2010 IEEE International Conference on Intelligence and Security Informatics最新文献

筛选
英文 中文
Entity refinement using latent semantic indexing 使用潜在语义索引进行实体细化
2010 IEEE International Conference on Intelligence and Security Informatics Pub Date : 2010-05-23 DOI: 10.1109/ISI.2010.5484765
R. Bradford
{"title":"Entity refinement using latent semantic indexing","authors":"R. Bradford","doi":"10.1109/ISI.2010.5484765","DOIUrl":"https://doi.org/10.1109/ISI.2010.5484765","url":null,"abstract":"Automated extraction of named entities is an important text analysis task. In addition to recognizing the occurrence of entity names, it is important to be able to label those names by type. Most entity extraction techniques categorize extracted entities into a few basic types, such as PERSON, ORGANIZATION, and LOCATION. This paper presents an approach for generating more fine-grained subdivisions of entity type. The technique of latent semantic indexing (LSI) is used to provide semantic context as an indicator of likely entity subtype. Tests were carried out on a collection of 5.5 million English-language news articles. At modest levels of recall, the accuracy of sub-type assignment was comparable to the accuracy with which the gross type was assigned by a state-of-the-art commercial entity extraction software package.","PeriodicalId":434501,"journal":{"name":"2010 IEEE International Conference on Intelligence and Security Informatics","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126255029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Tweets mining using WIKIPEDIA and impurity cluster measurement 使用维基百科和杂质聚类度量来挖掘推文
2010 IEEE International Conference on Intelligence and Security Informatics Pub Date : 2010-05-23 DOI: 10.1109/ISI.2010.5484758
Qing Chen, Timothy Shipper, L. Khan
{"title":"Tweets mining using WIKIPEDIA and impurity cluster measurement","authors":"Qing Chen, Timothy Shipper, L. Khan","doi":"10.1109/ISI.2010.5484758","DOIUrl":"https://doi.org/10.1109/ISI.2010.5484758","url":null,"abstract":"Twitter is one of the fastest growing online social networking services. Tweets can be categorized into trends, and are related with tags and follower/following social relationships. The categorization is neither accurate nor effective due to the short length of tweet messages and noisy data corpus. In this paper, we attempt to overcome these challenges with an extended feature vector along with a semi-supervised clustering technique. In order to achieve this goal, the training set is expanded with Wikipedia topic search result, and the feature set is extended. When building the clustering model and doing the classification, impurity measurement is introduced into our classifier platform. Our experiment results show that the proposed techniques outperform other classifiers with reasonable precision and recall.","PeriodicalId":434501,"journal":{"name":"2010 IEEE International Conference on Intelligence and Security Informatics","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134312515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Real time tracking of a remote moving object by active zoom cameras 动态变焦相机对远程移动物体的实时跟踪
2010 IEEE International Conference on Intelligence and Security Informatics Pub Date : 2010-05-23 DOI: 10.1109/ISI.2010.5484753
Yan Gao, Xiaolin Zhang
{"title":"Real time tracking of a remote moving object by active zoom cameras","authors":"Yan Gao, Xiaolin Zhang","doi":"10.1109/ISI.2010.5484753","DOIUrl":"https://doi.org/10.1109/ISI.2010.5484753","url":null,"abstract":"Object detecting and tracking at a distance has been a big problem in the research field of wide area security. This paper introduces a real time active vision system which can track a moving object from 1 meter to 200 meters. This visual servo system is mainly structured of three mechanical freedoms of pan, tilt and zoom. An eagle's eye mechanism is proposed to obtain a wide field of view (FOV) in high resolution. A fusion schemes that combines the results of the three separate zoom cameras for detecting and tracking a moving object at distance is also developed. A high performance pan-tilt unit and an algorithm of high frequency motor control is proposed to smooth the tracking. This system has the tracking and zooming functions to monitor an unexpected object at a long distance. The camera can zoom in to capture the high resolution detail of a pedestrian and record a series of available images while tracking. In order to demonstrate the effectiveness of the approaches adopted, an experiment of tracking a pedestrian from a distance of 100–200 meters has been carried out. Experimental results show that the proposed system is valid for tracking a pedestrian at a distance.","PeriodicalId":434501,"journal":{"name":"2010 IEEE International Conference on Intelligence and Security Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129221361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Cross-level behavioral analysis for robust early intrusion detection 鲁棒早期入侵检测的跨层行为分析
2010 IEEE International Conference on Intelligence and Security Informatics Pub Date : 2010-05-23 DOI: 10.1109/ISI.2010.5484768
Shun-Wen Hsiao, Yeali S. Sun, Meng Chang Chen, Hui Zhang
{"title":"Cross-level behavioral analysis for robust early intrusion detection","authors":"Shun-Wen Hsiao, Yeali S. Sun, Meng Chang Chen, Hui Zhang","doi":"10.1109/ISI.2010.5484768","DOIUrl":"https://doi.org/10.1109/ISI.2010.5484768","url":null,"abstract":"We anticipate future attacks would evolve to become more sophisticated to outwit existing intrusion detection techniques. Existing anomaly analysis techniques and signature-based detection practices can no longer effective. We believe intrusion detection systems (IDSs) of the future will need to be capable to detect or infer attacks based on more valuable information from the network-related properties and characteristics. We observed that even though the signatures or traffic patterns of future stealthy attacks can be modified to outwit current IDSs, certain behavioral aspects of an attack are invariant. We propose a novel approach that jointly monitors network activities at three different levels: transport layer protocols, (vulnerable) network services, and invariant anomaly behaviors (called attack symptoms). Our system, SecMon, captures the network behaviors by simultaneously performing cross-level state correlation for effective detection of anomaly behaviors. For the most part, the invariant anomaly behavior has not been fully exploited in the past. A probabilistic attack inference model is also proposed for attack assessment by correlating the observed attack symptoms to achieve the low false alarm rate. The evaluations demonstrate our prototype system is efficient and effective for sophisticated attacks, including polymorphism, stealthy, and unknown attack.","PeriodicalId":434501,"journal":{"name":"2010 IEEE International Conference on Intelligence and Security Informatics","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121156414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Rationalizing police patrol beats using Voronoi Tessellations 合理化警察巡逻殴打使用Voronoi镶嵌
2010 IEEE International Conference on Intelligence and Security Informatics Pub Date : 2010-05-23 DOI: 10.1109/ISI.2010.5484750
A. Verma, Ramyaa, S. Marru, Ye Fan, Raminderjeet Singh
{"title":"Rationalizing police patrol beats using Voronoi Tessellations","authors":"A. Verma, Ramyaa, S. Marru, Ye Fan, Raminderjeet Singh","doi":"10.1109/ISI.2010.5484750","DOIUrl":"https://doi.org/10.1109/ISI.2010.5484750","url":null,"abstract":"Computational criminology is an emerging interdisciplinary field that applies computer science and mathematical methods to the study of criminological problems. In order to understand the nature of crime one has to comprehend not only its spatio-temporal dimensions, but also the victim-offender relationship, role of guardians and history of similar incidents. In this position paper we explore a problem in rationalizing police patrolling beats using Voronoi Tessellations which provide a powerful technique to explore variety of criminological perspectives and understand the geography of crime and its control mechanism. The paper presents a method to rationally design an equitable workload amongst the police patrol beats in order to better handle the challenge of crime.","PeriodicalId":434501,"journal":{"name":"2010 IEEE International Conference on Intelligence and Security Informatics","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115450901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Similarity kernels via bi-clustering for conventional intergovernmental organizations 基于双聚类的传统政府间组织相似性核
2010 IEEE International Conference on Intelligence and Security Informatics Pub Date : 2010-05-23 DOI: 10.1109/ISI.2010.5484732
Minh Tam Le, J. Sweeney, Edo Liberty, S. Zucker
{"title":"Similarity kernels via bi-clustering for conventional intergovernmental organizations","authors":"Minh Tam Le, J. Sweeney, Edo Liberty, S. Zucker","doi":"10.1109/ISI.2010.5484732","DOIUrl":"https://doi.org/10.1109/ISI.2010.5484732","url":null,"abstract":"Many databases provide tabular data relating objects to entities; for example, which countries belong to certain organizations. We seek to infer implicit organizational variables over such objects (countries) as a function of these properties (organizational memberships), and vice versa. If kernels existed over objects, then machine learning and non-linear dimensionality reduction techniques could be used. But this requires a similarity or distance defined over objects, which does not exist a priori. We are exploring an approach to kernel identification based on bi-clustering in which an average over randomized biclusters approximates a kernel. We claim that such kernels provide a viable alternative to other, more common kernel approaches. Experiments with a database of memberships in conventional intergovernmental organizations supports this claim.","PeriodicalId":434501,"journal":{"name":"2010 IEEE International Conference on Intelligence and Security Informatics","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127086591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
News mining for border security Intelligence 新闻挖掘边境安全情报
2010 IEEE International Conference on Intelligence and Security Informatics Pub Date : 2010-05-23 DOI: 10.1109/ISI.2010.5484744
M. Atkinson, Jenya Belayeva, Vanni Zavarella, J. Piskorski, Silja Huttunen, Arto Vihavainen, R. Yangarber
{"title":"News mining for border security Intelligence","authors":"M. Atkinson, Jenya Belayeva, Vanni Zavarella, J. Piskorski, Silja Huttunen, Arto Vihavainen, R. Yangarber","doi":"10.1109/ISI.2010.5484744","DOIUrl":"https://doi.org/10.1109/ISI.2010.5484744","url":null,"abstract":"This presentation gives an overview of an effort to construct OSINT (Open-Source Intelligence) tools for Frontex, the European Agency for the Management of Operational Cooperation at the External Borders of the Member States of the European Union, to facilitate automating the process of extracting structured knowledge from on-line news articles on border-security related events at the EU borders and in related third countries. A particular focus is on incidents and developments which are of relevance in the context of illegal migration. This includes: (a) illegal migration incidents (e.g., illegal border crossing attempts), (b) related cross-border crime (e.g., human/arms/drug trafficking), (c) related crisis events (e.g., terrorist attacks, outbreaks of infectious disease).","PeriodicalId":434501,"journal":{"name":"2010 IEEE International Conference on Intelligence and Security Informatics","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129156838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Integrated assessment modeling of energy consumption behavior and carbon emissions 能源消费行为与碳排放的综合评价模型
2010 IEEE International Conference on Intelligence and Security Informatics Pub Date : 2010-05-23 DOI: 10.1109/ISI.2010.5484734
T. Sanquist, B. Shui, Heather Orr
{"title":"Integrated assessment modeling of energy consumption behavior and carbon emissions","authors":"T. Sanquist, B. Shui, Heather Orr","doi":"10.1109/ISI.2010.5484734","DOIUrl":"https://doi.org/10.1109/ISI.2010.5484734","url":null,"abstract":"This paper describes elements of an integrated modeling approach to human behavior and energy consumption. Developing a sustainable society is a key aspect of international security, and understanding the areas where consumption and carbon emissions can be reduced is essential. We employ statistical analysis of residential energy consumption in the US and other countries to describe the underlying patterns of energy use, and provide international comparisons at an aggregate level.","PeriodicalId":434501,"journal":{"name":"2010 IEEE International Conference on Intelligence and Security Informatics","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125771236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Computational knowledge and information management in veterinary epidemiology 兽医流行病学中的计算知识与信息管理
2010 IEEE International Conference on Intelligence and Security Informatics Pub Date : 2010-05-23 DOI: 10.1109/ISI.2010.5484764
Svitlana Volkova, W. Hsu
{"title":"Computational knowledge and information management in veterinary epidemiology","authors":"Svitlana Volkova, W. Hsu","doi":"10.1109/ISI.2010.5484764","DOIUrl":"https://doi.org/10.1109/ISI.2010.5484764","url":null,"abstract":"Monitoring of infectious animal diseases is an essential task for national biosecurity management and bioterrorism prevention. For this purpose, we present a system for animal disease outbreak analysis by automatically extracting relational information from online data. We aim to detect and map infectious disease outbreaks by extracting information from unstructured sources. The system crawls web sites and classifies pages by topical relevance. The information extraction component performs document analysis for animal disease related event recognition. The visualization component plots extracted events into GoogleMaps1 using geospatial information and supports timeline representation of animal disease outbreaks in SIMILE2.","PeriodicalId":434501,"journal":{"name":"2010 IEEE International Conference on Intelligence and Security Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130324479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Identifying high risk crime areas using topology 使用拓扑识别高风险犯罪区域
2010 IEEE International Conference on Intelligence and Security Informatics Pub Date : 2010-05-23 DOI: 10.1109/ISI.2010.5484782
Richard Frank, Andrew J. Park, P. Brantingham, J. Clare, Kathryn Wuschke, M. Vajihollahi
{"title":"Identifying high risk crime areas using topology","authors":"Richard Frank, Andrew J. Park, P. Brantingham, J. Clare, Kathryn Wuschke, M. Vajihollahi","doi":"10.1109/ISI.2010.5484782","DOIUrl":"https://doi.org/10.1109/ISI.2010.5484782","url":null,"abstract":"Computational criminology is an area of research that joins advanced theories in criminology with theories and methods in mathematics, computing science, geography and behavioural psychology. It is a multidisciplinary approach that takes the strengths of several disciplines and, with semantic challenges, builds new methods for the analysis of crime and crime patterns. This paper presents a developing algorithm for linking the geographic and cognitive psychology sides of criminology research with a prototype topology algorithm that joins local urban areas together using rules that define similarity between adjacent small units of analysis. The approach produces irregular shapes when mapped in a Euclidean space, but which follow expectations in a non-Euclidean topological sense. There are high local concentrations or hot spots of crime but frequently there is a sharp break on one side of the hot spot and with a gradual diffusion on the other. These shapes follow the cognitive psychological way of moving from one location to another without noticing gradual changes or conversely being aware of sharp changes from one location to the next. This article presents a pattern modeling approach that uses topology to spatially identify the concentrations of crime and their crisp breaks and gradual blending into adjacent areas using the basic components: interior, boundary and exterior. This topology algorithm is used to analyze crimes in a moderate sized city in British Columbia.","PeriodicalId":434501,"journal":{"name":"2010 IEEE International Conference on Intelligence and Security Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130341025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信