default search action
5th ISI 2007: New Brunswick, New Jersey, USA
- IEEE International Conference on Intelligence and Security Informatics, ISI 2007, New Brunswick, New Jersey, USA, May 23-24, 2007, Proceedings. IEEE 2007, ISBN 1-4244-1329-X
- David Madigan, Sushil Mittal, Fred S. Roberts:
Sequential Decision Making Algorithms for Port of Entry Inspection: Overcoming Computational Challenges. 1-7 - Phillip G. Bradford, Daniel A. Ray:
Using Digital Chains of Custody on Constrained Devices to Verify Evidence. 8-15 - Nabil R. Adam, Vandana Pursnani Janeja, Aabhas V. Paliwal, Basit Shafiq, Cédric Ulmer, Volker Gersabeck, Anne Hardy, Christof Bornhövd, Joachim Schaper:
Approach for Discovering and Handling Crisis in a Service-Oriented Environment. 16-24 - Huizhang Shen, Jidi Zhao:
A Quick Group Decision-making Planning Method for Emergency Response. 25-31 - Mirko Montanari, Sharad Mehrotra, Nalini Venkatasubramanian:
Architecture for an Automatic Customized Warning System. 32-39 - Siddharth Kaza, Daning Hu, Hsinchun Chen:
Dynamic Social Network Analysis of a Dark Network: Identifying Significant Facilitators. 40-46 - Richard M. Adler:
A Dynamic Social Network Software Platform for Counter-Terrorism Decision Support. 47-54 - Christopher C. Yang, Tobun D. Ng:
Terrorism and Crime Related Weblog Social Network: Link, Content Analysis and Information Visualization. 55-58 - Meytal Tubi, Rami Puzis, Yuval Elovici:
Deployment of DNIDS in Social Networks. 59-65 - Farah Jemili, Montaceur Zaghdoud, Mohamed Ben Ahmed:
A Framework for an Adaptive Intrusion Detection System using Bayesian Network. 66-70 - Ram Dantu, Prakash Kolan, Robert Akl, Kall Loper:
Classification of Attributes and Behavior in Risk Management Using Bayesian Networks. 71-74 - Li Yang, Joseph M. Kizza, Alma Cemerlic, Feiqiong Liu:
Fine-Grained Reputation-based Routing in Wireless Ad Hoc Networks. 75-78 - Sudarshan S. Chawathe:
Organizing Hot-Spot Police Patrol Routes. 79-86 - Maury Mitchell, Matthew Hudnall, David Brown, David Cordes, Randy K. Smith, Allen S. Parrish:
A Host Architecture for Automobile License Plate Recognition. 87-94 - Antonio Sanfilippo, Bob Baddeley, Christian Posse, Paul Whitney:
A Layered Dempster-Shafer Approach to Scenario Construction and Analysis. 95-102 - Joshua Sinai:
Forecasting Terrorist Groups' Warfare: Conventional to CBRN. 103-106 - Robert Moskovitch, Shay Pluderman, Ido Gus, Dima Stopel, Clint Feher, Yisrael Parmet, Yuval Shahar, Yuval Elovici:
Host Based Intrusion Detection using Machine Learning. 107-114 - Bechara al Bouna, Richard Chbeir, Johel Mitéran:
MCA2CM: Multimedia Context-Aware Access Control Model. 115-123 - Sangmi Chai, Raj Sharman, Smitha Patil, Shruta Satam, H. Raghav Rao, Shambhu J. Upadhyaya:
Surface Transportation and Cyber-Infrastructure: An Exploratory Study. 124-128 - Liang Li, Wei-Qiang Jiang, Jie Tian, Yixian Yang, Cai-Ping Jiang, Zhe Wu, Xin Yang:
A Networking Identity Authentication Scheme Combining Fingerprint Coding and Identity Based Encryption. 129-132 - Yiming Ma, Dmitri V. Kalashnikov, Ramaswamy Hariharan, Sharad Mehrotra, Nalini Venkatasubramanian, Naveen Ashish, Jay Lickfett:
On-Demand Information Portals for Disaster Situations. 133-136 - Bijit Hore, Hojjat Jafarpour, Ramesh C. Jain, Shengyue Ji, Daniel Massaguer, Sharad Mehrotra, Nalini Venkatasubramanian, Utz Westermann:
Design and Implementation of a Middleware for Sentient Spaces. 137-144 - Nazli Goharian, Alana Platt:
DOTS: Detection of Off-Topic Search via Result Clustering. 145-151 - Tiantian Qin, Judee K. Burgoon:
An Investigation of Heuristics of Human Judgment in Detecting Deception and Potential Implications in Countering Social Engineering. 152-159 - Hwan-Joon Choi, Mukkai S. Krishnamoorthy:
Categorization of Blogs through Similarity Analysis. 160-165 - Wang Jingxin, Zhiying Wang, Kui Dai:
Security Event Management System based on Mobile Agent Technology. 166-171 - Keisuke Takemori, Yutaka Miyake, Chie Ishida, Iwao Sasase:
A SOC Framework for ISP Federation and Attack Forecast by Learning Propagation Patterns. 172-179 - Habib Ullah Baig, Farrukh Kamran:
Detection of Port and Network Scan Using Time Independent Feature Set. 180-184 - Samuel R. Barrett:
Optimizing Sensor Placement for Intruder Detection with Genetic Algorithms. 185-188 - Yasuaki Sakamoto, Jeffrey V. Nickerson:
Social Behavior in a Team of Autonomous Sensors. 189-192 - Jeffrey Baumes, Mark K. Goldberg, Mykola Hayvanovych, Stephen Kelley, Malik Magdon-Ismail, Konstantin Mertsalov, William A. Wallace:
SIGHTS: A Software System for Finding Coalitions and Leaders in a Social Network. 193-199 - Haizheng Zhang, Baojun Qiu, C. Lee Giles, Henry C. Foley, John Yen:
An LDA-based Community Structure Discovery Approach for Large-Scale Social Networks. 200-207 - Justin Z. Zhan:
Privacy Preserving Collaborative Data Mining. 208 - David B. Skillicorn:
Detecting Anomalies in Graphs. 209-216 - Jie Wang, Jun Zhang:
Addressing Accuracy Issues in Privacy Preserving Data Mining through Matrix Factorization. 217-220 - Shuting Xu, Shuhua Lai:
Fast Fourier Transform Based Data Perturbation Method for Privacy Protection. 221-224 - Wayne L. Bethea, R. Scott Cost, Paul A. Frank, Frank B. Weiskopf:
Inferring Meaning and Intent of Discovered Data Sources. 225-228 - G. Alan Wang, Siddharth Kaza, Shailesh Joshi, Kris Chang, Homa Atabakhsh, Hsinchun Chen:
The Arizona IDMatcher: A Probabilistic Identity Matching System. 229-235 - Shenzhi Li, Christopher D. Janneck, Aditya P. Belapurkar, Murat Can Ganiz, Xiaoning Yang, Mark Dilsizian, Tianhao Wu, John M. Bright, William M. Pottenger:
Mining Higher-Order Association Rules from Distributed Named Entity Databases. 236-243 - Cyril Onwubiko, Andrew P. Lenaghan:
Managing Security Threats and Vulnerabilities for Small to Medium Enterprises. 244-249 - Zhe Wu, Jie Tian, Liang Li, Cai-Ping Jiang, Xin Yang:
A Secure Email System Based on Fingerprint Authentication Scheme. 250-253 - Chuanjun Li, Latifur Khan, Bhavani Thuraisingham, M. Husain, Shaofei Chen, Fang Qiu:
Geospatial Data Mining for National Security: Land Cover Classification and Semantic Grouping. 254-261 - Hyung Moo Kim, Jae Soo Yoo:
Recursive Algorithm of River and Basin Data Model based on Composite Design Pattern. 262-265 - Leonidas Deligiannidis, Farshad Hakimpour, Amit P. Sheth:
Visualization of Events in a Spatially and Multimedia Enriched Virtual Environment. 266-269 - Summer Adams, Ashok K. Goel:
Making Sense of VAST Data. 270-273 - Steven R. Haynes, Jonathan A. Singel:
Knowledge Reachback for WMD Events. 274-281 - Ahmed Abbasi, Hsinchun Chen:
Affect Intensity Analysis of Dark Web Forums. 282-288 - Nan Zhang:
On the Communication Complexity of Privacy-Preserving Information Sharing Protocols. 289-295 - Dawit Yimam Seid, Sharad Mehrotra:
Semantically Ranked Graph Pattern Queries for Link Analysis. 296-299 - Yanping Zhao, Wei Lu:
An Efficient Algorithm for Content Security Filtering Based on Double-Byte. 300-307 - Saket S. R. Mengle, Nazli Goharian, Alana Platt:
FACT: Fast Algorithm for Categorizing Text. 308-315 - Subramanian Appavu, Ramasamy Rajaram:
Association Rule Mining for Suspicious Email Detection: A Data Mining Approach. 316-323 - Vladimir Estivill-Castro, Ahmed HajYasien:
Fast Private Association Rule Mining by A Protocol for Securely Sharing Distributed Data. 324-330 - Justin Z. Zhan:
Using Homomorphic Encryption and Digital Envelope Techniques for Privacy Preserving Collaborative Sequential Pattern Mining. 331-334 - David D. Sulek, McClain L. Howarth, Virginia A. Ruebensaal:
Connecting the Dots: Revealing the Invisible Hand for Sharing Information. 335-341 - Tianjun Fu, Ahmed Abbasi, Hsinchun Chen:
Interaction Coherence Analysis for Dark Web Forums. 342-349 - Gregory A. Godfrey, John Cunningham, Tuan Tran:
A Bayesian, Nonlinear Particle Filtering Approach for Tracking the State of Terrorist Operations. 350-355 - Matthew Edman, Fikret Sivrikaya, Bülent Yener:
A Combinatorial Approach to Measuring Anonymity. 356-363 - Zhongjie Cui, Shuping Yao:
An Adaptive Modeling for Security Infrastructure Fault Response. 364 - Luk Boral, Maria Disla, Shivraj Patil, Jari Williams, Joon S. Park:
Countering Insider Threats in Personal Devices. 365 - Nasrullah Memon, David L. Hicks, Henrik Legind Larsen:
Dependence Centrality: Identifying Dependence of Nodes in Terrorist Networks. 366 - Jenq-Haur Wang, Hung-Chi Chang:
Distributed Web Police: A Peer-to-Peer Approach to Collaborative Copy Detection. 367 - Andreas Meissner:
Emergency Management in Australia, New Zealand and Europe - The 2006 EMANZE Survey. 368 - Hongyuan Shi, Dov Kruger, Jeffrey V. Nickerson:
Environmental Impact on Underwater Surveillance Systems in Estuary Areas. 369 - M. Anil Yazici, Kaan Özbay:
Importance of Information Collection and Dissemination for Evacuation Modeling and Management. 370 - Robert Moskovitch, Nir Nissim, Yuval Elovici:
Malicious Code Detection and Acquisition Using Active Learning. 371 - Hsin-Min Lu, Daniel Dajun Zeng, Hsinchun Chen:
Medical Ontology-Enhanced Text Processing for Infectious Disease Informatics. 372 - Pinar Oezden Wennerberg, Hristo Tanev, Jakub Piskorski, Clive Best:
Ontology Based Analysis of Violent Events. 373 - Irina Goldman, Samuel Barrett, Jeffrey V. Nickerson:
Optimization of Multi-Attribute Tasks for Underwater Motion of Robotic Sensor Agents. 374 - Ji-Zhi Wang, Yinglong Wang, Mei-Qin Wang:
Periodicity and Application for a kind of n-dimensional Arnold-type Transformation. 375 - Wingyan Chung, G. Alan Wang:
Profiling and Visualizing Cyber-criminal Activities: A General Framework. 376 - Ming Lei, Zijie Qi, Xiaoyan Hong, Susan V. Vrbsky:
Protecting Location Privacy with Dynamic Mac Address Exchanging in Wireless Networks. 377 - Rebecca Cathey, Steven M. Beitzel, Eric C. Jensen, David A. Grossman, Ophir Frieder:
Relationally Mapping XML Queries For Scalable XML Search. 378 - Alana Platt, Nazli Goharian:
Short Query Sequences in Misuse Detection. 379 - Rami Puzis, Meytal Tubi, Gil Tahan, Yuval Elovici:
Simulating Threats Propagation within the NSP Infrastructure. 380 - Antonio Badia, Jothi Ravishankar, Tulay Muezzinoglu:
Text Extraction of Spatial and Temporal Information. 381
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.