 |
|
P A I S I 2 0 0 7
P R O
G R A
M S C
H E D U L E |
|
|
Please download the list of accepted papers here
|
|
Tuesday,
April
10th,
2007 |
|
 |
 |
03:00pm
to
07:00pm |
Workshop
Registration
|
 |
|
|
Wednesday,
April
11th,
2007 |
|
 |
|
A |
B |
 |
08:25am
to
08:30am |
Opening
Remarks
|
 |
08:30am
to
08:40am |
Welcome
Speech
Tianchun Xu, Deputy Chief Executive, Wenjiang District, Chengdu, Sichuan, China
(Abstract)
|
 |
08:40am
to
09:15am |
Keynote
Speech
Exploring
Extremism
and
Terrorism
on
the
Web:
The
Dark
Web
Project
Hsinchun
Chen,
University
of
Arizona
(Abstract)
|
 |
Session
1:
09:15am
to
10:35am |
Session
W1-A:
Crime
Analysis
Analyzing
and
Visualizing
Gray
Web
Forum
Structure
Christopher
C.
Yang,
Torbun
D.
Ng,
Jau-Hwang
Wang,
Chih-Ping
Wei,
Hsinchun
Chen
(30
mins.)
An
Empirical
Analysis
of
Online
Gaming
Crime
Characteristics
from
2002
to
2004
Yungchang
Ku,
Ying-Chieh
Chen,
Kuo-Ching
Wu,
Chaochang
Chiu
(30
mins.)
Trends
in
Computer
Crime
and
Cybercrime
Research
during
the
Period
1974-2006:
A
Bibliometric
Approach
Chichao
Lu,
Wenyuan
Jun,
Weiping
Chang
(20
mins.)
|
Session
W1-B:
Cyberinfrastructure
Protection
Lightweight
Anomaly
Intrusion
Detection
in
Wireless
Sensor
Networks
Haiguang
Chen,
Peng
Han,
Xi
Zhou,
Chuanshan
Gao
(30
mins.)
ASITL:
Adaptive
Secure
Interoperation
using
Trust-Level
Li
Jin,
Zhengding
Lu
(30
mins.)
PPIDS:
Privacy
Preserving
Intrusion
Detection
System
Hyun-A
Park,
Dong
Hoon
Lee,
Jong
In
Lim,
Sang
Hyun
Cho
(20
mins.)
|
 |
Session
2:
11:00am
to
12:20pm |
Session
W2-A:
Emergency
Response
What-if
Emergency
Management
System:
A
Generalized
Voronoi
Diagram
Approach
Ickjai
Lee,
Reece
Pershouse,
Peter
Phillips,
Chris
Christensen
(30
mins.)
Agent
Based
Framework
for
Emergency
Rescue
and
Assistance
Planning
Yujun
Zheng,
Jinquan
Wang,
Jinyun
Xue
(30
mins.)
Evaluating
the
Disaster
Defense
Ability
of
Information
Systems
Baowen
Zhang,
Jing
Zhang,
Ning
Zhou,
Mingang
Chen
(20
mins.)
|
Session
W2-B:
Cyberinfrastructure
Protection
TCM-KNN
Algorithm
for
Supervised
Network
Intrusion
Detection
Yang
Li,
Bin-Xing
Fang,
Li
Guo,
You
Chen
(30
mins.)
Research
on
Hidden
Markov
Model
for
System
Call
Anomaly
Detection
Quan
Qian,
Mingjun
Xin
(30
mins.)
Port
and
Address
Hopping
for
Active
Cyber-Defense
Leyi
Shi,
Chunfu
Jia,
Shuwang
Lu,
Zhenhua
Liu
(20
mins.)
|
 |
2:00pm
to
2:30pm |
Plenary
Invited
Talk
Activity
Mining
to
Strengthen
Debt
Prevention
Chengqi
Zhang,
City
University
of
Hong
Kong
and
University
of
Technology,
Sydney
(Abstract)
|
 |
Session
3: 2:35pm
to
3:55pm |
Session
W3-A:
Emergency
Response
and
Surveillance
A
Case-based
Evolutionary
Group
Decision
Support
Method
for
Emergency
Response
Jidi
Zhao,
Tao
Jin,
Huizhang
Shen
(30
mins.)
Object
Tracking
with
Self-Updating
Tracking
Window
Huimin
Qian,
Yaobin
Mao,
Jason
Geng,
Zhiquan
Wang
(30
mins.)
A
Hybrid
Model
for
Worm
Simulations
in
a
Large
Network
Eul
Gyu
Im,
Jung
Sik
Kim,
In
Woo
Noh,
Hyun
Jun
Jang
(20
mins.)
|
Session
W3-B:
Cyberinfrastructure
Protection
Towards
Identifying
True
Threat
from
Network
Security
Data
Zhi-tang
Li,
Jie
Lei,
Li
Wang,
Dong
Li,
Yang-ming
Ma
(30
mins.)
Defending
DDoS
Attacks
Using
Hidden
Markov
Models
and
Cooperative
Reinforcement
Learning
Xin
Xu,
Yongqiang
Sun,
Zunguo
Huang
(30
mins.)
A
Framework
for
Proving
the
Security
of
Data
Transmission
Protocols
in
Sensor
Network
Mi
Wen,
Ling
Dong,
Yanfei
Zheng,
Kefei
Chen
(20
mins.)
|
 |
Session
4: 4:15pm
to
5:15pm |
Session
W4-A:
Novel
Applications
Airline
Safety
Evaluation
Based
on
Fuzzy
TOPSIS
Yong
Deng,
Jia
Xiong,
Ping
Fu
(20
mins.)
The
Treelike
Assembly
Classifier
for
Pedestrian
Detection
Huimin
Qian,
Yaobin
Mao,
Jason
Geng,
Zhiquan
Wang
(20
mins.)
A
Simple
Method
to
Buyers
in
Confronting
Internet
Auction
Fraud
Yungchang
Ku,
Yuchi
Chen,
Chaochang
Chiu
(20
mins.)
|
Session
W4-B:
Network
Security
A
RT0-Based
Compliance
Checker
Model
for
Automated
Trust
Negotiation
Zhensong
Liao,
Hai
Jin
(30
mins.)
A
Secure
Data
Transmission
Protocol
for
Mobile
Ad
Hoc
Networks
Shejie
Lu,
Jun
Li,
Zhiyuan
Liu,
Guohua
Cui
(30
mins.)
|
 |
5:35pm
to
7:30pm |
Workshop
Reception
/
Award
Ceremony
and
Poster
Session
A
Web
Portal
for
Terrorism
Activities
in
China
Daniel
Zeng,
Li
Zhang,
Donghua
Wei,
Fei-Yue
Wang
An
Overview
of
Telemarketing
Fraud
Problems
and
Countermeasures
in
Taiwan
Jau-Hwang
Wang,
Jiing-Long
Jow,
You-Lu
Liao,
Tyan-muh
Tsai,
Garfield
Hung
Mining
the
Core
Member
of
Terrorist
Crime
Group
Based
On
Social
Network
Analysis
Qihong
Liu,
Changjie
Tang,
Shaojie
Qiao,
Qiwei
Liu,
Fenlian
Wen
Providing
Personalized
Services
for
HWME
System
by
Item-based
Collaborative
Filtering
Qiudan
Li,
Yaodong
Li,
Huiguang
He,
Guanggang
Geng,
Yuanping
Zhu,
Chunheng
Wang
An
Intelligent
Agent-Oriented
System
for
Integrating
Network
Security
Devices
and
Handling
Large
Amount
of
Security
Events
Yang-ming
Ma,
Zhi-tang
Li,
Jie
Lei,
Li
Wang,
Dong
Li
Link
Analysis-based
Detection
of
Anomalous
Communication
Patterns
Daniel
Zeng,
Zan
Huang
Social
Modeling
and
Reasoning
for
Security
Informatics
Wenji
Mao,
Daniel
Zeng,
Li
Zhang,
Donghua
Wei,
Fei-Yue
Wang
Detecting
Botnets
by
Analyzing
DNS
Traffic
Hao
Tu,
Zhi-tang
Li,
Bin
Liu
HMM-based
Approach
for
Evaluating
Risk
Propagation
Young-Gab
Kim,
Jong
In
Lim
A
Symptom-based
Taxonomy
for
an
Early
Detection
of
Network
Attacks
Ki-Yoon
Kim,
Hyoung-Kee
Choi
Privacy
Preserving
Data
Mining
In
Digital
Age
Justin
Zhan,
Carnegie
Mellon
Univ.
|
 |
7:35pm
to
8:30pm |
Public
Lecture
Social
Computing
Fei-Yue
Wang,
Chinese
Academy
of
Sciences
|
|
|
Thursday,
April
12th,
2007 |
|
 |
|
A |
B |
 |
08:25am
to
08:30am |
Announcements
|
 |
08:30am
to
09:00am |
Plenary
Invited
Talk
"Top
10
Algorithms
in
Data
Mining"
Xindong
Wu,
University
of
Vermont
(Abstract)
|
 |
09:00am
to
09:50am |
Session
T1-A:
Data
and
Text
Mining
Anticipatory
Event
Detection
for
Bursty
Events
Kuiyu
Chang,
Qi
He,
Ridzwan
Aminuddin,
Ridzwan
Suri,
Ee-Peng
Lim
(20
mins.)
Community
Detection
in
Scale-free
Networks
Based
on
Hypergraph
Model
Rong
Qian,
Wei
Zhang,
Bingru
Yang
(20
mins.)
|
Session
T1-B:
Information
Access
and
Security
The
Study
of
Government
Website
Information
Disclosure
in
Taiwan
Yuan-Fa
Chen,
Yu-Lan
Sandy
Yeh,
Kuo-Ching
Wu
(20
mins.)
An
Inference
Control
Algorithm
for
RDF(S)
Repository
Jianjiang
Lu,
Jinpeng
Wang,
Yafei
Zhang,
Bo
Zhou,
Yanhui
Li,
Zhuang
Miao
(20
mins.)
|
 |
10:10am
to
11:15am |
Session
T2-A:
Surveillance
and
Threat
Analysis
Detecting
Cyber
Security
Threats
in
Weblogs
Using
Probabilistic
Models
Flora
S.
Tsai,
Kap
Luk
Chan
(30
mins.)
Security
Assessment
for
Application
Network
Services
using
Fault
Injection
Hyungwoo
Kang,
Dong
Hoon
Lee
(30
mins.)
|
Session
T2-B:
Information
and
Software
Watermarking
A
Novel
Relational
Database
Watermarking
Algorithm
Yu
Fu,
Cong
Jin,
Chuanxiang
Ma
(30
mins.)
Informed
Recognition
in
Software
Watermarking
William
Zhu
(20
mins.)
|
|
|
|
|
|
|