Adriana Esmeraldo de Oliveira, G. Motta, L. Batista
{"title":"A multibiometric access control architecture for continuous authentication","authors":"Adriana Esmeraldo de Oliveira, G. Motta, L. Batista","doi":"10.1109/ISI.2010.5484746","DOIUrl":"https://doi.org/10.1109/ISI.2010.5484746","url":null,"abstract":"In order to enhance security, biometrics has increasingly become part of access control architectures. Since some of unibiometrics' vulnerabilities have already shown up, they've been replaced or enhanced by multibiometrics. Also, continuous authentication processes have been considered an important security caution. In such a context, this paper presents an information security architecture for access control that aims to accomplish a high security level by adding multibiometrics and a continuous authentication process.","PeriodicalId":434501,"journal":{"name":"2010 IEEE International Conference on Intelligence and Security Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129580237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Meta-model driven construction of Timed Influence Nets","authors":"F. Mansoor, A. K. Zaidi, A. Levis","doi":"10.1109/ISI.2010.5484735","DOIUrl":"https://doi.org/10.1109/ISI.2010.5484735","url":null,"abstract":"A methodology to develop domain specific Timed Influence Nets (TINs) via the use of ontological representation of domain data is presented. One of the main challenges in using TINs has been the difficulty in formulating them. Many Subject Matter Experts have difficulty in expressing their knowledge in the TIN representation. The meta-model driven ontology based approach described in this paper provides potential assistance to these modelers in quickly creating new models for new situations and spend more time doing analysis. The paper describes the theoretic concepts used and a process that leads to an automated TIN generation. A simple example is provided to illustrate the technique.","PeriodicalId":434501,"journal":{"name":"2010 IEEE International Conference on Intelligence and Security Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128714751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Protection of Critical National Information Infrastructure (CNII) against cyber terrorism: Development of strategy and policy framework","authors":"Zahri Yunos, Syahrul Hafidz Suid","doi":"10.1109/ISI.2010.5484748","DOIUrl":"https://doi.org/10.1109/ISI.2010.5484748","url":null,"abstract":"Critical National Information Infrastructure (CNII) is crucial to the survivability of a nation that the destruction or disruption of these systems and communication networks would significantly affect the economic strength, image, defense and security, government capabilities to function, and public health and safety. CNII would probably become an attractive target for terrorists. There is a need to have a strategy at the national level for the protection of CNII from cyber terrorism activities.","PeriodicalId":434501,"journal":{"name":"2010 IEEE International Conference on Intelligence and Security Informatics","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128675058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Desktop text mining for law enforcement","authors":"J. Crawley, Gerhard Wagner","doi":"10.1109/ISI.2010.5484761","DOIUrl":"https://doi.org/10.1109/ISI.2010.5484761","url":null,"abstract":"This paper presents a software system supporting analysts in the domain of open source intelligence. The desktop application contains functions to extract information acquired from open sources. The text mining engine combines finite state machines, rule based entity guessing and machine learning in a lightweight pipelined approach. The text mining functions and the overall system design have been developed to be applicable in law enforcement settings. This paper focuses on the information extraction functions of the system.","PeriodicalId":434501,"journal":{"name":"2010 IEEE International Conference on Intelligence and Security Informatics","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116313974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Unsupervised multilingual concept discovery from daily online news extracts","authors":"Jenq-Haur Wang","doi":"10.1109/ISI.2010.5484763","DOIUrl":"https://doi.org/10.1109/ISI.2010.5484763","url":null,"abstract":"Web syndication technologies help us easily aggregate daily news from diverse sources. However, the huge amount of information makes us more difficult to read let alone digest and focus on the most important events. Therefore, we need an efficient way of news extraction and mining. In this paper, we propose an unsupervised approach to multilingual concept discovery from daily online news extracts. First, key terms are extracted statistically from short news extracts. Second, similar term candidates are grouped into concrete concepts with unsupervised term clustering methods. Our goal is automatic news processing with minimum resources, which requires no training in advance. The experimental results show the potential of the proposed approach in efficiency and effectiveness. Further investigation is needed to study the cross-lingual relation between extracted concepts.","PeriodicalId":434501,"journal":{"name":"2010 IEEE International Conference on Intelligence and Security Informatics","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124004756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Cowell, Russell S. Jensen, M. Gregory, Peter C. Ellis, Keith Fligg, Liam R. McGrath, Kelly O'Hara, Eric Bell
{"title":"Collaborative knowledge discovery & marshalling for intelligence & security applications","authors":"A. Cowell, Russell S. Jensen, M. Gregory, Peter C. Ellis, Keith Fligg, Liam R. McGrath, Kelly O'Hara, Eric Bell","doi":"10.1109/ISI.2010.5484731","DOIUrl":"https://doi.org/10.1109/ISI.2010.5484731","url":null,"abstract":"This paper discusses the Knowledge Encapsulation Framework, a flexible, extensible evidence-marshalling environment built upon a natural language processing pipeline and exposed to users via an open-source semantic wiki. We focus our discussion on applications of the framework to intelligence and security applications, specifically, an instantiation of the KEF environment for researching illicit trafficking in nuclear materials.","PeriodicalId":434501,"journal":{"name":"2010 IEEE International Conference on Intelligence and Security Informatics","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130234893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
W. Kuo, Jiin-Chiou Cheng, Yen-Hung Lin, Lih-Chyau Wuu
{"title":"Digitally signed document flexible sanitizing scheme based on bilinear maps","authors":"W. Kuo, Jiin-Chiou Cheng, Yen-Hung Lin, Lih-Chyau Wuu","doi":"10.1109/ISI.2010.5484747","DOIUrl":"https://doi.org/10.1109/ISI.2010.5484747","url":null,"abstract":"In 2001, the sanitizable signature was proposed by Steinfeld et al. Until now, many sanitizable signature schemes have been proposed. However, current sanitizable signature schemes are faced with the dishonest sanitizer or additional sanitizing problem due to the sanitizer can modify the signed document unrestrictedly. Therefore, a flexible sanitizable signature scheme based on bilinear mapping will be proposed in this paper. According to our security analysis, this proposed scheme is not only to keep the security requirement of sanitizable signature but also improve the disadvantage of related schemes.","PeriodicalId":434501,"journal":{"name":"2010 IEEE International Conference on Intelligence and Security Informatics","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133661247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Erwin Chan, Jason Ginsburg, B. T. Eyck, J. Rozenblit, M. Dameron
{"title":"Text analysis and entity extraction in asymmetric threat response and prediction","authors":"Erwin Chan, Jason Ginsburg, B. T. Eyck, J. Rozenblit, M. Dameron","doi":"10.1109/ISI.2010.5484737","DOIUrl":"https://doi.org/10.1109/ISI.2010.5484737","url":null,"abstract":"The Asymmetric Threat Response and Analysis Program (ATRAP) is a software system for intelligence fusion, visualization, reasoning, and prediction. ATRAP consists of a set of tools for annotating and automatically extracting entities and relationships from documents, visualizing this information in relational, geographic, and temporal dimensions, and determining future courses of action of adversaries by creating situational threat templates and applying customized prediction algorithms. In this paper, we first describe the task of analyzing data in intelligence reports, and then provide an overview of major system components: the Text Highlighter tool, the ThoughtSpace™ visualization environment, and the Template Builder and prediction tool. Subsequently, we describe linguistic characteristics of intelligence reports, and describe ATRAP's named entity recognition system.","PeriodicalId":434501,"journal":{"name":"2010 IEEE International Conference on Intelligence and Security Informatics","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115009759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Clustering and mapping related news about violence events on their time-lines","authors":"S. Ahmed, Sukru Tikves, H. Davulcu","doi":"10.1109/ISI.2010.5484742","DOIUrl":"https://doi.org/10.1109/ISI.2010.5484742","url":null,"abstract":"Keeping track of news stories and events as they progress can be a tedious job, but as every day routine most of the web users read and follow many stories and events in news. If an analyst in her area has to follow and map all these according to the time-line they happen, the task quickly becomes overwhelming. We present an online tool which attempts to ease the analyst's task of finding all news articles about an event, and sorting and mapping them on a time-line. We implemented an incremental clustering algorithm working on real-time incoming news, experimenting with different feature sets, including named entities and sentence overlap methods. We evaluated these approaches using Document Understand Conference (DUC) datasets.","PeriodicalId":434501,"journal":{"name":"2010 IEEE International Conference on Intelligence and Security Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131296771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-modeling of adversary behaviors","authors":"A. Levis, Lee W. Wagenhals, A. K. Zaidi","doi":"10.1109/ISI.2010.5484738","DOIUrl":"https://doi.org/10.1109/ISI.2010.5484738","url":null,"abstract":"Models developed using different modeling languages but the same data provide different insights of the human terrain. Interoperation of such models, i.e., multi-modeling, can produce a more robust modeling and simulation capability to support operational commanders or intelligence analysts. The C2 Wind Tunnel is a platform that enables multi-modeling and the conduct of simulations and computational experiments. However, to establish that the interoperation of the models is valid, meta-modeling analysis is required. An approach using concept maps is described.","PeriodicalId":434501,"journal":{"name":"2010 IEEE International Conference on Intelligence and Security Informatics","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126379947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}