 |
|
|
A |
B |
 |
08:30am
to 08:50am |
ISI:
Opening Remarks
Hsinchun
Chen,
Honorary
Co-Chair of WISI,
McClelland Professor of
Management
Information
Systems and Director
of Artificial
Intelligence
Lab, The
University of Arizona |
 |
09:00am
to 10:00am |
Keynote
Speech
Bhavani
Thuraisingham,
Professor of
Computer Science
and the Director
of Cyber
Security
Research Center
at the Erik
Jonsson School
of Engineering
and Computer
Science, The
University of
Texas at Dallas
(UTD) (Abstract) |
 |
10:00am
to 10:30am |
Coffee
Break I |
 |
Session
1:
10:30am
to 12:00pm |
Session 1A Web and Text Mining for Terrorism Informatics
Ballroom
1A, Level 3

Session
Chair: Mark Last
Unraveling
International
Terrorist Groups’
Exploitation of
the Web:
Technical
Sophistication,
Media Richness,
and Web
Interactivity
Jialun Qin, Yilu
Zhou, Edna Reid,
Guanpi Lai,
Hsinchun Chen
(30 mins.) 
Multi-Lingual Detection of Terrorist Content on the Web
Mark Last, Alex
Markov, Abraham
Kandel (30 mins.)

INEXT: An Investigative Search Tool for Knowledge Extraction
Zhen Sun,
Ee-Peng Lim (20
mins.)
|
|
 |
12:00pm
to 01:30pm |
Lunch |
 |
Session
2:
01:30pm
to 03:00pm |
|
|
 |
03:00pm
to 03:30pm |
Coffee
Break II |
 |
Session
3:
03:30pm
to 05:45pm |
Session 3A Crime
Data Mining
Ballroom
1A, Level 3
Session
Chair: Icjkai
Lee
Mining
Criminal
Databases to
Finding
Investigation
Clues - By
Example of
Stolen
Automobiles
Database
Patrick S. Chen,
K. C. Chang,
Tai-Ping Hsing,
Shi-Chie Chou
(30 mins.)

Country
Corruption
Analysis with
Self Organizing
Maps and Support
Vector
Machines
Johan Huysmans,
David Martens,
Bart Baesens,
Jan Vanthienen
(30 mins.)

Temporal
Representation
in Spike
Detection of
Sparse Personal
Identity
Streams
Clifton Phua,
Vincent Lee,
Ross Gayler,
Kate Smith (30
mins.)

Mining
Positive
Associations of
Urban Criminal
Activities Using
Hierarchical
Crime Hot Spots
Ickjai Lee,
Peter Phillips
(20 mins.)

VCCM Mining:
Mining Virtual
Community Core
Members Based on
Gene Expression
Programming
Qiao Shaojie,
Tang Changjie,
Peng Jing, Xiang
Yong, Liu
Yintian (20 mins.)
|
Session 3B
Terrorism
Research Tools (Invited
Speakers)
Ballroom
1B, Level 3
Session
Chair: Laura
Dugan
A
First Look at
Domestic and
International
Global Terrorism
Events,
1970-1997
Laura Dugan,
University of
Maryland (45
mins.) (Abstract)

Analysis of
Extremist
Groups'
Websites,
Forums, and
Videos: the Dark
Web Portal
Testbed
Edna Reid,
Artificial
Intelligence
Lab, University
of Arizona (45
mins.)

Terrorism
Incidents,
Indictments, and
Knowledge
Databases
Brad Robison,
Memorial
Institute for
Prevention of
Terrorism (MIPT)
(45 mins.)
|
 |
05:45pm
to 06:00pm |
Closing
Session and
Award
Presentation
|
 |
Recept-
ion:
06:00pm
to 08:00pm |
Poster
Reception

Integration
of a
Cryptographic
File System and
Access Control
SeongKi Kim,
WanJin Park,
SangYong Han

Applications
of Homomorphic
Functions to
Software
Obfuscation
William Zhu,
Clark Thomborson,
Fei-Yue Wang

Security
Model for
Informational
Privacy
Sabah Al-Fedaghi
A
viable system
for tracing
illegal users of
video
Hyunho Kang,
Brian Kurkoski,
Youngran Park,
Sanguk Shin,
Kazuhiko
Yamaguchi, Kingo
Kobayashi 
Privacy and
Security
Enhanced Offline
Oblivious
Transfer for
Massive Data
Distribution
Ickjai Lee,
Hossein Ghodosi 
The
Effectiveness of
Artificial
Rhythms and Cues
in Keystroke
Dynamics based
User
Authentication
Pilsung Kang,
Sunghoon Park,
Sungzoon Cho,
Seong-seob
Hwang, Hyung-joo
Lee Damage
Estimation
Algorithm for
Internet Attacks
Taek Lee,
Hoh Peter In,
Eul Gyu Im,
Heejo Lee A
New Secure Key
Exchange
Protocol between
STB and Smart
Card in DTV
Broadcasting
Eun-Jun Yoon,
Kee-Young Yoo
FADS:
A Fuzzy Anomaly
Detection
System
Dan Li,
Kefei Wang,
Jitender Deogun
Hidden
Markov Model
based Intrusion
Detection
Zhi-Yong Liu and
Hong Qiao One-class
Strategies for
Security
Information
Detection
Qing Tao,
Gao-wei Wu, Jue
Wang Design
of an Emergency
Prediction and
Prevention
Platform for
Societal
Security
Decision Support
Using Neural
Networks
Zeng-Guang Hou
and Min
Tan
A
Novel Identity
Authentication
Technique
without
Trustworthy
Third-party
based on
Fingerprint
Verification
Liang Li, Jie
Tian, Xin
Yang
Cyberspace
Community
Analysis and
Simulation Using
Complex Dynamic
Social
Networks
Baihua Xiao,
Huiguang He,
Yaodong Li,
Chunheng Wang Analysis
of Infectious
Disease Data
Based on
Evolutionary
Computation
Dong-bin
Zhao, Jian-qiang
Yi Rule+Exception
Learning-based
Class
Specification
and Labeling in
Intelligence and
Security
Analysis
Jue Wang,
Fei-Yue Wang,
Daniel D. Zeng
A
Computational
Framework for
Decision
Analysis and
Support in ISI:
Artificial
Societies,
Computational
Experiments, and
Parallel
Systems
Fei-Yue Wang |
|
|
|
|
|
|