2010 IEEE International Conference on Intelligence and Security Informatics最新文献

筛选
英文 中文
A multibiometric access control architecture for continuous authentication 用于连续身份验证的多生物识别访问控制体系结构
2010 IEEE International Conference on Intelligence and Security Informatics Pub Date : 2010-05-23 DOI: 10.1109/ISI.2010.5484746
Adriana Esmeraldo de Oliveira, G. Motta, L. Batista
{"title":"A multibiometric access control architecture for continuous authentication","authors":"Adriana Esmeraldo de Oliveira, G. Motta, L. Batista","doi":"10.1109/ISI.2010.5484746","DOIUrl":"https://doi.org/10.1109/ISI.2010.5484746","url":null,"abstract":"In order to enhance security, biometrics has increasingly become part of access control architectures. Since some of unibiometrics' vulnerabilities have already shown up, they've been replaced or enhanced by multibiometrics. Also, continuous authentication processes have been considered an important security caution. In such a context, this paper presents an information security architecture for access control that aims to accomplish a high security level by adding multibiometrics and a continuous authentication process.","PeriodicalId":434501,"journal":{"name":"2010 IEEE International Conference on Intelligence and Security Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129580237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Meta-model driven construction of Timed Influence Nets 元模型驱动的时间影响网构建
2010 IEEE International Conference on Intelligence and Security Informatics Pub Date : 2010-05-23 DOI: 10.1109/ISI.2010.5484735
F. Mansoor, A. K. Zaidi, A. Levis
{"title":"Meta-model driven construction of Timed Influence Nets","authors":"F. Mansoor, A. K. Zaidi, A. Levis","doi":"10.1109/ISI.2010.5484735","DOIUrl":"https://doi.org/10.1109/ISI.2010.5484735","url":null,"abstract":"A methodology to develop domain specific Timed Influence Nets (TINs) via the use of ontological representation of domain data is presented. One of the main challenges in using TINs has been the difficulty in formulating them. Many Subject Matter Experts have difficulty in expressing their knowledge in the TIN representation. The meta-model driven ontology based approach described in this paper provides potential assistance to these modelers in quickly creating new models for new situations and spend more time doing analysis. The paper describes the theoretic concepts used and a process that leads to an automated TIN generation. A simple example is provided to illustrate the technique.","PeriodicalId":434501,"journal":{"name":"2010 IEEE International Conference on Intelligence and Security Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128714751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Protection of Critical National Information Infrastructure (CNII) against cyber terrorism: Development of strategy and policy framework 保护关键国家信息基础设施(CNII)对抗网络恐怖主义:战略和政策框架的发展
2010 IEEE International Conference on Intelligence and Security Informatics Pub Date : 2010-05-23 DOI: 10.1109/ISI.2010.5484748
Zahri Yunos, Syahrul Hafidz Suid
{"title":"Protection of Critical National Information Infrastructure (CNII) against cyber terrorism: Development of strategy and policy framework","authors":"Zahri Yunos, Syahrul Hafidz Suid","doi":"10.1109/ISI.2010.5484748","DOIUrl":"https://doi.org/10.1109/ISI.2010.5484748","url":null,"abstract":"Critical National Information Infrastructure (CNII) is crucial to the survivability of a nation that the destruction or disruption of these systems and communication networks would significantly affect the economic strength, image, defense and security, government capabilities to function, and public health and safety. CNII would probably become an attractive target for terrorists. There is a need to have a strategy at the national level for the protection of CNII from cyber terrorism activities.","PeriodicalId":434501,"journal":{"name":"2010 IEEE International Conference on Intelligence and Security Informatics","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128675058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Desktop text mining for law enforcement 用于执法的桌面文本挖掘
2010 IEEE International Conference on Intelligence and Security Informatics Pub Date : 2010-05-23 DOI: 10.1109/ISI.2010.5484761
J. Crawley, Gerhard Wagner
{"title":"Desktop text mining for law enforcement","authors":"J. Crawley, Gerhard Wagner","doi":"10.1109/ISI.2010.5484761","DOIUrl":"https://doi.org/10.1109/ISI.2010.5484761","url":null,"abstract":"This paper presents a software system supporting analysts in the domain of open source intelligence. The desktop application contains functions to extract information acquired from open sources. The text mining engine combines finite state machines, rule based entity guessing and machine learning in a lightweight pipelined approach. The text mining functions and the overall system design have been developed to be applicable in law enforcement settings. This paper focuses on the information extraction functions of the system.","PeriodicalId":434501,"journal":{"name":"2010 IEEE International Conference on Intelligence and Security Informatics","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116313974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Unsupervised multilingual concept discovery from daily online news extracts 每日在线新闻摘录的无监督多语言概念发现
2010 IEEE International Conference on Intelligence and Security Informatics Pub Date : 2010-05-23 DOI: 10.1109/ISI.2010.5484763
Jenq-Haur Wang
{"title":"Unsupervised multilingual concept discovery from daily online news extracts","authors":"Jenq-Haur Wang","doi":"10.1109/ISI.2010.5484763","DOIUrl":"https://doi.org/10.1109/ISI.2010.5484763","url":null,"abstract":"Web syndication technologies help us easily aggregate daily news from diverse sources. However, the huge amount of information makes us more difficult to read let alone digest and focus on the most important events. Therefore, we need an efficient way of news extraction and mining. In this paper, we propose an unsupervised approach to multilingual concept discovery from daily online news extracts. First, key terms are extracted statistically from short news extracts. Second, similar term candidates are grouped into concrete concepts with unsupervised term clustering methods. Our goal is automatic news processing with minimum resources, which requires no training in advance. The experimental results show the potential of the proposed approach in efficiency and effectiveness. Further investigation is needed to study the cross-lingual relation between extracted concepts.","PeriodicalId":434501,"journal":{"name":"2010 IEEE International Conference on Intelligence and Security Informatics","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124004756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Collaborative knowledge discovery & marshalling for intelligence & security applications 智能和安全应用的协作知识发现和编组
2010 IEEE International Conference on Intelligence and Security Informatics Pub Date : 2010-05-23 DOI: 10.1109/ISI.2010.5484731
A. Cowell, Russell S. Jensen, M. Gregory, Peter C. Ellis, Keith Fligg, Liam R. McGrath, Kelly O'Hara, Eric Bell
{"title":"Collaborative knowledge discovery & marshalling for intelligence & security applications","authors":"A. Cowell, Russell S. Jensen, M. Gregory, Peter C. Ellis, Keith Fligg, Liam R. McGrath, Kelly O'Hara, Eric Bell","doi":"10.1109/ISI.2010.5484731","DOIUrl":"https://doi.org/10.1109/ISI.2010.5484731","url":null,"abstract":"This paper discusses the Knowledge Encapsulation Framework, a flexible, extensible evidence-marshalling environment built upon a natural language processing pipeline and exposed to users via an open-source semantic wiki. We focus our discussion on applications of the framework to intelligence and security applications, specifically, an instantiation of the KEF environment for researching illicit trafficking in nuclear materials.","PeriodicalId":434501,"journal":{"name":"2010 IEEE International Conference on Intelligence and Security Informatics","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130234893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Digitally signed document flexible sanitizing scheme based on bilinear maps 基于双线性映射的数字签名文档灵活消毒方案
2010 IEEE International Conference on Intelligence and Security Informatics Pub Date : 2010-05-23 DOI: 10.1109/ISI.2010.5484747
W. Kuo, Jiin-Chiou Cheng, Yen-Hung Lin, Lih-Chyau Wuu
{"title":"Digitally signed document flexible sanitizing scheme based on bilinear maps","authors":"W. Kuo, Jiin-Chiou Cheng, Yen-Hung Lin, Lih-Chyau Wuu","doi":"10.1109/ISI.2010.5484747","DOIUrl":"https://doi.org/10.1109/ISI.2010.5484747","url":null,"abstract":"In 2001, the sanitizable signature was proposed by Steinfeld et al. Until now, many sanitizable signature schemes have been proposed. However, current sanitizable signature schemes are faced with the dishonest sanitizer or additional sanitizing problem due to the sanitizer can modify the signed document unrestrictedly. Therefore, a flexible sanitizable signature scheme based on bilinear mapping will be proposed in this paper. According to our security analysis, this proposed scheme is not only to keep the security requirement of sanitizable signature but also improve the disadvantage of related schemes.","PeriodicalId":434501,"journal":{"name":"2010 IEEE International Conference on Intelligence and Security Informatics","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133661247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Text analysis and entity extraction in asymmetric threat response and prediction 非对称威胁响应与预测中的文本分析与实体提取
2010 IEEE International Conference on Intelligence and Security Informatics Pub Date : 2010-05-23 DOI: 10.1109/ISI.2010.5484737
Erwin Chan, Jason Ginsburg, B. T. Eyck, J. Rozenblit, M. Dameron
{"title":"Text analysis and entity extraction in asymmetric threat response and prediction","authors":"Erwin Chan, Jason Ginsburg, B. T. Eyck, J. Rozenblit, M. Dameron","doi":"10.1109/ISI.2010.5484737","DOIUrl":"https://doi.org/10.1109/ISI.2010.5484737","url":null,"abstract":"The Asymmetric Threat Response and Analysis Program (ATRAP) is a software system for intelligence fusion, visualization, reasoning, and prediction. ATRAP consists of a set of tools for annotating and automatically extracting entities and relationships from documents, visualizing this information in relational, geographic, and temporal dimensions, and determining future courses of action of adversaries by creating situational threat templates and applying customized prediction algorithms. In this paper, we first describe the task of analyzing data in intelligence reports, and then provide an overview of major system components: the Text Highlighter tool, the ThoughtSpace™ visualization environment, and the Template Builder and prediction tool. Subsequently, we describe linguistic characteristics of intelligence reports, and describe ATRAP's named entity recognition system.","PeriodicalId":434501,"journal":{"name":"2010 IEEE International Conference on Intelligence and Security Informatics","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115009759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Clustering and mapping related news about violence events on their time-lines 在时间线上对暴力事件的相关新闻进行聚类和映射
2010 IEEE International Conference on Intelligence and Security Informatics Pub Date : 2010-05-23 DOI: 10.1109/ISI.2010.5484742
S. Ahmed, Sukru Tikves, H. Davulcu
{"title":"Clustering and mapping related news about violence events on their time-lines","authors":"S. Ahmed, Sukru Tikves, H. Davulcu","doi":"10.1109/ISI.2010.5484742","DOIUrl":"https://doi.org/10.1109/ISI.2010.5484742","url":null,"abstract":"Keeping track of news stories and events as they progress can be a tedious job, but as every day routine most of the web users read and follow many stories and events in news. If an analyst in her area has to follow and map all these according to the time-line they happen, the task quickly becomes overwhelming. We present an online tool which attempts to ease the analyst's task of finding all news articles about an event, and sorting and mapping them on a time-line. We implemented an incremental clustering algorithm working on real-time incoming news, experimenting with different feature sets, including named entities and sentence overlap methods. We evaluated these approaches using Document Understand Conference (DUC) datasets.","PeriodicalId":434501,"journal":{"name":"2010 IEEE International Conference on Intelligence and Security Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131296771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-modeling of adversary behaviors 对手行为的多重建模
2010 IEEE International Conference on Intelligence and Security Informatics Pub Date : 2010-05-23 DOI: 10.1109/ISI.2010.5484738
A. Levis, Lee W. Wagenhals, A. K. Zaidi
{"title":"Multi-modeling of adversary behaviors","authors":"A. Levis, Lee W. Wagenhals, A. K. Zaidi","doi":"10.1109/ISI.2010.5484738","DOIUrl":"https://doi.org/10.1109/ISI.2010.5484738","url":null,"abstract":"Models developed using different modeling languages but the same data provide different insights of the human terrain. Interoperation of such models, i.e., multi-modeling, can produce a more robust modeling and simulation capability to support operational commanders or intelligence analysts. The C2 Wind Tunnel is a platform that enables multi-modeling and the conduct of simulations and computational experiments. However, to establish that the interoperation of the models is valid, meta-modeling analysis is required. An approach using concept maps is described.","PeriodicalId":434501,"journal":{"name":"2010 IEEE International Conference on Intelligence and Security Informatics","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126379947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信