2009 IEEE International Conference on Intelligence and Security Informatics最新文献

筛选
英文 中文
Mining top-k and bottom-k correlative crime patterns through graph representations 通过图表示挖掘top-k和bottom-k相关犯罪模式
2009 IEEE International Conference on Intelligence and Security Informatics Pub Date : 2009-06-08 DOI: 10.1109/ISI.2009.5137266
Peter Phillips, Ickjai Lee
{"title":"Mining top-k and bottom-k correlative crime patterns through graph representations","authors":"Peter Phillips, Ickjai Lee","doi":"10.1109/ISI.2009.5137266","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137266","url":null,"abstract":"Crime activities are geospatial phenomena and as such are geospatially, thematically and temporally correlated. Thus, crime datasets must be interpreted and analyzed in conjunction with various factors that can contribute to the formulation of crime. Discovering these correlations allows a deeper insight into the complex nature of criminal behavior. We introduce a graph based dataset representation that allows us to mine a set of datasets for correlation. We demonstrate our approach with real crime datasets and provide a comparison with other techniques.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124960565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Tracking terrorism news threads by extracting event signatures 通过提取事件签名跟踪恐怖主义新闻线程
2009 IEEE International Conference on Intelligence and Security Informatics Pub Date : 2009-06-08 DOI: 10.1109/ISI.2009.5137296
S. Ahmed, Ruchi Bhindwale, H. Davulcu
{"title":"Tracking terrorism news threads by extracting event signatures","authors":"S. Ahmed, Ruchi Bhindwale, H. Davulcu","doi":"10.1109/ISI.2009.5137296","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137296","url":null,"abstract":"With the humongous amount of news stories published daily and the range of ways (RSS feeds, blogs etc) to disseminate them, even an expert at tracking new developing stories can feel the information overload. At most times, when a user is reading a news story, she would like to know “what happened before this?“ or “how things progressed after this incident?”. In this paper, we present a novel real-time yet simple method to detect and track new events related to violence and terrorism in news streams through their life over a time line. We do this by first extracting signature of the event, at microscopic level rather than topic or macroscopic level, and then tracking and linking this event with mentions of same event signature in other incoming news articles. There by forming a thread that links all the news articles that describe this specific event, with no training data used or machine learning algorithms employed. We also present our experimental evaluations conducted with Document Understand Conference (DUC) datasets that validate our observations and methodology.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126231950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Implementing PII honeytokens to mitigate against the threat of malicous insiders 实现PII蜜糖令牌以减轻恶意内部人员的威胁
2009 IEEE International Conference on Intelligence and Security Informatics Pub Date : 2009-06-08 DOI: 10.1109/ISI.2009.5137315
Jonathan White, B. Panda
{"title":"Implementing PII honeytokens to mitigate against the threat of malicous insiders","authors":"Jonathan White, B. Panda","doi":"10.1109/ISI.2009.5137315","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137315","url":null,"abstract":"In the past several years, extensive research has been performed in various honeypot technologies, including honeynets, honeywalls, and honeytokens, primarily to gather information about external threats. Little to no research has been performed on how honeytokens, pieces of digital information designed to attract and trace illicit uses of data, can be implemented to catch one of the most dangerous threats, the trusted insider. The goal of this work is to detect, identify, and confirm insider threats, specifically threats that are after personally identifiable information (PII) data.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125215176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
IEDs in the dark web: Lexicon expansion and genre classification 暗网中的简易爆炸装置:词典扩展和类型分类
2009 IEEE International Conference on Intelligence and Security Informatics Pub Date : 2009-06-08 DOI: 10.1109/ISI.2009.5137293
Hsinchun Chen
{"title":"IEDs in the dark web: Lexicon expansion and genre classification","authors":"Hsinchun Chen","doi":"10.1109/ISI.2009.5137293","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137293","url":null,"abstract":"Improvised explosive device web pages represent a significant source of knowledge for security organizations. In this paper, we present significant improvements to our approach to the discovery and classification of IED related web pages in the Dark Web. We present a statistical feature ranking approach to the expansion of the keyword lexicon used to discover IED related web pages, which identified new relevant terms for inclusion. Additionally, we present an improved web page feature representation designed to better capture the structural and stylistic cues revealing of genres of communication, and a series of experiments comparing the classification performance of the new representation with our existing approach.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127538119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Effective whitelisting for filesystem forensics 有效的文件系统取证白名单
2009 IEEE International Conference on Intelligence and Security Informatics Pub Date : 2009-06-08 DOI: 10.1109/ISI.2009.5137284
S. Chawathe
{"title":"Effective whitelisting for filesystem forensics","authors":"S. Chawathe","doi":"10.1109/ISI.2009.5137284","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137284","url":null,"abstract":"Forensic analysis of the large filesystems commonly found on current computers requires an effective method for categorizing and prioritizing files in order to avoid overwhelming the investigator. A key technique for this purpose is whitelisting files, i.e., skipping the detailed analysis of files that match files in a well known reference collection of files. Effective use of this technique requires an efficient method to match files, detecting not only exact matches, but also near matches or approximate matches. This paper outlines the requirements for such matching, formalizes them as the bounded best match and approximate bounded near-match problems, and describes methods to solve these problems. In particular, the approximate bounded near-match problem is mapped to the problem of finding near neighbors in a high-dimensional metric space and solved using locality-sensitive hashing.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116683124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Building a better password: The role of cognitive load in information security training 构建更好的密码:认知负荷在信息安全培训中的作用
2009 IEEE International Conference on Intelligence and Security Informatics Pub Date : 2009-06-08 DOI: 10.1109/ISI.2009.5137281
Ann-Marie Horcher, G. Tejay
{"title":"Building a better password: The role of cognitive load in information security training","authors":"Ann-Marie Horcher, G. Tejay","doi":"10.1109/ISI.2009.5137281","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137281","url":null,"abstract":"User passwords are the gateway to an organization's assets. When users are the agents selecting passwords, they are the key component to improving passwords. Users must be persuaded to select passwords difficult to compromise. User behavior can be influenced by information security training. This study examines the use of cognitive load theory to design the information security training on password strength. The comprehension of training is measured by an examination of passwords selected after the training.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114596553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Stability of individual and group behavior in a blog network 博客网络中个人和群体行为的稳定性
2009 IEEE International Conference on Intelligence and Security Informatics Pub Date : 2009-06-08 DOI: 10.1109/ISI.2009.5137263
Stephen Kelley, M. Goldberg, M. Magdon-Ismail, Konstantin Mertsalov
{"title":"Stability of individual and group behavior in a blog network","authors":"Stephen Kelley, M. Goldberg, M. Magdon-Ismail, Konstantin Mertsalov","doi":"10.1109/ISI.2009.5137263","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137263","url":null,"abstract":"This work experimentally examines different notions of stability of the behavior of individuals and groups in a network of blogs. Our experiments are conducted on data collected from LiveJournal. All stability notions aim to locate stable behavior within an individual's area, which is defined in a variety of manners. Our experiments confirm an earlier observation of the highly dynamic nature of the network. Roughly 70% of the communication of a typical week was not observed in the previous week. Depending on the definition of stability and area used, we find small, but highly stable, sets of individuals with stable behavior in the network.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130184133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A game theory approach for the reallocation of security forces against terrorist diversionary attacks 针对恐怖分子转移攻击重新分配安全部队的博弈论方法
2009 IEEE International Conference on Intelligence and Security Informatics Pub Date : 2009-06-08 DOI: 10.1109/ISI.2009.5137277
Yi-Ming Chen, Dachrahn Wu, Cheng-Kuang Wu
{"title":"A game theory approach for the reallocation of security forces against terrorist diversionary attacks","authors":"Yi-Ming Chen, Dachrahn Wu, Cheng-Kuang Wu","doi":"10.1109/ISI.2009.5137277","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137277","url":null,"abstract":"Terrorists tend to coordinate multiple raids which, combined with diversionary attacks are designed to divert the attention of the security forces, causing them to take a longer time to respond. This in turn enables the terrorists to cause more casualties at their primary target. It is important to efficiently reallocate the available security forces to meet these terrorist attacks, especially when the available resources are limited. In this paper we proposed two game theory-based models for the reallocation of security forces for the purpose of countering both primary and diversionary attacks in an urban environment. The first model is used each target and the “attack on hidden-object game” in which one analyzes the interaction behavior between the security force commander and the terrorists within a zero-sum game. The probability of a primary attack to this target is derived from the mixed strategy Nash equilibrium. The second model uses all these probabilities to compute the Shapley value for each target, in terms of the majority of all probabilities for primary attacks. The Shapley values are then used to create a reallocated set of the limited security forces. Experimental results show the approach proposed in this study is more efficient than the traditional method for dealing with ever more likely gunshot events.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128595007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Change point detection based on call detail records 基于呼叫细节记录的变更点检测
2009 IEEE International Conference on Intelligence and Security Informatics Pub Date : 2009-06-08 DOI: 10.1109/ISI.2009.5137271
Huiqi Zhang, R. Dantu, João W. Cangussu
{"title":"Change point detection based on call detail records","authors":"Huiqi Zhang, R. Dantu, João W. Cangussu","doi":"10.1109/ISI.2009.5137271","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137271","url":null,"abstract":"In this paper we propose a method for combining wavelet denoising and sequential approach for detecting change points on mobile phone based on detailed call records. The Minmax method is used to estimate the thresholds of frequency and call duration for denoising. This work is useful to enhance homeland security, detecting unwanted calls (e.g., spam) and commercial purposes. For validation of our results, we randomly choose actual call logs of 20 users from 100 users collected at MIT by the Reality Mining Project group for a period of 8 months. Simulation data is also used to validate the results. The experimental results show that our model achieves good performance with high accuracy.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122130246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Factors influencing Bloggers' perceived indentifiability 影响博主感知可识别性的因素
2009 IEEE International Conference on Intelligence and Security Informatics Pub Date : 2009-06-08 DOI: 10.1109/ISI.2009.5137267
Chyng-yang Jang, M. Stefanone
{"title":"Factors influencing Bloggers' perceived indentifiability","authors":"Chyng-yang Jang, M. Stefanone","doi":"10.1109/ISI.2009.5137267","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137267","url":null,"abstract":"Prior research found that the majority of blogs are personal and relational in nature where bloggers reveal intimate information about themselves and target their public posts to their off-line social networks. These personal-journal style blogs expose their authors to potential privacy risks. Bloggers may choose to conceal their identities to mitigate the privacy concerns or disclose their identities for positive relational communication. This study explores the impacts of personal traits and perceived communication context on bloggers' decision of identity disclosure. Data were collected via an online survey of 148 randomly selected bloggers. Results showed that self disclosure tendency and targeting blogs at family and close friends were positive predictors to bloggers' perceived identifiability. In addition, self disclosure tendency and extraversion were found to moderate the relationship between bloggers' perceived vulnerability and identifiability. The implications on privacy management and relational communication online are discussed.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121249405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信