ISI 2013 Conference Program

June 4, 2013
7:00am - 5:30pmRegistration
7:00am - 8:30amBreakfast - Room: Leonesa II
 Signature Discovery Workshop
Room: Leonesa III
Evaluating Cybersecurity Visualizations
Room: Discovery
Social Media Analytics
Room: Discovery
8:15am - 8:30am   Welcome/Introduction  
8:30am - 8:45am   Keynote Speaker: Pak Chung Wong, Pacific Northwest National Laboratory
Room: Amphitheater
8:45am - 9:00am Welcome  
9:00am - 9:15am Presenter: Nathan Baker
Topic: Signature discovery methodology
9:15am - 9:45am Reflecting on Visualization for Cyber Security, Sophie Engle and Carrie Gates, CA Labs and University of San Francisco  
9:45am - 10:15am Presenter: Alexander Venzin
Topic: An Investigation into Label Fusion on Sparse Data
Investigating the Efficacy of Network Visualizations for Intelligence Tasks, Christopher Berardi, Erin Solovey, and Mary Cummings, Human Automation Lab, MIT  
10:15am - 10:30am Presenter: Emilie Hogan
Topic: Graph Analytics for Signature Discovery
Break - Room: Foyer  
10:30am - 10:45am Capturing Human Cognition in Cybersecurity Simulations with NETS, Nick Giacobe, Vincent Mancuso, Dev Minotra  
10:45am - 11:00am Presenter: Shan Suthaharan
Topic: Lame Curve-based signature discovery learning technique for network traffic classification
11:00am - 11:15am Visualization Techniques for Efficient Malware Detection, John Donahue and Anand Paturi, Computation Analysis and Network Enterprise Solutions  
11:15am - 11:30am Presenter: Arun Sathanur
Topic: Capturing Signatures of Anomalous Behavior in Online Social Networks
11:30am - 11:45am Information Visualization Metrics and Methods for Cybersecurity Evaluation, John Langton and Alex Baker, VisiTrend  
11:45am - 12:00pm Lunch - Room: Leonesa II  
12:00pm - 12:30pm Christopher Alexander's Fifteen Properties: Towards Developing Evaluating Metrics for Security Visualizations, Ziyad Alshaih, Abdulrahman Alarifi, Mansour Alsaleh, King Abdulaziz City for Science and Technology  
12:30pm - 1:00pm Lunch - Room: Leonesa II
1:00pm - 1:15pm Presenter: Elena Peterson
Topic: A Generalized Bio-inspired Method for Discovering Sequence-based Signatures
1:15pm - 1:30pm   Welcome / Opening Remarks
1:30pm - 2:00pm Presenter: Kay Yee Yeung
Topic: Signature Discovery for Personalized Medicine
  Invited Speaker: Bhavani Thuraisingham, University of Texas at Dallas
Topic: TBA
2:00pm - 2:30pm Presenter: Zoe Gastelum
Topic: The Lifecycle of Bayesian Network Models Developed for Multi-Source Signature Assessment of Nuclear Programs
  Invited Speaker: Anne Kao, Boeing
Topic: Challenges in Analyzing Social Media Data
2:30pm - 3:00pm Presenter: Landon Sego
Topic: Assessing the Quality of Bioforensic Signatures
  Invited Speaker: Alan Ritter, University of Washington
Topic: Extracting Knowledge from Informal Text
3:00pm - 3:15pm Presenter: Yarden Livnat
Topic: The CommonGround Visual Paradigm for Biosurveillance
  Speaker: Jie Wang, Xuwei Liang and Shiaofen Fang
Topic: Discovering the Rating Pattern of Online Reviewers through Data Coclustering
3:15pm - 3:30pm   Break - Room: Foyer
3:30pm - 3:50pm Panel Discussion   Speaker: Arun V. Sathanur, Vikram Jandhyala and Chuanjia Xing
Topic: PHYSENSE: Scalable Sociological Interaction Models for Influence Estimation on Online Social Networks
3:50pm - 4:00pm   Speaker: Ansheng Ge, Wenji Mao, Daniel Zeng and Lei Wang
Topic: Action Knowledge Extraction from Web Text
4:00pm - 4:30pm     Invited Speaker: Daniel Zeng, Chinese Academy of Sciences & University of Arizona
Topic: Social Computing: Recent Progress and Future Trends
4:30pm - 5:30pm     Panel Discussion
June 5, 2013
7:00am - 5:30pmRegistration
7:00am - 8:30amBreakfast - Room: Leonesa II
8:30am - 8:45amWelcome and Conference Opening: Dr. Antonio Sanfilippo, Pacific Northwest National Laboratory
Room: Amphitheater
8:45am - 9:30pmKeynote: Dr. Joseph Kielman, Department of Homeland Security
Room: Amphitheater
9:30am - 9:45amTransition to parallel sessions
9:45am - 11:15amEmergent Threats & Big Data in Security Informatics
Room: Leonesa III
Panel: Security and Information Assurance
Room: Amphitheater
9:45am - 10:15amAndrew Reid, Mohammad Tayebi and Richard Frank. Exploring the Structural Characteristics of Social Networks in a Large Criminal Court Database.Moderator:
Anne Kao (Boeing)

Barbara Endicott-Popovsky (UW)
Dewey Houck (Boeing)
Nick Multari (PNNL)
Felix Wu (UC Davis)
10:15am - 10:30amJustin Song, Valerie Spicer and Patricia Brantingham. The Edge Effect: Exploring High Crime Zones near Residential Neighborhoods 
10:30am - 10:45amYolanda Baker, Rajeev Agrawal and Sambit Bhattacharya. Analyzing Security Threats as Reported by the United States Computer Emergency Readiness Team (US-CERT) 
10:45am - 11:15amEdna Reid. Crowdsourcing and Gamification Techniques in Inspire (AQAP Online Magazine) 
11:15am - 12:30pmLunch - Room: Leonesa II
12:30pm - 2:00pmEmergent Threats & Big Data in Security Informatics
Room: Leonesa III
Panel: Intelligence and Security Informatics Research: Outlook and Opportunities
Room: Amphitheater
12:30pm - 1:00pmFrank Greitzer, Thomas Carroll and Adam Roberts. Cyber Friendly Fire: Research Challenges for Security InformaticsModerator:
Antonio Sanfilippo (PNNL)

Michael Gabbay (UW)

Joseph Kielman (DHS)
Dewey Murdick (IARPA)
Barry Costa (MITRE)
1:00pm - 1:15pmVictor Benjamin and Hsinchun Chen. Machine Learning for Attack Vector Identification in Malicious Source Code 
1:15pm - 1:30pmRudolph Mappus and Erica Briscoe. Layered behavioral trace modeling for threat detection 
1:30pm - 1:45pmZakariya Dehlawi and Norah Abokhodair. Saudi Arabia's Response to Cyber Conflict: A case study of the Shamoon malware incident 
1:45pm - 2:00pmLora Weiss, Erica Briscoe, Walter Wright, Keith Kline, John Horgan, Lily Cushenbery and Casey Hilland. A Model Docking System for Understanding Radicalization 
2:00pm - 2:30pmBreak and Set-Up of Poster Session (Poster Session to be held in Princessa I-II rooms)
2:30pm - 4:45pmBig Data in Security Informatics
Room: Amphitheater
Decision Making in Security Informatics
Room: Leonesa III
Decision Making in Security Informatics and Emerging Threats
Room: Leonesa I
2:30pm - 3:00pmRichard Colbaugh, Kristin Glass and Travis Bauer. Dynamic Information-Theoretic Measures for Security InformaticsSihao Ding, Qiang Zhai, Yuan F. Zheng and Dong Xuan. Side-View Face Authentication Based on Wavelet and Random Forest with Subsets
(Best Paper Award Nominee)
Richard Colbaugh and Kristin Glass. Moving Target Defense for Adaptive Adversaries
3:00pm - 3:30pmRoger Bradford. Use of Latent Semantic Indexing to Identify Name Variants in Large Data CollectionsJoel Brynielsson, Fredrik Johansson and Anders Westling. Learning to classify emotional content in crisis-related tweetsYanmin Shang, Peng Zhang, Yanan Cao and Li Guo. Behavioral Targeting with Social Regularization
3:30pm - 3:45pmAlan Ratner and Phil Kelly . Anomalies in Network TrafficBrendan Kitts. Click Fraud Botnet Detection by Calculating Mix Adjusted Traffic ValueDavid Skillicorn and Edna Reid. Language Use in Inspire Magazine
3:45pm - 4:00pmTravis Bauer, Richard Colbaugh, Kristin Glass and Daniel Garcia. Detecting Collaboration from BehaviorLuwen Huangfu, Wenji Mao and Daniel Zeng. OCC Model-Based Emotion Extraction from Online Reviews
4:00pm - 4:15pmMinh-Tam Le, John Sweeney, Matthew Lawlor and Steven Zucker. Discovering Thematic Structure in Political DatasetsCarolyn Lamb and David Skillicorn. Detecting Deception in Interrogation SettingsHonglu Du, Heng Xu, Mary Beth Rosson and John Carroll. Effects of Fear Appeals and Point of Reference on the Persuasiveness of IT Security Communications
4:15pm - 4:30pmArchana Polisetti, Shan Suthaharan, Scott Richter and Sat Gupta. A systematic signature discovery learning technique for regular and intrusion network trafficFatih Özgül and Zeki Erdem. Which crime features are important for criminal network members?Evmorfia N. Argyriou, Aikaterini Sotiraki and Antonios Symvonis. Occupational Fraud Detection Through Visualization
4:30pm - 4:45pmDonald Kretz and Charles Granderson. An Interdisciplinary Approach to Studying and Improving Terrorism AnalysisChen Zhong, Deepak Kirubakaran, John Yen, Peng Liu, Steve Hutchinson and Hasan Cam. How to Use Experience in Cyber Analysis: An Analytical Reasoning Support SystemDuncan Hodges and Sadie Creese. Building a better intelligence machine: A new approach to capability review and development
4:45pm - 5:00pmBreak and Move to Poster Session
5:00pm - 8:00pmPoster Session and Social Event
Room: Princessa I-II
June 6, 2013
7:00am - 5:30pmRegistration
7:00am - 8:30amBreakfast - Room: Leonesa II
8:30am - 9:15amKeynote:CAPT Dylan Schmorrow, US Office of the Secretary of Defense
Room: Amphitheater
9:15am - 9:30amTransition to parallel sessions
9:30am - 11:00amEmergent Threats
Room: Leonesa III
Panel: Open Source Indicators and Predicting the News
Room: Amphitheater
9:30am - 10:00amVinayak Elangovan, Amir Shirkhodaie and Amjad Alkilani. A Multi-Modality Attributes Unmasking Scheme for Group Activity Characterization and Data FusionModerator:
Courtney Corley (PNNL)

Open Source Indicators Program PIs
10:00am - 10:15amOlga Babko-Malaya, Daniel Hunter, Andy Seidel and Fotis Barlos. Flexible Creation of Indicators of Scientific and Technological Emergence 
10:15am - 10:30amDavid Matsumoto and Hyisung Hwang. Differences between Individuals with and without Experience with Assault in Identifying Facial Signs of Imminent Aggression 
10:30am - 10:45amIrfan Kanat, Sathananda Siloju, Santanam Raghu and Ajay Vinze. Gamification of Emergency Response Training: A Public Health Example 
10:45am - 11:00amJessica Zeitz Self, Rebecca Zeitz, Alan Breitler and Chris North. Auto-Highlighter: Identifying Salient Sentences in Text 
11:00am - 11:15amBreak - Room: Foyer
11:15am - 12:30pmBig Data in Security Informatics
Room: Amphitheater
Emergent Threats
Room: Leonesa III
Big Data and Decision Making in Security Informatics
Room: Leonesa I
11:15am - 11:45amJonathan Mugan, Eric McDermid, Abbey McGrew and Laura Hitt. Identifying Groups of Interest through Temporal Analysis and Event Response MonitoringBrendan Kitts. Click Fraud Detection with Bot SignaturesWilliam Reynolds, William J. Salter, Robert M. Farber, Courtney Corley, Chase P. Dowling, William O. Beeman, Lynn Smith-Lovin and Joon Nak Choi. Sociolect-Based Community Detection
11:45am - 12:00pmFabrizio Albertetti, Paul Cotofrei, Lionel Grossrieder, Olivier Ribaux and Kilian Stoffel. Crime Linkage with a Fuzzy MCDM Approach: the CriLiM MethodologySiddharth Gupta, Casey Hanson, Carl Gunter, Mario Frank, David Liebovitz and Bradley Malin. Modeling and Detecting Anomalous Topic AccessVictor Yingjie Chen and Cheryl Zhenyu Qian. From When and What to Where: Linking Spatio-Temporal Visualizations in Visual Analytics
12:00pm - 12:15pmQingchao Kong, Wenji Mao and Daniel Zeng. Predicting User Participation in Social Networking Sites
12:15pm - 12:30pmGabi Kedma, Mordehai Guri, Tom Sela and Yuval Elovici. Analyzing Users' Web Surfing Patterns to Trace Terrorists and CriminalsLi Liu, Yuanzhuo Wang, and Jing Ding. Stochastic Game Model for Information Dissemination of Emergency Events in Social NetworkHamed Yaghoubi Shahir, Uwe Glässer, Narek Nalbandyan and Hans Wehn. Situation Analysis Systems Design
12:30pm - 1:45pmLunch - Room: Leonesa II
1:45pm - 2:30pmKeynote: Dr. William Burns - Decision Science Research Institute Inc.
Room: Amphitheater
2:30pm - 4:45pmIARPA Special Session: Emergent Phenomena and Big Data in Security Informatics
Room: Amphitheater
2:30pm - 2:45pmIntroduction: Dr. Dewey Murdick, Intelligence Advanced Research Projects Activity
Room: Amphitheater
2:45pm - 3:15pmRyan Compton. Detecting future civil unrest events from unprocessed Twitter data "Emerging Phenomena and Big Data in Security Informatics" (Best Paper Award Nominee)
Room: Amphitheater
3:15pm - 3:45pmBenjamin Miller, Nicholas Arcolano and Nadya Bliss. Efficient Anomaly Detection in Dynamic, Attributed Graphs: Emerging Phenomena and Big Data in Security Informatics
Room: Amphitheater
3:45pm - 4:00pmBreak - Room: Foyer
4:00pm - 4:15pmHana Akselrod, Monica Mercon, Petter Kirkeby Risoe, Jeffrey Schlegelmilch, Joanne McGovern and Sandy Bogucki. Integrating Epidemiological Modelling into Management of Emergent Infectious Threats: Emerging Phenomena and Big Data in Security Informatics
Room: Amphitheater
4:15pm - 4:30pmBob Schlicher, Robert Abercrombie and Lee Hively. Conceptual Framework to Enable Early Warning of Relevant Phenomena "Emerging Phenomena and Big Data in Security Informatics"
Room: Amphitheater
4:30pm - 4:45pmPedro Manrique, Hong Qi, Ana Morgenstern, Nicolas Velasquez, Neil Johnson and Tsai-Ching Lu. Context Matters: Improving the Uses of Big Data in Security Informatics for Forecasting Civil Unrest. Emerging Phenomena and Big Data in Security Informatics
Room: Amphitheater
4:45pm - 6:00pmDecision Making in Security Informatics
Room: Amphitheater
Emergent Threats
Room: Leonesa III
4:45pm - 5:15pmDr. James R. (Bob) Johnson. Information Graphs of Event Threads: Identifying and Building Forward and Backward Event Threads for Societal Events. (Invited Talk, presented by Anita Miller)Kevin Hamlen. Next-generation Cyber-attacks and Defenses. (Invited Talk) 
5:15pm - 5:30pmJohn Johnson and Emilie Hogan. A Graph Analytic Metric for Mitigating APTJosephine Namayanja and Vandana Janeja. Discovery of Persistent Threat Structures through Temporal and Geo-Spatial Characterization in Evolving Networks 
5:30pm - 5:45pmJess Smith, William Hutton and George Muller. Preliminaries for Resilient Cyber Systems 
5:45pm - 6:00pm Lauren Bradel, Jessica Zeitz Self, Alex Endert, M. Shahriar Hossain, Naren Ramakrishnan and Chris North. Spatially "Connecting the Dots" 
June 7, 2013
7:00am - 11:45amRegistration
7:00am - 8:30amBreakfast - Room: Leonesa II
8:30am - 9:45amEmergent Threats and Big Data in Security Informatics
Room: Leonesa I
Emergent Threats
Room: Leonesa III
8:30am - 9:00amDave Debarr, Venkatesh Ramanathan and Harry Wechsler. Phishing Detection Using Traffic Behavior, Spectral Clustering, and Random ForestsAnne Kao, William Ferng, Stephen Poteet, Lesley Quach and Rod Tjoelker. TALISON - Tensor Analysis of Social Media Data 
9:00am - 9:30amCourtney Corley, Chase Dowling, Stuart Rose and Taylor McKenzie. SociAL Sensor Analytics: Measuring Phenomenology at Scale
(Best Paper Award Winner)
Simon Pratt, Philippe Giabbanelli and Jean-Sébastien Mercier. Detecting Unfolding Crises with Visual Analytics and Conceptual Maps 
9:30am - 9:45amKenneth Olson and Christopher Karvetski. Improving Expert Judgment with Coherence WeightingYolanda Gil. Task-Centered Network Models through Semantic Workflows 
9:45am - 10:30amKeynote: Dr. Pietro Michelucci - Strategic Analysis, Inc.
Room: Leonesa I
10:30am - 10:45amBreak - Room: Foyer
10:45am - 11:45amDecision Making in Security Informatics
Room: Leonesa I
Big Data in Security Informatics
Room: Leonesa III
10:45am - 11:15amDavid Zage, Kristin Glass and Richard Colbaugh. Improving Supply Chain Security Using Big Data in Security InformaticsChase Dowling, Courtney Corley, Robert Farber and William Reynolds. Jargon and Graph Modularity on Twitter 
11:15am - 11:30amMahantesh Halappanavar, Sutanay Choudhury, Emilie Hogan, Peter Hui, John Johnson, Indrajit Ray and Lawrence Holder. Position Paper: Towards a Networks-of-Networks Framework for Cyber SecurityVictor Benjamin, Wingyan Chung, Ahmed Abbasi, Joshua Chuang, Catherine Larson and Hsinchun Chen. Evaluating Text Visualization: An Experiment in Authorship Analysis
(Best Paper Award Nominee)
11:30am - 11:45amXin Gu and Zhengquan Xu. The Security Analysis of Data Re-encryption Model in Cloud Service