IEEE ISI 2010 Program
Download ISI 2010 Program
Latest version (PDF, 123KB)
Also please scroll to the bottom to see important information about the Workshop on Current Issues in Predictive Approaches to Intelligence and Security Analysis (PAISA)
Table of Contents
4:00pm-7:00pm | Conference and Workshop Registration. |
7:30am-8:30am | Registration |
8:30am-8:40am | Welcome and Conference Opening, Waterfront Ballroom A & B |
8:40am-9:40am | Keynote Talk:
Waterfront Ballroom A & B Session Chair: Christopher C. Yang, Drexel University Dark Network Analysis: The Dark Web Experience |
9:45am-10:45am | Sessions M1-I, M1-II |
M1-I: Terrorism Informatics
Waterfront Ballroom A & B |
|
Session Chair: Ke Wang, Simon Fraser University Herbert H. Tsang, Andrew J. Park, Mengting Sun and Uwe Glässer. GENIUS: A Computational Modeling Framework for Counter-Terrorism Planning and Response Yulei Zhang, Shuo Zeng, Chun-Neng Huang, Li Fan, Ximing Yu, Yan Dang, Catherine Larson, Dorothy Denning, Nancy Roberts and Hsinchun Chen. Developing a Dark Web Collection and Infrastructure for Computational and Social Sciences |
|
M1-II: Innovative and Emerging Applications
Princess Louisa Suite |
|
Session Chair: Antonio Baida, University of Louisville Xu Chen and Tak Shing Yum. Cross Entropy Approach for Patrol Route Planning in Dynamic Environments Uwe Glässer, Piper Jackson, Ali Khalili Araghi and Hamed Yaghoubi Shahir. Intelligent Decision Support for Marine Safety and Security Operations |
|
10:45am-11:00am | Break |
11:00am-12:00pm | Sessions M2-I, M2-II |
M2-I: Computational Criminology (Invited Session)
Waterfront Ballroom A & B |
|
Session Chair: Cathy Larson, University of Arizona Computational Criminology: The Past and the Future |
|
M2-II: Information Systems Security and Cyber Security
Princess Louisa Suite |
|
Session Chair: Wei-Bin Lee, Feng Chia University Shun-Wen Hsiao, Yeali S. Sun, Meng Chang Chen and Hui Zhang. Cross-Level Behavioral Analysis for Robust Early Intrusion Detection Ayman Taha, Ayman Bahaa, Hani Mahdi and Ismail Abdel Ghafa. Agent Based Correlation Model for Intrusion Detection Alerts |
|
12:00pm-1:30pm | Lunch Break |
1:30pm-2:30pm | Sessions M3-I, M3-II |
M3-I: Computational Criminology
Waterfront Ballroom A & B Session Chair: Arvind Verma, Indiana University Patricia L. Brantingham, Andrew Park, Richard Frank, Joseph Clare, Kathryn Wuschke and Mona Vajihollahi. Identifying High Risk Crime Areas using Topology Vladia Pinheiro, Vasco Furtado, Tarcisio Pequeno and Douglas Nogueira. Natural Language Processing Based on Semantic Inferentialism for Extracting Crime Information from Text |
|
M3-II: Terrorism and Security Informatics
Princess Louisa Suite Session Chair: Bill Glackman, Simon Fraser University Paul Elzinga, Jonas Poelmans, Stijn Viaene, Guido Dedene and Shanti Morsing. Terrorist Threat Assessment with Formal Concept Analysis Xuning Tang and Christopher Yang. Identifying Influential Users in an Online Healthcare Social Network |
|
2:30pm-3:30pm | Sessions M4-I, M4-II |
M4-I: Network-based Data Analytics
Waterfront Ballroom A & B |
|
Session Chair: Christopher C. Yang, Drexel University Michael Porter and Ryan Smith. Network Neighborhood Analysis Xuning Tang and Christopher Yang. Generalizing Terrorist Social Networks with K-Nearest Neighbor and Edge Betweeness for Social Network Integration and Privacy Preservation |
|
M4-II: Social Movements and Network Analysis
Princess Louisa Suite Session Chair: Ke Wang, Simon Fraser University David Zimbra and Hsinchun Chen. Comparing the Virtual Linkage Intensity and Real World Proximity of Social Movements Sibel Adali, Robert Escriva, Mark Goldberg, Mykola Hayvanovych, Malik Magdon-Ismail, Boleslaw Szymanski, William Wallace and Gregory Williams. Measuring Behavioral Trust in Social Networks |
|
Baojun Qiu, Kristinka Ivanova, John Yen and Peng Liu. Study of Effect of Node Seniority in Social Networks | |
3:30pm-4:00pm | Break and Set-up of Poster Session |
4:00pm-5:00pm | Sessions M5-I, M5-II |
M5-I: Text Mining and Content Analysis
Waterfront Ballroom A & B |
|
Session Chair: Fasco Furtado, University of Fortaleza Roger Bradford. Entity Refinement using Latent Semantic Indexing Gaston L. Huillier, Richard Weber, Alejandro Hevia and Sebastian Rios. Latent Semantic Analysis and Keyword Extraction for Phishing Classification Jenq-Haur Wang. Unsupervised Multilingual Concept Discovery from Daily Online News Extracts |
|
M5-II: Innovative and Emerging Applications
Princess Louisa Suite |
|
Session Chair: Mykola Hayvanovych, Rensselaer Polytechnic Institute Yan Gao and Xiaolin Zhang. Real Time Tracking of Remote Moving Object by Active Zoom Cameras Arvind Verma, Ramyaa Ramyaa, Raminder Singh and Suresh Marru. Rationalizing police patrol beats using Voronoi Tessellations |
|
6:00pm-7:30pm | Welcome Reception and Poster Presentation |
7:30am-8:30am | Registration |
8:45am-9:45am | Keynote Talk:
Waterfront Ballroom A & B Session Chair: Patricia L. Brantingham, Simon Fraser University Technological Challenges in the Investigation of Terrorism Gary Bass, Deputy Commissioner Pacific Region and Commanding Officer “E” Division for the RCMP in British Columbia |
9:45am-10:45am | Keynote Talk:
Waterfront Ballroom A & B Session Chair: Patricia L. Brantingham, Simon Fraser University The US and the EU Differences in Anti-terrorism Efforts |
10:45am-11:15am | Break |
11:15am-12:00pm | Sessions T1-I, T2-II |
T1-I: Infrastructure Protection and Cyber Security
Waterfront Ballroom A & B |
|
Session Chair: Herbert Tsang, Simon Fraser University Lei Wang, Tianbing Xia and Jennifer Seberry. Inter-Domain Routing Validator Based Spoofing Defence System Wei-Bin Lee, Hsing-Bai Chen and Ching-Chih Cheng. Secure Communication between Set-top Box and Smart Card for Fair Use in DTV Broadcasting |
|
T1-II: Innovative and Emerging Applications
Princess Louisa Suite |
|
Session Chair: Antonio Baida, University of Louisville John Warden. Intelligence for the Business of Crime Fighting (invited) Latifur Khan. Stream Mining and Its Applications toward Security (invited) |
|
12:00pm-1:30pm | Lunch Break |
1:30pm-2:30pm | Keynote Talk:
Waterfront Ballroom A & B Session Chair: Uwe Glässer, Simon Fraser University Decision Support with a Joint Multi-national Multi-agency Defense and Security Environment |
2:30pm-3:30pm | Sessions T2-I, T2-II |
T2-I: Computational Criminology
Waterfront Ballroom A & B Session Chair: Cathy Larson, University of Arizona Amir H. Ghaseminejad and Paul Brantingham. An Executive Decision Support System For Longitudinal Statistical Analysis of Crime and Law Enforcement Performance Andrew Park, Valerie Spicer, Monique Guterres, Patricia Brantingham and Greg Jenion. Testing Perception of Crime in a Virtual Environment |
|
T2-II: Information Systems Security and Terrorism Informatics
Princess Louisa Suite Session Chair: Latifur Khan, University of Texas at Dallas Antonio Badia. Balancing Security and Information Sharing on Multilevel Security Databases Xiaochen Li, Wenji Mao, Daniel Zeng and Fei-Yue Wang. Automatic Construction of Domain Theory for Attack Planning |
|
3:30pm-4:00pm | Break |
4:00pm-5:30pm | Panel Discussion:
Waterfront Ballroom A & B Communication and Information Systems for Inter-Agencies Integration: A Safety and Security Perspective Panel Chair: Adel Guitouni, Defence Scientist, Command and Control Decision Support System Section, Defence Research & Development Canada (DRDC) Valcartier Panelists: Major Axel Sundquist (CF), J6 Officer-in-Charge Communication and Information System Officer), Joint Task Force Games Inspector Dennis Crowe (RCMP), Officer-in-Charge Informatics, Vancouver 2010 Integrated Security Unit LCol Paul Fleet, Deputy Chief of Staff Operations, Joint Task Force Games Mike Webb, Manager, Telecommunications and Systems, Emergency Management BC Lynne Genik, Defence Scientist, DRDC Ottawa |
6:30pm-8:30pm | Conference Banquet and Award Ceremony |
7:00am-10:00am | Registration |
8:30am-9:30am | Session W1-I |
W1-I: Innovative and Emerging Applications
Waterfront Ballroom A & B |
|
Session Chair: Richard Colbaugh, Sandia National Laboratories Kristin Glass, Richard Colbaugh and Max Planck. Automatically Identifying the Sources of Large Internet Events Svitlana Volkova and William Hsu. Computational Knowledge and Information Management in Veterinary Epidemiology |
|
9:30am – 10:30am | Session W2-I |
W2-I: Network-based Data Analytics
WaterfrontBallroom A & B |
|
Session Chair: Latifur Khan, University of Texas at Dallas Huiqi Zhang and Ram Dantu. Predicting Social Ties in Mobile Phone Networks Richard Colbaugh and Kristin Glass. Early Warning Analysis for Social Diffusion Events |
|
10:30am-10:45am | Break |
10:45am-12:15pm | Session W3-I and Panel Discussion |
W3-I: Text Mining and Content Analysis
Waterfront Ballroom A & B Session Chair: Kristin Glass, New Mexico Tech Jonathan Brett Crawley and Gerhard Wagner. Desktop Text Mining for Law Enforcement Qing Chen, Timothy Shipper and Latifur Khan. Tweets Mining Using WIKIPEDIA and Impurity Cluster Measurement Richard Colbaugh and Kristin Glass. Estimating Sentiment Orientation in Social Media for Intelligence Monitoring and Analysis |
|
Panel Discussion:
Princess Louisa Suite Model Interoperability Panelists: Antonio Sanfilippo, PNNL Alexander Levis, GMU Lucas Overbey, SPAWAR Bill Reynolds, LSS Inc. Ed Waltz, BAE Systems |
|
12:15pm-12:30pm | Closing Remarks |
The Workshop on Current Issues in Predictive Approaches to Intelligence and Security Analysis (PAISA) is held in parallel with IEEE ISI 2010 on May 26. The workshop program can be downloaded here.
http://predictiveanalytics.pnl.gov/isi2010_conference/PAISA10Agenda.pdf
[Top]