6. ISI 2008:
Taipei,
Taiwan
IEEE International Conference on Intelligence and Security Informatics, ISI 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings.
IEEE 2008 BibTeX
Keynotes
Invited Talks
Knowledge Discovery and Cyberactivism
- Tianjun Fu, Hsinchun Chen:
Analysis of cyberactivism: A case study of online free Tibet activities.
1-6
Electronic Edition (link) BibTeX
- Yi-Da Chen, Ahmed Abbasi, Hsinchun Chen:
Developing ideological networks using social network analysis and writeprints: A case study of the international Falun Gong movement.
7-12
Electronic Edition (link) BibTeX
- A. Little, David B. Skillicorn:
Detecting deception in testimony.
13-18
Electronic Edition (link) BibTeX
- J. G. Dutrisac, David B. Skillicorn:
Subverting prediction in adversarial settings.
19-24
Electronic Edition (link) BibTeX
- Christopher C. Yang, Tobun Dorbin Ng:
Analyzing content development and visualizing social interactions in Web forum.
25-30
Electronic Edition (link) BibTeX
- Yiting Peng, Jau-Hwang Wang:
Link analysis based on webpage co-occurrence mining - a case study on a notorious gang leader in Taiwan.
31-34
Electronic Edition (link) BibTeX
- Lung-Hao Lee, Cheng-Jye Luh, Chih-Jie Yang:
A study on early decision making in objectionable web content classification.
35-39
Electronic Edition (link) BibTeX
- C. C. Yang:
Information sharing and privacy protection of terrorist or criminal social networks.
40-45
Electronic Edition (link) BibTeX
- Benjamin C. M. Fung, Ke Wang, Lingyu Wang, Mourad Debbabi:
A framework for privacy-preserving cluster analysis.
46-51
Electronic Edition (link) BibTeX
- Minh-Tam Le, Hoang-Vu Dang, Ee-Peng Lim, Anwitaman Datta:
WikiNetViz: Visualizing friends and adversaries in implicit social networks.
52-57
Electronic Edition (link) BibTeX
- Shaojie Qiao, Changjie Tang, Huidong Jin, Shucheng Dai, Xingshu Chen:
Constrained k-closest pairs query processing based on growing window in crime databases.
58-63
Electronic Edition (link) BibTeX
- Stanley Y. W. Su, Howard W. Beck, Seema Degwekar, Jeff DePree, Xuelian Xiao, Chen Zhou, Minsoo Lee:
Distributed processing of event data and multi-faceted knowledge in a collaboration federation.
64-69
Electronic Edition (link) BibTeX
- Lan Du, Huidong Jin, Olivier Y. de Vel, Nianjun Liu:
A latent semantic indexing and WordNet based information retrieval model for digital forensics.
70-75
Electronic Edition (link) BibTeX
- Hsin-Min Lu, Daniel Zeng, Hsinchun Chen:
Bioterrorism event detection based on the Markov switching model: A simulated anthrax outbreak study.
76-81
Electronic Edition (link) BibTeX
- Ryan Layfield, Murat Kantarcioglu, Bhavani M. Thuraisingham:
Simulating bioterrorism through epidemiology approximation.
82-87
Electronic Edition (link) BibTeX
- Hsinchun Chen:
Discovery of improvised explosive device content in the Dark Web.
88-93
Electronic Edition (link) BibTeX
- Hsinchun Chen:
IEDs in the Dark Web: Genre classification of improvised explosive device web pages.
94-97
Electronic Edition (link) BibTeX
- Hsinchun Chen, S. Thoms, Tianjun Fu:
Cyber extremism in Web 2.0: An exploratory study of international Jihadist groups.
98-103
Electronic Edition (link) BibTeX
- Hsinchun Chen:
Sentiment and affect analysis of Dark Web forums: Measuring radicalization on the internet.
104-109
Electronic Edition (link) BibTeX
- Shi-Cho Cha, Pei-Wen Juo, Li-Ting Liu, Wei-Ning Chen:
RiskPatrol: A risk management system considering the integration risk management with business continuity processes.
110-115
Electronic Edition (link) BibTeX
- Yi-Ming Chen, Dachrahn Wu, Cheng-Kuang Wu:
A game theory approach for an emergency management security advisory system.
116-121
Electronic Edition (link) BibTeX
- Wen-Gong Shieh, Wen-Bing Horng:
Efficient and complete remote authentication scheme with smart cards.
122-127
Electronic Edition (link) BibTeX
- Yuanhung Lien, Xuefei Leng, K. Mayes, Jung-Hui Chiu:
Reading order independent grouping proof for RFID tags.
128-136
Electronic Edition (link) BibTeX
CyberSecurity
- Uwe Glässer, Mona Vajihollahi:
Identity management architecture.
137-144
Electronic Edition (link) BibTeX
- Duc-Phong Le, Alexis Bonnecaze, Alban Gabillon:
Signtiming scheme based on aggregate signature.
145-149
Electronic Edition (link) BibTeX
- Jiexun Li, G. Alan Wang, Hsinchun Chen:
PRM-based identity matching using social context.
150-155
Electronic Edition (link) BibTeX
- Robert Moskovitch, Dima Stopel, Clint Feher, Nir Nissim, Yuval Elovici:
Unknown malcode detection via text categorization and the imbalance problem.
156-161
Electronic Edition (link) BibTeX
- Dat Tran, Wanli Ma, Dharmendra Sharma:
Automated network feature weighting-based anomaly detection.
162-166
Electronic Edition (link) BibTeX
- S. J. Yang, S. Byers, J. Holsopple, B. Argauer, D. Fava:
Intrusion activity projection for cyber situational awareness.
167-172
Electronic Edition (link) BibTeX
- C. Thomas, N. Balakrishnan:
Advanced sensor fusion technique for enhanced Intrusion Detection.
173-178
Electronic Edition (link) BibTeX
- Ming-Yang Su, Kai-Chi Chang, Hua-Fu Wei, Chun-Yuen Lin:
A real-time network intrusion detection system based on incremental mining approach.
179-184
Electronic Edition (link) BibTeX
Knowledge Discovery and Visualization
- J. G. Dutrisac, David B. Skillicorn:
Hiding clusters in adversarial settings.
185-187
Electronic Edition (link) BibTeX
- A. Chapanond, M. S. Krishnamoorthy:
Models and methods for prediction problem of evolving graphs.
188-190
Electronic Edition (link) BibTeX
- Mark K. Goldberg, Malik Magdon-Ismail, Stephen Kelley, Konstantin Mertsalov:
A locality model of the evolution of blog networks.
191-193
Electronic Edition (link) BibTeX
- Wenjia Wang, Phuong Thanh Cao-Thai:
Novel position-coded methods for mining web access patterns.
194-196
Electronic Edition (link) BibTeX
- Cheng-Lung Sung, Min-Yuh Day, Hsu-Chun Yen, Wen-Lian Hsu:
A template alignment algorithm for question classification.
197-199
Electronic Edition (link) BibTeX
- Ajith Abraham, Hongbo Liu:
Swarm intelligence based rough set reduction scheme for support vector machines.
200-202
Electronic Edition (link) BibTeX
- N. W. Lo, Shiou-Hung Chen:
A study of anti-robot agent mechanisms and process on online games.
203-205
Electronic Edition (link) BibTeX
- C. J. Mielke, Hsinchun Chen:
Botnets, and the cybercriminal underground.
206-211
Electronic Edition (link) BibTeX
- Yan Dang, Yulei Zhang, N. Suakkaphong, Cathy Larson, Hsinchun Chen:
An integrated approach to mapping worldwide bioterrorism research capabilities.
212-214
Electronic Edition (link) BibTeX
- Shinsaku Kiyomoto, Toshiaki Tanaka:
Anonymous attribute authentication scheme using self-blindable certificates.
215-217
Electronic Edition (link) BibTeX
- Zhihong Liu, Jianfeng Ma, Qiping Huang, Sang-Jae Moon:
Keying material based key pre-distribution scheme.
218-221
Electronic Edition (link) BibTeX
- Wen-Gong Shieh, Jian-Min Wang, Wen-Bing Horng:
Secure remote control model for information appliances.
222-224
Electronic Edition (link) BibTeX
- Hyun-A Park, Dong Hoon Lee, Justin Zhan, Gary Blosser:
Efficient keyword index search over encrypted documents of groups.
225-229
Electronic Edition (link) BibTeX
- Yu-Jie Chang, Ja-Chen Lin:
Data hiding using VQ index file.
230-232
Electronic Edition (link) BibTeX
- M. M. Fard, N. Mozayani:
A new on-line signature verification by Spatio-Temporal neural network.
233-235
Electronic Edition (link) BibTeX
- Ickjai Lee, Christopher Torpelund-Bruin:
Multiplicatively-weighted order-k Minkowski-metric Voronoi models for disaster decision support systems.
236-238
Electronic Edition (link) BibTeX
- Chung-Hao Chen, TeYu Chien, Wen-Chao Yang, Che-Yen Wen:
Restoration of linear motion and out-of-focus blurred images in surveillance systems.
239-241
Electronic Edition (link) BibTeX
- Zhong Gao, Guanming Lu, Mengjue Liu, Meng Cui:
A novel risk assessment system for port state control inspection.
242-244
Electronic Edition (link) BibTeX
- Wanli Ma, Dat Tran, Dharmendra Sharma:
A study on the feature selection of network traffic for intrusion detection purpose.
245-247
Electronic Edition (link) BibTeX
- Chien-Chuan Lin, Ming-Shi Wang:
Depth evaluation intrusion detection using Coloured Stochastic Petri Nets.
248-250
Electronic Edition (link) BibTeX
- Ji Zhang, Qigang Gao, Hai Wang:
Anomaly detection in high-dimensional network data streams: A case study.
251-253
Electronic Edition (link) BibTeX
- Guomeng Wang, Yanping Zhao:
A fast algorithm for data erasure.
254-256
Electronic Edition (link) BibTeX
- R. Charles:
KARIS: A multiple-scheme framework for encryption based on an annotation model for enhanced information security.
257-258
Electronic Edition (link) BibTeX
- Yu-Ping Fan, Cheng-Wei Chen:
The performance analysis of anti- terrorism intelligence from Taiwan's Investigation Bureau of the Ministry of Justice.
259-260
Electronic Edition (link) BibTeX
- Shih-Hsuan Chiu, Che-Yen Wen, Wei-Chieh Kao:
An effective surveillance video retrieval method based upon motion detection.
261-262
Electronic Edition (link) BibTeX
- Zhang Jian, Yao Tianfang:
A study of the identification of authorship for Chinese texts.
263-264
Electronic Edition (link) BibTeX
- Chao-Hsi Yeh, Chung-Huang Yang:
Design and implementation of honeypot systems based on open-source software.
265-266
Electronic Edition (link) BibTeX
- Robert Moskovitch, Clint Feher, Yuval Elovici:
Unknown malcode detection - A chronological evaluation.
267-268
Electronic Edition (link) BibTeX
- Kwo-Jean Farn, Shu-Kuo Lin, Kuo-Sui Lin, Chung-Huang Yang:
A study on critical infrastructure information technology Malfunction controls-- illustration of Taiwan.
269-270
Electronic Edition (link) BibTeX
- Sen-Jen Lin, Ja-Chen Lin, Wen-Pinn Fang:
Visual Cryptography (VC) with non-expanded shadow images: Hilbert-curve approach.
271-272
Electronic Edition (link) BibTeX
- Jun Wu, Dong-Hun Seo, Chi-Hwa Song, Won Don Lee:
A new classifier for numerical incomplete data.
273-274
Electronic Edition (link) BibTeX
- P. Panjiyar, P. Mourya, N. Bansal, P. Srivastava, A. Mukherjee:
Transport security using mobile technology.
275-276
Electronic Edition (link) BibTeX
- D. W. McMichael, R. Fu, S. Williams, G. A. Jarrad:
Sem@ntica: A system for semantic extraction and logical querying of text corpora.
277-278
Electronic Edition (link) BibTeX
- Ha-Thanh Le, Peter Kok Keong Loh:
Evaluating AVDL descriptions for web application vulnerability analysis.
279-281
Electronic Edition (link) BibTeX
- Jan-Mou Li, Chung-Hao Chen, Shang-Hsing Hsieh, Wen-Chao Yang, Che-Yen Wen:
Preparedness for post-disaster internet traffic management.
282-283
Electronic Edition (link) BibTeX
- Chia-Long Wu, Der-Chyuan Lou, Te-Jen Chang:
An efficient Montgomery exponentiation algorithm for public-key cryptosystems.
284-285
Electronic Edition (link) BibTeX
- Chorng-Shyong Ong, Min-Yuh Day, Kuo-Tay Chen, Wen-Lian Hsu:
User-centered evaluation of question answering systems.
286-287
Electronic Edition (link) BibTeX
- Guo-Lun Luo, H. Ker-Chang Chang:
A new online auction with convertible authenticated encryption and authentication.
288-289
Electronic Edition (link) BibTeX
- Weiping Chang, Chichao Lu, WenYuan Jen:
A study of integrated criminal justice data base system.
290-291
Electronic Edition (link) BibTeX
- Wen-Pinn Fang, Hong-Ru Lee, Fang-Pan Line:
An novel two layer user identification method.
292-293
Electronic Edition (link) BibTeX
- W. Al-Ahmad, R. Al-Kaabi:
An extended security framework for e-government.
294-295
Electronic Edition (link) BibTeX
Copyright © Sat May 16 23:25:35 2009
by Michael Ley (ley@uni-trier.de)