117 results on '"Kantor P"'
Search Results
2. Studying Children in Context: Theories, Methods, and Ethics.
- Author
-
Graue, M. Elizabeth, Walsh, Daniel J., Ceglowski, Deborah, Dyson, Anne Hass, Fernie, David E., Kantor, Rebecca, Leavitt, Robin Lynn, Miller, Peggy J., Ting, Hsueh-Yin, Graue, M. Elizabeth, Walsh, Daniel J., Ceglowski, Deborah, Dyson, Anne Hass, Fernie, David E., Kantor, Rebecca, Leavitt, Robin Lynn, Miller, Peggy J., and Ting, Hsueh-Yin
- Abstract
Studying or finding out about children is exceptionally difficult--intellectually, physically, and emotionally. Physical, social, cognitive, and political distances between adult and the child make their relationship very different from the relationships among adults. This book explains the art and science of doing qualitative research involving children. Six themes run through the book: the importance of finding out in context; the situated nature of the research process; the centrality of social interaction; the social nature of research; the centrality of the children; and the situatedness of the methods. The chapters of the book are: (1) "The Child as Object"; (2) "Interpretive Science"; (3) "Theory as Context"; (4) "Ethics: Being Fair"; (5) "Researcher Role as Context"; (6)"Generating Data"; (7) "Constructing a Data Record"; (8) "Interpretation in Context"; and (9) "Writing as Context." The final chapter discusses issues of institutional and market constraints, and validity. Chapters 3, 4, 5, and 7-9 include case studies. Contains 161 references. (HTH)
- Published
- 1998
3. Constricted Terrain: Jonathan Kozol, the Left, and the Possibilities of Educational Reform.
- Author
-
Lowe, Robert, Kantor, Harvey, Lowe, Robert, and Kantor, Harvey
- Abstract
Kozol's books examine how public schools perpetuate racial injustice, noting ethical abdication by the affluent in violation of children's innocence and capability by urban schools. Schools fail children by deforming the spirit of the poor and soothing the conscience of the rich. Kozol demands greater resources for poor students. (SM)
- Published
- 1993
4. The Adaptive Network Library Interface: A Historical Overview and Interim Report.
- Author
-
Kantor, Paul B.
- Abstract
Describes the development of the Adaptive Network Library Interface (ANLI), an interactive computer program that acts as an interface between the users of an online card catalog and the catalog itself. Highlights include historical background; hypertext and the ANLI; neuronal nets and von Neumann computer architectures; and future possibilities. (Contains eight references.) (LRW)
- Published
- 1993
5. Decision Making with Barely Any Information: The Role of Mixed Strategies
- Author
-
Kantor, P. B., primary and Kantor, M. J., additional
- Published
- 1988
- Full Text
- View/download PDF
6. Question Answering as Dialogue with Data.
- Author
-
Strzalkowski, Tomek, Harabagiu, Sanda, Small, Sharon, Hardy, Hilda, Kantor, Paul, Min, Wu, Ryan, Sean, Shimizu, Nobuyuki, Ting, Liu, Wacholder, Nina, and Yamrom, Boris
- Published
- 2006
- Full Text
- View/download PDF
7. Distributed Search and Rescue with Robot and Sensor Teams.
- Author
-
Yuta, Shin'ichi, Asama, Hajima, Prassler, Erwin, Tsubouchi, Takashi, Thrun, Sebastian, Kantor, George, Singh, Sanjiv, Peterson, Ronald, Rus, Daniela, Das, Aveek, Kumar, Vijay, Pereira, Guilherme, and Spletzer, John
- Abstract
We develop a network of distributed mobile sensor systems as a solution to the emergency response problem. The mobile sensors are inside a building and they form a connected ad-hoc network. We discuss cooperative localization algorithms for these nodes. The sensors collect temperature data and run a distributed algorithm to assemble a temperature gradient. The mobile nodes are controlled to navigate using this temperature gradient. We also discuss how such networks can assist human users to find an exit. We have conducted an experiment at a facility used to train firefighters in order to understand the environment and to test component technology. Results from experiments at this facility as well as simulations are presented here. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
8. Imaging Intramyocardial Microcirculatory Function Using Fast Computed Tomography.
- Author
-
Cannon, Christopher P., Schoepf, U. Joseph, Möhlenkamp, Stefan, Schmermund, Axel, Kantor, Birgit, Erbel, Raimund, and Ritman, Erik L.
- Abstract
Coronary arterial disease is currently diagnosed and treated primarily on the basis of its impact on the large-diameter epicardial arteries. A structural change, usually a localized narrowing (stenosis) of a coronary artery lumen, is generally detected and quantitated by selective coronary angiography. However, by the time the epicardial artery stenosis results in reduced epicardial flow and the patient becomes symptomatic, it is generally too late to arrest (much less reverse) the disease process in that artery. Therefore, a noninvasive test that identifies presymptomatic, subclinical disease should result in initiation of therapy at a time when the disease process is still reversible. Causal risk factors—i.e., dyslipidemia, arterial hypertension, diabetes mellitus, and smoking—are responsible for the majority of coronary artery disease cases, and risk-factor modification in high-risk asymptomatic individuals has been shown to improve outcome (1). Early risk stratification, aggressive preventive counseling, and therapy in high-risk subjects is therefore recommended (2,3). However, limited economic resourses warrant careful patient selection and appropriate therapeutic aggressiveness. Hence, any imaging tool for this purpose is required (1) to allow identification and quantification of early disease, and (2) to be sensitive enough to ascertain therapeutic efficacy over time to justify continuation or modification of the initiated therapy. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
9. Filtering, Fusion and Dynamic Information Presentation: Towards a General Information Firewall.
- Author
-
Kantor, Paul, Muresan, Gheorghe, Roberts, Fred, Zeng, Daniel D., Wang, Fei-Yue, Chen, Hsinchun, Merkle, Ralph C., Conti, Gregory, Ahamad, Mustaque, and Norback, Robert
- Abstract
Intelligence analysts are flooded with massive amounts of data from a multitude of sources and in many formats. From this raw data they attempt to gain insight that will provide decision makers with the right information at the right time. Data quality varies from very high quality data generated by reputable sources to misleading and very low quality data generated by malicious entities. Disparate organizations and databases, global collection networks and international language differences further hamper the analyst's job. We present a web based information firewall to help counter these problems. It allows analysts to collaboratively customize web content by the creation and sharing of dynamic knowledge-based user interfaces that greatly improve data quality, and hence analyst effectiveness, through filtering, fusion and dynamic transformation techniques. Our results indicate that this approach is not only effective, but will scale to support large entities within the Intelligence Community. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
10. The Application of PROACT® RCA to Terrorism/Counter Terrorism Related Events.
- Author
-
Kantor, Paul, Muresan, Gheorghe, Roberts, Fred, Zeng, Daniel D., Wang, Fei-Yue, Chen, Hsinchun, Merkle, Ralph C., and Latino, Robert J.
- Abstract
Field proven Root Cause Analysis (RCA) from the industrial sector can assist the terrorism community in decompiling terrorist acts to further understand the mentalities that trigger such events to escalate. RCA is a disciplined thought process that is not specific to any industry or given situation, but specific to the human being. We will focus on how to logically breakdown a seemly complex event into it more manageable sub-components. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
11. The Qualitative Challenge of Insurgency Informatics.
- Author
-
Kantor, Paul, Muresan, Gheorghe, Roberts, Fred, Zeng, Daniel D., Wang, Fei-Yue, Chen, Hsinchun, Merkle, Ralph C., and Tousley, Scott
- Abstract
Terrorism and insurgency analysis depends critically on qualitative understanding, to ensure that quantitative work is on target. Key concerns include: qualitative analysis distorted by policy expectation, obstructed by compartmentalization and classification, and mistaken when drawing from the wrong history and experience. Open presentation of analytic processes allows more effective judgment of the credibility of analysis and interpretations. Data itself will not be the problem, but rather the constructs and methodologies used to assemble the data into conclusions. These challenges are at the heart of terrorist informatics. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
12. Forecasting Terrorist Groups' Warfare: ‘Conventional' to CBRN.
- Author
-
Kantor, Paul, Muresan, Gheorghe, Roberts, Fred, Zeng, Daniel D., Wang, Fei-Yue, Chen, Hsinchun, Merkle, Ralph C., and Sinai, Joshua
- Abstract
To assess the type or spectrum of warfare that a terrorist group is likely to conduct in its operations, this paper proposes an indications and warning (I&W) methodology to comprehensively and systematically map all the significant indicators (as well as sub-indicators and observables) that need to be examined. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
13. Forecasting Terrorism: Indicators and Proven Analytic Techniques.
- Author
-
Kantor, Paul, Muresan, Gheorghe, Roberts, Fred, Zeng, Daniel D., Wang, Fei-Yue, Chen, Hsinchun, Merkle, Ralph C., and Khalsa, Sundri K.
- Abstract
This forecasting methodology identifies 68 indicators of terrorism and employs proven analytic techniques in a systematic process that safeguards against 36 of the 42 common warning pitfalls that experts have identified throughout history. The complete version of this research provides: 1) a step-by-step explanation of how to forecast terrorism, 2) an evaluation of the forecasting system against the 42 common warning pitfalls that have caused warning failures in the past, and 3) recommendations for implementation. The associated CD has the website interface to this methodology to forecast terrorist attacks. This methodology could be applied to any intelligence topic (not just terrorism) by simply changing the list of indicators. The complete version of this research is available in Forecasting Terrorism: Indicators and Proven Analytic Techniques, Scarecrow Press, Inc., ISBN 0-8108-5017-6. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
14. A Secured Mobile Phone Based on Embedded Fingerprint Recognition Systems.
- Author
-
Kantor, Paul, Muresan, Gheorghe, Roberts, Fred, Zeng, Daniel D., Fei-Yue Wang, Hsinchun Chen, Merkle, Ralph C., Xinjian Chen, Jie Tian, Qi Su, Xin Yang, and Fei Yue Wang
- Abstract
This paper presents a prototype design and implementation of secured mobile phones based on embedded fingerprint recognition systems. One is a front-end fingerprint capture sub-system and the other is a back-end fingerprint recognition system based on smart phones. The fingerprint capture sub-system is an external module which contains two parts: an ARM-Core processor LPC2106 and an Atmel Finger Sensor AT77C101B. The LPC2106 processor controls the AT77C101B sensor to capture the fingerprint image. In the fingerprint recognition system, a new fingerprint verification algorithm was implemented on internal hardwares. The performance of the proposed system, with 4.16% equal error rate (EER) was examined on Atmel fingerprints database. The average computation time on a 13 MHz CPU S1C33 (by Epson) is about 5.0 sec. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
15. Connections in the World of International Terrorism.
- Author
-
Kantor, Paul, Muresan, Gheorghe, Roberts, Fred, Zeng, Daniel D., Wang, Fei-Yue, Chen, Hsinchun, Merkle, Ralph C., and Shahar, Yael
- Abstract
This paper gives an introduction to an ambitious database project currently running at the International Policy Institute for Counter-Terrorism. The project builds on an extensive database of terrorist incidents dating back to 1968 and adds both content and functionality to make these databases more accessible to researchers. The information on terrorist incidents has been supplemented with information on the organizations responsible, the individual perpetrators, front companies, and monetary sources. The content now being added to the database includes raw historical data from interviews and court documents. This information can provide valuable sociological data for researchers, including how perpetrators were recruited for each attack; their stated motivation; their socio-economic background; what influenced them to join the terrorist organization; etc. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
16. Performance Study of a Compiler/Hardware Approach to Embedded Systems Security.
- Author
-
Kantor, Paul, Muresan, Gheorghe, Roberts, Fred, Zeng, Daniel D., Wang, Fei-Yue, Chen, Hsinchun, Merkle, Ralph C., Mohan, Kripashankar, Narahari, Bhagirath, Simha, Rahul, Ott, Paul, Choudhary, Alok, and Zambreno, Joseph
- Abstract
Trusted software execution, prevention of code and data tampering, authentication, and providing a secure environment for software are some of the most important security challenges in the design of embedded systems. This short paper evaluates the performance of a hardware/software co-design methodology for embedded software protection. Secure software is created using a secure compiler that inserts hidden codes into the executable code which are then validated dynamically during execution by a reconfigurable hardware component constructed from Field Programmable Gate Array (FPGA) technology. While the overall approach has been described in other papers, this paper focuses on security-performance tradeoffs and the effect of using compiler optimizations in such an approach. Our results show that the approach provides software protection with modest performance penalty and hardware overhead. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
17. Computational Tool in Infrastructure Emergency Total Evacuation Analysis.
- Author
-
Kantor, Paul, Muresan, Gheorghe, Roberts, Fred, Zeng, Daniel D., Fei-Yue Wang, Hsinchun Chen, Merkle, Ralph C., Wong, Kelvin H. L., and Mingchun Luo
- Abstract
Investigation has been made in the total evacuation of high profile infrastructures like airport terminal, super-highrise building, racecourse and tunnels. With the recent advancement of computer technologies, a number of evacuation modelling techniques has been developed to visualize the evacuation pattern and optimize the evacuation provisions. Computer simulations enable the integration of individual human factors like age, gender, percentage of crowd, mobility impairment, walking speed and patience level into evacuation model. Other behavioural factors like shortest distance, quickest time, adjacent movement and personal space can also be computed. The simulation results can be more realistic and reliable then the traditional hand calculations or code compliance design which cannot consider the actual performance and human factors. The simulation results can be used to characterize the efficiency of total evacuation and to maximize the life safety protection, which is a major concern by general public and authorities for high-profile infrastructures. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
18. CODESSEAL: Compiler/FPGA Approach to Secure Applications.
- Author
-
Kantor, Paul, Muresan, Gheorghe, Roberts, Fred, Zeng, Daniel D., Fei-Yue Wang, Hsinchun Chen, Merkle, Ralph C., Gelbart, Olga, Ott, Paul, Narahari, Bhagirath, Simha, Rahul, Choudhary, Alok, and Zambreno, Joseph
- Abstract
The science of security informatics has become a rapidly growing field involving different branches of computer science and information technologies. Software protection, particularly for security applications, has become an important area in computer security. This paper proposes a joint compiler/hardware infrastructure - CODESSEAL - for software protection for fully encrypted execution in which both program and data are in encrypted form in memory. The processor is supplemented with an FPGA-based secure hardware component that is capable of fast encryption and decryption, and performs code integrity verification, authentication, and provides protection of the execution control flow. This paper outlines the CODESSEAL approach, the architecture, and presents preliminary performance results. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
19. Biomonitoring, Phylogenetics and Anomaly Aggregation Systems.
- Author
-
Kantor, Paul, Muresan, Gheorghe, Roberts, Fred, Zeng, Daniel D., Fei-Yue Wang, Hsinchun Chen, Merkle, Ralph C., Stockwell, David R. B., and Wang, Jason T. L.
- Abstract
While some researchers have exploited the similarity between cyber attacks and epidemics we believe there is also potential to leverage considerable experience gained in other biological domains: phylogenetics, ecological niche modeling, and biomonitoring. Here we describe some new ideas for threat detection from biomonitoring, and approximate graph searching and matching for cross network aggregation. Generic anomaly aggregation systems using these methods could detect and model the inheritance and evolution of vulnerability and threats across multiple domains and time scales. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
20. Map-Mediated GeoCollaborative Crisis Management.
- Author
-
Kantor, Paul, Muresan, Gheorghe, Roberts, Fred, Zeng, Daniel D., Wang, Fei-Yue, Chen, Hsinchun, Merkle, Ralph C., Cai, Guoray, MacEachren, Alan M., Brewer, Isaac, McNeese, Mike, Sharma, Rajeev, and Fuhrmann, Sven
- Abstract
Managing crises requires collecting geographical intelligence and making spatial decisions through collaborative efforts among multiple, distributed agencies and task groups. Crisis management also requires close coordination among individuals and groups of individuals who need to collaboratively derive information from geospatial data and use that information in coordinated ways. However, geospatial information systems do not currently support group work and can not meet the information needs of crisis managers. This paper describes a group interface for geographical information system, featuring multimodal human input, conversational dialogues, and same-time, different place communications among teams. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
21. A Jackson Network-Based Model for Quantitative Analysis of Network Security.
- Author
-
Kantor, Paul, Muresan, Gheorghe, Roberts, Fred, Zeng, Daniel D., Fei-Yue Wang, Hsinchun Chen, Merkle, Ralph C., Zhengtao Xiang, Yufeng Chen, Wei Jian, and Fei Yan
- Abstract
It is important for trusted intranets to focus on network security as a whole with dynamic and formalized analysis. The qualitative and current quantitative methods have difficulties to reach the requirements. After analyzing the attacking process, a Jackson network-based model with absorbing states is proposed, where the absorbing states mean the attacks succeed or fail. We compute the steady-state joint probability distribution of network nodes, the mean time of attack data spent in network, and the probabilities from the network entry node to absorbing states. According to the analysis of the above measures, we analyze the relationship between network security and performance. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
22. Learning Classifiers for Misuse Detection Using a Bag of System Calls Representation.
- Author
-
Kantor, Paul, Muresan, Gheorghe, Roberts, Fred, Zeng, Daniel D., Fei-Yue Wang, Hsinchun Chen, Merkle, Ralph C., Dae-Ki Kang, Doug Fuller, and Honavar, Vasant
- Abstract
In this paper, we propose a "bag of system calls" representation for intrusion detection of system call sequences and describe misuse detection results with widely used machine learning techniques on University of New Mexico (UNM) and MIT Lincoln Lab (MIT LL) system call sequences with the proposed representation. With the feature representation as input, we compare the performance of several machine learning techniques and show experimental results. The results show that the machine learning techniques on simple "bag of system calls" representation of system call sequences is effective and often perform better than those approaches that use foreign contiguous subsequences for detecting intrusive behaviors of compromised processes. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
23. The Multi-fractal Nature of Worm and Normal Traffic at Individual Source Level.
- Author
-
Kantor, Paul, Muresan, Gheorghe, Roberts, Fred, Zeng, Daniel D., Wang, Fei-Yue, Chen, Hsinchun, Merkle, Ralph C., Chen, Yufeng, Dong, Yabo, Lu, Dongming, and Pan, Yunhe
- Abstract
Worms have been becoming a serious threat in web age because worms can cause huge loss due to the fast-spread property. To detect worms effectively, it is important to investigate the characteristics of worm traffic at individual source level. We model worm traffic with the multi-fractal process, and compare the multi-fractal property of worm and normal traffics at individual source level. The results show that the worm traffic possesses less multi-fractal property. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
24. Intrusion Detection System Using Sequence and Set Preserving Metric.
- Author
-
Kantor, Paul, Muresan, Gheorghe, Roberts, Fred, Zeng, Daniel D., Wang, Fei-Yue, Chen, Hsinchun, Merkle, Ralph C., Kumar, Pradeep, Rao, M. Venkateswara, Krishna, P. Radha, Bapi, Raju S., and Laha, Arijit
- Abstract
Intrusion detection systems rely on a wide variety of observable data to distinguish between legitimate and illegitimate activities. In this paper we investigate the use of sequences of system calls for classifying intrusions and faults induced by privileged processes in Unix Operating system. In our work we applied sequence-data mining approach in the context of intrusion detection system (IDS). This paper introduces a new similarity measure that considers both sequence as well as set similarity among sessions. Considering both order of occurrences as well as content in a session enhances the capabilities of kNN classifier significantly, especially in the context of intrusion detection. From our experiments on DARPA 1998 IDS dataset we infer that the order of occurrences plays a major role in determining the nature of the session. The objective of this work is to construct concise and accurate classifiers to detect anomalies based on sequence as well as set similarity. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
25. An Ontological Approach to the Document Access Problem of Insider Threat.
- Author
-
Kantor, Paul, Muresan, Gheorghe, Roberts, Fred, Zeng, Daniel D., Wang, Fei-Yue, Chen, Hsinchun, Merkle, Ralph C., Aleman-Meza, Boanerges, Burns, Phillip, Eavenson, Matthew, Palaniswami, Devanand, and Sheth, Amit
- Abstract
Verification of legitimate access of documents, which is one aspect of the umbrella of problems in the Insider Threat category, is a challenging problem. This paper describes the research and prototyping of a system that takes an ontological approach, and is primarily targeted for use by the intelligence community. Our approach utilizes the notion of semantic associations and their discovery among a collection of heterogeneous documents. We highlight our contributions in (graphically) capturing the scope of the investigation assignment of an intelligence analyst by referring to classes and relationships of an ontology; in computing a measure of the relevance of documents accessed by an analyst with respect to his/her assignment; and by describing the components of our system that have provided early yet promising results, and which will be further evaluated more extensively based on domain experts and sponsor inputs. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
26. Active Automation of the DITSCAP.
- Author
-
Kantor, Paul, Muresan, Gheorghe, Roberts, Fred, Zeng, Daniel D., Fei-Yue Wang, Hsinchun Chen, Merkle, Ralph C., Seok Won Lee, Gandhi, Robin A., Gail-Joon Ahn, and Yavagal, Deepak S.
- Abstract
The Defense Information Infrastructure (DII) connects Department of Defense (DoD) mission support, command and control, and intelligence computers and users through voice, data, imagery, video, and multimedia services, and provides information processing and value-added services. For such a critical infrastructure to effectively mitigate risk, optimize its security posture and evaluate its information assurance practices, we identify the need for a structured and comprehensive certification and accreditation (C&A) framework with appropriate tool support. In this paper, we present an active approach to provide effective tool support that automates the DoD Information Technology Security C&A Process (DITSCAP) for information networks in the DII. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
27. Detecting Deception in Synchronous Computer-Mediated Communication Using Speech Act Profiling.
- Author
-
Kantor, Paul, Muresan, Gheorghe, Roberts, Fred, Zeng, Daniel D., Fei-Yue Wang, Hsinchun Chen, Merkle, Ralph C., Twitchell, Douglas P., Forsgren, Nicole, Wiers, Karl, Burgoon, Judee K., and Nunmaker, Jay F.
- Abstract
Detecting deception is a complicated endeavor. Previous attempts at deception detection in computer-mediated communication have met with some success. This study shows how speech act profiling [1] can be used to aid deception detection in synchronous computer-mediated communication (S-CMC). Chat logs from an online group game where deception was introduced were subjected to speech act profiling analysis. The results provide some support to previous research showing greater uncertainty in deceptive S-CMC. Also shown is that deceivers in the specific task tend to engage in less strategizing than non-deceivers. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
28. Deception Across Cultures: Bottom-Up and Top-Down Approaches.
- Author
-
Kantor, Paul, Muresan, Gheorghe, Roberts, Fred, Zeng, Daniel D., Fei-Yue Wang, Hsinchun Chen, Merkle, Ralph C., Lina Zhou, and Lutterbie, Simon
- Abstract
This paper examines various approaches to analyzing differences in patterns of deception and how deception is evaluated across cultures. The approaches are divided into bottom-up approaches, which examine the foundations of culture and how they affect deception, and top-down approaches, which refer to models of deception and how their dynamics change across cultures. Considerations of the various approaches have led to a conclusion that the most comprehensive method for modeling deception across cultures would be to synthesize the two approaches, rather than consider them as opposing schools of thought. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
29. Data Distortion for Privacy Protection in a Terrorist Analysis System.
- Author
-
Kantor, Paul, Muresan, Gheorghe, Roberts, Fred, Zeng, Daniel D., Fei-Yue Wang, Hsinchun Chen, Merkle, Ralph C., Shuting Xu, Jun Zhang, Dianwei Han, and Jie Wang
- Abstract
Data distortion is a critical component to preserve privacy in security-related data mining applications, such as in data mining-based terrorist analysis systems. We propose a sparsified Singular Value Decomposition (SVD) method for data distortion. We also put forth a few metrics to measure the difference between the distorted dataset and the original dataset. Our experimental results using synthetic and real world datasets show that the sparsified SVD method works well in preserving privacy as well as maintaining utility of the datasets. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
30. A Survey of Software Watermarking.
- Author
-
Kantor, Paul, Muresan, Gheorghe, Roberts, Fred, Zeng, Daniel D., Hsinchun Chen, Merkle, Ralph C., Zhu, William, Thomborson, Clark, and Fei-Yue Wang
- Abstract
In the Internet age, software is one of the core components for the operation of network and it penetrates almost all aspects of industry, commerce, and daily life. Since digital documents and objects can be duplicated and distributed easily and economically cheaply and software is also a type of digital objects, software security and piracy becomes a more and more important issue. In order to prevent software from piracy and unauthorized modification, various techniques have been developed. Among them is software watermarking which protects software through embedding some secret information into software as an identifier of the ownership of copyright for this software. This paper gives a brief overview of software watermarking. It describes the taxonomy, attack models, and algorithms of software watermarking. Keyword: Software Security, Software Watermarking. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
31. Thematic Indicators Derived from World News Reports.
- Author
-
Kantor, Paul, Muresan, Gheorghe, Roberts, Fred, Zeng, Daniel D., Wang, Fei-Yue, Chen, Hsinchun, Merkle, Ralph C., Best, Clive, Goot, Erik, and Paola, Monica
- Abstract
A method for deriving statistical indicators from the Europe Media Monitor (EMM) is described. EMM monitors world news in real time from the Internet and various News Agencies. The new method measures the intensity of news reporting for any country concerning a particular theme. Two normalised indicators are defined for each theme (j) and for each country (c). The first (Icj) is a measure of the relative importance for a given theme to that country. The second (Ijc) is a measure of the relative importance placed on that country with respect to the given theme by the world's media. The method has then been applied to news articles processed by EMM for each day during August 2003. This month was characterized by a number of serious terrorist bomb attacks visible both in the EMM data and in the derived indicators. The calculated indicators for a selection of countries are presented. Their interpretation and possible biases in the data are discussed. The data are then applied to identify candidate countries for "forgotten conflicts". These are countries with high levels of conflict but poorly reported in the world's media. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
32. A Novel Watermarking Algorithm Based on SVD and Zernike Moments.
- Author
-
Kantor, Paul, Muresan, Gheorghe, Roberts, Fred, Zeng, Daniel D., Fei-Yue Wang, Hsinchun Chen, Merkle, Ralph C., Haifeng Li, Shuxun Wang, Weiwei Song, and Quan Wen
- Abstract
A robust image watermarking technique is proposed in this paper. The watermarked image is obtained by modifying the maximum singular value in each image block. The robustness of the proposed algorithm is achieved from two aspects: the stability of the maximum singular values and preprocessing before watermark extraction. Zernike moments are used to estimate the rotation angle, and the translation and scaling distortions are corrected by geometric moment methods. Experimental results show that this algorithm makes a trade-off among the imperceptibility, robustness and capacity. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
33. How Question Answering Technology Helps to Locate Malevolent Online Content.
- Author
-
Kantor, Paul, Muresan, Gheorghe, Roberts, Fred, Zeng, Daniel D., Wang, Fei-Yue, Chen, Hsinchun, Merkle, Ralph C., Roussinov, Dmitri, and Robles-Flores, Jose Antonio
- Abstract
The inherent lack of control over the Internet content resulted in proliferation of online material that can be potentially detrimental. For example, the infamous "Anarchist Cookbook" teaching how to make weapons, home made bombs, and poisons, keeps re-appearing in various places. Some websites teach how to break into computer networks to steal passwords and credit card information. Law enforcement, security experts, and public watchdogs started to locate, monitor, and act when such malevolent content surfaces on the Internet. Since the resources of law enforcement are limited, it may take some time before potentially malevolent content is located, enough for it to disseminate and cause harm. The only practical way for searching the content of the Internet, available for law enforcement, security experts, and public watchdogs is by using a search engine, such as Google, AOL, MSN, etc. We have suggested and empirically evaluated an alternative technology (automated question answering or QA) capable of locating potentially malevolent online content. We have implemented a proof-of-concept prototype that is capable of finding web pages that provide the answers to given questions (e.g. "How to build a pipe bomb?"). Using students as subjects in a controlled experiment, we have empirically established that our QA prototype finds web pages that are more likely to provide answers to given questions than simple keyword search using Google. This suggests that QA technology can be a good replacement or an addition to the traditional keyword searching for the task of locating malevolent online content and, possibly, for a more general task of interactive online information exploration. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
34. Information Supply Chain: A Unified Framework for Information-Sharing.
- Author
-
Kantor, Paul, Muresan, Gheorghe, Roberts, Fred, Zeng, Daniel D., Fei-Yue Wang, Hsinchun Chen, Merkle, Ralph C., Shuang Sun, and John Yen
- Abstract
To balance demand and supply of information, we propose a framework called "information supply chain" (ISC). This framework is based on supply chain management (SCM), which has been used in business management science. Both ISC and SCM aim to satisfy demand with high responsiveness and efficiency. ISC uses an information requirement planning (IRP) algorithm to reason, plan, and satisfy needers with useful information. We believe that ISC can not only unify existing information-sharing methods, but also produce new solutions that enable the right information to be delivered to the right recipients in the right way and at the right time. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
35. Evaluating an Infectious Disease Information Sharing and Analysis System.
- Author
-
Kantor, Paul, Muresan, Gheorghe, Roberts, Fred, Zeng, Daniel D., Fei-Yue Wang, Merkle, Ralph C., Paul Jen-Hwa Hu, Daniel Zeng, Hsinchun Chen, Larson, Catherine, Wei Chang, and Chunju Tseng
- Abstract
Infectious disease informatics is a subfield of security informatics that focuses on information analysis and management issues critical to the prevention, detection, and management of naturally occurring or terrorist-engineered infectious disease outbreaks. We have developed a research prototype called BioPortal which provides an integrated environment to support cross-jurisdictional and cross-species infectious disease information sharing, integration, analysis, and reporting. This paper reports a pilot study evaluating BioPortal's usability, user satisfaction, and potential impact on practice. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
36. Collecting and Analyzing the Presence of Terrorists on the Web: A Case Study of Jihad Websites.
- Author
-
Kantor, Paul, Muresan, Gheorghe, Roberts, Fred, Zeng, Daniel D., Fei-Yue Wang, Merkle, Ralph C., Reid, Edna, Jialun Qin, Yilu Zhou, Guanpi Lai, Sageman, Marc, Weimann, Gabriel, and Hsinchun Chen
- Abstract
The Internet which has enabled global businesses to flourish has become the very same channel for mushrooming ‘terrorist news networks.' Terrorist organizations and their sympathizers have found a cost-effective resource to advance their courses by posting high-impact Websites with short shelf-lives. Because of their evanescent nature, terrorism research communities require unrestrained access to digitally archived Websites to mine their contents and pursue various types of analyses. However, organizations that specialize in capturing, archiving, and analyzing Jihad terrorist Websites employ different, manualbased analyses techniques that are inefficient and not scalable. This study proposes the development of automated or semi-automated procedures and systematic methodologies for capturing Jihad terrorist Website data and its subsequent analyses. By analyzing the content of hyperlinked terrorist Websites and constructing visual social network maps, our study is able to generate an integrated approach to the study of Jihad terrorism, their network structure, component clusters, and cluster affinity. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
37. Some Marginal Learning Algorithms for Unsupervised Problems.
- Author
-
Kantor, Paul, Muresan, Gheorghe, Roberts, Fred, Zeng, Daniel D., Hsinchun Chen, Merkle, Ralph C., Qing Tao, Gao-Wei Wu, Fei-Yue Wang, and Jue Wang
- Abstract
In this paper, we investigate one-class and clustering problems by using statistical learning theory. To establish a universal framework, a unsupervised learning problem with predefined threshold η is formally described and the intuitive margin is introduced. Then, one-class and clustering problems are formulated as two specific η-unsupervised problems. By defining a specific hypothesis space in η-one-class problems, the crucial minimal sphere algorithm for regular one-class problems is proved to be a maximum margin algorithm. Furthermore, some new one-class and clustering marginal algorithms can be achieved in terms of different hypothesis spaces. Since the nature in SVMs is employed successfully, the proposed algorithms have robustness, flexibility and high performance. Since the parameters in SVMs are interpretable, our unsupervised learning framework is clear and natural. To verify the reasonability of our formulation, some synthetic and real experiments are conducted. They demonstrate that the proposed framework is not only of theoretical interest, but they also has a legitimate place in the family of practical unsupervised learning techniques. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
38. LSI-Based Taxonomy Generation: The Taxonomist System.
- Author
-
Kantor, Paul, Muresan, Gheorghe, Roberts, Fred, Zeng, Daniel D., Wang, Fei-Yue, Chen, Hsinchun, Merkle, Ralph C., and Wnek, Janusz
- Abstract
The following presents a method for constructing taxonomies by utilizing the Latent Semantic Indexing (LSI) technique. The LSI technique enables representation of textual data in a vector space, facilitates access to all documents and terms by contextual queries, and allows for text comparisons. A taxonomy generator downloads collection of documents, creates document clusters, assigns titles to clusters, and organizes the clusters in a hierarchy. The nodes in the hierarchy are ordered from general to specific in the depth of the hierarchy, and from most similar to least similar in the breadth of the hierarchy. This method is capable of producing meaningful classifications in a short time. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
39. Leveraging One-Class SVM and Semantic Analysis to Detect Anomalous Content.
- Author
-
Kantor, Paul, Muresan, Gheorghe, Roberts, Fred, Zeng, Daniel D., Fei-Yue Wang, Hsinchun Chen, Merkle, Ralph C., Yilmazel, Ozgur, Symonenko, Svetlana, Balasubramanian, Niranjan, and Liddy, Elizabeth D.
- Abstract
Experiments were conducted to test several hypotheses on methods for improving document classification for the malicious insider threat problem within the Intelligence Community. Bag-of-words (BOW) representations of documents were compared to Natural Language Processing (NLP) based representations in both the typical and one-class classification problems using the Support Vector Machine algorithm. Results show that the NLP features significantly improved classifier performance over the BOW approach both in terms of precision and recall, while using many fewer features. The one-class algorithm using NLP features demonstrated robustness when tested on new domains. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
40. Efficient Discovery of New Information in Large Text Databases.
- Author
-
Kantor, Paul, Muresan, Gheorghe, Roberts, Fred, Zeng, Daniel D., Fei-Yue Wang, Hsinchun Chen, Merkle, Ralph C., and Bradford, R. B.
- Abstract
Intelligence analysts are often faced with large data collections within which information relevant to their interests may be very sparse. Existing mechanisms for searching such data collections present difficulties even when the specific nature of the information being sought is known. Finding unknown information using these mechanisms is very inefficient. This paper presents an approach to this problem, based on iterative application of the technique of latent semantic indexing. In this approach, the body of existing knowledge on the analytic topic of interest is itself used as a query in discovering new relevant information. Performance of the approach is demonstrated on a collection of one million documents. The approach is shown to be highly efficient at discovering new information. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
41. Discovering Identity Problems: A Case Study.
- Author
-
Kantor, Paul, Muresan, Gheorghe, Roberts, Fred, Zeng, Daniel D., Wang, Fei-Yue, Merkle, Ralph C., Wang, Alan G., Atabakhsh, Homa, Petersen, Tim, and Chen, Hsinchun
- Abstract
Identity resolution is central to fighting against crime and terrorist activities in various ways. Current information systems and technologies deployed in law enforcement agencies are neither adequate nor effective for identity resolution. In this research we conducted a case study in a local police department on problems that produce difficulties in retrieving identity information. We found that more than half (55.5%) of the suspects had either a deceptive or an erroneous counterpart existing in the police system. About 30% of the suspects had used a false identity (i.e., intentional deception), while 42% had records alike due to various types of unintentional errors. We built a taxonomy of identity problems based on our findings. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
42. Analysis of Three Intrusion Detection System Benchmark Datasets Using Machine Learning Algorithms.
- Author
-
Kantor, Paul, Muresan, Gheorghe, Roberts, Fred, Zeng, Daniel D., Wang, Fei-Yue, Chen, Hsinchun, Merkle, Ralph C., Kayacık, H. Güneş, and Zincir-Heywood, Nur
- Abstract
In this paper, we employed two machine learning algorithms - namely, a clustering and a neural network algorithm - to analyze the network traffic recorded from three sources. Of the three sources, two of the traffic sources were synthetic, which means the traffic was generated in a controlled environment for intrusion detection benchmarking. The main objective of the analysis is to determine the differences between synthetic and real-world traffic, however the analysis methodology detailed in this paper can be employed for general network analysis purposes. Moreover the framework, which we employed to generate one of the two synthetic traffic sources, is briefly discussed. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
43. Testing a Rational Choice Model of Airline Hijackings.
- Author
-
Kantor, Paul, Muresan, Gheorghe, Roberts, Fred, Zeng, Daniel D., Wang, Fei-Yue, Chen, Hsinchun, Merkle, Ralph C., Dugan, Laura, LaFree, Gary, and Piquero, Alex R.
- Abstract
Using data that combines information from the Federal Aviation Administration, the RAND Corporation, and a newly developed database on global terrorist activity, we are able to examine trends in 1,101 attempted aerial hijackings that occurred around the world from 1931 to 2003. We have especially complete information for 828 hijackings that occurred before 1986. Using a rational choice theoretical framework, we employ econometric time-series methods to estimate the impact of several major counter hijacking interventions on the likelihood of differently motivated hijacking events and to model the predictors of successful hijackings. Some of the interventions examined use certainty-based strategies of target hardening to reduce the perceived likelihood of success while others focus on raising the perceived costs of hijacking by increasing the severity of punishment. We also assess which specific intervention strategies were most effective for deterring hijackers whose major purpose was terrorism related. We found support for the conclusion that new hijacking attempts were less likely to be undertaken when the certainty of apprehension was increased through metal detectors and law enforcement at passenger checkpoints. We also found that fewer hijackers attempted to divert airliners to Cuba once that country made it a crime to hijack flights. Our results support the contagion view that hijacking rates significantly increase after a series of hijackings closely-clustered in time. Finally, we found that policy interventions only significantly decrease the likelihood of non-terrorist-related hijackings. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
44. Mapping the Contemporary Terrorism Research Domain: Researchers, Publications, and Institutions Analysis.
- Author
-
Kantor, Paul, Muresan, Gheorghe, Roberts, Fred, Zeng, Daniel D., Wang, Fei-Yue, Merkle, Ralph C., Reid, Edna, and Chen, Hsinchun
- Abstract
The ability to map the contemporary terrorism research domain involves mining, analyzing, charting, and visualizing a research area according to experts, institutions, topics, publications, and social networks. As the increasing flood of new, diverse, and disorganized digital terrorism studies continues, the application of domain visualization techniques are increasingly critical for understanding the growth of scientific research, tracking the dynamics of the field, discovering potential new areas of research, and creating a big picture of the field's intellectual structure as well as challenges. In this paper, we present an overview of contemporary terrorism research by applying domain visualization techniques to the literature and author citation data from the years 1965 to 2003. The data were gathered from ten databases such as the ISI Web of Science then analyzed using an integrated knowledge mapping framework that includes selected techniques such as self-organizing map (SOM), content map analysis, and co-citation analysis. The analysis revealed (1) 42 key terrorism researchers and their institutional affiliations; (2) their influential publications; (3) a shift from focusing on terrorism as a low-intensity conflict to an emphasis on it as a strategic threat to world powers with increased focus on Osama Bin Laden; and (4) clusters of terrorism researchers who work in similar research areas as identified by co-citation and block-modeling maps. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
45. Measuring Success in Countering Terrorism: Problems and Pitfalls.
- Author
-
Kantor, Paul, Muresan, Gheorghe, Roberts, Fred, Zeng, Daniel D., Wang, Fei-Yue, Chen, Hsinchun, Merkle, Ralph C., and Probst, Peter S.
- Abstract
One of the major problems in Intelligence analysis and counter-terrorism research is the use or, more precisely, misuse of metrics as a means to measure success. Such quantification may be admirable and necessary when dealing with rocket motors or physical phenomena but can be self-defeating and unrealistic when dealing with people and human events which, after all, are the ultimate underpinnings of terrorism, insurgency and political instability. Human behavior is notoriously hard to predict and outcomes without historical perspective difficult to assess. Measures of success that are touted as useful and accurate so often in the real world prove to be little more than intellectual snake oil. Hard quantifiable data that is meaningful is hard to come by, and so we often willingly settle for data that are easily accessible and quantifiable, hoping that our extrapolations are sufficiently accurate to guide or assess a course of action or the conduct of a conflict. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
46. A Conceptual Model of Counterterrorist Operations.
- Author
-
Kantor, Paul, Muresan, Gheorghe, Roberts, Fred, Zeng, Daniel D., Fei-Yue Wang, Hsinchun Chen, Merkle, Ralph C., Davis, David, Frendak-Blume, Allison, Wheeler, Jennifer, Woodcock, Alexander E. R., and Worrell, III, Clarence
- Abstract
This paper describes the development of the Conceptual Model of Counter Terrorist Operations or the CMCTO. The CMCTO is a top down decomposition of the functions that are performed in the Counter Terrorist Domain. The models first decomposes the domain into Functions directed toward terrorists; Functions directed toward victims; and, Functions of support. Each of these functions is further decomposed to varying levels. The paper also includes a comprehensive review of the literature and of the process used. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
47. Analyzing Terrorist Networks: A Case Study of the Global Salafi Jihad Network.
- Author
-
Kantor, Paul, Muresan, Gheorghe, Roberts, Fred, Zeng, Daniel D., Fei-Yue Wang, Merkle, Ralph C., Jialun Qin, Xu, Jennifer J., Daning Hu, Sageman, Marc, and Hsinchun Chen
- Abstract
It is very important for us to understand the functions and structures of terrorist networks to win the battle against terror. However, previous studies of terrorist network structure have generated little actionable results. This is mainly due to the difficulty in collecting and accessing reliable data and the lack of advanced network analysis methodologies in the field. To address these problems, we employed several advance network analysis techniques ranging from social network analysis to Web structural mining on a Global Salafi Jihad network dataset collected through a large scale empirical study. Our study demonstrated the effectiveness and usefulness of advanced network techniques in terrorist network analysis domain. We also introduced the Web structural mining technique into the terrorist network analysis field which, to the best our knowledge, has never been used in this domain. More importantly, the results from our analysis provide not only insights for terrorism research community but also empirical implications that may help law-reinforcement, intelligence, and security communities to make our nation safer. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
48. A New Conceptual Framework to Resolve Terrorism's Root Causes.
- Author
-
Kantor, Paul, Muresan, Gheorghe, Roberts, Fred, Zeng, Daniel D., Wang, Fei-Yue, Chen, Hsinchun, Merkle, Ralph C., and Sinai, Joshua
- Abstract
To effectively resolve the violent challenges presented by terrorist groups to the security and well-being of their state adversaries, it is crucial to develop an appropriate understanding of all the root causes underlying such conflicts because terrorist insurgencies do not emerge in a political, socio-economic, religious or even psychological vacuum. It could be argued, in fact, that the root causes underlying an insurgency are the initial components driving the terrorist life cycle (TLC) and the terrorist attack cycle (TAC). The TLC refers to why and how terrorist groups are formed, led and organized, the nature of their grievances, motivations, strategies and demands vis-a-vis their adversaries, and the linkages that terrorist groups form with their supporting constituency. These components of the TLC, in turn, affect the TAC—a group's modus operandi, how they conduct the spectrum of operations, ranging from non-violent to violent activities, and their choice of weaponry and targeting. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
49. Selective Fusion for Speaker Verification in Surveillance.
- Author
-
Kantor, Paul, Muresan, Gheorghe, Roberts, Fred, Zeng, Daniel D., Wang, Fei-Yue, Chen, Hsinchun, Merkle, Ralph C., Solewicz, Yosef A., and Koppel, Moshe
- Abstract
This paper presents an improved speaker verification technique that is especially appropriate for surveillance scenarios. The main idea is a meta-learning scheme aimed at improving fusion of low- and high-level speech information. While some existing systems fuse several classifier outputs, the proposed method uses a selective fusion scheme that takes into account conveying channel, speaking style and speaker stress as estimated on the test utterance. Moreover, we show that simultaneously employing multi-resolution versions of regular classifiers boosts fusion performance. The proposed selective fusion method aided by multi-resolution classifiers decreases error rate by 30% over ordinary fusion. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
50. Modeling and Multiway Analysis of Chatroom Tensors.
- Author
-
Kantor, Paul, Muresan, Gheorghe, Roberts, Fred, Zeng, Daniel D., Wang, Fei-Yue, Chen, Hsinchun, Merkle, Ralph C., Acar, Evrim, Çamtepe, Seyit A., Krishnamoorthy, Mukkai S., and Yener, Bülent
- Abstract
This work identifies the limitations of n-way data analysis techniques in multidimensional stream data, such as Internet chatroom communications data, and establishes a link between data collection and performance of these techniques. Its contributions are twofold. First, it extends data analysis to multiple dimensions by constructing n-way data arrays known as high order tensors. Chatroom tensors are generated by a simulator which collects and models actual communication data. The accuracy of the model is determined by the Kolmogorov-Smirnov goodness-of-fit test which compares the simulation data with the observed (real) data. Second, a detailed computational comparison is performed to test several data analysis techniques including svd [1], and multiway techniques including Tucker1, Tucker3 [2], and Parafac [3]. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.