Last Update: 2006/3/15
 W I S I  2 0 0 6    P R O G R A M    S C H E D U L E   (tentative)

 Link to Workshop Proceedings

 

Sunday, April 9th, 2006

A
B
08:30am to 08:50am
ISI: Opening Remarks
Hsinchun Chen, Honorary Co-Chair of WISI, McClelland Professor of Management Information Systems and Director of Artificial Intelligence Lab, The University of Arizona
09:00am to 10:00am
Keynote Speech
Bhavani Thuraisingham, Professor of Computer Science and the Director of Cyber Security Research Center at the Erik Jonsson School of Engineering and Computer Science, The University of Texas at Dallas (UTD) (Abstract)
10:00am to 10:30am
Coffee Break I
Session 1: 10:30am to 12:00pm

Session 1A Web and Text Mining for Terrorism Informatics
Ballroom 1A, Level 3

Session Chair: Mark Last
Unraveling International Terrorist Groups’ Exploitation of the Web: Technical Sophistication, Media Richness, and Web Interactivity 
Jialun Qin, Yilu Zhou, Edna Reid, Guanpi Lai, Hsinchun Chen (30 mins.)
Multi-Lingual Detection of Terrorist Content on the Web 
Mark Last, Alex Markov, Abraham Kandel (30 mins.)
INEXT: An Investigative Search Tool for Knowledge Extraction 
Zhen Sun, Ee-Peng Lim (20 mins.) 

Session 1B Cybercrime Analysis
Ballroom 1B, Level 3

Session Chair: Jau-Hwang Wang
Cybercrime in Taiwan -An Analysis of Suspect Records 
WenYuan Jen, Weiping Chang, Shihchieh Chou (30 mins.)

Analysis of Computer Crime Characteristics in Taiwan 
You-lu Liao, Cynthia Tsai (30 mins.)

A Cross Datasets Referring Outlier Detection Model Applied to Suspicious Financial Transaction Discrimination 
Tang Jun (20 mins.) 

12:00pm to 01:30pm
Lunch
Session 2: 01:30pm to 03:00pm

Session 2A Network Security
Ballroom 1A, Level 3
Session Chair: You-lu Liao 
Detecting Novel Network Attacks with a Data Field 
Feng Xie, Shuo Bai (20 mins.)

Improving Authentication Accuracy of Unfamiliar Passwords with Pauses and Cues for Keystroke Dynamics-based Authentication
Seong-seob Hwang, Hyoung-joo Lee, Sungzoon Cho (20 mins.)

Intrusion Detection Based on Hidden Information Database 
Huizhang Shen, Jidi Zhao, Huanchen Wang (20 mins.)

Defender Personality Traits 
Tara Whalen, Carrie Gates (20 mins.)

Session 2B Methodologies to Support Terrorism Research (Invited Speakers)
Ballroom 1B, Level 3

Session Chair: Edna Reid
Developing Terrorism Informatics: Databases, Tools, and Techniques 
Hsinchun Chen, Artificial Intelligence Lab, University of Arizona (45 mins.) 

Terrorist Use of the Internet: The Threat and Response 
Rohan Gunaratna, International Centre for Political Violence and Terrorism Research, IDSS, Singapore (45 mins.)

03:00pm to 03:30pm
Coffee Break II
Session 3: 03:30pm to 05:45pm

Session 3A Crime Data Mining
Ballroom 1A, Level 3
Session Chair: Icjkai Lee
Mining Criminal Databases to Finding Investigation Clues - By Example of Stolen Automobiles Database 
Patrick S. Chen, K. C. Chang, Tai-Ping Hsing, Shi-Chie Chou (30 mins.)

Country Corruption Analysis with Self Organizing Maps and Support Vector Machines 
Johan Huysmans, David Martens, Bart Baesens, Jan Vanthienen (30 mins.)

Temporal Representation in Spike Detection of Sparse Personal Identity Streams 
Clifton Phua, Vincent Lee, Ross Gayler, Kate Smith (30 mins.)

Mining Positive Associations of Urban Criminal Activities Using Hierarchical Crime Hot Spots
Ickjai Lee, Peter Phillips (20 mins.)

VCCM Mining: Mining Virtual Community Core Members Based on Gene Expression Programming
Qiao Shaojie, Tang Changjie, Peng Jing, Xiang Yong, Liu Yintian (20 mins.)

Session 3B Terrorism Research Tools (Invited Speakers)
Ballroom 1B, Level 3
Session Chair: Laura Dugan
A First Look at Domestic and International Global Terrorism Events, 1970-1997 
Laura Dugan, University of Maryland (45 mins.) (Abstract)

Analysis of Extremist Groups' Websites, Forums, and Videos: the Dark Web Portal Testbed 
Edna Reid, Artificial Intelligence Lab, University of Arizona (45 mins.) 

Terrorism Incidents, Indictments, and Knowledge Databases 
Brad Robison, Memorial Institute for Prevention of Terrorism (MIPT) (45 mins.)

05:45pm to 06:00pm
Closing Session and Award Presentation
Recept-
ion:
06:00pm to 08:00pm
Poster Reception

Integration of a Cryptographic File System and Access Control 
SeongKi Kim, WanJin Park, SangYong Han

Applications of Homomorphic Functions to Software Obfuscation 
William Zhu, Clark Thomborson, Fei-Yue Wang

Security Model for Informational Privacy 
Sabah Al-Fedaghi A viable system for tracing illegal users of video 
Hyunho Kang, Brian Kurkoski, Youngran Park, Sanguk Shin, Kazuhiko Yamaguchi, Kingo Kobayashi
Privacy and Security Enhanced Offline Oblivious Transfer for Massive Data Distribution 
Ickjai Lee, Hossein Ghodosi
The Effectiveness of Artificial Rhythms and Cues in Keystroke Dynamics based User Authentication 
Pilsung Kang, Sunghoon Park, Sungzoon Cho, Seong-seob Hwang, Hyung-joo Lee Damage Estimation Algorithm for Internet Attacks
Taek Lee, Hoh Peter In, Eul Gyu Im, Heejo Lee A New Secure Key Exchange Protocol between STB and Smart Card in DTV Broadcasting
Eun-Jun Yoon, Kee-Young Yoo 
FADS: A Fuzzy Anomaly Detection System 
Dan Li, Kefei Wang, Jitender Deogun
Hidden Markov Model based Intrusion Detection 
Zhi-Yong Liu and Hong Qiao One-class Strategies for Security Information Detection
Qing Tao, Gao-wei Wu, Jue Wang Design of an Emergency Prediction and Prevention Platform for Societal Security Decision Support Using Neural Networks 
Zeng-Guang Hou and Min Tan 
A Novel Identity Authentication Technique without Trustworthy Third-party based on Fingerprint Verification 
Liang Li, Jie Tian, Xin Yang 
Cyberspace Community Analysis and Simulation Using Complex Dynamic Social Networks 
Baihua Xiao, Huiguang He, Yaodong Li, Chunheng Wang Analysis of Infectious Disease Data Based on Evolutionary Computation
Dong-bin Zhao, Jian-qiang Yi Rule+Exception Learning-based Class Specification and Labeling in Intelligence and Security Analysis 
Jue Wang, Fei-Yue Wang, Daniel D. Zeng 
A Computational Framework for Decision Analysis and Support in ISI: Artificial Societies, Computational Experiments, and Parallel Systems 
Fei-Yue Wang

 

 
Singapore | April 9, 2006
© 2004-2006 Chinese University of Hong Kong, University of Arizona