2009 IEEE International Conference on Intelligence and Security Informatics最新文献

筛选
英文 中文
A framework for harnessing public wisdom to ensure food safety 利用公众智慧确保食品安全的框架
2009 IEEE International Conference on Intelligence and Security Informatics Pub Date : 2009-06-08 DOI: 10.1109/ISI.2009.5137297
T. D. Ng, Christopher C. Yang
{"title":"A framework for harnessing public wisdom to ensure food safety","authors":"T. D. Ng, Christopher C. Yang","doi":"10.1109/ISI.2009.5137297","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137297","url":null,"abstract":"Food safety issues often draw public attention after the discovery of suspected or confirmed cases of food poisoning and contamination. Food safety incidents reveal voids in existing food safety practices established by food science, governmental policies, and business processes. The vulnerability in food supply chain may yield room for potential food terrorism. This paper presents a framework for harnessing public wisdom from mass media to improve and advance existing practices to better ensure our food safety. The framework incorporates the use of content and social network analyses to distill important issues into food safety knowledge.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123362769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Identification of extremist videos in online video sharing sites 网络视频分享网站极端主义视频的识别
2009 IEEE International Conference on Intelligence and Security Informatics Pub Date : 2009-06-08 DOI: 10.1109/ISI.2009.5137295
Tianjun Fu, Chunneng Huang, Hsinchun Chen
{"title":"Identification of extremist videos in online video sharing sites","authors":"Tianjun Fu, Chunneng Huang, Hsinchun Chen","doi":"10.1109/ISI.2009.5137295","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137295","url":null,"abstract":"Web 2.0 has become an effective grassroots communication platform for extremists to promote their ideas, share resources, and communicate among each other. As an important component of Web 2.0, online video sharing sites such as YouTube and Google video have also been utilized by extremist groups to distribute videos. This study presented a framework for identifying extremist videos in online video sharing sites by using user-generated text content such as comments, video descriptions, and titles without downloading the videos. Text features including lexical features, syntactic features and content specific features were first extracted. Then Information Gain was used for feature selection, and Support Vector Machine was deployed for classification. The exploratory experiment showed that our proposed framework is effective for identifying online extremist videos, with the F-measure as high as 82%.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124566020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Prediction of past unsolved terrorist attacks 预测过去未解决的恐怖袭击
2009 IEEE International Conference on Intelligence and Security Informatics Pub Date : 2009-06-08 DOI: 10.1109/ISI.2009.5137268
Fatih Özgül, Z. Erdem, C. Bowerman
{"title":"Prediction of past unsolved terrorist attacks","authors":"Fatih Özgül, Z. Erdem, C. Bowerman","doi":"10.1109/ISI.2009.5137268","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137268","url":null,"abstract":"In this study, a novel model is proposed to predict perpetuators of some terrorist events which are remain unsolved. The CPM learns from similarities between terrorist attacks and their crime attributes then puts them in appropriate clusters. Solved and unsolved attacks are gathered in the same - all linked to each other - “umbrella” clusters; then CPM classifies all related terrorist events which are expected to belong to one single terrorist group. The developed model is applied to a real crime dataset, which includes solved and unsolved terrorist attacks and crimes in Turkey between 1970 and 2005. CPM predictions produced significant precision value for big terrorist groups and reasonable recall values for small terrorist groups.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124284576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Identifying Google Talk packets 识别Google Talk数据包
2009 IEEE International Conference on Intelligence and Security Informatics Pub Date : 2009-06-08 DOI: 10.1109/ISI.2009.5137327
J. Ho, Ping Ji, Weifeng Chen, R. Hsieh
{"title":"Identifying Google Talk packets","authors":"J. Ho, Ping Ji, Weifeng Chen, R. Hsieh","doi":"10.1109/ISI.2009.5137327","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137327","url":null,"abstract":"Instant messages and online chatting are the earliest forms of online social networking, and they remain as popular communication channels that people use to exchange information and socialize with each other through the Internet, even with the existence of the current diversified and various modern social networks such as mySpace and Facebook. This is especially the case for younger generations, who talk to each other by using text messages much more often than using phone calls and emails. The light-weight communication style of simple type-and-send-in-real-time is the main reason for online chatting (or instant messages) being favorable. However, similar with other sophisticated social networks, online chatting potentially faces the problem of being utilized by perpetrators or even pedophiles to conduct initial approach to innocent online users, who are in many situations children, which may lead to a dangerous crime. Therefore, in some cases, the investigation of victim's online chatting history may play an important role in identifying potential suspects. In this paper we study the aforementioned problem from the technical perspective and seek to conduct systematic approaches to retrieve user online chatting records from general Internet traces. Specifically, we conduct a preliminary study on identifying different types of Google Talk, one of the most popular online chatting software, by using Wireshark (or Ethereal). We describe in details the pattern of each type of online chat messages, and present the corresponding process of identifying the messages. Our experiments show that unencrypted Google Talk chat messages can be easily identified. This study is an initiation on conducting research to provide simple tools for facilitating online message investigations in the future.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129168982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Hardening adversarial prediction with anomaly tracking 通过异常跟踪强化对抗预测
2009 IEEE International Conference on Intelligence and Security Informatics Pub Date : 2009-06-08 DOI: 10.1109/ISI.2009.5137269
M. J. Bourassa, D. Skillicorn
{"title":"Hardening adversarial prediction with anomaly tracking","authors":"M. J. Bourassa, D. Skillicorn","doi":"10.1109/ISI.2009.5137269","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137269","url":null,"abstract":"Predictors are often regarded as black boxes that treat all incoming records exactly the same, regardless of whether or not they resemble those from which the predictor was built. This is inappropriate, especially in adversarial settings where rare but unusual records are of critical importance and some records might occur because of deliberate attempts to subvert the entire process. We suggest that any predictor can, and should, be hardened by including three extra functions that watch for different forms of anomaly: input records that are unlike those previously seen (novel records); records that imply that the predictor is not accurately modelling reality (interesting records); and trends in predictor behavior that imply that reality is changing and the predictor should be updated. Detecting such anomalies prevents silent poor predictions, and allows for responses, such as: human intervention, using a variant process for some records, or triggering a predictor update.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132940038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Observation of network structure in Amazon.com 亚马逊网络结构观察
2009 IEEE International Conference on Intelligence and Security Informatics Pub Date : 2009-06-08 DOI: 10.1109/ISI.2009.5137264
T. Yoneyama, M. Krishnamoorthy
{"title":"Observation of network structure in Amazon.com","authors":"T. Yoneyama, M. Krishnamoorthy","doi":"10.1109/ISI.2009.5137264","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137264","url":null,"abstract":"Amazon.com is among the largest bookstores on the internet. It provides the sales rank of each book. Our hypothesis is as follows: if a book has low sales rank (i.e., it is well-sold), the related book also has a low sales rank. In the small world principle, if a network is connected, any two nodes are connected with relatively small number of links. If this hypothesis is true, any book can link to a bestseller book with small number of distance by linking some related books. In this paper, we design an algorithm to ascertain our hypothesis, and analyze the network structure of Amazon.com.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134255123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Web opinions analysis with scalable distance-based clustering 基于可扩展距离聚类的Web意见分析
2009 IEEE International Conference on Intelligence and Security Informatics Pub Date : 2009-06-08 DOI: 10.1109/ISI.2009.5137273
Christopher C. Yang, T. D. Ng
{"title":"Web opinions analysis with scalable distance-based clustering","authors":"Christopher C. Yang, T. D. Ng","doi":"10.1109/ISI.2009.5137273","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137273","url":null,"abstract":"Due to the advance of Web 2.0 technologies, a large volume of web opinions are available in computer-mediated communication sites such as forums and blogs. Many of these web opinions involve terrorism and crime related issues. For instances, some terrorist groups may use web forums to propagandize their ideology, some may post threaten messages, and some criminals may recruit members or identify victims through web social networks. Analyzing and clustering Web opinions are extremely challenging. Unlike regular documents, web opinions usually appear as short and sparse text messages. Using typical document clustering techniques on web opinions produce unsatisfying result. In this work, we propose the scalable distance-based clustering technique for web opinions clustering. We have conducted experiments and benchmarked with the density-based algorithm. It shows that it obtains higher micro and macro accuracy. This web opinions clustering technique is useful in identifying the themes of discussions in web social networks and studying their development as well as the interactions of active participants.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114748750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
The software EBox: Integrated information for situational awareness 软件EBox:用于态势感知的综合信息
2009 IEEE International Conference on Intelligence and Security Informatics Pub Date : 2009-06-08 DOI: 10.1109/ISI.2009.5137275
N. Ashish, Jay Lickfett, S. Mehrotra, N. Venkatasubramanian
{"title":"The software EBox: Integrated information for situational awareness","authors":"N. Ashish, Jay Lickfett, S. Mehrotra, N. Venkatasubramanian","doi":"10.1109/ISI.2009.5137275","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137275","url":null,"abstract":"This paper describes the development of the “EBox”, a system that provides integrated access to a wide variety of information sources relevant to providing situational awareness during emergency response situations. The EBox exemplifies a novel information integration approach in which both pre-existing data and real-time information streams are obtained from multiple sources and are rapidly and intelligently ingested and registered to faclilitate efficient and integrated access at a later time. We describe the design and development of the EBox, and the deployment experience in a drill and demonstration exercise. We further describe key technical challenges that remain and our ongoing research efforts in addressing such challenges.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130513854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
From digital forensic report to Bayesian network representation 从数字取证报告到贝叶斯网络表示
2009 IEEE International Conference on Intelligence and Security Informatics Pub Date : 2009-06-08 DOI: 10.1109/ISI.2009.5137330
Robert Lee, S. Lang, Kevin Stenger
{"title":"From digital forensic report to Bayesian network representation","authors":"Robert Lee, S. Lang, Kevin Stenger","doi":"10.1109/ISI.2009.5137330","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137330","url":null,"abstract":"Computer (digital) forensic examiners typically write a report to document the examination process, including tools used, major processing steps, summary of the findings, and a detailed listing of relevant evidence (files, artifacts) exported to external media (CD, DVD, hard copy) for the case investigator or attorney. However, proper interpretation of the significance of extracted evidence often requires additional consultation with the examiner. This paper proposes a practical methodology for transforming the findings in typical forensic reports to a graphical representation using Bayesian networks (BNs). BNs offer the following advantages: (1) Delineate the cause-effect relationship among relevant pieces of evidence described in the report; and (2) Use probability and established Bayesian inference rules to deal with uncertainty of digital evidence. A realistic forensic report is used to demonstrate this methodology.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126163075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Design and implementation of a secure social network system 一个安全的社交网络系统的设计与实现
2009 IEEE International Conference on Intelligence and Security Informatics Pub Date : 2009-03-01 DOI: 10.1109/ISI.2009.5137318
Ryan Layfield, B. Thuraisingham, L. Khan, Murat Kantarcioglu
{"title":"Design and implementation of a secure social network system","authors":"Ryan Layfield, B. Thuraisingham, L. Khan, Murat Kantarcioglu","doi":"10.1109/ISI.2009.5137318","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137318","url":null,"abstract":"Context-based anomaly tracking represents a new approach to security enhancement of communication streams. By creating a system that develops an understanding of normal and abnormal based on communication history, it is possible to detect fluctuations in an evolving social network. Although more research is necessary to overcome current obstacles, the combination of social network analysis and anomaly detection techniques yields a promising set of applications for enhancing communication security. In this paper we will describe a system for context-based anomaly detection and then describe experiments for message surveillance application.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115768545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信