Long Papers.- Collusion Set Detection Through Outlier Discovery.- Digging in the Details: A Case Study in Network Data Mining.- Efficient Identification of Overlapping Communities.- Event-Driven Document Selection for Terrorism Information Extraction.- Link Analysis Tools for Intelligence and Counterterrorism.- Mining Candidate Viruses as Potential Bio-terrorism Weapons from Biomedical Literature.- Private Mining of Association Rules.- Design Principles of Coordinated Multi-incident Emergency Response Systems.- Multi-modal Biometrics with PKI Technologies for Border Control Applications.- Risk Management Using Behavior Based Bayesian Networks.- Sensitivity Analysis of an Attack Containment Model.- Toward a Target-Specific Method of Threat Assessment.- Incident and Casualty Databases as a Tool for Understanding Low-Intensity Conflicts.- Integrating Private Databases for Data Analysis.- Applying Authorship Analysis to Arabic Web Content.- Automatic Extraction of Deceptive Behavioral Cues from Video.- Automatically Determining an Anonymous Author’s Native Language.- A Cognitive Model for Alert Correlation in a Distributed Environment.- Beyond Keyword Filtering for Message and Conversation Detection.- Content-Based Detection of Terrorists Browsing the Web Using an Advanced Terror Detection System (ATDS).- Modeling and Multiway Analysis of Chatroom Tensors.- Selective Fusion for Speaker Verification in Surveillance.- A New Conceptual Framework to Resolve Terrorism’s Root Causes.- Analyzing Terrorist Networks: A Case Study of the Global Salafi Jihad Network.- A Conceptual Model of Counterterrorist Operations.- Measuring Success in Countering Terrorism: Problems and Pitfalls.- Mapping the Contemporary Terrorism Research Domain: Researchers, Publications, and Institutions Analysis.- Testing a Rational Choice Model of Airline Hijackings.- Short Papers.- Analysis of Three Intrusion Detection System Benchmark Datasets Using Machine Learning Algorithms.- Discovering Identity Problems: A Case Study.- Efficient Discovery of New Information in Large Text Databases.- Leveraging One-Class SVM and Semantic Analysis to Detect Anomalous Content.- LSI-Based Taxonomy Generation: The Taxonomist System.- Some Marginal Learning Algorithms for Unsupervised Problems.- Collecting and Analyzing the Presence of Terrorists on the Web: A Case Study of Jihad Websites.- Evaluating an Infectious Disease Information Sharing and Analysis System.- How Question Answering Technology Helps to Locate Malevolent Online Content.- Information Supply Chain: A Unified Framework for Information-Sharing.- Map-Mediated GeoCollaborative Crisis Management.- Thematic Indicators Derived from World News Reports.- A Novel Watermarking Algorithm Based on SVD and Zernike Moments.- A Survey of Software Watermarking.- Data Distortion for Privacy Protection in a Terrorist Analysis System.- Deception Across Cultures: Bottom-Up and Top-Down Approaches.- Detecting Deception in Synchronous Computer-Mediated Communication Using Speech Act Profiling.- Active Automation of the DITSCAP.- An Ontological Approach to the Document Access Problem of Insider Threat.- Filtering, Fusion and Dynamic Information Presentation: Towards a General Information Firewall.- Intrusion Detection System Using Sequence and Set Preserving Metric.- The Multi-fractal Nature of Worm and Normal Traffic at Individual Source Level.- Learning Classifiers for Misuse Detection Using a Bag of System Calls Representation.- A Jackson Network-Based Model for Quantitative Analysis of Network Security.- Biomonitoring, Phylogenetics and Anomaly Aggregation Systems.- CODESSEAL: Compiler/FPGA Approach to Secure Applications.- Computational Tool in Infrastructure Emergency Total Evacuation Analysis.- Performance Study of a Compiler/Hardware Approach to Embedded Systems Security.- A Secured Mobile Phone Based on Embedded Fingerprint Recognition Systems.- Connections in the World of International Terrorism.- Forecasting Terrorism: Indicators and Proven Analytic Techniques.- Forecasting Terrorist Groups’ Warfare: ‘Conventional’ to CBRN.- The Qualitative Challenge of Insurgency Informatics.- The Application of PROACT® RCA to Terrorism/Counter Terrorism Related Events.- Extended Abstracts for Posters and Demos.- A Group Decision-Support Method for Search and Rescue Based on Markov Chain.- A New Relationship Form in Data Mining.- A Study of ”Root Causes of Conflict” Using Latent Semantic Analysis.- An Empirical Study on Dynamic Effects on Deception Detection.- Anti Money Laundering Reporting and Investigation – Sorting the Wheat from the Chaff.- Application of Latent Semantic Indexing to Processing of Noisy Text.- Detecting Misuse of Information Retrieval Systems Using Data Mining Techniques.- Mining Schemas in Semistructured Data Using Fuzzy Decision Trees.- More Than a Summary: Stance-Shift Analysis.- Principal Component Analysis (PCA) for Data Fusion and Navigation of Mobile Robots.- BioPortal: Sharing and Analyzing Infectious Disease Information.- DIANE: Revolutionizing the Way We Collect, Analyze, and Share Information.- Processing High-Speed Intelligence Feeds in Real-Time.- Question Answer TARA: A Terrorism Activity Resource Application.- Template Based Semantic Similarity for Security Applications.- The Dark Web Portal Project: Collecting and Analyzing the Presence of Terrorist Groups on the Web.- Toward an ITS Specific Knowledge Engine.- A Blind Image Watermarking Using for Copyright Protection and Tracing.- Towards an Effective Wireless Security Policy for Sensitive Organizations.- A Taxonomy of Cyber Attacks on 3G Networks.- An Adaptive Approach to Handle DoS Attack for Web Services.- An Architecture for Network Security Using Feedback Control.- Defending a Web Browser Against Spying with Browser Helper Objects.- Dynamic Security Service Negotiation to Ensure Security for Information Sharing on the Internet.- Enhancing Spatial Database Access Control by Eliminating the Covert Topology Channel.- Gathering Digital Evidence in Response to Information Security Incidents.- On the QP Algorithm in Software Watermarking.- On the Use of Opaque Predicates in Mobile Agent Code Obfuscation.- Secure Contents Distribution Using Flash Memory Technology.- Infrastructure Protection and Emergency Response.- Background Use of Sensitive Information to Aid in Analysis of Non-sensitive Data on Threats and Vulnerabilities.- Securing Grid-Based Critical Infrastructures.- The Safety Alliance of Cushing – A Model Example of Cooperation as an Effective Counterterrorism Tool.- Surveillance, Border Protection, and Transportation Systems.- A Framework for Global Monitoring and Security Assistance Based on IPv6 and Multimedia Data Mining Techniques.- An Agent-Based Framework for a Traffic Security Management System.- Application of a Decomposed Support Vector Machine Algorithm in Pedestrian Detection from a Moving Vehicle.- Application of Cooperative Co-evolution in Pedestrian Detection Systems.- Biometric Fingerprints Based Radio Frequency Identification.- BorderSafe: Cross-Jurisdictional Information Sharing, Analysis, and Visualization.