Security Informatics Pub Date : 2009-06-08 DOI: 10.1109/ISI.2009.5137304
W. Eberle, L. Holder
{"title":"Applying graph-based anomaly detection approaches to the discovery of insider threats","authors":"W. Eberle, L. Holder","doi":"10.1109/ISI.2009.5137304","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137304","url":null,"abstract":"The ability to mine data represented as a graph has become important in several domains for detecting various structural patterns. One important area of data mining is anomaly detection, but little work has been done in terms of detecting anomalies in graph-based data. In this paper we present graph-based approaches to uncovering anomalies in applications containing information representing possible insider threat activity: e-mail, cell-phone calls, and order processing.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126348219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
PerpSearch: An integrated crime detection system PerpSearch:综合罪案侦查系统
2009 IEEE International Conference on Intelligence and Security Informatics Pub Date : 2009-06-08 DOI: 10.1109/ISI.2009.5137289
Li Ding, D. Steil, M. Hudnall, B. Dixon, Randy K. Smith, David Brown, A. Parrish
{"title":"PerpSearch: An integrated crime detection system","authors":"Li Ding, D. Steil, M. Hudnall, B. Dixon, Randy K. Smith, David Brown, A. Parrish","doi":"10.1109/ISI.2009.5137289","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137289","url":null,"abstract":"Information technologies such as data mining and social network analysis have been widely used in law enforcement to solve crimes. Recent research indicates that geographic profiling also plays an important role in facilitating the investigation of crimes. However, lack of integration makes those systems less helpful in practice. In this paper, we propose an integrated system called PerpSearch that will take a given description of a crime, including its location, type, and the physical description of suspects (personal characteristics or vehicles) as input. To detect suspects, the system will process these inputs through four integrated components: geographic profiling, social network analysis, crime patterns, and physical matching. Essentially, geographic profiling determines “where” the suspects are, while other components determine “who” the suspects are. We then process the results using a score engine to give investigators a ranked list of individuals. To date, we have implemented a prototype of the system based on current Alabama law enforcement data.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127385739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Traffic and security analysis on Sony Playstation 3 索尼Playstation 3的流量和安全分析
2009 IEEE International Conference on Intelligence and Security Informatics Pub Date : 2009-06-08 DOI: 10.1109/ISI.2009.5137325
Michael Perelman, Ping Ji, Weifeng Chen
{"title":"Traffic and security analysis on Sony Playstation 3","authors":"Michael Perelman, Ping Ji, Weifeng Chen","doi":"10.1109/ISI.2009.5137325","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137325","url":null,"abstract":"Online games are clearly growing as a significant component of the current and future Internet. As a major online game console, the Sony PlayStation 3 (PS3) produces more and more network traffic. People also begin to use PS3 for emails and web surfing besides playing games due to its enhanced web capabilities. Recognizing the traffic patterns of PS3 is important to network administrators whereas understanding its security is essential for users. However, traffic and security analysis of PS3 has been either done or unpublished. In this paper, we present our initial efforts on game traffic analysis for PS3 and explore the vulnerabilities of PS3 by testing a few attacking schemes on a PS3 console. The research will benefit both network administrators and PS3 users to understand the PS3 systems better.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128229663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unifying strategies and tactics: A survivability framework for countering cyber attacks 统一战略和战术:应对网络攻击的生存能力框架
2009 IEEE International Conference on Intelligence and Security Informatics Pub Date : 2009-06-08 DOI: 10.1109/ISI.2009.5137282
Yanjun Zuo, B. Panda
{"title":"Unifying strategies and tactics: A survivability framework for countering cyber attacks","authors":"Yanjun Zuo, B. Panda","doi":"10.1109/ISI.2009.5137282","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137282","url":null,"abstract":"This paper presents a framework to enhance a system's survivability to thwart malicious attacks and to continuously provide critical services to users. We focus on two key survivability elements: strategy and tactic. The latter further includes a set of activities and operations. We show how survivability activities are developed in light of tactics to implement the chosen survivability strategies in face of malicious attacks. An example of military command and control system is presented, where a set of survivability activities are specified to carry out two strategies: dynamic system reconfiguration and transparent system repairs. An architectural model is proposed to facilitate system design in building survivable systems.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127274136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Dark web forums portal: Searching and analyzing jihadist forums 暗网论坛门户:搜索和分析圣战论坛
2009 IEEE International Conference on Intelligence and Security Informatics Pub Date : 2009-06-08 DOI: 10.1109/ISI.2009.5137274
Yulei Zhang, Shuo Zeng, Li Fan, Yan Dang, Catherine A. Larson, Hsinchun Chen
{"title":"Dark web forums portal: Searching and analyzing jihadist forums","authors":"Yulei Zhang, Shuo Zeng, Li Fan, Yan Dang, Catherine A. Larson, Hsinchun Chen","doi":"10.1109/ISI.2009.5137274","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137274","url":null,"abstract":"With the advent of Web 2.0, the Web is acting as a platform which enables end-user content generation. As a major type of social media in Web 2.0, Web forums facilitate intensive interactions among participants. International Jihadist groups often use Web forums to promote violence and distribute propaganda materials. These Dark Web forums are heterogeneous and widely distributed. Therefore, how to access and analyze the forum messages and interactions among participants is becoming an issue. This paper presents a general framework for Web forum data integration. Specifically, a Web-based knowledge portal, the Dark Web Forums Portal, is built based on the framework. The portal incorporates the data collected from different international Jihadist forums and provides several important analysis functions, including forum browsing and searching (in single forum and across multiple forums), forum statistics analysis, multilingual translation, and social network visualization. Preliminary results of our user study show that the Dark Web Forums Portal helps users locate information quickly and effectively. Users found the forum statistics analysis, multilingual translation, and social network visualization functions of the portal to be particularly valuable.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131002275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
Voronoi representation for areal data processing in data-rich environments 在数据丰富的环境中进行实际数据处理的Voronoi表示
2009 IEEE International Conference on Intelligence and Security Informatics Pub Date : 2009-06-08 DOI: 10.1109/ISI.2009.5137291
D. Breitkreutz, Ickjai Lee
{"title":"Voronoi representation for areal data processing in data-rich environments","authors":"D. Breitkreutz, Ickjai Lee","doi":"10.1109/ISI.2009.5137291","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137291","url":null,"abstract":"Privacy and data explosion issues are major concerns in intelligence and security informatics. An areal data representation is a popular way to overcome these two issues. As data grows at an unprecedented rate, there still needs an improvement in area data representations to be more scalable. This paper determines the potential for an alternative areal representation that can offer performance benefits over traditional methods for use within data-rich environments. From the experiments performed, improvements are promising, especially within time-critical applications that need to consider large amounts of data quickly.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132381115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Building Social Networks in Persistent Video Surveillance 在持续视频监控中构建社会网络
2009 IEEE International Conference on Intelligence and Security Informatics Pub Date : 2009-06-08 DOI: 10.1109/ISI.2009.5137307
Daniel T. Schmitt, S. Kurkowski, M. Mendenhall
{"title":"Building Social Networks in Persistent Video Surveillance","authors":"Daniel T. Schmitt, S. Kurkowski, M. Mendenhall","doi":"10.1109/ISI.2009.5137307","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137307","url":null,"abstract":"Social networks are a beneficial analysis tool in counterterrorism and counterinsurgent activities. The difficulty lies in the amount of time and resources it takes to construct a social network. By exploiting existing 24-hour overhead persistent video, we can build a social network from vehicle to vehicle and vehicle to building interactions. This paper demonstrates building a social network from vehicle tracks based on their interactions in an urban environment. From this social network we can see relationships among actors and their locations of interest. This information provides additional intelligence about terrorist activities to exploit them.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132051038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A natural language interface for crime-related spatial queries 用于犯罪相关空间查询的自然语言界面
2009 IEEE International Conference on Intelligence and Security Informatics Pub Date : 2009-06-08 DOI: 10.1109/ISI.2009.5137290
Chengyang Zhang, Y. Huang, Rada Mihalcea, Hector Cuellar
{"title":"A natural language interface for crime-related spatial queries","authors":"Chengyang Zhang, Y. Huang, Rada Mihalcea, Hector Cuellar","doi":"10.1109/ISI.2009.5137290","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137290","url":null,"abstract":"Web-based mapping applications such as Google Maps or Virtual Earth have become increasingly popular. However, current map search is still keyword-based and supports a limited number of spatial predicates. In this paper, we build towards a natural language query interface to spatial databases to answer crime-related spatial queries. The system has two main advantages compared with interfaces such as Google Maps: (1) It allows query conditions to be expressed in natural language, and (2) It supports a larger number of spatial predicates, such as “within 3 miles” and “close to”. The system is evaluated using a set of crime-related queries run against a dataset that contains many spatial layers in the Denton, Texas area. The results show that our approach significantly outperforms Google Maps when processing complicated spatial queries.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124423154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A two-level protocol to answer private location-based queries 一个两级协议,用于回答基于位置的私人查询
2009 IEEE International Conference on Intelligence and Security Informatics Pub Date : 2009-06-08 DOI: 10.1109/ISI.2009.5137287
Roopa Vishwanathan, Y. Huang
{"title":"A two-level protocol to answer private location-based queries","authors":"Roopa Vishwanathan, Y. Huang","doi":"10.1109/ISI.2009.5137287","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137287","url":null,"abstract":"An important privacy issue in Location Based Services (LBS) is to hide a user's identity and location while still providing quality location based services. A user's identity can be easily hidden through anonymous web browsing services. However, a user's location can reveal a user's identity. For example, a user at home may want to ask queries such as “Find the nearest hospital around me” through a GPS enabled mobile phone but he may not be willing to dislose his own location. A common way to achieve location privacy is through cloaking, e.g. the client sends a cloaked region to the server and filters the results to find the exact answer. Recently, Private Information Retrieval has been adopted to answer private location-based queries. However, we argue that ensuring the server does not reveal more data than what is queried is important at the same time. In this paper, we propose an efficient two-level solution based on two cryptographic protocols: PIR and Oblivious Transfer. Our solution is a general-purpose one and can use either a two-level PIR [2] or it can use a combination of PIR and Oblivious Transfer [11]. Our approach provides privacy for the user/client, does not use a trusted party or anonymizer, is provably privacy-preserving, and when compared to previous approaches ensures that the server reveals as minimum data as is required, and the data that is released by the server is as fine-grained or precise as possible.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123146962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信