


default search action
8th ISI 2010: Vancouver, BC, Canada
- Christopher C. Yang, Daniel Zeng, Ke Wang, Antonio Sanfilippo, Herbert H. Tsang, Min-Yuh Day, Uwe Glässer, Patricia L. Brantingham, Hsinchun Chen:

IEEE International Conference on Intelligence and Security Informatics, ISI 2010, Vancouver, BC, Canada, May 23-26, 2010, Proceedings. IEEE 2010, ISBN 978-1-4244-6460-9 - Amir H. Ghaseminejad, Paul J. Brantingham:

An executive decision support system for longitudinal statistical analysis of crime and law enforcement performance crime analysis system pacific region (CASPR). 1-6 - Andrew J. Park, Valerie Spicer, Monique Guterres, Patricia L. Brantingham, Greg Jenion:

Testing perception of crime in a virtual environment. 7-12 - Richard Frank, Andrew J. Park, Patricia L. Brantingham, Joseph Clare, Kathryn Wuschke, Mona Vajihollahi:

Identifying high risk crime areas using topology. 13-18 - Vládia Pinheiro

, Vasco Furtado
, Tarcisio H. C. Pequeno, Douglas Nogueira:
Natural Language Processing based on Semantic inferentialism for extracting crime information from text. 19-24 - Huiqi Zhang, Ram Dantu:

Predicting social ties in mobile phone networks. 25-30 - Michael D. Porter

, Ryan Smith:
Network neighborhood analysis. 31-36 - Richard Colbaugh, Kristin Glass:

Early warning analysis for social diffusion events. 37-42 - Xuning Tang, Christopher C. Yang:

Identifing influential users in an online healthcare social network. 43-48 - Xuning Tang, Christopher C. Yang:

Generalizing terrorist social networks with K-nearest neighbor and edge betweeness for social network integration and privacy preservation. 49-54 - Michael Gallagher:

The U.S. and the EU differences in anti-terrorism efforts. 55-58 - Yulei Zhang, Shuo Zeng, Chunneng Huang, Li Fan, Ximing Yu, Yan Dang, Catherine A. Larson, Dorothy E. Denning, Nancy Roberts, Hsinchun Chen:

Developing a Dark Web collection and infrastructure for computational and social sciences. 59-64 - Xiaochen Li, Wenji Mao, Daniel Zeng, Fei-Yue Wang:

Automatic construction of domain theory for attack planning. 65-70 - Herbert H. Tsang

, Andrew J. Park, Mengting Sun, Uwe Glässer:
GENIUS: A computational modeling framework for counter-terrorism planning and response. 71-76 - Paul Elzinga, Jonas Poelmans, Stijn Viaene

, Guido Dedene, Shanti Morsing:
Terrorist threat assessment with formal concept analysis. 77-82 - Antonio Badia

:
Balancing security and information sharing in intelligence databases. 83-88 - Ayman E. Taha, Ismail Abdel Ghaffar, Ayman M. Bahaa Eldin

, Hani M. K. Mahdi
:
Agent based correlation model for intrusion detection alerts. 89-94 - Shun-Wen Hsiao

, Yeali S. Sun, Meng Chang Chen, Hui Zhang:
Cross-level behavioral analysis for robust early intrusion detection. 95-100 - Uwe Glässer, Piper J. Jackson

, Ali Khalili Araghi, Hamed Yaghoubi Shahir:
Intelligent decision support for Marine safety and Security Operations. 101-107 - Kristin Glass, Richard Colbaugh, Max Planck:

Automatically identifying the sources of large Internet events. 108-113 - Xu Chen, Tak-Shing Peter Yum:

Cross Entropy approach for patrol route planning in dynamic environments. 114-119 - Svitlana Volkova, William H. Hsu:

Computational knowledge and information management in veterinary epidemiology. 120-125 - Roger B. Bradford:

Entity refinement using latent semantic indexing. 126-128 - Gaston L'Huillier

, Alejandro Hevia
, Richard Weber
, Sebastián A. Ríos:
Latent semantic analysis and keyword extraction for phishing classification. 129-131 - Jenq-Haur Wang

:
Unsupervised multilingual concept discovery from daily online news extracts. 132-134 - Richard Colbaugh, Kristin Glass:

Estimating sentiment orientation in social media for intelligence monitoring and analysis. 135-137 - Jonathan Brett Crawley, Gerhard Wagner:

Desktop text mining for law enforcement. 138-140 - Qing Chen, Timothy Shipper, Latifur Khan

:
Tweets mining using WIKIPEDIA and impurity cluster measurement. 141-143 - David Zimbra, Hsinchun Chen:

Comparing the virtual linkage intensity and real world proximity of social movements. 144-146 - Baojun Qiu, Kristinka Ivanova

, John Yen, Peng Liu:
Study of effect of node seniority in social networks. 147-149 - Sibel Adali, Robert Escriva, Mark K. Goldberg, Mykola Hayvanovych, Malik Magdon-Ismail, Boleslaw K. Szymanski

, William A. Wallace, Gregory Todd Williams:
Measuring behavioral trust in social networks. 150-152 - Lei Wang

, Tianbing Xia
, Jennifer Seberry:
Inter-Domain Routing Validator Based Spoofing Defence System. 153-155 - Wei-Bin Lee, Hsing-Bai Chen, Ching-Chih Cheng:

Secure communication between set-top box and smart card for fair use in DTV broadcasting. 156-158 - John Warden:

BI -Intelligence for the business of crime fighting. 159-161 - Yan Gao, Xiaolin Zhang:

Real time tracking of a remote moving object by active zoom cameras. 162-164 - Arvind K. Verma, Ramyaa Ramyaa, Suresh Marru

, Ye Fan, Raminder Singh:
Rationalizing police patrol beats using Voronoi Tessellations. 165-167 - Xiangtao Liu, Xueqi Cheng, Jingyuan Li

, Haijun Zhai, Shuo Bai:
Identifying vulgar content in eMule network through text classification. 168 - Zahri Yunos, Syahrul Hafidz Suid:

Protection of Critical National Information Infrastructure (CNII) against cyber terrorism: Development of strategy and policy framework. 169 - Yungchang Ku, Chaochang Chiu, Yulei Zhang, Li Fan, Hsinchun Chen:

Global disease surveillance using social media: HIV/AIDS content intervention in web forums. 170 - Adriana Esmeraldo de Oliveira, Gustavo Henrique Matos Bezerra Motta, Leonardo Vidal Batista:

A multibiometric access control architecture for continuous authentication. 171 - Wen-Chung Kuo, Jiin-Chiou Cheng, Yen-Hung Lin, Lih-Chyau Wuu:

Digitally signed document flexible sanitizing scheme based on bilinear maps. 172 - Martin Atkinson, Jenya Belayeva, Vanni Zavarella

, Jakub Piskorski, Silja Huttunen, Arto Vihavainen, Roman Yangarber
:
News mining for border security Intelligence. 173 - Yan Tang, Kendra M. L. Cooper, João W. Cangussu, Kun Tian, Yin Wu:

Towards effective improvement of the Bayesian Belief Network Structure learning. 174 - Syed Toufeeq Ahmed, Sukru Tikves

, Hasan Davulcu:
Clustering and mapping related news about violence events on their time-lines. 175 - Boris Y. L. Chan, Vincent Ng

:
HPC - privacy model for collaborative skyline processing. 176 - Antonio Sanfilippo

:
Workshop on current issues in predictive approaches to intelligence and security analytics. 177-178 - Lucas A. Overbey, Gregory McKoy, Jesse Gordon, Shannon McKitrick:

Automated sensing and social network analysis in virtual worlds. 179-184 - Alexander H. Levis, Lee W. Wagenhals, Abbas K. Zaidi:

Multi-modeling of adversary behaviors. 185-189 - William N. Reynolds:

Breadth-depth triangulation for validation of modeling and simulation of complex systems. 190-195 - Zahra Mohaghegh

:
Combining System Dynamics and Bayesian Belief Networks for Socio-Technical Risk Analysis. 196-201 - Erwin Chan, Jason Ginsburg, Brian Ten Eyck, Jerzy W. Rozenblit, Mike Dameron:

Text analysis and entity extraction in asymmetric threat response and prediction. 202-207 - Thomas F. Sanquist, Bin Shui

, Heather Orr:
Integrated assessment modeling of energy consumption behavior and carbon emissions. 208-211 - Faisal Mansoor, Abbas K. Zaidi, Alexander H. Levis:

Meta-model driven construction of Timed Influence Nets. 212-217 - Minh Tam Le, John Sweeney, Edo Liberty, Steven W. Zucker:

Similarity kernels via bi-clustering for conventional intergovernmental organizations. 218-220 - William N. Reynolds, Marta S. Weber, Robert M. Farber, Courtney D. Corley, Andrew J. Cowell

, Michelle L. Gregory:
Social media and social reality. 221-226 - Stephen J. Walsh

, Angela Dalton, Paul Whitney, Amanda M. White:
Parameterizing bayesian network representations of social-behavioral models by expert elicitation. 227-232 - Andrew J. Cowell

, Russell S. Jensen, Michelle L. Gregory, Peter C. Ellis, Keith Fligg, Liam McGrath, Kelly O'Hara, Eric Belanga Bell:
Collaborative knowledge discovery & marshalling for intelligence & security applications. 233-238

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














