default search action
PAISI 2007: Chengdu, China
- Christopher C. Yang, Daniel Dajun Zeng, Michael Chau, Kuiyu Chang, Qing Yang, Xueqi Cheng, Jue Wang, Fei-Yue Wang, Hsinchun Chen:
Intelligence and Security Informatics, Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007, Proceedings. Lecture Notes in Computer Science 4430, Springer 2007, ISBN 978-3-540-71548-1
Keynote
- Hsinchun Chen:
Exploring Extremism and Terrorism on the Web: The Dark Web Project. 1-20
Long Papers
Crime Analysis
- Christopher C. Yang, Tobun D. Ng, Jau-Hwang Wang, Chih-Ping Wei, Hsinchun Chen:
Analyzing and Visualizing Gray Web Forum Structure. 21-33 - Yungchang Ku, Ying-Chieh Chen, Kuo-Ching Wu, Chaochang Chiu:
An Empirical Analysis of Online Gaming Crime Characteristics from 2002 to 2004. 34-45 - Flora S. Tsai, Kap Luk Chan:
Detecting Cyber Security Threats in Weblogs Using Probabilistic Models. 46-57
Emergency Response and Surveillance
- Ickjai Lee, Reece Pershouse, Peter Phillips, Chris Christensen:
What-if Emergency Management System: A Generalized Voronoi Diagram Approach. 58-69 - Yujun Zheng, Jinquan Wang, Jinyun Xue:
Agent Based Framework for Emergency Rescue and Assistance Planning. 70-81 - Huimin Qian, Yaobin Mao, Jason Geng, Zhiquan Wang:
Object Tracking with Self-updating Tracking Window. 82-93 - Jidi Zhao, Tao Jin, Huizhang Shen:
A Case-Based Evolutionary Group Decision Support Method for Emergency Response. 94-104
Intrusion Detection
- Haiguang Chen, Peng Han, Xi Zhou, Chuanshan Gao:
Lightweight Anomaly Intrusion Detection in Wireless Sensor Networks. 105-116 - Li Jin, Zhengding Lu:
ASITL: Adaptive Secure Interoperation Using Trust-Level. 117-128 - Zhensong Liao, Hai Jin:
A RT0-Based Compliance Checker Model for Automated Trust Negotiation. 129-140 - Yang Li, Binxing Fang, Li Guo, You Chen:
TCM-KNN Algorithm for Supervised Network Intrusion Detection. 141-151 - Quan Qian, Mingjun Xin:
Research on Hidden Markov Model for System Call Anomaly Detection. 152-159
Network Security
- Zhitang Li, Jie Lei, Li Wang, Dong Li, Yang-ming Ma:
Towards Identifying True Threat from Network Security Data. 160-171 - Hyungwoo Kang, Dong Hoon Lee:
Security Assessment for Application Network Services Using Fault Injection. 172-183 - Shejie Lu, Jun Li, Zhiyuan Liu, Guohua Cui:
A Secure Data Transmission Protocol for Mobile Ad Hoc Networks. 184-195 - Xin Xu, Yongqiang Sun, Zunguo Huang:
Defending DDoS Attacks Using Hidden Markov Models and Cooperative Reinforcement Learning. 196-207 - Yu Fu, Cong Jin, Chuanxiang Ma:
A Novel Relational Database Watermarking Algorithm. 208-219
Short Papers
Data and Text Mining
- Kuiyu Chang, Qi He, Ridzwan Aminuddin, Ridzwan Suri, Ee-Peng Lim:
Anticipatory Event Detection for Bursty Events. 220-225 - Rong Qian, Wei Zhang, Bingru Yang:
Community Detection in Scale-Free Networks Based on Hypergraph Model. 226-231 - C. X. Wei, Xianbin Cao, Yanwu Xu, Hong Qiao, Fei-Yue Wang:
The Treelike Assembly Classifier for Pedestrian Detection. 232-237
Cybercrime and Information Access and Security
- Yungchang Ku, Yuchi Chen, Chaochang Chiu:
A Proposed Data Mining Approach for Internet Auction Fraud Detection. 238-243 - Chichao Lu, WenYuan Jen, Weiping Chang:
Trends in Computer Crime and Cybercrime Research During the Period 1974-2006: A Bibliometric Approach. 244-250 - Yuan-Fa Chen, Sandy Yu-Lan Yeh, Kuo-Ching Wu:
The Study of Government Website Information Disclosure in Taiwan. 251-256 - William Zhu:
Informed Recognition in Software Watermarking. 257-261 - Jianjiang Lu, Jinpeng Wang, Yafei Zhang, Bo Zhou, Yanhui Li, Zhuang Miao:
An Inference Control Algorithm for RDF(S) Repository. 262-268
Intrusion Detection
- Hyun-A Park, Dong Hoon Lee, Jongin Lim, Sang Hyun Cho:
PPIDS: Privacy Preserving Intrusion Detection System. 269-274 - Baowen Zhang, Jing Zhang, Ning Zhou, Mingang Chen:
Evaluating the Disaster Defense Ability of Information Systems. 275-281 - Yong Deng, Jia Xiong, Ping Fu:
Airline Safety Evaluation Based on Fuzzy TOPSIS. 282-287
Network Security
- Mi Wen, Ling Dong, Yanfei Zheng, Kefei Chen:
A Framework for Proving the Security of Data Transmission Protocols in Sensor Network. 288-294 - Leyi Shi, Chunfu Jia, Shuwang Lü, Zhenhua Liu:
Port and Address Hopping for Active Cyber-Defense. 295-300 - Eul-Gyu Im, Jung Sik Kim, In Woo Noh, Hyun Jun Jang:
A Hybrid Model for Worm Simulations in a Large Network. 301-306
Posters
Terrorism Informatics and Crime Analysis
- Daniel Dajun Zeng, Li Zhang, Donghua Wei, Fei-Yue Wang:
A Web Portal for Terrorism Activities in China. 307-308 - Jau-Hwang Wang, Jiing-Long Jow, You-Lu Liao, Tyan-Muh Tsai, Garfield Hung:
An Overview of Telemarketing Fraud Problems and Countermeasures in Taiwan. 309-310 - Qihong Liu, Changjie Tang, Shaojie Qiao, Qiwei Liu, Fenlian Wen:
Mining the Core Member of Terrorist Crime Group Based on Social Network Analysis. 311-313 - Qiudan Li, Yaodong Li, Huiguang He, Guanggang Geng, Yuanping Zhu, Chunheng Wang:
Providing Personalized Services for HWME System by Item-Based Collaborative Filtering. 314-315
Network Security and Intrusion Detection
- Yang-ming Ma, Zhitang Li, Jie Lei, Li Wang, Dong Li:
An Intelligent Agent-Oriented System for Integrating Network Security Devices and Handling Large Amount of Security Events. 316-317 - Daniel Dajun Zeng, Zan Huang:
Link Analysis-Based Detection of Anomalous Communication Patterns. 318-320 - Wenji Mao, Daniel Dajun Zeng, Li Zhang, Donghua Wei, Fei-Yue Wang:
Social Modeling and Reasoning for Security Informatics. 321-322 - Hao Tu, Zhitang Li, Bin Liu:
Detecting Botnets by Analyzing DNS Traffic. 323-324 - Young-Gab Kim, Jongin Lim:
HMM-Based Approach for Evaluating Risk Propagation. 325-326 - Ki-Yoon Kim, Hyoung-Kee Choi:
A Symptom-Based Taxonomy for an Early Detection of Network Attacks. 327-328
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.