ebook img

Intelligence and Security Informatics: Pacific Asia Workshop, PAISI 2013, Beijing, China, August 3, 2013. Proceedings PDF

126 Pages·2013·2.227 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Intelligence and Security Informatics: Pacific Asia Workshop, PAISI 2013, Beijing, China, August 3, 2013. Proceedings

G. Alan Wang Xiaolong Zheng Michael Chau Hsinchun Chen (Eds.) 9 3 Intelligence and 0 8 S C Security Informatics N L Pacific Asia Workshop, PAISI 2013 Beijing, China, August 2013 Proceedings 123 Lecture Notes in Computer Science 8039 CommencedPublicationin1973 FoundingandFormerSeriesEditors: GerhardGoos,JurisHartmanis,andJanvanLeeuwen EditorialBoard DavidHutchison LancasterUniversity,UK TakeoKanade CarnegieMellonUniversity,Pittsburgh,PA,USA JosefKittler UniversityofSurrey,Guildford,UK JonM.Kleinberg CornellUniversity,Ithaca,NY,USA AlfredKobsa UniversityofCalifornia,Irvine,CA,USA FriedemannMattern ETHZurich,Switzerland JohnC.Mitchell StanfordUniversity,CA,USA MoniNaor WeizmannInstituteofScience,Rehovot,Israel OscarNierstrasz UniversityofBern,Switzerland C.PanduRangan IndianInstituteofTechnology,Madras,India BernhardSteffen TUDortmundUniversity,Germany MadhuSudan MicrosoftResearch,Cambridge,MA,USA DemetriTerzopoulos UniversityofCalifornia,LosAngeles,CA,USA DougTygar UniversityofCalifornia,Berkeley,CA,USA GerhardWeikum MaxPlanckInstituteforInformatics,Saarbruecken,Germany G. Alan Wang Xiaolong Zheng Michael Chau Hsinchun Chen (Eds.) Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2013 Beijing, China, August 3, 2013 Proceedings 1 3 VolumeEditors G.AlanWang VirginiaTech,PamplinCollegeofBusiness Blacksburg,VA24061,USA E-mail:[email protected] XiaolongZheng ChineseAcademyofSciences,InstituteofAutomation Beijing100190,China E-mail:[email protected] MichaelChau TheUniversityofHongKong,FacultyofBusinessandEconomics HongKong,China E-mail:[email protected] HsinchunChen UniversityofArizona,DepartmentofManagementInformationSystems Tucson,AZ85721,USA E-mail:[email protected] ISSN0302-9743 e-ISSN1611-3349 ISBN978-3-642-39692-2 e-ISBN978-3-642-39693-9 DOI10.1007/978-3-642-39693-9 SpringerHeidelbergDordrechtLondonNewYork LibraryofCongressControlNumber:2013942885 CRSubjectClassification(1998):K.6.5,C.2,H.3,H.4,H.2.8,I.2.6,D.4.6,K.4 LNCSSublibrary:SL4–SecurityandCryptology ©Springer-VerlagBerlinHeidelberg2013 Thisworkissubjecttocopyright.AllrightsarereservedbythePublisher,whetherthewholeorpartof thematerialisconcerned,specificallytherightsoftranslation,reprinting,reuseofillustrations,recitation, broadcasting,reproductiononmicrofilmsorinanyotherphysicalway,andtransmissionorinformation storageandretrieval,electronicadaptation,computersoftware,orbysimilarordissimilarmethodology nowknownorhereafterdeveloped.Exemptedfromthislegalreservationarebriefexcerptsinconnection withreviewsorscholarlyanalysisormaterialsuppliedspecificallyforthepurposeofbeingenteredand executedonacomputersystem,forexclusiveusebythepurchaserofthework.Duplicationofthispublication orpartsthereofispermittedonlyundertheprovisionsoftheCopyrightLawofthePublisher’slocation, initscurrentversion,andpermissionforusemustalwaysbeobtainedfromSpringer.Permissionsforuse maybeobtainedthroughRightsLinkattheCopyrightClearanceCenter.Violationsareliabletoprosecution undertherespectiveCopyrightLaw. Theuseofgeneraldescriptivenames,registerednames,trademarks,servicemarks,etc.inthispublication doesnotimply,evenintheabsenceofaspecificstatement,thatsuchnamesareexemptfromtherelevant protectivelawsandregulationsandthereforefreeforgeneraluse. Whiletheadviceandinformationinthisbookarebelievedtobetrueandaccurateatthedateofpublication, neithertheauthorsnortheeditorsnorthepublishercanacceptanylegalresponsibilityforanyerrorsor omissionsthatmaybemade.Thepublishermakesnowarranty,expressorimplied,withrespecttothe materialcontainedherein. Typesetting:Camera-readybyauthor,dataconversionbyScientificPublishingServices,Chennai,India Printedonacid-freepaper SpringerispartofSpringerScience+BusinessMedia(www.springer.com) Preface The field of intelligence and security informatics (ISI) is concerned with the development of advanced information technologies, systems, algorithms, and databases for national, international, and societal security-related applications, throughanintegratedtechnological,organizational,andpolicy-basedapproach. In the past decade, the insecurity generated by crime and violent incidents around the world has attracted researchers and practitioners in related fields to conduct security-relatedresearch.The ISI community intends to apply infor- mation technologies to the understanding, monitoring, and prevention of crime and terrorism in the hope of restoring the sense of security. The Pacific Asia Workshopon Intelligence and Security Informatics (PAISI) provides a platform for the ISI community to present and discuss findings in security-relatedresearch.ItfocusesontopicsandissuesincludingISI dataman- agement,dataandtextminingforISIapplications,terrorisminformatics,decep- tion and intent detection, terrorist and criminal social network analysis, public health and bio-security, crime analysis, cyber-infrastructure protection, trans- portation infrastructure security, policy studies and evaluation, information as- surance, enterprise risk management, and information systems security. The annual IEEE International Conference series on ISI began in 2003. In 2006, the first international Workshop on ISI (WISI) was held in Singapore in conjunction with the Pacific Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2006). The workshop attracted over 100 contributors and participants from all over the worldand markedthe start of a new series of ISI meetings inthe PacificAsia region.Inthe followingfew years,the workshop was held in Chengdu, China (2007), Taipei, Taiwan (2008), Bangkok, Thailand (2009), Hyderabad, India (2010), Beijing, China (2011), and Kuala Lumpur, Malaysia (2012). This year, the Pacific Asia ISI Workshop series (PAISI 2013) wasonceagainheldinBeijing,China.Theone-dayeventwasheldinconjunction with the International Joint Conference on Artificial Intelligence (IJCAI 2013). PAISI 2013 was hosted by the University of Arizona, the University of Hong Kong,andVirginiaPolytechnicInstituteandStateUniversity.Theone-daypro- gramincludedakeynotespeechandpresentationsoffourlongpapersandseven short papers. We hope PAISI can continue to provide a stimulating forum for ISI researchers in Pacific Asia and other regions of the world to exchange ideas VI Preface andreportresearchprogress.We wishtoexpressoursinceregratitudeto allthe workshop Program Committee members, who provided valuable and construc- tive review comments. August 2013 G. Alan Wang Xiaolong Zheng Michael Chau Hsinchun Chen Organization Workshop Co-chairs G. Alan Wang Virginia Tech, USA Xiaolong Zheng The Chinese Academy of Sciences, China Michael Chau TheUniversityofHongKong,HongKongSAR China Hsinchun Chen The University of Arizona, USA Program Committee Zeyar Aung Masdar Institute of Science and Technology, UAE Weiping Chang Central Police University, Taiwan Xueqi Cheng The Chinese Academy of Sciences, China Vladimir Estivill-Castro Griffith University, Australia Uwe Gl¨asser Simon Fraser University, Canada Eul Gyu Im Hanyang University, Korea Jian Jiao Microsoft, USA Da-Yu Kao Central Police University, Taiwan Siddharth Kaza Towson University, USA Paul W.H. Kwan The University of New England, USA Kai Pui Lam The Chinese University of Hong Kong, Hong Kong SAR China Wai Lam The Chinese University of Hong Kong, Hong Kong SAR China Mark Last Ben-Gurion University of the Negev, Israel Ickjai Lee James Cook University, Australia Xiaochen Li The Chinese Academy of Sciences, China You-Lu Liao Central Police University, Taiwan Ee-Peng Lim Singapore Management University, Singapore Hongyan Liu Tsinghua University, China Hsin-Min Lu National Taiwan University, Taiwan Jun Luo The Chinese Academy of Sciences, China Xin Luo The University of New Mexico, USA Wenji Mao The Chinese Academy of Sciences, China Byron Marshall Oregon State University, USA Dorbin Ng The Chinese University of Hong Kong, Hong Kong SAR China Shaojie Qiao Southwest Jiaotong University, China VIII Organization Shrisha Rao International Institute of Information Technology, India Srinath Srinivasa International Institute of Information Technology, India Aixin Sun Nanyang Technological University, Singapore Paul Thompson Dartmouth College, USA Jennifer Xu Bentley University, USA Wei Zhang Tianjin University, China Yilu Zhou George Washington University, USA Table of Contents Information Sharing and Data/Text Mining Belief Manipulation: A Formal Model of Deceit in Message Passing Systems (Short Paper)............................................ 1 Aaron Hunter Region of Interest Discovery in Location-Based Social Networking Services with Protected Locations (Short Paper) ..................... 9 Rong Tan, Junzhong Gu, Peng Chen, and Zhou Zhong Label Micro-blog Topics Using the Bayesian Inference Method (Short Paper) ................................................... 19 Heng Gao, Qiudan Li, and Xiaolong Zheng Terrorism Informatics Collective Intelligence for Suicide Surveillance in Web Forums (Short Paper) ................................................... 29 Tim M.H. Li, Ben C.M. Ng, Michael Chau, Paul W.C. Wong, and Paul S.F. Yip Computing Optimal Attack Strategies Using Unconstrained Influence Diagrams (Short Paper) .......................................... 38 Viliam Lis´y and Radek P´ıbil Network-Based Data Analytics Identifying Peer Influence in Online Social Networks Using Transfer Entropy ........................................................ 47 Saike He, Xiaolong Zheng, Daniel Zeng, Kainan Cui, Zhu Zhang, and Chuan Luo Modeling Relationship Strength for Link Prediction .................. 62 Ning Li, Xu Feng, Shufan Ji, and Ke Xu What Is the Uniqueness of Growth Pattern in Human Flesh Search Organization?(Short Paper) ...................................... 75 Tao Wang, Qingpeng Zhang, Julei Fu, Xiao Wang, and Suncong Zheng X Table of Contents Information Access and Security Energy Saving Replay Attack Prevention in Clustered Wireless Sensor Networks ....................................................... 82 Amrita Ghosal, Aadirupa Saha, and Sipra Das Bit Detecting Web Attacks Based on Domain Statistics .................. 97 Chia-Mei Chen, Jhe-Jhun Huang, and Ya-Hui Ou A Novel Key Scheme Based on QR Decomposition for Wireless Sensor Networks (Short Paper)........................................... 107 Weimin Xie, Liejun Wang, and Mingwei Wang Author Index.................................................. 117

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.