default search action
11th ISI 2013: Seattle, WA, USA
- Kristin Glass, Richard Colbaugh, Antonio Sanfilippo, Anne Kao, Michael Gabbay, Courtney D. Corley, Jiexun Li, Latifur Khan, Adam Wynne, Lisa Coote, Wenji Mao, Daniel Zeng, Ahmad Yaghoobi:
2013 IEEE International Conference on Intelligence and Security Informatics, Seattle, WA, USA, June 4-7, 2013. IEEE 2013, ISBN 978-1-4673-6214-6 - Welcome message from conference co-chairs.
- Fabrizio Albertetti, Paul Cotofrei, Lionel Grossrieder, Olivier Ribaux, Kilian Stoffel:
Crime linkage: A fuzzy MCDM approach. 1-3 - Evmorfia N. Argyriou, Aikaterini A. Sotiraki, Antonios Symvonis:
Occupational fraud detection through visualization. 4-6 - Olga Babko-Malaya, Daniel Hunter, Andy Seidel, Fotios Barlos:
Flexible creation of indicators of scientific and technological emergence: Emerging phenomena and big data. 7-9 - Yolanda S. Baker, Rajeev Agrawal, Sambit Bhattacharya:
Analyzing security threats as reported by the United States Computer Emergency Readiness Team (US-CERT). 10-12 - Travis L. Bauer, Daniel Garcia, Richard Colbaugh, Kristin Glass:
Detecting collaboration from behavior. 13-15 - Victor A. Benjamin, Wingyan Chung, Ahmed Abbasi, Joshua Chuang, Catherine A. Larson, Hsinchun Chen:
Evaluating text visualization: An experiment in authorship analysis. 16-20 - Victor A. Benjamin, Hsinchun Chen:
Machine learning for attack vector identification in malicious source code. 21-23 - Lauren Bradel, Jessica Zeitz Self, Alex Endert, Mahmud Shahriar Hossain, Chris North, Naren Ramakrishnan:
How analysts cognitively "connect the dots". 24-26 - Roger B. Bradford:
Use of latent semantic indexing to identify name variants in large data collections. 27-32 - Joel Brynielsson, Fredrik Johansson, Anders Westling:
Learning to classify emotional content in crisis-related tweets. 33-38 - Yingjie Victor Chen, Zhenyu Cheryl Qian:
From when and what to where: Linking spatio-temporal visualizations in visual analytics. 39-44 - Richard Colbaugh, Kristin Glass, Travis L. Bauer:
Dynamic information-theoretic measures for security informatics. 45-49 - Richard Colbaugh, Kristin Glass:
Moving target defense for adaptive adversaries. 50-55 - Ryan Compton, Craig Lee, Tsai-Ching Lu, Lalindra De Silva, Michael Macy:
Detecting future social unrest in unprocessed Twitter data: "Emerging phenomena and big data". 56-60 - Courtney D. Corley, Chase P. Dowling, Stuart J. Rose, Taylor McKenzie:
SociAL Sensor Analytics: Measuring phenomenology at scale. 61-66 - Dave DeBarr, Venkatesh Ramanathan, Harry Wechsler:
Phishing detection using traffic behavior, spectral clustering, and random forests. 67-72 - Zakariya Dehlawi, Norah Abokhodair:
Saudi Arabia's response to cyber conflict: A case study of the Shamoon malware incident. 73-75 - Sihao Ding, Qiang Zhai, Yuan F. Zheng, Dong Xuan:
Side-view face authentication based on wavelet and random forest with subsets. 76-81 - Honglu Du, Heng Xu, Mary Beth Rosson, John M. Carroll:
Effects of Fear appeals and point of reference on the persuasiveness of IT security communications. 82-84 - Vinayak Elangovan, Amjad Alkilani, Amir Shirkhodaie:
A multi-modality attributes representation scheme for Group Activity characterization and data fusion. 85-90 - Yolanda Gil:
Towards task-centered network models through semantic workflows. 91-93 - Frank L. Greitzer, Thomas E. Carroll, Adam D. Roberts:
Cyber friendly fire: Research challenges for security informatics. 94-99 - Siddharth Gupta, Casey Hanson, Carl A. Gunter, Mario Frank, David M. Liebovitz, Bradley A. Malin:
Modeling and detecting anomalous topic access. 100-105 - Kevin W. Hamlen:
Stealthy software: Next-generation cyber-attacks and defenses. 109-112 - Duncan Hodges, Sadie Creese:
Building a better intelligence machine: A new approach to capability review and development. 113-115 - Luwen Huangfu, Wenji Mao, Daniel Zeng, Lei Wang:
OCC model-based emotion extraction from online reviews. 116-121 - James R. Johnson:
Information graphs of event threads: Identifying and building forward and backward event threads for societal events. 122-128 - John R. Johnson, Emilie Hogan:
A graph analytic metric for mitigating advanced persistent threat. 129-133 - Irfan E. Kanat, Sathananda Siloju, T. S. Raghu, Ajay S. Vinze:
Gamification of emergency response training: A public health example. 134-136 - Anne Kao, William Ferng, Stephen R. Poteet, Lesley Quach, Rodney Tjoelker:
TALISON - Tensor analysis of social media data. 137-142 - Gabi Kedma, Mordechai Guri, Tom Sela, Yuval Elovici:
Analyzing users' web surfing patterns to trace terrorists and criminals. 143-145 - Brendan Kitts, Jing Ying Zhang, Albert Roux, Ron Mills:
Click Fraud Detection with Bot Signatures. 146-150 - Brendan Kitts, Jing Ying Zhang, Gang Wu, Raj Mahato:
Click fraud botnet detection by calculating mix adjusted traffic value: A method for de-cloaking click fraud attacks that is resistant to spoofing. 151-153 - Qingchao Kong, Wenji Mao, Daniel Zeng:
Predicting user participation in social networking sites. 154-156 - Donald R. Kretz, Charles W. Granderson:
An interdisciplinary approach to studying and improving terrorism analysis. 157-159 - C. E. Lamb, David B. Skillicorn:
Detecting deception in interrogation settings. 160-162 - Minh Tam Le, John Sweeney, Matthew Lawlor, Steven W. Zucker:
Discovering thematic structure in political datasets. 163-165 - Li Liu, Yuanzhuo Wang, Jing Ding:
Stochastic game model for information dissemination of emergency events in social network. 166-168 - Pedro D. Manrique, Hong Qi, Ana Morgenstern, Nicolas Velasquez, Tsai-Ching Lu, Neil F. Johnson:
Context matters: Improving the uses of big data for forecasting civil unrest: Emerging phenomena and big data. 169-172 - Rudolph Louis Mappus IV, Erica Briscoe:
Layered behavioral trace modeling for threat detection. 173-175 - David Matsumoto, Hyisung C. Hwang:
Differences between individuals with and without experience with assault in identifying facial signs of imminent aggression. 176-178 - Benjamin A. Miller, Nicholas Arcolano, Nadya T. Bliss:
Efficient anomaly detection in dynamic, attributed graphs: Emerging phenomena and big data. 179-184 - Jonathan Mugan, Eric McDermid, Abbey McGrew, Laura Hitt:
Identifying groups of interest through temporal analysis and event response monitoring. 185-190 - Josephine M. Namayanja, Vandana Pursnani Janeja:
Discovery of persistent threat structures through temporal and geo-spatial characterization in evolving networks. 191-196 - Kenneth C. Olson, Christopher W. Karvetski:
Improving expert judgment by coherence weighting. 197-199 - Simon F. Pratt, Philippe J. Giabbanelli, Jean-Sebastien Mercier:
Detecting unfolding crises with Visual Analytics and Conceptual Maps Emerging phenomena and big data. 200-205 - Alan S. Ratner, Phillip Kelly:
Anomalies in network traffic. 206-208 - Andrew A. Reid, Mohammad A. Tayebi, Richard Frank:
Exploring the structural characteristics of social networks in a large criminal court database. 209-214 - Edna F. Reid:
Crowdsourcing and gamification techniques in Inspire (AQAP online magazine). 215-220 - William N. Reynolds, William J. Salter, Robert M. Farber, Courtney D. Corley, Chase P. Dowling, William O. Beeman, Lynn Smith-Lovin, Joon Nak Choi:
Sociolect-based community detection. 221-226 - Bob G. Schlicher, Robert K. Abercrombie, Lee M. Hively:
Conceptual framework to enable early warning of relevant phenomena "Emerging phenomena and big data". 227-229 - Hamed Yaghoubi Shahir, Uwe Glässer, Narek Nalbandyan, Hans Wehn:
Maritime situation analysis. 230-232 - Yanmin Shang, Peng Zhang, Yanan Cao, Li Guo:
Behavioral targeting with social regularization. 233-238 - David B. Skillicorn, Edna F. Reid:
Language use in Inspire magazine. 239-244 - Justin Song, Valerie Spicer, Patricia L. Brantingham:
The edge effect: Exploring high crime zones near residential neighborhoods. 245-250 - Lora Weiss, Erica Briscoe, Walter Wright, Sim Harbert, Keith Kline, John Horgan, Lily Cushenbery, Casey Hilland:
A model docking system for understanding radicalization. 251-253 - David Zage, Kristin Glass, Richard Colbaugh:
Improving supply chain security using big data. 254-259 - Jessica Zeitz Self, Rebecca Zeitz, Chris North, Alan L. Breitler:
Auto-Highlighter: Identifying Salient Sentences in Text. 260-262 - Chen Zhong, Deepak S. Kirubakaran, John Yen, Peng Liu, Steve E. Hutchinson, Hasan Cam:
How to use experience in cyber analysis: An analytical reasoning support system. 263-265 - Luca Cazzanti, Courosh Mehanian, Julie Penzotti, Doug Scott, Oliver Downs:
Unsupervised ranking and characterization of differentiated clusters. 266 - Laura Hitt, Matt McClain:
Identifying threatening networks from transactional data. 267 - Doowon Kim, Chaitanya Achan, Jinsuk Baek, Paul S. Fisher:
Implementation of framework to identify potential phishing websites. 268 - Wesley Brandi, Brendan Kitts, Raj Mahato, Jing Ying Zhang:
Armored ads. 269 - Sangho Lee, Da Young Ju:
Assessment of malicious applications using permissions and enhanced user interfaces on Android. 270 - Po-Ruey Lei:
Exploring trajectory behavior model for anomaly detection in maritime moving objects. 271 - Sadi Evren Seker, Cihan Mert, Khaled Al-Naami, Ugur Ayan, Nuri Ozalp:
Ensemble classification over stock market time series and economy news. 272-273 - Peng Su, Dan Zhu, Daniel Dajun Zeng:
A new pruning method for resolving conflicts in actionable behavioral rules. 274 - Carrie Gates, Sophie Engle:
Reflecting on visualization for cyber security. 275-277 - Christopher W. Berardi, Erin Treacy Solovey, Mary L. Cummings:
Investigating the efficacy of network visualizations for intelligence tasks. 278-283 - Nicklaus A. Giacobe, Michael D. McNeese, Vincent F. Mancuso, Dev Minotra:
Capturing human cognition in cyber-security simulations with NETS. 284-288 - John Donahue, Anand Paturi, Srinivas Mukkamala:
Visualization techniques for efficient malware detection. 289-291 - John T. Langton, Alex Baker:
Information visualization metrics and methods for cyber security evaluation. 292-294 - Ziyad Alshaikh, Abdulrahman Alarifi, Mansour Alsaleh:
Christopher Alexander's fifteen properties: Toward developing evaluation metrics for security visualizations. 295-300 - Nathan A. Baker, Jonathan L. Barr, George T. Bonheyo, Cliff A. Joslyn, Kannan Krishnaswami, Mark E. Oxley, Rich Quadrel, Landon H. Sego, Mark F. Tardiff, Adam S. Wynne:
Research towards a systematic signature discovery process. 301-308 - Alexander M. Venzin, Mark E. Oxley, Nathaniel Beagley:
An investigation into label fusion on sparse data. 309-314 - Emilie Hogan, John R. Johnson, Mahantesh Halappanavar, Chaomei Lo:
Graph analytics for signature discovery. 315-320 - Shan Suthaharan, Laxmi Sunkara, Sweta Keshapagu:
Lame' curve-based signature discovery learning technique for network traffic classification. 321-326 - Arun V. Sathanur, Vikram Jandhyala, Chuanjia Xing:
Capturing signatures of anomalous behavior in online social networks. 327-329 - Elena S. Peterson, Darren S. Curtis, Aaron R. Phillips, Jeremy Teuton, Christopher S. Oehmen:
A generalized bio-inspired method for discovering sequence-based signatures. 330-332 - Ka Yee Yeung:
Signature discovery for personalized medicine. 333-338 - Zoe N. Gastelum, Amanda M. White, Paul D. Whitney, Luke J. Gosink, Landon H. Sego:
The lifecycle of Bayesian network models developed for Multi-Source Signature assessment of Nuclear Programs. 339-345 - Landon H. Sego, Aimee E. Holmes, Luke J. Gosink, Bobbie-Jo M. Webb-Robertson, Helen W. Kreuzer, Richard M. Anderson, Alan J. Brothers, Courtney D. Corley, Mark R. Tardiff:
Assessing the quality of bioforensic signatures. 346-351 - Yarden Livnat, Elizabeth Jurrus, Adi V. Gundlapalli, Per Gestland:
The CommonGround visual paradigm for biosurveillance. 352-357 - Arun V. Sathanur, Vikram Jandhyala, Chuanjia Xing:
PHYSENSE: Scalable sociological interaction models for influence estimation on online social networks. 358-363 - Daniel C. Krawczyk, James Bartlett, Murat Kantarcioglu, Kevin W. Hamlen, Bhavani Thuraisingham:
Measuring expertise and bias in cyber security using cognitive and neuroscience approaches. 364-367 - Ansheng Ge, Wenji Mao, Daniel Zeng, Lei Wang:
Action knowledge extraction from Web text. 368-370 - Zhu Zhang, Xiaolong Zheng, Daniel Dajun Zeng, Kainan Cui, Chuan Luo, Saike He, Scott Leischow:
Discovering seasonal patterns of smoking behavior using online search information. 371-373 - Jie Wang, Xuwei Liang:
Discovering the rating pattern of online reviewers through data coclustering. 374-376 - Chase P. Dowling, Courtney D. Corley, Robert M. Farber, William N. Reynolds:
Jargon and graph modularity on twitter. 381-383
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.