My-Kerala

Message Board Home Tree Login / Register Search Latest Messages Start Format Help Email-Us

Workshop on Intelligence & Security Informatics- June 17-19, 2010, Mysore

Kerala Forum: Kerala Education: Workshop on Intelligence & Security Informatics- June 17-19, 2010, Mysore
By Lohith Krishnamurthy on Thursday, June 10, 2010 - 03:38 am: Edit Post

Sub: ISiM Workshop on Intelligence & Security Informatics, June 17-19, 2010


International School of Information Management
University of Mysore


Workshop on Intelligence & Security Informatics
June 17-19, 2010, Mysore
(http://www.isim.ac.in/isi/index.htm)


*********

The International School of Information Management (ISiM), University of Mysore is organizing a workshop on Intelligence & Security Informatics during June 17-19, 2010 at Mysore.


Program Overview :

Day 1 (17 June 2010): Inaugural Address: Cue See model and organizational security by Dr. Matthew
Frank Barney, Head – Leadership Development, Infosys Technologies Ltd., Mysore.

Key Note Address : Information Processing Under Stress : A Study of Mumbai First Responders of the 26/11 Terrorist Attacks by Prof. H Raghav Rao, Suny Buffalo, University of South Florida.
Measurement of Social Tension: Reading Mumbai Terrorist Attack
through Twitter by Dr. Manish Agrawal and Prof. H. Raghav Rao.
.
Tutorial 1 :
Competitive Intelligence and Business Strategies by Dr. R.N. Prasad, Senior Lead
Principal, Education and Research, Infosys Technologies, Ltd., Mysore.


Day 2 (18 June 2010): Tutorial 2 :
Stream Data Mining and Its Applications in security informatics by Dr. Bhavani Thuraisingham is Professor of Computer Science and Director of the Cyber Security Research Center in the Erik Jonsson School of Engineering and Computer Science, University of Texas at Dallas.

Day 3 (19 June 2010): Tutorial 3-
Machine Learning Techniques for Crime Data Analysis by Dr. Michael Chau, Assistant
Professor, The University of Hong Kong.


*********

Registration Details:

Registration Fee (Corporate) : INR 4000
Registration Fee (Academic) : INR 2000
Registration Fee (Students) : INR 1000

*********


Workshop Details
Context and relevance:

Combating terrorism has occupied centre-stage across governments, security agencies, policy makers, academia, industry and society at large for obvious and understandable reasons. In the academic and industry circles, past decade has witnessed significant interest in security-related research in a wide range of applications spanning across national and international security, economic and societal security, and including personal and community security. Academic disciplines especially centered on Information Technologies such as information and computer sciences, information systems, human-computer studies, technology adoption, and policy studies have made rapid progress in developing and evaluating customized frameworks, methodologies, techniques, and systems to meet specific information processing and knowledge management challenges of “security” and “Intelligence”. An emerging field of cross-disciplinary study, called the Intelligence and Security Informatics (ISI), encompassing these efforts through an integrated technological, organizational, and policy-based approach has evolved. This multidiscipline is shaped by research and applications in fields from data/text/web mining to knowledge management to cognitive science to social psychology. The emergent field also has spawned professional societies and conferences, to build a professional community -

This emergent field has good prospects for and demands best of the young minds to expand and strengthen the domain and help contribute to the end goal of Secure and Smart society. The Workshop would help achieve this goal.

The Summer School on ISI 2010 will provide a learning platform for students and professionals, who focus on ISI research. We believe that this summer school will enrich the understanding of the emerging domain of ISI.

The Workshop will have three Tutorials:

Tutorial 1:
Competitive Intelligence and Business Strategies by Dr. R. N. Prasad, Senior Lead Principal, Education and Research, Infosys Technologies, Mysore
Topics covered include:
o Principles and Practice of CI
o Market threats, changes and new opportunities and trends.
o CI categories: Strategic, tactical, adhoc and continuous.
o CI Vs. BI
o CI tools
o Metrics and best practices
o Web Analytics and methods

Tutorial 2:
Stream Data Mining and Its Applications in security informatics by Dr. Bhavani Thuraisingham, Professor of Computer Science and Director of the Cyber Security Research Center in the Erik Jonsson School of Engineering and Computer Science, University of Texas at Dallas.

Abstract :
Data streams are continuous flows of data. Examples of data streams include network traffic, sensor data; call center records and so on. Their sheer volume and speed pose a great challenge for the data mining community to mine them. Data streams demonstrate several unique properties: infinite length, concept-drift, concept evolution and limited labeled data. Concept-drift occurs in data streams when the underlying concept of data changes over time. Concept-evolution occurs when new classes evolve in streams. Data streams may also suffer from scarcity of labeled data since it is not possible to manually label all the data points in the stream. This tutorial will present an organized picture on how to handle various data mining techniques: in particular, how to handle classification problem in stream domain, and how to handle clustering in evolving streams.
During this tutorial we also present how the aforementioned properties are addressed for handling the data mining techniques.

Tutorial Outline:

We will introduce stream mining with examples, and present its characteristics and challenges and current state of the art, and its application to security.

• Introduction,
• Data mining applications for security,
• Suspicious event detection,
• Face detection
• Web page prediction
• Building a classification model using scarcely labeled training data based on semi-supervised clustering and active learning.
• Techniques that address all four major challenges to data stream classification: infinite length, concept-drift, concept-evolution, and limited labeled data.
• Classification techniques for evolving data streams (i.e., feature set changing along with concept evolution) focusing on textual stream.
• Clustering techniques for evolving data stream.
• Applications of stream mining in various domains including security.
• Current state of the art of data intensive stream mining using cloud computing, namely, Hadoop.


Tutorial 3:
Machine Learning Techniques for Crime Data Analysis by Dr. Michael Chau, Assistant Professor, The University of Hong Kong
Topics covered include:
• Introduction to Machine Learning
• Types of Learning
• Machine Learning Techniques
o Decision Trees
o Probabilistic Models
o Neural Networks
• Applications in Crime Data Analysis
• Network Analysis and Visualization
• Textual Analysis
• Hands on with WEKA








Faculty:

1. Dr. Bhavani Thuraisingham, Professor of Computer Science and Director of the Cyber Security Research Center in the Erik Jonsson School of Engineering and Computer Science, University of Texas at Dallas.
2. Dr. R. N. Prasad, Senior Lead Principal, Education and Research, Infosys Technologies Ltd, Mysore & his Team.
3. Dr. Michael Chau ,Assistant Professor, The University of Hong Kong. URL: http://www.business.hku.hk/~mchau/


Workshop Organized by:

International School of Information Management (ISiM), University of Mysore, Mysore

Workshop Chair:
• Shalini R. Urs
Executive Director and Professor
International School of Information Management, University of Mysore
URL: http://www.isim.ac.in/shalinirurs.htm


Workshop Sponsor:

Microsoft Research, Bangalore

Workshop Venue:

International School of Information Management, (ISiM)
Manasagangotri,
University of Mysore,
Mysore- 570006

Contact Details:

Mr. Lohith
International School of Information Management
University of Mysore, Manasagangotri
Mysore – 570 006
Email: office@isim.ac.in


********

Add a Message


This is a public posting area. Enter your username and password if you have an account. Otherwise, enter your full name as your username and leave the password blank. Your e-mail address is optional.
Username:  
Password:
E-mail:
Post as "Anonymous"


My-India.Net | My-Kerala.Com | My-Tamil.Com | My-Kannada.Com | My-Telugu.Com | My-Gujarat.Com | My-Maharashtra.Com | My-Uttarpradesh.Com | My-WestBengal.Com | My-Mobilephone.Com
Webmasters | AdNetwork | Take Us | e-mail Us
© My-Kerala.Com