{"title":"An executive decision support system for longitudinal statistical analysis of crime and law enforcement performance crime analysis system pacific region (CASPR)","authors":"A. Ghaseminejad, P. Brantingham","doi":"10.1109/ISI.2010.5484784","DOIUrl":"https://doi.org/10.1109/ISI.2010.5484784","url":null,"abstract":"This paper describes the structure of an executive decision support system based on a data warehouse about offences and clearance rates in British Columbia. The system was developed at the Institute for Canadian Urban Research Studies at Simon Fraser University. The paper explains how the data mining and automated statistical analysis in this system can be used by criminologists for analysis of crime trends both at the jurisdiction level and province wide. Database technologies and statistical functions have been utilized in a set of programs that encapsulate the knowledge of experts. The paper explains how by performing repeated regression analysis on all Jurisdiction-crime combinations the system can discover important and significant trends at the local level and how general province-wide trends can be detected. An example of using the system to evaluate the relationship between reported crime rates and clearance rates is explained.","PeriodicalId":434501,"journal":{"name":"2010 IEEE International Conference on Intelligence and Security Informatics","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130922196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The U.S. and the EU differences in anti-terrorism efforts","authors":"M. Gallagher","doi":"10.1109/ISI.2010.5484777","DOIUrl":"https://doi.org/10.1109/ISI.2010.5484777","url":null,"abstract":"While there is a consensus among developed countries over the need to combat terrorism, there are marked differences on how to accomplish that. Recently the European Union (EU) rejected a US-EU agreement on financial data exchange. Shifts in power in Europe are taking place, which contributed to this rejection. But more basically, there is a difference in views on the balance between about managing anti-terrorism efforts and respect for civil liberties, especially in data sharing. The post-WWII alliances are still strong, but Europe has a different take on many issues. In our interdependent globalized world, U.S. authorities are being required to adjust the tools and methods we can use. The sympathy and readiness to assist in the immediate aftermath of 9/11 have now faded. We should understand these differences and realize we are entering a period where being creative and factoring in the views of our allies is essential if we are to pursue successfully those who would do us harm.","PeriodicalId":434501,"journal":{"name":"2010 IEEE International Conference on Intelligence and Security Informatics","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116271562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automatic construction of domain theory for attack planning","authors":"Xiaochen Li, W. Mao, D. Zeng, Fei-Yue Wang","doi":"10.1109/ISI.2010.5484775","DOIUrl":"https://doi.org/10.1109/ISI.2010.5484775","url":null,"abstract":"Terrorism organizations are devising increasingly sophisticated plans to conduct attacks. The ability of emulating or constructing attack plans by potential terrorists can help us understand the intents and motivation behind terrorism activities. A feasible computational method to construct plans is planning technique in AI. Traditionally, AI planning methods rely on a predefined domain theory which is compiled by domain experts manually. To facilitate domain theory construction and plan generation, we propose a method to construct domain theory automatically from free text data. The effectiveness of our proposed approach is evaluated empirically through experimental studies using real world terrorist plans .","PeriodicalId":434501,"journal":{"name":"2010 IEEE International Conference on Intelligence and Security Informatics","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133335089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yan Tang, K. Cooper, João W. Cangussu, Kun Tian, Yin Wu
{"title":"Towards effective improvement of the Bayesian Belief Network Structure learning","authors":"Yan Tang, K. Cooper, João W. Cangussu, Kun Tian, Yin Wu","doi":"10.1109/ISI.2010.5484745","DOIUrl":"https://doi.org/10.1109/ISI.2010.5484745","url":null,"abstract":"Summary form only given.The Bayesian Belief Network (BBN) is a very powerful tool for causal relationship modeling and probabilistic reasoning. A BBN has two components. First is its structure a directed acyclic graph (DAG) whose nodes represent random variables and whose arcs represent the dependencies between the variables. The second component is its parameter in the form of Conditional Probability Tables (CPTs).The BBN is widely used in many different areas, excelling itself in Prediction, Risk Analysis, Diagnosis and Decision Support.","PeriodicalId":434501,"journal":{"name":"2010 IEEE International Conference on Intelligence and Security Informatics","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124868665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Generalizing terrorist social networks with K-nearest neighbor and edge betweeness for social network integration and privacy preservation","authors":"Xuning Tang, Christopher C. Yang","doi":"10.1109/ISI.2010.5484776","DOIUrl":"https://doi.org/10.1109/ISI.2010.5484776","url":null,"abstract":"Social network analysis has been shown to be effective in supporting intelligence and law enforcement force to identify suspects, terrorist or criminal subgroups, and their communication patterns. However, social network data owned by individual law enforcement units contain private information that must be preserved before sharing with other law enforcement units. Such privacy issue tremendously reduces the utility of the social network data since the integration of social networks from different law enforcement units cannot be fully integrated. Without integration of social network data, the effectiveness of terrorist or criminal social network analysis is diminished. In this paper, we introduce the KNN and EBB algorithm for constructing generalized subgraphs and a mechanism to integrate the generalized information to conduct the closeness centrality measures. The result shows that the proposed technique improves the accuracy of closeness centrality measures substantially while protecting the sensitive data.","PeriodicalId":434501,"journal":{"name":"2010 IEEE International Conference on Intelligence and Security Informatics","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129158870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Inter-Domain Routing Validator Based Spoofing Defence System","authors":"Lei Wang, Tianbing Xia, J. Seberry","doi":"10.1109/ISI.2010.5484754","DOIUrl":"https://doi.org/10.1109/ISI.2010.5484754","url":null,"abstract":"IP spoofing remains a problem today in the Internet. In this paper, a new system called Inter-Domain Routing Validator Based Spoofing Defence System (SDS) for filtering spoofed IP packets is proposed. SDS uses efficient symmetric key message authentication code (UMAC) as its tag to verify that a source IP address is valid. Different ASes border routers obtain a shared key via the Inter-Domain Routing Validator (IRV) servers which will manage the secret keys and exchange keys among different ASes via security communication channel. SDS is efficient, secure and easy to cooperate with other defence mechanisms.","PeriodicalId":434501,"journal":{"name":"2010 IEEE International Conference on Intelligence and Security Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129848915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Predicting social ties in mobile phone networks","authors":"Huiqi Zhang, R. Dantu","doi":"10.1109/ISI.2010.5484780","DOIUrl":"https://doi.org/10.1109/ISI.2010.5484780","url":null,"abstract":"A social network dynamically changes since the social relationships (social ties) change over time. The evolution of a social network mainly depends on the evolution of the social relationships. The social-tie strengths of person-to-person are different one another even though they are in the same group. In this paper we investigate the evolution of person-to-person social relationships, quantify and predict social tie strengths based on call-detail records of mobile phones. We propose an affinity model for quantifying social-tie strengths in which a reciprocity index is integrated to measure the level of reciprocity between users and their communication partners. Since human social relationships change over time, we map the call-log data to time series of the social-tie strengths by the affinity model. Then we use ARIMA model to predict social-tie strengths. For validation of our results, we used actual call logs of 81 users collected for a period of 8 months at MIT by the Reality Mining Project group and also used call logs of 20 users collected for a period of 6 months by UNT's Network Security team. These users have around 5000 communication partners. The experimental results show that our model is effective. We achieve prediction performance with accuracy of average 95.2% for socially close and near members. Among other applications, this work is useful for homeland security, detection of unwanted calls (e.g., spam), and marketing.","PeriodicalId":434501,"journal":{"name":"2010 IEEE International Conference on Intelligence and Security Informatics","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126344972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cross Entropy approach for patrol route planning in dynamic environments","authors":"Xu Chen, T. Yum","doi":"10.1109/ISI.2010.5484767","DOIUrl":"https://doi.org/10.1109/ISI.2010.5484767","url":null,"abstract":"Proper patrol route planning increases the effectiveness of police patrolling and improves public security. In this paper we present a new approach for the real-time patrol route planning in a dynamic environment. We first build a mathematic framework, and then propose a fast algorithm developed from the Cross Entropy method to meet the real-time computation requirement needed for many applications. In addition, as the randomness is an important factor for practices, the entropy concept is used for designing the randomized patrol routes schedule strategy. Numerical studies demonstrate that the approach has fast convergence property and is efficient in dynamic patrol environment.","PeriodicalId":434501,"journal":{"name":"2010 IEEE International Conference on Intelligence and Security Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131074460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ayman E. Taha, I. A. Ghaffar, A. Eldin, Hani M. K. Mahdi
{"title":"Agent based correlation model for intrusion detection alerts","authors":"Ayman E. Taha, I. A. Ghaffar, A. Eldin, Hani M. K. Mahdi","doi":"10.1109/ISI.2010.5484771","DOIUrl":"https://doi.org/10.1109/ISI.2010.5484771","url":null,"abstract":"Alert correlation is a promising technique in intrusion detection. It analyzes the alerts from one or more intrusion detection system and provides a compact summarized report and high-level view of attempted intrusions which highly improves security effectiveness. Correlation component is a procedure which aggregates alerts according to certain criteria. The aggregated alerts could have common features or represent steps of pre-defined scenario attacks. Correlation approaches composed of a single component or a comprehensive set of components. The effectiveness of a component depends heavily on the nature of the dataset analyzed. The order of correlation component will affect the correlation process performance. Moreover not all components should be used for different dataset. This paper presents an agent-based alert correlation model. Learning agent learns the nature of dataset within a network then guides the whole correlation process and components in such a suitable way of which components could be used and in which order. The model improves the performance of correlation process by selecting the proper components to be used. This model assures minimum alerts to be processed on each component depending on the dataset and minimum time for correlation process.","PeriodicalId":434501,"journal":{"name":"2010 IEEE International Conference on Intelligence and Security Informatics","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116876058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xiangtao Liu, Xueqi Cheng, Jingyuan Li, Haijun Zhai, Shuo Bai
{"title":"Identifying vulgar content in eMule network through text classification","authors":"Xiangtao Liu, Xueqi Cheng, Jingyuan Li, Haijun Zhai, Shuo Bai","doi":"10.1109/ISI.2010.5484751","DOIUrl":"https://doi.org/10.1109/ISI.2010.5484751","url":null,"abstract":"Through years of development, the cyberspace has been dominated by traffic of peer-to-peer (P2P) file sharing applications. Among them, eMule is especially favored by millions of P2P users all over the world. However, it is very difficult to manage the content which is delivered through eMule due to its distributed property, thus a large number of vulgar content (e.g., pornographic and violent files) is existing in eMule. Since children and adolescents are the main force of eMule users, it is quite necessary to provide an efficient method to identify and filter the vulgar content for the sake of innocent children and adolescents. In this study, an automatic framework based on text classification is proposed to identify and filter vulgar content in eMule. Filename is used as the feature to carry out the elementary research on the effectiveness of our framework, although filename may be changed freely by eMule users. We aim to achieve high accuracy when identifying and filtering vulgar content, thus to raise the quality of the content delivered in eMule to a higher level.","PeriodicalId":434501,"journal":{"name":"2010 IEEE International Conference on Intelligence and Security Informatics","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124223641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}