5. ISI 2007:
New Brunswick,
New Jersey,
USA
IEEE International Conference on Intelligence and Security Informatics, ISI 2007, New Brunswick, New Jersey, USA, May 23-24, 2007, Proceedings.
IEEE 2007 BibTeX
- David Madigan, Sushil Mittal, Fred Roberts:
Sequential Decision Making Algorithms for Port of Entry Inspection: Overcoming Computational Challenges.
1-7
Electronic Edition (link) BibTeX
- Phillip G. Bradford, Daniel A. Ray:
Using Digital Chains of Custody on Constrained Devices to Verify Evidence.
8-15
Electronic Edition (link) BibTeX
- Nabil R. Adam, Vandana Pursnani Janeja, Aabhas V. Paliwal, Basit Shafiq, Cedric Ulmer, Volker Gersabeck, Anne Hardy, Christof Bornhövd, Joachim Schaper:
Approach for Discovering and Handling Crisis in a Service-Oriented Environment.
16-24
Electronic Edition (link) BibTeX
- Huizhang Shen, Jidi Zhao:
A Quick Group Decision-making Planning Method for Emergency Response.
25-31
Electronic Edition (link) BibTeX
- Mirko Montanari, Sharad Mehrotra, Nalini Venkatasubramanian:
Architecture for an Automatic Customized Warning System.
32-39
Electronic Edition (link) BibTeX
- Siddharth Kaza, Daning Hu, Hsinchun Chen:
Dynamic Social Network Analysis of a Dark Network: Identifying Significant Facilitators.
40-46
Electronic Edition (link) BibTeX
- Richard M. Adler:
A Dynamic Social Network Software Platform for Counter-Terrorism Decision Support.
47-54
Electronic Edition (link) BibTeX
- Christopher C. Yang, Tobun D. Ng:
Terrorism and Crime Related Weblog Social Network: Link, Content Analysis and Information Visualization.
55-58
Electronic Edition (link) BibTeX
- Meytal Tubi, Rami Puzis, Yuval Elovici:
Deployment of DNIDS in Social Networks.
59-65
Electronic Edition (link) BibTeX
- Farah Jemili, Montaceur Zaghdoud, Mohamed Ben Ahmed:
A Framework for an Adaptive Intrusion Detection System using Bayesian Network.
66-70
Electronic Edition (link) BibTeX
- Ram Dantu, Prakash Kolan, Robert Akl, Kall Loper:
Classification of Attributes and Behavior in Risk Management Using Bayesian Networks.
71-74
Electronic Edition (link) BibTeX
- Li Yang, Joseph M. Kizza, Alma Cemerlic, Feiqiong Liu:
Fine-Grained Reputation-based Routing in Wireless Ad Hoc Networks.
75-78
Electronic Edition (link) BibTeX
- Sudarshan S. Chawathe:
Organizing Hot-Spot Police Patrol Routes.
79-86
Electronic Edition (link) BibTeX
- Maury Mitchell, Matthew Hudnall, David Brown, David Cordes, Randy K. Smith, Allen S. Parrish:
A Host Architecture for Automobile License Plate Recognition.
87-94
Electronic Edition (link) BibTeX
- Antonio Sanfilippo, Bob Baddeley, Christian Posse, Paul Whitney:
A Layered Dempster-Shafer Approach to Scenario Construction and Analysis.
95-102
Electronic Edition (link) BibTeX
- Joshua Sinai:
Forecasting Terrorist Groups' Warfare: Conventional to CBRN.
103-106
Electronic Edition (link) BibTeX
- Robert Moskovitch, Shay Pluderman, Ido Gus, Dima Stopel, Clint Feher, Yisrael Parmet, Yuval Shahar, Yuval Elovici:
Host Based Intrusion Detection using Machine Learning.
107-114
Electronic Edition (link) BibTeX
- Bechara al Bouna, Richard Chbeir, Johel Miteran:
MCA2CM: Multimedia Context-Aware Access Control Model.
115-123
Electronic Edition (link) BibTeX
- Sangmi Chai, Raj Sharman, Smitha Patil, Shruta Satam, H. Raghav Rao, Shambhu J. Upadhyaya:
Surface Transportation and Cyber-Infrastructure: An Exploratory Study.
124-128
Electronic Edition (link) BibTeX
- Liang Li, Wei-Qiang Jiang, Jie Tian, Yi-Xian Yang, Cai-Ping Jiang, Zhe Wu, Xin Yang:
A Networking Identity Authentication Scheme Combining Fingerprint Coding and Identity Based Encryption.
129-132
Electronic Edition (link) BibTeX
- Yiming Ma, Dmitri V. Kalashnikov, Ramaswamy Hariharan, Sharad Mehrotra, Nalini Venkatasubramanian, Naveen Ashish, Jay Lickfett:
On-Demand Information Portals for Disaster Situations.
133-136
Electronic Edition (link) BibTeX
- Bijit Hore, Hojjat Jafarpour, Ramesh Jain, Shengyue Ji, Daniel Massaguer, Sharad Mehrotra, Nalini Venkatasubramanian, Utz Westermann:
Design and Implementation of a Middleware for Sentient Spaces.
137-144
Electronic Edition (link) BibTeX
- Nazli Goharian, Alana Platt:
DOTS: Detection of Off-Topic Search via Result Clustering.
145-151
Electronic Edition (link) BibTeX
- Tiantian Qin, Judee K. Burgoon:
An Investigation of Heuristics of Human Judgment in Detecting Deception and Potential Implications in Countering Social Engineering.
152-159
Electronic Edition (link) BibTeX
- Hwan-Joon Choi, Mukkai S. Krishnamoorthy:
Categorization of Blogs through Similarity Analysis.
160-165
Electronic Edition (link) BibTeX
- Wang Jingxin, Zhiying Wang, Kui Dai:
Security Event Management System based on Mobile Agent Technology.
166-171
Electronic Edition (link) BibTeX
- Keisuke Takemori, Yutaka Miyake, Chie Ishida, Iwao Sasase:
A SOC Framework for ISP Federation and Attack Forecast by Learning Propagation Patterns.
172-179
Electronic Edition (link) BibTeX
- Habib Ullah Baig, Farrukh Kamran:
Detection of Port and Network Scan Using Time Independent Feature Set.
180-184
Electronic Edition (link) BibTeX
- Samuel R. Barrett:
Optimizing Sensor Placement for Intruder Detection with Genetic Algorithms.
185-188
Electronic Edition (link) BibTeX
- Yasuaki Sakamoto, Jeffrey V. Nickerson:
Social Behavior in a Team of Autonomous Sensors.
189-192
Electronic Edition (link) BibTeX
- Jeffrey Baumes, Mark K. Goldberg, Mykola Hayvanovych, Stephen Kelley, Malik Magdon-Ismail, Konstantin Mertsalov, William A. Wallace:
SIGHTS: A Software System for Finding Coalitions and Leaders in a Social Network.
193-199
Electronic Edition (link) BibTeX
- Haizheng Zhang, Baojun Qiu, C. Lee Giles, Henry C. Foley, John Yen:
An LDA-based Community Structure Discovery Approach for Large-Scale Social Networks.
200-207
Electronic Edition (link) BibTeX
- Justin Z. Zhan:
Privacy Preserving Collaborative Data Mining.
208
Electronic Edition (link) BibTeX
- David B. Skillicorn:
Detecting Anomalies in Graphs.
209-216
Electronic Edition (link) BibTeX
- Jie Wang, Jun Zhang:
Addressing Accuracy Issues in Privacy Preserving Data Mining through Matrix Factorization.
217-220
Electronic Edition (link) BibTeX
- Shuting Xu, Shuhua Lai:
Fast Fourier Transform Based Data Perturbation Method for Privacy Protection.
221-224
Electronic Edition (link) BibTeX
- Wayne L. Bethea, R. Scott Cost, Paul A. Frank, Frank B. Weiskopf:
Inferring Meaning and Intent of Discovered Data Sources.
225-228
Electronic Edition (link) BibTeX
- G. Alan Wang, Siddharth Kaza, Shailesh Joshi, Kris Chang, Homa Atabakhsh, Hsinchun Chen:
The Arizona IDMatcher: A Probabilistic Identity Matching System.
229-235
Electronic Edition (link) BibTeX
- Shenzhi Li, Christopher D. Janneck, Aditya P. Belapurkar, Murat Can Ganiz, Xiaoning Yang, Mark Dilsizian, Tianhao Wu, John M. Bright, William M. Pottenger:
Mining Higher-Order Association Rules from Distributed Named Entity Databases.
236-243
Electronic Edition (link) BibTeX
- Cyril Onwubiko, Andrew P. Lenaghan:
Managing Security Threats and Vulnerabilities for Small to Medium Enterprises.
244-249
Electronic Edition (link) BibTeX
- Zhe Wu, Jie Tian, Liang Li, Cai-Ping Jiang, Xin Yang:
A Secure Email System Based on Fingerprint Authentication Scheme.
250-253
Electronic Edition (link) BibTeX
- Chuanjun Li, Latifur Khan, Bhavani M. Thuraisingham, M. Husain, Shaofei Chen, Fang Qiu:
Geospatial Data Mining for National Security: Land Cover Classification and Semantic Grouping.
254-261
Electronic Edition (link) BibTeX
- Hyung Moo Kim, Jae Soo Yoo:
Recursive Algorithm of River and Basin Data Model based on Composite Design Pattern.
262-265
Electronic Edition (link) BibTeX
- Leonidas Deligiannidis, Farshad Hakimpour, Amit P. Sheth:
Visualization of Events in a Spatially and Multimedia Enriched Virtual Environment.
266-269
Electronic Edition (link) BibTeX
- Summer Adams, Ashok K. Goel:
Making Sense of VAST Data.
270-273
Electronic Edition (link) BibTeX
- Steven R. Haynes, Jonathan A. Singel:
Knowledge Reachback for WMD Events.
274-281
Electronic Edition (link) BibTeX
- Ahmed Abbasi, Hsinchun Chen:
Affect Intensity Analysis of Dark Web Forums.
282-288
Electronic Edition (link) BibTeX
- Nan Zhang:
On the Communication Complexity of Privacy-Preserving Information Sharing Protocols.
289-295
Electronic Edition (link) BibTeX
- Dawit Yimam Seid, Sharad Mehrotra:
Semantically Ranked Graph Pattern Queries for Link Analysis.
296-299
Electronic Edition (link) BibTeX
- Yanping Zhao, Wei Lu:
An Efficient Algorithm for Content Security Filtering Based on Double-Byte.
300-307
Electronic Edition (link) BibTeX
- Saket S. R. Mengle, Nazli Goharian, Alana Platt:
FACT: Fast Algorithm for Categorizing Text.
308-315
Electronic Edition (link) BibTeX
- Subramanian Appavu, Ramasamy Rajaram:
Association Rule Mining for Suspicious Email Detection: A Data Mining Approach.
316-323
Electronic Edition (link) BibTeX
- Vladimir Estivill-Castro, Ahmed HajYasien:
Fast Private Association Rule Mining by A Protocol for Securely Sharing Distributed Data.
324-330
Electronic Edition (link) BibTeX
- Justin Z. Zhan:
Using Homomorphic Encryption and Digital Envelope Techniques for Privacy Preserving Collaborative Sequential Pattern Mining.
331-334
Electronic Edition (link) BibTeX
- David D. Sulek, McClain L. Howarth, Virginia A. Ruebensaal:
Connecting the Dots: Revealing the Invisible Hand for Sharing Information.
335-341
Electronic Edition (link) BibTeX
- Tianjun Fu, Ahmed Abbasi, Hsinchun Chen:
Interaction Coherence Analysis for Dark Web Forums.
342-349
Electronic Edition (link) BibTeX
- Gregory A. Godfrey, John Cunningham, Tuan Tran:
A Bayesian, Nonlinear Particle Filtering Approach for Tracking the State of Terrorist Operations.
350-355
Electronic Edition (link) BibTeX
- Matthew Edman, Fikret Sivrikaya, Bülent Yener:
A Combinatorial Approach to Measuring Anonymity.
356-363
Electronic Edition (link) BibTeX
- Zhongjie Cui, Shuping Yao:
An Adaptive Modeling for Security Infrastructure Fault Response.
364
Electronic Edition (link) BibTeX
- Luk Boral, Maria Disla, Shivraj Patil, Jari Williams, Joon S. Park:
Countering Insider Threats in Personal Devices.
365
Electronic Edition (link) BibTeX
- Nasrullah Memon, David L. Hicks, Henrik Legind Larsen:
Dependence Centrality: Identifying Dependence of Nodes in Terrorist Networks.
366
Electronic Edition (link) BibTeX
- Jenq-Haur Wang, Hung-Chi Chang:
Distributed Web Police: A Peer-to-Peer Approach to Collaborative Copy Detection.
367
Electronic Edition (link) BibTeX
- Andreas Meissner:
Emergency Management in Australia, New Zealand and Europe - The 2006 EMANZE Survey.
368
Electronic Edition (link) BibTeX
- Hongyuan Shi, Dov Kruger, Jeffrey V. Nickerson:
Environmental Impact on Underwater Surveillance Systems in Estuary Areas.
369
Electronic Edition (link) BibTeX
- M. Anil Yazici, Kaan Ozbay:
Importance of Information Collection and Dissemination for Evacuation Modeling and Management.
370
Electronic Edition (link) BibTeX
- Robert Moskovitch, Nir Nissim, Yuval Elovici:
Malicious Code Detection and Acquisition Using Active Learning.
371
Electronic Edition (link) BibTeX
- Hsin-Min Lu, Daniel Dajun Zeng, Hsinchun Chen:
Medical Ontology-Enhanced Text Processing for Infectious Disease Informatics.
372
Electronic Edition (link) BibTeX
- Pinar Oezden Wennerberg, Hristo Tanev, Jakub Piskorski, Clive Best:
Ontology Based Analysis of Violent Events.
373
Electronic Edition (link) BibTeX
- Irina Goldman, Samuel Barrett, Jeffrey V. Nickerson:
Optimization of Multi-Attribute Tasks for Underwater Motion of Robotic Sensor Agents.
374
Electronic Edition (link) BibTeX
- Ji-Zhi Wang, Ying-Long Wang, Mei-Qin Wang:
Periodicity and Application for a kind of n-dimensional Arnold-type Transformation.
375
Electronic Edition (link) BibTeX
- Wingyan Chung, G. Alan Wang:
Profiling and Visualizing Cyber-criminal Activities: A General Framework.
376
Electronic Edition (link) BibTeX
- Ming Lei, Zijie Qi, Xiaoyan Hong, Susan V. Vrbsky:
Protecting Location Privacy with Dynamic Mac Address Exchanging in Wireless Networks.
377
Electronic Edition (link) BibTeX
- Rebecca Cathey, Steven M. Beitzel, Eric C. Jensen, David A. Grossman, Ophir Frieder:
Relationally Mapping XML Queries For Scalable XML Search.
378
Electronic Edition (link) BibTeX
- Alana Platt, Nazli Goharian:
Short Query Sequences in Misuse Detection.
379
Electronic Edition (link) BibTeX
- Rami Puzis, Meytal Tubi, Gil Tahan, Yuval Elovici:
Simulating Threats Propagation within the NSP Infrastructure.
380
Electronic Edition (link) BibTeX
- Antonio Badia, Jothi Ravishankar, Tulay Muezzinoglu:
Text Extraction of Spatial and Temporal Information.
381
Electronic Edition (link) BibTeX
Copyright © Sat May 16 23:25:35 2009
by Michael Ley (ley@uni-trier.de)