[ISI 2009 (IEEE Intelligence & Security Informatics 2010) -- Burnayb, British Columbia - June 8-11, 2010]

[ISI 2010 -- Burnaby, British Columbia]

Program
 

IEEE ISI 2010 Program

Download ISI 2010 Program
Latest version (PDF, 123KB)

Also please scroll to the bottom to see important information about the Workshop on Current Issues in Predictive Approaches to Intelligence and Security Analysis (PAISA)

Table of Contents

 

May 23, 2010 (Sunday)
4:00pm-7:00pm Conference and Workshop Registration.
 
May 24, 2010 (Monday)
7:30am-8:30am Registration
8:30am-8:40am Welcome and Conference Opening, Waterfront Ballroom A & B
8:40am-9:40am Keynote Talk:

Waterfront Ballroom A & B

Session Chair: Christopher C. Yang, Drexel University

Dark Network Analysis: The Dark Web Experience
Hsinchun Chen, University of Arizona

9:45am-10:45am Sessions M1-I, M1-II
M1-I: Terrorism Informatics

Waterfront Ballroom A & B

Session Chair: Ke Wang, Simon Fraser University

Herbert H. Tsang, Andrew J. Park, Mengting Sun and Uwe Glässer. GENIUS: A Computational Modeling Framework for Counter-Terrorism Planning and Response

Yulei Zhang, Shuo Zeng, Chun-Neng Huang, Li Fan, Ximing Yu, Yan Dang, Catherine Larson, Dorothy Denning, Nancy Roberts and Hsinchun Chen. Developing a Dark Web Collection and Infrastructure for Computational and Social Sciences

M1-II: Innovative and Emerging Applications

Princess Louisa Suite

Session Chair: Antonio Baida, University of Louisville

Xu Chen and Tak Shing Yum. Cross Entropy Approach for Patrol Route Planning in Dynamic Environments

Uwe Glässer, Piper Jackson, Ali Khalili Araghi and Hamed Yaghoubi Shahir. Intelligent Decision Support for Marine Safety and Security Operations

10:45am-11:00am Break
11:00am-12:00pm Sessions M2-I, M2-II
M2-I: Computational Criminology (Invited Session)

Waterfront Ballroom A & B

Session Chair: Cathy Larson, University of Arizona

Computational Criminology: The Past and the Future
Patricia L. Brantingham, Simon Fraser University

M2-II: Information Systems Security and Cyber Security

Princess Louisa Suite

Session Chair: Wei-Bin Lee, Feng Chia University

Shun-Wen Hsiao, Yeali S. Sun, Meng Chang Chen and Hui Zhang. Cross-Level Behavioral Analysis for Robust Early Intrusion Detection

Ayman Taha, Ayman Bahaa, Hani Mahdi and Ismail Abdel Ghafa. Agent Based Correlation Model for Intrusion Detection Alerts

12:00pm-1:30pm Lunch Break
1:30pm-2:30pm Sessions M3-I, M3-II
M3-I: Computational Criminology

Waterfront Ballroom A & B

Session Chair: Arvind Verma, Indiana University

Patricia L. Brantingham, Andrew Park, Richard Frank, Joseph Clare, Kathryn Wuschke and Mona Vajihollahi. Identifying High Risk Crime Areas using Topology

Vladia Pinheiro, Vasco Furtado, Tarcisio Pequeno and Douglas Nogueira. Natural Language Processing Based on Semantic Inferentialism for Extracting Crime Information from Text

M3-II: Terrorism and Security Informatics

Princess Louisa Suite

Session Chair: Bill Glackman, Simon Fraser University

Paul Elzinga, Jonas Poelmans, Stijn Viaene, Guido Dedene and Shanti Morsing. Terrorist Threat Assessment with Formal Concept Analysis

Xuning Tang and Christopher Yang. Identifying Influential Users in an Online Healthcare Social Network

2:30pm-3:30pm Sessions M4-I, M4-II
M4-I: Network-based Data Analytics

Waterfront Ballroom A & B

Session Chair: Christopher C. Yang, Drexel University

Michael Porter and Ryan Smith. Network Neighborhood Analysis

Xuning Tang and Christopher Yang. Generalizing Terrorist Social Networks with K-Nearest Neighbor and Edge Betweeness for Social Network Integration and Privacy Preservation

M4-II: Social Movements and Network Analysis

Princess Louisa Suite

Session Chair: Ke Wang, Simon Fraser University

David Zimbra and Hsinchun Chen. Comparing the Virtual Linkage Intensity and Real World Proximity of Social Movements

Sibel Adali, Robert Escriva, Mark Goldberg, Mykola Hayvanovych, Malik Magdon-Ismail, Boleslaw Szymanski, William Wallace and Gregory Williams. Measuring Behavioral Trust in Social Networks

Baojun Qiu, Kristinka Ivanova, John Yen and Peng Liu. Study of Effect of Node Seniority in Social Networks
3:30pm-4:00pm Break and Set-up of Poster Session
4:00pm-5:00pm Sessions M5-I, M5-II
M5-I: Text Mining and Content Analysis

Waterfront Ballroom A & B

Session Chair: Fasco Furtado, University of Fortaleza

Roger Bradford. Entity Refinement using Latent Semantic Indexing

Gaston L. Huillier, Richard Weber, Alejandro Hevia and Sebastian Rios. Latent Semantic Analysis and Keyword Extraction for Phishing Classification

Jenq-Haur Wang. Unsupervised Multilingual Concept Discovery from Daily Online News Extracts

M5-II: Innovative and Emerging Applications

Princess Louisa Suite

Session Chair: Mykola Hayvanovych, Rensselaer Polytechnic Institute

Yan Gao and Xiaolin Zhang. Real Time Tracking of Remote Moving Object by Active Zoom Cameras

Arvind Verma, Ramyaa Ramyaa, Raminder Singh and Suresh Marru. Rationalizing police patrol beats using Voronoi Tessellations

6:00pm-7:30pm Welcome Reception and Poster Presentation
 
May 25, 2010 (Tuesday)
7:30am-8:30am Registration
8:45am-9:45am Keynote Talk:

Waterfront Ballroom A & B

Session Chair: Patricia L. Brantingham, Simon Fraser University

Technological Challenges in the Investigation of Terrorism

Gary Bass, Deputy Commissioner Pacific Region and Commanding Officer “E” Division for the RCMP in British Columbia

9:45am-10:45am Keynote Talk:

Waterfront Ballroom A & B

Session Chair: Patricia L. Brantingham, Simon Fraser University

The US and the EU Differences in Anti-terrorism Efforts
Michael Gallagher, LaSalle University

10:45am-11:15am Break
11:15am-12:00pm Sessions T1-I, T2-II
T1-I: Infrastructure Protection and Cyber Security

Waterfront Ballroom A & B

Session Chair: Herbert Tsang, Simon Fraser University

Lei Wang, Tianbing Xia and Jennifer Seberry. Inter-Domain Routing Validator Based Spoofing Defence System

Wei-Bin Lee, Hsing-Bai Chen and Ching-Chih Cheng. Secure Communication between Set-top Box and Smart Card for Fair Use in DTV Broadcasting

T1-II: Innovative and Emerging Applications

Princess Louisa Suite

Session Chair: Antonio Baida, University of Louisville

John Warden. Intelligence for the Business of Crime Fighting (invited)

Latifur Khan. Stream Mining and Its Applications toward Security (invited)

12:00pm-1:30pm Lunch Break
1:30pm-2:30pm Keynote Talk:

Waterfront Ballroom A & B

Session Chair: Uwe Glässer, Simon Fraser University

Decision Support with a Joint Multi-national Multi-agency Defense and Security Environment
Éloi Bossé, Defence Research & Development Canada (DRDC) Valcartier

2:30pm-3:30pm Sessions T2-I, T2-II
T2-I: Computational Criminology

Waterfront Ballroom A & B

Session Chair: Cathy Larson, University of Arizona

Amir H. Ghaseminejad and Paul Brantingham. An Executive Decision Support System For Longitudinal Statistical Analysis of Crime and Law Enforcement Performance

Andrew Park, Valerie Spicer, Monique Guterres, Patricia Brantingham and Greg Jenion. Testing Perception of Crime in a Virtual Environment

T2-II: Information Systems Security and Terrorism Informatics

Princess Louisa Suite

Session Chair: Latifur Khan, University of Texas at Dallas

Antonio Badia. Balancing Security and Information Sharing on Multilevel Security Databases

Xiaochen Li, Wenji Mao, Daniel Zeng and Fei-Yue Wang. Automatic Construction of Domain Theory for Attack Planning

3:30pm-4:00pm Break
4:00pm-5:30pm Panel Discussion:

Waterfront Ballroom A & B

Communication and Information Systems for Inter-Agencies Integration: A Safety and Security Perspective

Panel Chair: Adel Guitouni, Defence Scientist, Command and Control Decision Support System Section, Defence Research & Development Canada (DRDC) Valcartier

Panelists:

Major Axel Sundquist (CF), J6 Officer-in-Charge Communication and Information System Officer), Joint Task Force Games

Inspector Dennis Crowe (RCMP), Officer-in-Charge Informatics, Vancouver 2010 Integrated Security Unit

LCol Paul Fleet, Deputy Chief of Staff Operations, Joint Task Force Games

Mike Webb, Manager, Telecommunications and Systems, Emergency Management BC

Lynne Genik, Defence Scientist, DRDC Ottawa

6:30pm-8:30pm Conference Banquet and Award Ceremony
 
May 26, 2010 (Wednesday)
7:00am-10:00am Registration
8:30am-9:30am Session W1-I
W1-I: Innovative and Emerging Applications

Waterfront Ballroom A & B

Session Chair: Richard Colbaugh, Sandia National Laboratories

Kristin Glass, Richard Colbaugh and Max Planck. Automatically Identifying the Sources of Large Internet Events

Svitlana Volkova and William Hsu. Computational Knowledge and Information Management in Veterinary Epidemiology

9:30am – 10:30am Session W2-I
W2-I: Network-based Data Analytics

WaterfrontBallroom A & B

Session Chair: Latifur Khan, University of Texas at Dallas

Huiqi Zhang and Ram Dantu. Predicting Social Ties in Mobile Phone Networks

Richard Colbaugh and Kristin Glass. Early Warning Analysis for Social Diffusion Events

10:30am-10:45am Break
10:45am-12:15pm Session W3-I and Panel Discussion
W3-I: Text Mining and Content Analysis

Waterfront Ballroom A & B

Session Chair: Kristin Glass, New Mexico Tech

Jonathan Brett Crawley and Gerhard Wagner. Desktop Text Mining for Law Enforcement

Qing Chen, Timothy Shipper and Latifur Khan. Tweets Mining Using WIKIPEDIA and Impurity Cluster Measurement

Richard Colbaugh and Kristin Glass. Estimating Sentiment Orientation in Social Media for Intelligence Monitoring and Analysis

Panel Discussion:

Princess Louisa Suite

Model Interoperability

Panelists:

Antonio Sanfilippo, PNNL

Alexander Levis, GMU

Lucas Overbey, SPAWAR

Bill Reynolds, LSS Inc.

Ed Waltz, BAE Systems

12:15pm-12:30pm Closing Remarks

The Workshop on Current Issues in Predictive Approaches to Intelligence and Security Analysis (PAISA) is held in parallel with IEEE ISI 2010 on May 26. The workshop program can be downloaded here.

http://predictiveanalytics.pnl.gov/isi2010_conference/PAISA10Agenda.pdf

[Top]