2010 IEEE International Conference on Intelligence and Security Informatics最新文献

筛选
英文 中文
An executive decision support system for longitudinal statistical analysis of crime and law enforcement performance crime analysis system pacific region (CASPR) 犯罪纵向统计分析行政决策支援系统及执法表现太平洋地区犯罪分析系统(CASPR)
2010 IEEE International Conference on Intelligence and Security Informatics Pub Date : 2010-05-23 DOI: 10.1109/ISI.2010.5484784
A. Ghaseminejad, P. Brantingham
{"title":"An executive decision support system for longitudinal statistical analysis of crime and law enforcement performance crime analysis system pacific region (CASPR)","authors":"A. Ghaseminejad, P. Brantingham","doi":"10.1109/ISI.2010.5484784","DOIUrl":"https://doi.org/10.1109/ISI.2010.5484784","url":null,"abstract":"This paper describes the structure of an executive decision support system based on a data warehouse about offences and clearance rates in British Columbia. The system was developed at the Institute for Canadian Urban Research Studies at Simon Fraser University. The paper explains how the data mining and automated statistical analysis in this system can be used by criminologists for analysis of crime trends both at the jurisdiction level and province wide. Database technologies and statistical functions have been utilized in a set of programs that encapsulate the knowledge of experts. The paper explains how by performing repeated regression analysis on all Jurisdiction-crime combinations the system can discover important and significant trends at the local level and how general province-wide trends can be detected. An example of using the system to evaluate the relationship between reported crime rates and clearance rates is explained.","PeriodicalId":434501,"journal":{"name":"2010 IEEE International Conference on Intelligence and Security Informatics","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130922196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
The U.S. and the EU differences in anti-terrorism efforts 美国和欧盟在反恐方面存在分歧
2010 IEEE International Conference on Intelligence and Security Informatics Pub Date : 2010-05-23 DOI: 10.1109/ISI.2010.5484777
M. Gallagher
{"title":"The U.S. and the EU differences in anti-terrorism efforts","authors":"M. Gallagher","doi":"10.1109/ISI.2010.5484777","DOIUrl":"https://doi.org/10.1109/ISI.2010.5484777","url":null,"abstract":"While there is a consensus among developed countries over the need to combat terrorism, there are marked differences on how to accomplish that. Recently the European Union (EU) rejected a US-EU agreement on financial data exchange. Shifts in power in Europe are taking place, which contributed to this rejection. But more basically, there is a difference in views on the balance between about managing anti-terrorism efforts and respect for civil liberties, especially in data sharing. The post-WWII alliances are still strong, but Europe has a different take on many issues. In our interdependent globalized world, U.S. authorities are being required to adjust the tools and methods we can use. The sympathy and readiness to assist in the immediate aftermath of 9/11 have now faded. We should understand these differences and realize we are entering a period where being creative and factoring in the views of our allies is essential if we are to pursue successfully those who would do us harm.","PeriodicalId":434501,"journal":{"name":"2010 IEEE International Conference on Intelligence and Security Informatics","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116271562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automatic construction of domain theory for attack planning 攻击规划领域理论的自动构建
2010 IEEE International Conference on Intelligence and Security Informatics Pub Date : 2010-05-23 DOI: 10.1109/ISI.2010.5484775
Xiaochen Li, W. Mao, D. Zeng, Fei-Yue Wang
{"title":"Automatic construction of domain theory for attack planning","authors":"Xiaochen Li, W. Mao, D. Zeng, Fei-Yue Wang","doi":"10.1109/ISI.2010.5484775","DOIUrl":"https://doi.org/10.1109/ISI.2010.5484775","url":null,"abstract":"Terrorism organizations are devising increasingly sophisticated plans to conduct attacks. The ability of emulating or constructing attack plans by potential terrorists can help us understand the intents and motivation behind terrorism activities. A feasible computational method to construct plans is planning technique in AI. Traditionally, AI planning methods rely on a predefined domain theory which is compiled by domain experts manually. To facilitate domain theory construction and plan generation, we propose a method to construct domain theory automatically from free text data. The effectiveness of our proposed approach is evaluated empirically through experimental studies using real world terrorist plans .","PeriodicalId":434501,"journal":{"name":"2010 IEEE International Conference on Intelligence and Security Informatics","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133335089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Towards effective improvement of the Bayesian Belief Network Structure learning 对贝叶斯信念网络结构学习的有效改进
2010 IEEE International Conference on Intelligence and Security Informatics Pub Date : 2010-05-23 DOI: 10.1109/ISI.2010.5484745
Yan Tang, K. Cooper, João W. Cangussu, Kun Tian, Yin Wu
{"title":"Towards effective improvement of the Bayesian Belief Network Structure learning","authors":"Yan Tang, K. Cooper, João W. Cangussu, Kun Tian, Yin Wu","doi":"10.1109/ISI.2010.5484745","DOIUrl":"https://doi.org/10.1109/ISI.2010.5484745","url":null,"abstract":"Summary form only given.The Bayesian Belief Network (BBN) is a very powerful tool for causal relationship modeling and probabilistic reasoning. A BBN has two components. First is its structure a directed acyclic graph (DAG) whose nodes represent random variables and whose arcs represent the dependencies between the variables. The second component is its parameter in the form of Conditional Probability Tables (CPTs).The BBN is widely used in many different areas, excelling itself in Prediction, Risk Analysis, Diagnosis and Decision Support.","PeriodicalId":434501,"journal":{"name":"2010 IEEE International Conference on Intelligence and Security Informatics","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124868665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Generalizing terrorist social networks with K-nearest neighbor and edge betweeness for social network integration and privacy preservation 基于k近邻和边缘间性的恐怖分子社交网络泛化研究
2010 IEEE International Conference on Intelligence and Security Informatics Pub Date : 2010-05-23 DOI: 10.1109/ISI.2010.5484776
Xuning Tang, Christopher C. Yang
{"title":"Generalizing terrorist social networks with K-nearest neighbor and edge betweeness for social network integration and privacy preservation","authors":"Xuning Tang, Christopher C. Yang","doi":"10.1109/ISI.2010.5484776","DOIUrl":"https://doi.org/10.1109/ISI.2010.5484776","url":null,"abstract":"Social network analysis has been shown to be effective in supporting intelligence and law enforcement force to identify suspects, terrorist or criminal subgroups, and their communication patterns. However, social network data owned by individual law enforcement units contain private information that must be preserved before sharing with other law enforcement units. Such privacy issue tremendously reduces the utility of the social network data since the integration of social networks from different law enforcement units cannot be fully integrated. Without integration of social network data, the effectiveness of terrorist or criminal social network analysis is diminished. In this paper, we introduce the KNN and EBB algorithm for constructing generalized subgraphs and a mechanism to integrate the generalized information to conduct the closeness centrality measures. The result shows that the proposed technique improves the accuracy of closeness centrality measures substantially while protecting the sensitive data.","PeriodicalId":434501,"journal":{"name":"2010 IEEE International Conference on Intelligence and Security Informatics","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129158870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Inter-Domain Routing Validator Based Spoofing Defence System 基于域间路由验证器的欺骗防御系统
2010 IEEE International Conference on Intelligence and Security Informatics Pub Date : 2010-05-23 DOI: 10.1109/ISI.2010.5484754
Lei Wang, Tianbing Xia, J. Seberry
{"title":"Inter-Domain Routing Validator Based Spoofing Defence System","authors":"Lei Wang, Tianbing Xia, J. Seberry","doi":"10.1109/ISI.2010.5484754","DOIUrl":"https://doi.org/10.1109/ISI.2010.5484754","url":null,"abstract":"IP spoofing remains a problem today in the Internet. In this paper, a new system called Inter-Domain Routing Validator Based Spoofing Defence System (SDS) for filtering spoofed IP packets is proposed. SDS uses efficient symmetric key message authentication code (UMAC) as its tag to verify that a source IP address is valid. Different ASes border routers obtain a shared key via the Inter-Domain Routing Validator (IRV) servers which will manage the secret keys and exchange keys among different ASes via security communication channel. SDS is efficient, secure and easy to cooperate with other defence mechanisms.","PeriodicalId":434501,"journal":{"name":"2010 IEEE International Conference on Intelligence and Security Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129848915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Predicting social ties in mobile phone networks 预测移动电话网络中的社会关系
2010 IEEE International Conference on Intelligence and Security Informatics Pub Date : 2010-05-23 DOI: 10.1109/ISI.2010.5484780
Huiqi Zhang, R. Dantu
{"title":"Predicting social ties in mobile phone networks","authors":"Huiqi Zhang, R. Dantu","doi":"10.1109/ISI.2010.5484780","DOIUrl":"https://doi.org/10.1109/ISI.2010.5484780","url":null,"abstract":"A social network dynamically changes since the social relationships (social ties) change over time. The evolution of a social network mainly depends on the evolution of the social relationships. The social-tie strengths of person-to-person are different one another even though they are in the same group. In this paper we investigate the evolution of person-to-person social relationships, quantify and predict social tie strengths based on call-detail records of mobile phones. We propose an affinity model for quantifying social-tie strengths in which a reciprocity index is integrated to measure the level of reciprocity between users and their communication partners. Since human social relationships change over time, we map the call-log data to time series of the social-tie strengths by the affinity model. Then we use ARIMA model to predict social-tie strengths. For validation of our results, we used actual call logs of 81 users collected for a period of 8 months at MIT by the Reality Mining Project group and also used call logs of 20 users collected for a period of 6 months by UNT's Network Security team. These users have around 5000 communication partners. The experimental results show that our model is effective. We achieve prediction performance with accuracy of average 95.2% for socially close and near members. Among other applications, this work is useful for homeland security, detection of unwanted calls (e.g., spam), and marketing.","PeriodicalId":434501,"journal":{"name":"2010 IEEE International Conference on Intelligence and Security Informatics","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126344972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
Cross Entropy approach for patrol route planning in dynamic environments 动态环境下巡逻路线规划的交叉熵方法
2010 IEEE International Conference on Intelligence and Security Informatics Pub Date : 2010-05-23 DOI: 10.1109/ISI.2010.5484767
Xu Chen, T. Yum
{"title":"Cross Entropy approach for patrol route planning in dynamic environments","authors":"Xu Chen, T. Yum","doi":"10.1109/ISI.2010.5484767","DOIUrl":"https://doi.org/10.1109/ISI.2010.5484767","url":null,"abstract":"Proper patrol route planning increases the effectiveness of police patrolling and improves public security. In this paper we present a new approach for the real-time patrol route planning in a dynamic environment. We first build a mathematic framework, and then propose a fast algorithm developed from the Cross Entropy method to meet the real-time computation requirement needed for many applications. In addition, as the randomness is an important factor for practices, the entropy concept is used for designing the randomized patrol routes schedule strategy. Numerical studies demonstrate that the approach has fast convergence property and is efficient in dynamic patrol environment.","PeriodicalId":434501,"journal":{"name":"2010 IEEE International Conference on Intelligence and Security Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131074460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Agent based correlation model for intrusion detection alerts 基于Agent的入侵检测告警关联模型
2010 IEEE International Conference on Intelligence and Security Informatics Pub Date : 2010-05-23 DOI: 10.1109/ISI.2010.5484771
Ayman E. Taha, I. A. Ghaffar, A. Eldin, Hani M. K. Mahdi
{"title":"Agent based correlation model for intrusion detection alerts","authors":"Ayman E. Taha, I. A. Ghaffar, A. Eldin, Hani M. K. Mahdi","doi":"10.1109/ISI.2010.5484771","DOIUrl":"https://doi.org/10.1109/ISI.2010.5484771","url":null,"abstract":"Alert correlation is a promising technique in intrusion detection. It analyzes the alerts from one or more intrusion detection system and provides a compact summarized report and high-level view of attempted intrusions which highly improves security effectiveness. Correlation component is a procedure which aggregates alerts according to certain criteria. The aggregated alerts could have common features or represent steps of pre-defined scenario attacks. Correlation approaches composed of a single component or a comprehensive set of components. The effectiveness of a component depends heavily on the nature of the dataset analyzed. The order of correlation component will affect the correlation process performance. Moreover not all components should be used for different dataset. This paper presents an agent-based alert correlation model. Learning agent learns the nature of dataset within a network then guides the whole correlation process and components in such a suitable way of which components could be used and in which order. The model improves the performance of correlation process by selecting the proper components to be used. This model assures minimum alerts to be processed on each component depending on the dataset and minimum time for correlation process.","PeriodicalId":434501,"journal":{"name":"2010 IEEE International Conference on Intelligence and Security Informatics","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116876058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Identifying vulgar content in eMule network through text classification 通过文本分类识别eMule网络中的低俗内容
2010 IEEE International Conference on Intelligence and Security Informatics Pub Date : 2010-05-23 DOI: 10.1109/ISI.2010.5484751
Xiangtao Liu, Xueqi Cheng, Jingyuan Li, Haijun Zhai, Shuo Bai
{"title":"Identifying vulgar content in eMule network through text classification","authors":"Xiangtao Liu, Xueqi Cheng, Jingyuan Li, Haijun Zhai, Shuo Bai","doi":"10.1109/ISI.2010.5484751","DOIUrl":"https://doi.org/10.1109/ISI.2010.5484751","url":null,"abstract":"Through years of development, the cyberspace has been dominated by traffic of peer-to-peer (P2P) file sharing applications. Among them, eMule is especially favored by millions of P2P users all over the world. However, it is very difficult to manage the content which is delivered through eMule due to its distributed property, thus a large number of vulgar content (e.g., pornographic and violent files) is existing in eMule. Since children and adolescents are the main force of eMule users, it is quite necessary to provide an efficient method to identify and filter the vulgar content for the sake of innocent children and adolescents. In this study, an automatic framework based on text classification is proposed to identify and filter vulgar content in eMule. Filename is used as the feature to carry out the elementary research on the effectiveness of our framework, although filename may be changed freely by eMule users. We aim to achieve high accuracy when identifying and filtering vulgar content, thus to raise the quality of the content delivered in eMule to a higher level.","PeriodicalId":434501,"journal":{"name":"2010 IEEE International Conference on Intelligence and Security Informatics","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124223641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信