default search action
10th ISI 2012: Washington, DC, USA
- Daniel Zeng, Lina Zhou, Bojan Cukic, G. Alan Wang, Christopher C. Yang:
2012 IEEE International Conference on Intelligence and Security Informatics, ISI 2012, Washington, DC, USA, June 11-14, 2012. IEEE 2012, ISBN 978-1-4673-2105-1 - Nguyen Thanh Hung, Do Hoang Giang, Wee Keong Ng, Huafei Zhu:
Cloud-enabled data sharing model. 1-6 - Hsien-Ming Chou, Lina Zhou:
A game theory approach to deception strategy in computer mediated communication. 7-11 - Ahmed Abbasi, Fatemeh Zahedi, Yan Chen:
Impact of anti-phishing tool performance on attack success rates. 12-17 - Richard Colbaugh, Kristin Glass:
Predictive defense against evolving adversaries. 18-23 - Victor A. Benjamin, Hsinchun Chen:
Securing cyberspace: Identifying key actors in hacker communities. 24-29 - Zhenmin Lin, Jerzy W. Jaromczyk:
An efficient secure comparison protocol. 30-35 - Xiaofeng Wang, Donald E. Brown, Matthew S. Gerber:
Spatio-temporal modeling of criminal incidents using geographic, demographic, and twitter-derived information. 36-41 - David B. Skillicorn:
Outlier detection using semantic sensors. 42-47 - Yang Song, Xiaolin Zhang:
An active binocular integrated system for intelligent robot vision. 48-53 - Yue Zhang, Donald E. Brown:
Police patrol district design using agent-based simulation and GIS. 54-59 - Michael Yip, Nigel Shadbolt, Craig Webber:
Structural analysis of online criminal social networks. 60-65 - Richard Colbaugh, Kristin Glass:
Leveraging sociological models for prediction I: Inferring adversarial relationships. 66-71 - Richard Colbaugh, Kristin Glass:
Leveraging sociological models for prediction II: Early warning for complex contagions. 72-77 - David Zimbra, Hsinchun Chen:
Scalable sentiment classification across multiple Dark Web Forums. 78-83 - Richard Mason, Brian James McInnis, Siddhartha R. Dalal:
Machine learning for the automatic identification of terrorist incidents in worldwide news media. 84-89 - Simon F. Pratt, Philippe J. Giabbanelli, Piper J. Jackson, Vijay Kumar Mago:
Rebel with many causes: A computational model of insurgency. 90-95 - Ming Yang, Hsinchun Chen:
Partially supervised learning for radical opinion identification in hate group web forums. 96-101 - Venkatesh Ramanathan, Harry Wechsler:
Phishing website detection using Latent Dirichlet Allocation and AdaBoost. 102-107 - Jiyoung Woo, Hsinchun Chen:
An event-driven SIR model for topic diffusion in web forums. 108-113 - Zhangwen Tan, Wenji Mao, Daniel Zeng, Xiaochen Li, Xiuguo Bao:
Acquiring netizen group's opinions for modeling food safety events. 114-119 - Kristin Glass, Richard Colbaugh:
Agile detection of framing rhetoric in social media. 120-122 - Xiarong Li, Daniel Zeng, Lei Wang:
Click frauds and price determination models. 123-125 - Jason Koepke, Siddharth Kaza, Ahmed Abbasi:
Exploratory experiments to identify fake websites by using features from the network stack. 126-128 - Antonio Badia:
Evaluating source trustability with data provenance: A research note. 129-131 - Jan Kallberg, Bhavani Thuraisingham:
Towards cyber operations - The new role of academic cyber security research and education. 132-134 - Shen-Shyang Ho:
Preserving privacy for moving objects data mining. 135-137 - Minh Tam Le, John Sweeney, Bruce M. Russett, Steven W. Zucker:
Structural inference in political science datasets. 138-140 - Pallabi Parveen, Bhavani Thuraisingham:
Unsupervised incremental sequence learning for insider threat detection. 141-143 - Vance Chiang-Chi Liao, Ming-Syan Chen:
Efficient mining structural motifs for biosequences with intra- and inter-block gap constraints. 144-146 - Vladimir Avram, Uwe Glässer, Hamed Yaghoubi Shahir:
Anomaly detection in spatiotemporal data in the maritime domain. 147-149 - Shan Suthaharan:
A unit-circle classification algorithm to characterize back attack and normal traffic for intrusion detection. 150-152 - Mark K. Goldberg, J. Greenman, Bridget Gutting, Malik Magdon-Ismail, John Schwartz, William A. Wallace:
Graph search beyond text: Relational searches in semantic hyperlinked data. 153-155 - Fatih Özgül, Murat Gök, Zeki Erdem, Yakup Ozal:
Detecting criminal networks: SNA models are compared to proprietary models. 156-158 - Wingyan Chung:
Categorizing temporal events: A case study of domestic terrorism. 159-161 - Christian Leuprecht, Todd Hataley, David B. Skillicorn:
Vectors of extremism across the Canada-US border. 162-164 - Joshua Sinai:
Research note: Concept to develop a software-based counter-terrorism campaign decision support tool. 165-167 - Paul Jen-Hwa Hu, Xing Wan, Yan Dang, Catherine A. Larson, Hsinchun Chen:
Evaluating an integrated forum portal for terrorist surveillance and analysis. 168-170 - Tarique Anwar, Muhammad Abulaish:
Identifying cliques in dark web forums - An agglomerative clustering approach. 171-173 - Ansheng Ge, Wenji Mao, Daniel Zeng, Qingchao Kong, Huachi Zhu:
Extracting action knowledge in security informatics. 174-176 - James R. (Bob) Johnson, Anita Miller, Latifur Khan, Bhavani Thuraisingham:
Extracting semantic information structures from free text law enforcement data. 177-179 - David B. Skillicorn, P. K. Chandrasekaran:
Ranking documents by internal variability. 180-182 - Kelly Hughes, Yanzhen Qu:
A generic cyber attack response resource risk assessment model. 183 - Peng He, George Karabatis:
Using semantic networks to counter cyber threats. 184 - Do Quoc Le, Taeyoel Jeong, H. Eduardo Roman, James Won-Ki Hong:
Communication patterns based detection of anomalous network traffic. 185 - Neal Wagner, Vikas Agrawal:
Emergency decision support using an agent-based modeling approach. 186 - Mohammad S. Habibi:
Data exploitation using visual analytics. 187-192 - Ben-xian Li, Meng-jun Li, Duo-Yong Sun, Jiang Li, Wenju Li:
Evaluation method for node importance based on node condensation in terrorism networks. 193 - Wenju Li, Duoyong Sun, Ben-xian Li, Shu-Quan Guo, Ning Gu:
A robust evaluation of terrorist network based on node-lap degree of triads. 194 - Wingyan Chung, Wen Tang:
Building a web collection for online surveillance of U.S. domestic terrorism. 195 - Thirimachos Bourlai, Bojan Cukic:
Multi-spectral face recognition: Identification of people in difficult environments. 196-201 - Jay F. Nunamaker Jr., Judee K. Burgoon, Nathan W. Twyman, Jeffrey Gainer Proudfoot, Ryan M. Schuetzler, Justin Scott Giboney:
Establishing a foundation for automated human credibility screening. 202-211 - Siddharth Kaza, Hsin-Min Lu, Daniel Zeng, Hsinchun Chen:
Using burst detection techniques to identify suspicious vehicular traffic at border crossings. 212-214 - Satyen Abrol, Latifur Khan, Vaibhav Khadilkar, Bhavani Thuraisingham, Tyrone Cadenhead:
Design and implementation of SNODSOC: Novel class detection for social network analysis. 215-220 - Yuequn Li, Wenji Mao, Daniel Zeng, Luwen Huangfu, Chunyang Liu:
Extracting opinion explanations from Chinese online reviews. 221-223 - Hamid Reza Alipour, Daniel Zeng, Douglas C. Derrick:
AdaBoost-based sensor fusion for credibility assessment. 224-226 - Irina Sakharova:
Payment card fraud: Challenges and solutions. 227-234 - Weiyun Chen, Xin Li:
Deciphering wisdom of crowds from their influenced binary decisions. 235-240
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.