


default search action
9th ISI 2011: Beijing, China
- 2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011, Beijing, China, 10-12 July, 2011. IEEE 2011, ISBN 978-1-4577-0082-8

Terrorism Informatics
- Shuo Zeng, Mingfeng Lin, Hsinchun Chen:

Dynamic user-level affect analysis in social media: Modeling violence in the Dark Web. 1-6 - Hsinchun Chen, Dorothy E. Denning, Nancy Roberts, Catherine A. Larson, Ximing Yu, Chunneng Huang:

The Dark Web Forum Portal: From multi-lingual to video. 7-14 - Jiyoung Woo, Jaebong Son, Hsinchun Chen:

An SIR model for violent topic diffusion in social media. 15-19 - Irina Sakharova:

Al Qaeda terrorist financing and technologies to track the finance network. 20-25 - Duo-Yong Sun, Shu-Quan Guo, Ben-xian Li, Xiao-Peng Liu:

Study on covert networks of terrorists based on interactive relationship hypothesis. 26-30
Infrastructure Protection and Emergency Responses
- Heping Li, Jie Liu, Shuwu Zhang:

Automatic behavior model selection by iterative learning and abnormality recognition. 31-36 - Polina Zilberman, Shlomi Dolev

, Gilad Katz
, Yuval Elovici, Asaf Shabtai:
Analyzing group communication for preventing data leakage via email. 37-41 - Xiaofeng Wang, Donald E. Brown:

The spatio-temporal generalized additive model for criminal incidents. 42-47 - Hamed Yaghoubi Shahir, Uwe Glässer, Piper J. Jackson

, Hans Wehn:
Test-case generation for marine safety and security scenarios. 48-53 - Piper J. Jackson

, Uwe Glässer, Hamed Yaghoubi Shahir, Hans Wehn:
An extensible decision engine for Marine Safety and Security. 54-59 - Hsinchun Chen, Catherine A. Larson, Theodore Elhourani, David Zimbra, David Ware:

The Geopolitical Web: Assessing societal risk in an uncertain world. 60-64
Network-based Data Analytics
- Kristin Glass, Richard Colbaugh:

Estimating the sentiment of social media content for security informatics applications. 65-70 - Il-Chul Moon, Alice H. Oh, Kathleen M. Carley:

Analyzing social media in escalating crisis situations. 71-76 - Raymond Heatherly, Murat Kantarcioglu:

Extending the classification of nodes in social networks. 77-82
Text Mining and Content Analysis
- Jianping Zeng, Jiangjiao Duan, Chengrong Wu:

Topic discovery based on dual EM merging. 83-88 - Tam T. Nguyen, Kuiyu Chang, Siu Cheung Hui:

Supervised term weighting for sentiment analysis. 89-94 - Pir Abdul Rasool Qureshi, Nasrullah Memon, Uffe Kock Wiil:

LanguageNet: A novel framework for processing unstructured text information. 95-100 - James R. (Bob) Johnson, Anita Miller, Latifur Khan

, Bhavani Thuraisingham, Murat Kantarcioglu:
Identification of related information of interest across free text documents. 101-106 - James R. (Bob) Johnson, Anita Miller, Latifur Khan

, Bhavani Thuraisingham, Murat Kantarcioglu:
Extraction of expanded entity phrases. 107-112 - Patricia L. Brantingham, Paul J. Brantingham, Amir H. Ghaseminejad:

The distribution of event complexity in the British Columbia court system. 113-118
Enterprise Risk Management and Information Systems Security
- You Chen, Steve Nyemba, Wen Zhang, Bradley A. Malin

:
Leveraging social networks to detect anomalous insider actions in collaborative environments. 119-124 - Richard Colbaugh, Kristin Glass:

Proactive defense for evolving cyber threats. 125-130 - Maya Bercovitch, Meir Renford, Lior Hasson, Asaf Shabtai, Lior Rokach, Yuval Elovici:

HoneyGen: An automated honeytokens generator. 131-136 - Edith Felix, Olivier Delande, Fabio Massacci

, Federica Paci
:
Managing changes with legacy security engineering processes. 137-142 - Justin Zhan, B. John Oommen

, Johanna Crisostomo:
Anomaly detection using weak estimators. 143-149 - Jian Guan, James H. Graham, Jeffrey L. Hieb

:
A digraph model for risk identification and mangement in SCADA systems. 150-155
Innovative and Emerging Applications
- Zhanyong Tang, Dingyi Fang

:
A tamper-proof software watermark using code encryption. 156-160 - Hesiri Weerasinghe, Huirong Fu, Supeng Leng, Ye Zhu:

Enhancing unlinkability in Vehicular Ad Hoc Networks. 161-166 - Christopher C. Yang, Xuning Tang, Xiajing Gong:

Identifying Dark Web clusters with temporal coherence analysis. 167-172
Information Sharing and Data/Text Mining
- Jiexun Li, G. Alan Wang

:
Criminal identity resolution using social behavior and relationship attributes. 173-175 - Fatih Özgül

, Claus Atzenbeck, Ahmet Çelik, Zeki Erdem:
Incorporating data sources and methodologies for crime data mining. 176-180 - Peng Su, Wenji Mao, Daniel Zeng, Huimin Zhao:

Mining actionable behavioral rules from group data. 181-183 - Xiaochen Li, Wenji Mao, Daniel Zeng, Huachi Zhu:

Forecasting group behavior via multiple plan recognition. 184-186 - Zhenmin Lin, Jerzy W. Jaromczyk:

Privacy preserving two-party k-means clustering over vertically partitioned dataset. 187-191 - Richard Colbaugh, Kristin Glass:

Detecting emerging topics and trends via predictive analysis of 'meme' dynamics. 192-194 - Tarique Anwar

, Muhammad Abulaish
, Khaled Alghathbar:
Web content mining for alias identification: A first step towards suspect tracking. 195-197 - Christopher C. Yang:

Preserving privacy in social network integration with τ-tolerance. 198-200
Enterprise Risk Management and Information Systems Security
- Amir Harel, Asaf Shabtai, Lior Rokach, Yuval Elovici:

Dynamic Sensitivity-Based Access Control. 201-203 - Sk. Md. Mizanur Rahman

, Md. Mehedi Masud
, Carlisle Adams, Hussein T. Mouftah, Atsuo Inomata:
Session-wise private data exchange in eHealth peer-to-peer database management systems. 204-206 - Xiarong Li, Yong Liu, Daniel Zeng:

Publisher click fraud in the pay-per-click advertising market: Incentives and consequences. 207-209
Infrastructure Protection and Emergency Responses
- Jing Gong, William A. Wallace, John E. Mitchell:

Decision modeling for resilient infrastructures. 210-212 - He Gao, Yuanzhuo Wang, Li Wang, Li Liu, Jinming Li, Xueqi Cheng:

Trojan characteristics analysis based on Stochastic Petri Nets. 213-215
Innovative and Emerging Applications
- Muniba Shaikh, Nasrullah Memon, Uffe Kock Wiil:

Extended approximate string matching algorithms to detect name aliases. 216-219
Posters
- Xiaoting Li, Jingfu Yang, Zishan Wang:

The construction of accounting information system under the environment of the network. 220 - Ben-xian Li, Meng-jun Li:

Game analysis in international anti-terrorism strike. 221 - Yin-zhi Lei, Xiao-yin Zhou, Xi-peng Wei:

Research on government on-line information management and service. 222-225 - Jiwei Song:

The analysis of military intelligence early warning based on open source intelligence. 226 - Yanzhen Qu, Weiwen Yang:

Improving the security of the distributed enterprise data warehouse system. 227 - Arnaud Casteigts, Marie-Hélène Chomienne, Louise Bouchard, Guy-Vincent Jourdan:

Enabling dynamic linkage of linguistic census data at Statistics Canada (extended abstract). 228 - Timmy Nguyen, Leonidas Deligiannidis:

Utilizing infrared technology to prevent terrorist attacks. 229 - Alana Platt, Cynthia Hood, Levi Citrin:

Organization of social network messages to improve understanding of an evolving crisis. 230 - Pir Abdul Rasool Qureshi, Nasrullah Memon, Uffe Kock Wiil, Panagiotis Karampelas

, Jose Ignacio Nieto Sancheze:
heteroHarvest: Harvesting information from heterogeneous sources. 231 - Peter Mooney

, Huabo Sun, Padraig Corcoran, Lei Yan:
Citizen-generated spatial data and information: Risks and opportunities. 232
International Symposium on System Informatics and Engineering
- Wenbin Wang, Yifang Liu, Michael G. Pecht

:
A theoretical model to minimize the operational cost for canary-equipped electronic system's health management. 233-238 - Liu Lan-Lan, Zhou Meng:

The polynomial representation of Gray map on Zp2. 239-241 - Yinjiao Xing, Qiang Miao, Kwok-Leung Tsui

, Michael G. Pecht
:
Prognostics and health monitoring for lithium-ion battery. 242-247 - Yun Wan

, William Perry:
Lessons from method: A successful Electronic Medical Record (EMR) system implementation. 248-251 - Jian Liu, Jing Li, Byoung Uk Kim:

Bayesian reliability modeling of multi-level system with interdependent subsystems and components. 252-257 - Abhishek K. Shrivastava

, Junjie Cao:
A decomposition approach to imbalanced classification. 258-260 - Gulanbaier Tuerhong, Seoung Bum Kim:

A nonparametric fault isolation approach through hybrid novelty score. 261-266 - Yan Fu Wang, Min Xie

, Kien Ming Ng
, Yi Fei Meng:
Quantitative risk analysis model of integrating fuzzy fault tree with Bayesian Network. 267-271 - Ji Hoon Kang, Seoung Bum Kim:

Clustering algorithm-based control charts. 272-277 - Kyu Jong Lee, Seoung Bum Kim, Sun-Kyoung Park:

Daily, seasonal, and spatial patterns of PM10 in Seoul, Korea. 278-283 - Defeng Shen, Shunong Zhang:

Design of logic processes for prognostics and health management in an avionics system. 284-288 - Bingsen Zhang, Yongchang Zhang, Houjun Yang, Xiaojie Liu, Anling Zhang, Zhongwen Zhang:

Research on numerical analysis for color matching in textile dyeing based on least square Fitting. 289-292 - Bingsen Zhang, Yaping Shi, Houjun Yang, Xiaojie Liu, Anling Zhang:

Research on application of the minimum error average fitting method in computer color matching. 293-296 - Michael H. Wang:

A cost-based FMEA decision tool for product quality design and management. 297-302 - Lilyam Paolino, Horacio Paggi, Fernando Alonso, Genoveva López Gómez:

Solving incidents in telecommunications using a multi-agent system. 303-308 - Jinyu Yuan, Zhixing He:

Empirical analysis on causal relationship between institution and economic development based on VAR method. 309-312 - Haidong Xiao, Ning Chen, Yan Hu:

Situational awareness on disruption management: A system information propagation approach. 313-315 - Haidong Xiao, Ning Chen:

Analysis of cyberspace security situational awareness based on fuzz reason. 316-319 - Sai-Yin Zhang, Zhong-Zhan Zhang:

Analysis of accelerated degradation test under constant stress with errors for longitudinal data. 320-324 - Shuguang He, Chenghang Xiao:

Multivariate process monitoring and fault identification model using decision tree learning techniques. 325-330 - Yueliang Chen, Guixue Bian, Lin Yi, Jianjun Hu:

Study on distributions of fatigue crack-nucleating particle sizes and cracks formation in aluminum alloy. 331-334 - Maosheng Yang, Yuquan Bi, Yueliang Chen, Li Xu:

Studying on influencing factors of Fretting fatigue life of aluminum alloy. 335-338 - Xue-Jing Li, Dan Yu:

A reliability integrated acceptance test plan for series systems whose components following exponential distributions. 339-344 - Fangyi He:

An optimal control algorithm based on Kalman filter for ARMA disturbances. 345-348 - Yizhen Hai, Vincent C. Cheng, Shui Yee Wong

, Kwok-Leung Tsui
, Kwok-Yung Yuen
:
Logistic regression analysis for Predicting Methicillin-resistant Staphylococcus Aureus (MRSA) in-hospital mortality. 349-353 - Tai Feng Zhang, Wei Yi Zhao, Xiao-Hua Yang, Zeng Jie Cai:

Compiling the marine environment spectrum based on inversion satellite remote sensing data. 354-357 - Danfeng Zhang, Xiaoming Tan, Yueliang Chen:

Distribution rule of corrosion damage morphology parameters for aluminum alloy. 358-361 - Jinsong Hu, Ling Cui, Zengqiang Li, Xiaogen Hu, Haixiang Wu:

An new approach for newsboy problem with fuzzy demand. 362-366
International Workshop on Social Computing
- Ran Zhao, Guochun Fu, Jianhui Cheng:

On the analysis of the applications and social influence of mobile phone reading in the medium and small cities in China: Take the first pilot city Baoding for an example. 367-372 - Duo-Yong Sun, Shu-Quan Guo, Hai Zhang, Ben-xian Li:

Study on covert networks of terroristic organizations based on text analysis. 373-378 - Beiming Sun, Vincent T. Y. Ng

:
Lifespan and popularity measurement of online content on social networks. 379-383 - Xing Fang, Justin Zhan, Nicholas Koceja, Kenneth Williams, Justin Brewton:

Integrating online social networks for enhancing reputation systems of e-commerce. 384-389 - Zhihong Jiang, Hui Wang, Yubao Zhang, Pei Li:

A geographic analysis of P2P-TV viewership. 390-395 - Pengyi Fan, Pei Li, Zhihong Jiang, Wei Li, Hui Wang:

Measurement and analysis of topology and information propagation on Sina-Microblog. 396-401 - Chao Gao, Xin Zhang, Liang Zheng, Hui Wang:

On image similarity in the context of multimedia social computing. 402-406 - Yongqing Wang, Wenji Mao, Daniel Zeng, Ning Bao:

Boosting rank with predictable training error. 407-409

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














