Schedule and Program 
 
   May 23, 2007
Wednesday
(Day One)
A
B
C
7:00 am - 8:00 am
Registration and Continental Breakfast
8:00 am - 8:15 am
Welcome and Conference Opening
8:15 am - 9:00 am
Keynote Address: Steven Nixon, Deputy Associate Director of National Intelligence for Science and Technology (DADNI/S&T),
Office of the DNI, "Science and Technology in the Intelligence Community"
9:00 am - 10:00 am

Track I Plenary Panel: Port Security and Infrastructure Protection
Moderator: Jeffrey J. Milstein, Operations Manager, Moran Agency, and Sr. Agent, Port of NY/NJ

Panelists:
Beth Ann Rooney, Manager, Port Security, Port Authority of NY/NJ
Steve Loevsky, General Manager, P&O Ports NA and Manhattan Cruise Terminal
Capt. David L. Scott, Commander, USCG Sector Delaware Bay
Peter Keyes, General Manager, Moran Towing, Tug and Barge Company NY
Brendan T. Fitzpatrick, FBI/CGIS (Coast Guard Investigative Service), JTTF (Joint Terrorism Task Force)

10:00 am - 10:30 am
Break
10:30 am - 12:00 pm
Sessions W1-I, W1-II, W1-III*
Session W1: 10:30 am - 12:00 pm

W1-I: Port Security and Infrastructure Protection

Sequential Decision Making Algorithms for Port of Entry Inspection: Overcoming Computational Challenges (LP)

David Madigan, Sushil Mittal and Fred Roberts

 

A Bayesian-Enhanced Expert Methodology to Assess Risk and Consequence of Future Threats to Homeland Infrastructures (SP)

Michael Smith, E. DeVere Henderson and William Stryker

Using Digital Chains of Custody on Constrained Devices to Verify Evidence (LP)

Phillip Bradford and Daniel Ray

W1-II:  Emergency Response Systems and Decision-Making

Approach for Discovering and Handling Crisis in a Service-Oriented Environment (LP)

Nabil Adam, Vandana Janeja, Aabhas Paliwal, Basit Shafiq, Cedric Ulmer, Volker Gersabeck, Anne Hardy, Christof Bornhoevd and Joachim Schaper  


A Quick Group Decision-making Process for Emergency Response (LP)

Huizhang Shen and Jidi Zhao

Architecture for an Automatic Customized Warning Dissemination (LP)

Mirko Montanari, Sharad Mehrotra and Nalini Venkatasubramanian

W1-III: Social Network Analysis in Security Applications

Dynamic Social Network Analysis of a Dark Network: Identifying Significant Facilitators (LP)

Siddharth Kaza, Daning Hu and Hsinchun Chen

 A Dynamic Social Network Software Platform for Counter-Terrorism Decision Support (LP)

Richard Adler

Terrorism and Crime Related Weblog Social Network: Link, Content Analysis and Information Visualization (SP)

Christopher Yang and Tobun Ng

 

12:00 pm - 1:30 pm
Lunch
1:30pm to 2:30pm

Track II Plenary Panel: Preparedness for and Response to High-Consequence Events
Moderator: Paul J. Lioy, Ph.D. Professor and Deputy Director of the Environmental and Occupational Health Sciences Institute (EOHSI), RWJMS & RU, NJ

Panelists:
David Prezant, Chief Medical Officer, FDNY Office of Medical Affairs, NYC, NY
Jeffrey Laskin, Ph.D. Professor and Director of the NIH CounterACT Center, RWJMS & EOHSI, NJ
Paul Kalb, Ph.D. Head, Environmental Research & Technology Division, Environmental Services Department, Brookhaven National Laboratory, NY
Panos Georgopoulos, Professor and Director of the Computational Chemodymamics Laboratory, EOHSI & RWJMS, NJ
Jonathan G. Herrmann, P.E., BCEE, Director, National Homeland Security Research, Environmental Protection Agency

2:30 pm - 4:00 pm
Sessions W2-I, W2-II, W2-III*
Session W2: 
2:30 Pm - 4:00 pm

W2-I: Infrastructure Protection and Cyber Security

Deployment of DNIDS in Social Networks (LP)

Meytal Tubi, Rami Puzis and Yuval Elovici


A Framework for an Adaptive Intrusion Detection System using Bayesian Network (LP)

Farah Jemili, Montaceur Zaghdoud and Mohamed Ben Ahmed


Classification of Attributes and Behavior in Risk Management Using Bayesian Networks (LP)

Ram Dantu, Prakash Kolan and Robert Akl

W2-II:  Emergency Response and Emerging Applications

Fine-Grained Reputation-based Routing in Wireless Ad Hoc Networks (SP)

Li Yang, Joseph Kizza, Alma Cemerlic and Feiqiong Liu


Organizing Hot-Spot Police Patrol Routes (LP)

Sudarshan S. Chawathe


A Host Architecture For Automobile License Plate Recognition (LP)

Matthew Hudnall, David Brown, David Cordes, Randy Smith and Allen Parrish

W2-III: Terrorism Informatics and Countermeasures

A Layered Dempster-Shafer Approach to Scenario Construction and Analysis (LP)

Antonio Sanfilippo, Bob Baddeley, Christian Posse and Paul Whitney


Forecasting Terrorist Warfare: Conventional to CBRN (SP)

Joshua Sinai

 
Real-time Correlation of Network Security Alerts (LP)

Aifang Zhang and Zhitang Li

4:00 pm - 4:30 pm
Break and set-up of Poster Session
4:30 pm - 6:00 pm
Sessions W3-I, W3-II, W3-III*
Session W3:
4:30 pm - 6:00 pm

W3-I:  Infrastructure Protection and Cyber Security

Host Based Intrusion Detection using Machine Learning (LP)

Robert Moskovitch, Ido Gus, Shay Pluderman, Dima Stopel, Yisrael Parmet, Yuval Shahar and Yuval Elovici

MCA2CM: Multimedia Context-Aware Access Control Model (LP)

Bechara Al Bouna, Richard Chebir and Johel Miteran


Surface Transportation and Cyber-Infrastructure: An Exploratory Study (SP)

Sangmi Chai, Raj Sharman, Smitha Patil, Shruta Satam, Raghav Rao and Shambhu Upadhyaya


A Networking Identity Authentication Scheme Combining Fingerprint Coding and Identity Based Encryption (SP)

Liang Li, Jie Tian, Zhe Wu and Xin Yang

W3-II:  Emergency Response Systems and Applications

On-Demand Information Portals for Disaster Situations (LP)

Yiming Ma, Dmitri Kalashnikov, Sharad Mehrotra, Nalini Venkatasubramanian, Ram Hariharan, Naveen Ashish and Jay Lickfett


Design and Implementation of a Middleware for Sentient Spaces (SP)

Bijit Hore, Hojjat Jafarpour, Ramesh Jain, Shengyue Ji, Daniel Massaguer, Sharad Mehrotra, Nalini Venkatasubramanian and Utz Westermann


DOTS: Detection of Off-Topic Search via Result Clustering (LP)

Nazli Goharian and Alana Platt

 

W3-III: Deception Detection and Identity Management


An Investigation of Heuristics of Human Judgment in Detecting Deception and Potential Implications in Countering Social Engineering (LP)

Tiantian Qin and Judee Burgoon


Categorization of Blogs through Similarity Analysis (LP)

Hwan-Joon Choi and Mukkai Krishnamoorthy


Security Event Management System Based on Mobile Agent Technology (SP)

Wang Jing-Xin


Model Dynamic Propagation of Malicious Information Fabricated by Terrorists on the Internet (SP)

Zhengyou Xia

6:00 pm - 7:20 pm
Poster Session and Reception
7:20 pm - 7:30 pm
Awards ceremony

May 24, 2007
 Thursday (Day Two)

A
B
C
7:00 am - 8:00 am
Registration and Continental Breakfast
8:00am - 8:15am
Conference Announcements
8:15 am - 9:00 am
Keynote Address: John O. Brennan, President and CEO, The Analysis Corporation, "Technology Analysis and Policy in Countering Terrorism"
9:00am - 10:00am

Track III Plenary Panel: Future Directions in Terrorism & Counterterrorism Informatics
Moderator: Bob Ross, Chief, Risk Sciences Branch, Office of Special Programs, Science and Technology Directorate, DHS

Panelists:
Richard Adler, President, DecisionPath, Inc.
Leslie W. Kennedy, Dean, Rutgers School of Criminal Justice, Rutgers University, Newark, NJ

Major John Hunt,
Commanding Officer, New Jersey State Police Homeland Security Branch - Special Operations Section

Joshua Sinai, Program Manager, Terrorism and Counterterrorism Studies, The Analysis Corporation
Captain Cristopher Simmermon, Commanding Officer, Marine Services Bureau, New Jersey State Police Homeland Security Branch - Special Operations Section
Michael Smith, Senior Master Sergeant, USAF Reserves (Retired)  
William Stryker, Chief, Office of Intelligence Analysis, DHS

10:00 am - 10:30 am

 Break

10:30 am - 12:00 pm
Sessions T1-I, T2-II, T1-III*
Session T1: 
10:30 am - 12:00 pm

T1-I:  Infrastructure  Protection and Sensor Networks

A SOC Framework for ISP Federation and Attack Forecast by Learning Propagation Patterns (LP)

Keisuke Takemori, Yutaka Miyake, Chie Ishida and Iwao Sasase


Detection of Port and Network Scan Using Time Independent Feature Set (LP)

Habib Ullah Baig


Optimizing Sensor Placement for Intruder Detection with Genetic Algorithms (SP)

Samuel Barrett


Social Behavior in a Team of Autonomous Sensors (SP)

Yasuaki Sakamoto and Jeffrey Nickerson

T1-II: Social Network Analysis and Knowledge Discovery

SIGHTS: A Software System for Finding Coalitions and Leaders in a Social Network (LP)

Jeffrey Baumes, Mark Goldberg, Mykola Hayvanovych, Stephen Kelley, Malik Magdon-Ismail, Konstantin Mertsalov and William Wallace

Media Strategy (and its Absence) in Asymmetric Conflict: The 2006 Israel-Lebanon War (SP)

Don Radlauer

An LDA-based Community Structure Discovery Approach for Large-Scale Social Networks (LP)

Haizheng Zhang, Baojun Qiu, Lee Giles, Henry Foley and John Yen


Privacy-Oriented Electronic Surveys (SP)

Justin Zhan

T1-III:  Enabling Knowledge Discovery Techniques

Detecting Anomalies in Graphs (LP)

David Skillicorn


Addressing Accuracy Issues in Privacy Preserving Data Mining through Matrix Factorization (SP)

Jie Wang, Jun Zhang and Weijun Zhong


Fast Fourier Transform Based Data Perturbation Method for Privacy Protection (SP)

Shuting Xu and Shuhua Lai

Inferring Meaning and Intent of Discovered Data Sources (SP)

Wayne L. Bethea, R. Scott Cost, Paul A. Frank and Frank B. Weiskopf

12:00 pm - 1:30 pm
Lunch
1:30 pm - 3:00 pm
Sessions T2-I, T2-II, T2-III*
Session T2:  1:30 pm - 3:00 pm

T2-I:  Identity Management and Cyber Security

The Arizona IDMatcher: A Probabilistic Identity Matching System (LP)

G. Alan Wang, Siddharth Kaza, Shailesh Joshi, Kris Chang, Homa Atabakhsh and Hsinchun Chen


Mining Higher-Order Association Rules from Distributed Named Entity Databases (LP)

Shenzhi Li, Christopher Janneck, Aditya Belapurkar, Murat Ganiz, Xiaoning Yang, Mark Dilsizian, Tianhao Wu, John Bright and William Pottenger


Managing Security Threats and Vulnerabilities for Small to Medium Enterprises (SP)

Cyril Onwubiko and Andrew Lenaghan


A Secure Email System Based on Fingerprint Authentication Scheme (SP)

Zhe Wu, Jie Tian, Liang Li and Xin Yang 

T2-II:   Geo-spatial Data Analysis and Text Mining

Geospatial Data Mining for National Security: Land Cover Classification and Semantic Grouping (LP)

Chuanjun Li, L. Khan, B. Thuraisingham, M. Husain, S. Chen and F. Qiu


Recursive algorithm of river and basin data model based on composite design pattern (LP)

Hyung Moo Kim and Jae Soo Yoo



Visualization of Events in a Spatially and Multimedia Enriched Virtual Environment (SP)

Leonidas Deligiannidis, Farshad Hakimpour and Amit Sheth

Making Sense of VAST Data (SP)

Summer Adams and Ashok K. Goel

 

T2-III: Terrorism Informatics and Countermeasures

Knowledge Reachback for WMD Events (LP)

Steven R. Haynes and Jonathan A. Singel

 
Affect Intensity Analysis of Dark Web Forums (LP)

Ahmed Abbasi and Hsinchun Chen

On the Communication Complexity of Privacy-Preserving Information Sharing (LP)

Nan Zhang

3:00 pm - 4:30 pm
Sessions T3-I, T3-II, T3-III*
Session T3: 
3:00 pm - 4:30 pm

T3-I: Link Analysis and Text Mining

Semantically Ranked Graph Pattern Queries for Link Analysis (LP)

Dawit Seid and Sharad Mehrotra


An Efficient Algorithm for Content Security Filtering Based on Double-Byte (LP)

Yanping Zhao and Wei Lu

 
FACT: Fast Algorithm for Categorizing Text (LP)

Saket Mengle, Nazli Goharian and Alana Platt

 

T3-II: Data Mining for Security Applications


Association Rule Mining for Suspicious Email Detection: A Data Mining Approach (LP)

Appavu Balamurugan


Fast Private Association Rule Mining by A Protocol for Securely Sharing Distributed Data (LP)

Vladimir Estivill-Castro and Ahmed HajYasien

 
Using Homomorphic Encryption and Digital Envelope Techniques for Privacy Preserving Collaborative Sequential Pattern Mining (SP)

Justin Zhan


Connecting the Dots: Revealing the Invisible Hand for Sharing Information (SP)

David Sulek, Howarth McClain and Virginia Ruebensaal

 

T3-III: Terrorism Informatics

Interaction Coherence Analysis for Dark Web Forums (LP)

Tianjun Fu, Ahmed Abbasi and Hsinchun Chen


A Bayesian, Nonlinear Particle Filtering Approach for Tracking the State of Terrorist Operations (LP)

Gregory Godfrey, Tuan Tran and John Cunningham


A Combinatorial Approach to Measuring Anonymity

Matthew Edman, Fikret Sivrikaya and Bulent Yener

4:30 pm - 5:00 pm
Break
5:00pm - 6:00pm

Closing Panel: The S&T Value of Operational Field Experiments (OFEs)
Moderator: Paul Kantor, Director, Center for Interdisciplinary Studies in Information Privacy and Security, Rutgers University

Panelists:

Arthur H. Becker, Knowledge Discovery and Dissemination Program Manager, Department of Defense.

Sid Dalal, Center for Discrete Mathematics and Theoretical Computer Science, (formerly Vice-President, Imaging & Services Technology Center, Xerox)

Harold Neal, New Jersey Office of Homeland Security and Preparedness

*   Each session period consists of three parallel sessions (I, II, and III)
*   Short papers (SP) are of 20 minutes duration
*   Long papers (LP) are of 25 minutes duration

*  The first presenter in each session is asked to serve as that session's chair, unless otherwise arranged.

Posters

Making Sense of VAST Data; Summer Adams, Ashok K. Goel

A Dynamic Social Network Software Platform for Counter-Terrorism Decision Support; Richard M. Adler

Text Extraction of Spatial and Temporal Information; Antonio Badia, Tulay Muezzinoglu, Jothi Ravishankar

Optimizing Sensor Placement for Intruder Detection with Genetic Algorithms; Samuel Barrett

Relationally Mapping XML Queries For Scalable XML Search; Rebecca Cathey; Steven M. Beitzel, Eric C. Jensen, David Grossman, Ophir Frieder

Profiling and Visualizing Cyber-criminal Activities: A General Framework; Wingyan Chung, G. Alan Wang

Fast Private Association Rule Mining by A Protocol for Securely Sharing Distributed Data; Vladdimir Estivill-Castro, Ahmed Hajyasien

A Bayesian, Nonlinear Particle Filtering Approach for Tracking the State of Terrorist Operations; Greg Godfrey

Detection of Off-Topic Search via Result Clustering; Nazli Goharian, Alana Platt

Short Query Sequences in Misuse Detection; Nazli Goharian, Alana Platt

Optimization of Multi-Attribute Tasks for Underwater Motion of Robotic Sensor Agents; Irina Goldman, Samuel Barrett, Jeffrey V. Nickerson

Knowledge Reachback for WMD Events; Steven Haynes, Jonathan Singel

Dependence Centrality: Identifying Dependence of Nodes in Terrorist Networs; David L. Hicks, Nasrullah Memon, Henrik Legind Larsen

A Framework for an Adaptive Intrusion Detection System using Bayesian Network, Farah Jemili, Montaceur Zaghdoud, Mohamed Ben Ahmed

Periodicity and Application for a kind of n-dimensional Arnold-type Transformation; Wang Jizhi, Wang Yinglong, Wang Meiqin

Protecting Location Privacy with Dynamic Mac Address Exchanging in Wireless Networks; Ming Lei, ZiJie Qi, Xiaoyan Hong, Susan V. Vrbsky

A Networking Identity Authentication Scheme Combining Fingerprint Coding and Identity Based Encryption; Liang Li, Wei-Qiang Jiang, Jie Tian, Yi-Xian Yang, Cai-Ping Jiang, Zhe Wu, Xin Yang, Justin Zhan

Emergency Management in Australia, New Zealand and Europe ? The 2006 EMANZE Survey; Andreas Meissner

FACT: Fast Algorithm for Categorizing Text; Saket Mengle, Nazli Goharian, Alana Platt

SIGHTS: A Software System for Finding Coalitions and Leaders in a Social Network; Konstantin Mertsalov, J. Baumes, M. Goldberg, M. Hayvanovych, S. Kelley, M. Magdon-Ismail, W. Wallace

Sequential Decision Making Algorithms for Port of Entry Inspection: Overcoming Computational Challenges; Sushil Mittal, David Madigan, Fred Roberts

Ontology Based Analysis of Violent Events; Pinar Oezden Wennerberg

Managing Security Threats and Vulnerabilities for Small and Medium Enterprises; Cyril Onwubiko, Andrew Lenaghan

Simulating Threats Propagation within the NSP Infrastructure; Rami Puzis, Meytal Tubi, Gil Tahan, Yuval Elovici

Social Behavior in a Team of Autonomous Sensors; Yasuaki Sakamoto, Jeffrey V. Nickerson

A Layered Dempster-Shafer Approach to Scenario Construction and Analysis; Antonio Sanfilippo, Bob Baddeley, Christian Posse, Paul Whitney

Environmental Impacts on Underwater Surveillance System in Estuary Areas; Hongyuan Shi, Dov Kruger, Jeffrey V. Nickerson

Detecting Anomalies in Graphs, David Skillicorn

A SOC Framework for ISP Federation and Attack Forecast by Learning Propagation Patterns; Keisuke Takemori, Yutaka Miyake, Chie Ishida, Iwao Sasase

Distributed Web Police: A Peer-to-Peer Approach to Collaborative Copy Detection; Jenq-Haur Wang, Hung-Chi Chang

Addressing Accuracy Issues in Privacy Preserving Data Mining through Matrix Factorization; Jie Wang, Jun Zhang, Weijun Zhong

A Secure Email System Based on Fingerprint Authentication Scheme; Zhe Wu, Jie Tian, Liang Li, Cai-ping Jiang, Xin Yang

Importance of Information Collection and Dissemination for Evacuation Modeling and Management; Anil Yazici, Kaan Ozbay

Medical Ontology-Enhanced Text Processing for Infectious Disease Informatics; Daniel Zeng, Hsin-Min Lu, Hsinchun Chen

On the Communication Complexity of Privacy-Preserving Information Sharing Protocols; Nan Zhang

 

ISI 2007 Message 

In the past few years, intelligence and security informatics (ISI) research, which is concerned with the study of the development and use of advanced information technologies and systems for national and international security-related applications, has experienced tremendous growth and attracted substantial interest from academic researchers in related fields as well as practitioners from both government agencies and industry. The ISI community is maturing, and a core set of research methodologies and technical approaches has emerged and is becoming the underpinning of ISI research. 

The first two meetings (ISI 2003 and ISI 2004) in the ISI symposium and conference series were held in Tucson, Arizona. With sponsorship by the IEEE Intelligent Transportation Systems Society, ISI 2005 was held in Atlanta, Georgia. Building on the momentum of these ISI meetings, we held ISI 2006 in San Diego, California. In addition to the established and emerging ISI technical research topics, ISI 2006 continued a track on terrorism informatics, which is a new stream of terrorism research leveraging the latest advances in social science methodologies, and information technologies and tools. 

This year, in New Brunswick, New Jersey, hosted by Rutgers University and several centers there, the conference is pleased to return to its originating focus which is to establish and strengthen links between researchers and practitioners. We have three main tracks this year. Port security and infrastructure protection is motivated by the central location of New Jersey on major land and sea traffic routes. Emergency response systems and decision making is an issue of growing importance which includes preparation not only for threats initiated by groups or individuals but also for response to natural problems such as floods and epidemics. And, since many threats in the modern world do originate with the activities of terrorists, we are continuing the track on terrorism and countermeasures, in the recognition that the best way to respond to terrorist attacks is to prevent them from the outset.  

Our keynote address on the first day will be given by Mr. Steve Nixon Deputy Director for Science and Technology at the Office of the Director of National Intelligence. The Terrorism Informatics track provides the theme for the keynote address on the second day by Mr. John Brennan, formerly with the CIA. The kick-off panel for the Port Security track will feature presentations by terminal managers and Coast Guard and Port Authority experts. That for the Emergency Response track will feature presentations by experts from the New York City Fire Department, the Environmental Protection Agency, universities, and the private sector. The panel for the Terrorism and Counter-terrorism track will include experts from DHS, criminal justice, and private sector organizations dealing with counter-terrorism. The program itself features exciting sessions on: Port Security and Infrastructure Protection; Emergency Response Systems and Decision-Making; Terrorism Informatics and Countermeasures; Social Network Analysis in Security Applications; Terrorism Informatics and Countermeasures; Infrastructure Protection and Cyber Security; Preparedness for and Response to High-Consequence Events; Deception Detection and Identity Management; Infrastructure Protection and Sensor Networks; Identity Management and Cyber Security; Link Analysis and Text Mining and Data Mining for Security Applications. We close the workshop with an exciting Sponsors Plenary Panel: The S&T Value of Operational Field Experiments. 

ISI 2007, to be held at Rutgers University in New Brunswick, New Jersey, is sponsored by IEEE Intelligent Transportation Systems Society with a technical co-sponsorship from the IEEE Systems, Man, & Cybernetics Society. Locally it is supported by the DIMACS Center for Discrete Mathematics and Theoretical Computer Science, the DIMACS-CAIT Laboratory for Port Security (LPS), the Rutgers ISIPS Center for Interdisciplinary Studies in Information Privacy and Security, and the Department of Homeland Security Center of Excellence for Dynamic Data Analysis (DyDAn), headquartered at DIMACS-Rutgers. 

We wish to express our gratitude to all members of the ISI 2007 Program Committee and additional reviewers who provided constructive review comments, and especially the Program Chairs, Tayfur Altiok, Benjamin Melamed Gheorghe Muresan and Daniel Zeng. We would also like to thank Feiyue Wang and Umit Ozguner of the IEEE. We wish to thank Art Becker, Larry Brandt, and Steve Dennis for their continued support of the ISI series and other related ISI research. Our special thanks go to Sarah Donnelly and the DIMACS staff for local support and the IEEE editorial and production staff for their support of the ISI conference series.  

Program Chairs:
Hsinchun Chen
Paul Kantor
Fred Roberts