


default search action
10th ISI 2012: Washington, DC, USA
- Daniel Zeng, Lina Zhou, Bojan Cukic, G. Alan Wang, Christopher C. Yang:

2012 IEEE International Conference on Intelligence and Security Informatics, ISI 2012, Washington, DC, USA, June 11-14, 2012. IEEE 2012, ISBN 978-1-4673-2105-1 - Nguyen Thanh Hung, Do Hoang Giang, Wee Keong Ng

, Huafei Zhu:
Cloud-enabled data sharing model. 1-6 - Hsien-Ming Chou, Lina Zhou:

A game theory approach to deception strategy in computer mediated communication. 7-11 - Ahmed Abbasi

, Fatemeh Zahedi, Yan Chen
:
Impact of anti-phishing tool performance on attack success rates. 12-17 - Richard Colbaugh, Kristin Glass:

Predictive defense against evolving adversaries. 18-23 - Victor A. Benjamin, Hsinchun Chen:

Securing cyberspace: Identifying key actors in hacker communities. 24-29 - Zhenmin Lin, Jerzy W. Jaromczyk:

An efficient secure comparison protocol. 30-35 - Xiaofeng Wang, Donald E. Brown, Matthew S. Gerber:

Spatio-temporal modeling of criminal incidents using geographic, demographic, and twitter-derived information. 36-41 - David B. Skillicorn

:
Outlier detection using semantic sensors. 42-47 - Yang Song, Xiaolin Zhang:

An active binocular integrated system for intelligent robot vision. 48-53 - Yue Zhang, Donald E. Brown:

Police patrol district design using agent-based simulation and GIS. 54-59 - Michael Yip, Nigel Shadbolt, Craig Webber

:
Structural analysis of online criminal social networks. 60-65 - Richard Colbaugh, Kristin Glass:

Leveraging sociological models for prediction I: Inferring adversarial relationships. 66-71 - Richard Colbaugh, Kristin Glass:

Leveraging sociological models for prediction II: Early warning for complex contagions. 72-77 - David Zimbra, Hsinchun Chen:

Scalable sentiment classification across multiple Dark Web Forums. 78-83 - Richard Mason, Brian James McInnis

, Siddhartha R. Dalal:
Machine learning for the automatic identification of terrorist incidents in worldwide news media. 84-89 - Simon F. Pratt, Philippe J. Giabbanelli, Piper J. Jackson

, Vijay Kumar Mago
:
Rebel with many causes: A computational model of insurgency. 90-95 - Ming Yang, Hsinchun Chen:

Partially supervised learning for radical opinion identification in hate group web forums. 96-101 - Venkatesh Ramanathan, Harry Wechsler:

Phishing website detection using Latent Dirichlet Allocation and AdaBoost. 102-107 - Jiyoung Woo, Hsinchun Chen:

An event-driven SIR model for topic diffusion in web forums. 108-113 - Zhangwen Tan, Wenji Mao, Daniel Zeng, Xiaochen Li, Xiuguo Bao:

Acquiring netizen group's opinions for modeling food safety events. 114-119 - Kristin Glass, Richard Colbaugh:

Agile detection of framing rhetoric in social media. 120-122 - Xiarong Li, Daniel Zeng, Lei Wang:

Click frauds and price determination models. 123-125 - Jason Koepke, Siddharth Kaza, Ahmed Abbasi

:
Exploratory experiments to identify fake websites by using features from the network stack. 126-128 - Antonio Badia

:
Evaluating source trustability with data provenance: A research note. 129-131 - Jan Kallberg

, Bhavani Thuraisingham:
Towards cyber operations - The new role of academic cyber security research and education. 132-134 - Shen-Shyang Ho:

Preserving privacy for moving objects data mining. 135-137 - Minh Tam Le, John Sweeney, Bruce M. Russett, Steven W. Zucker:

Structural inference in political science datasets. 138-140 - Pallabi Parveen, Bhavani Thuraisingham:

Unsupervised incremental sequence learning for insider threat detection. 141-143 - Vance Chiang-Chi Liao, Ming-Syan Chen

:
Efficient mining structural motifs for biosequences with intra- and inter-block gap constraints. 144-146 - Vladimir Avram, Uwe Glässer, Hamed Yaghoubi Shahir:

Anomaly detection in spatiotemporal data in the maritime domain. 147-149 - Shan Suthaharan

:
A unit-circle classification algorithm to characterize back attack and normal traffic for intrusion detection. 150-152 - Mark K. Goldberg, J. Greenman, Bridget Gutting, Malik Magdon-Ismail, John Schwartz, William A. Wallace:

Graph search beyond text: Relational searches in semantic hyperlinked data. 153-155 - Fatih Özgül

, Murat Gök, Zeki Erdem, Yakup Ozal:
Detecting criminal networks: SNA models are compared to proprietary models. 156-158 - Wingyan Chung:

Categorizing temporal events: A case study of domestic terrorism. 159-161 - Christian Leuprecht

, Todd Hataley, David B. Skillicorn
:
Vectors of extremism across the Canada-US border. 162-164 - Joshua Sinai:

Research note: Concept to develop a software-based counter-terrorism campaign decision support tool. 165-167 - Paul Jen-Hwa Hu, Xing Wan, Yan Dang, Catherine A. Larson, Hsinchun Chen:

Evaluating an integrated forum portal for terrorist surveillance and analysis. 168-170 - Tarique Anwar

, Muhammad Abulaish
:
Identifying cliques in dark web forums - An agglomerative clustering approach. 171-173 - Ansheng Ge, Wenji Mao, Daniel Zeng, Qingchao Kong, Huachi Zhu:

Extracting action knowledge in security informatics. 174-176 - James R. (Bob) Johnson, Anita Miller, Latifur Khan

, Bhavani Thuraisingham:
Extracting semantic information structures from free text law enforcement data. 177-179 - David B. Skillicorn

, P. K. Chandrasekaran:
Ranking documents by internal variability. 180-182 - Kelly Hughes, Yanzhen Qu:

A generic cyber attack response resource risk assessment model. 183 - Peng He, George Karabatis:

Using semantic networks to counter cyber threats. 184 - Do Quoc Le, Taeyoel Jeong, H. Eduardo Roman

, James Won-Ki Hong:
Communication patterns based detection of anomalous network traffic. 185 - Neal Wagner, Vikas Agrawal:

Emergency decision support using an agent-based modeling approach. 186 - Mohammad S. Habibi:

Data exploitation using visual analytics. 187-192 - Ben-xian Li, Meng-jun Li, Duo-Yong Sun, Jiang Li, Wenju Li:

Evaluation method for node importance based on node condensation in terrorism networks. 193 - Wenju Li, Duoyong Sun, Ben-xian Li, Shu-Quan Guo, Ning Gu:

A robust evaluation of terrorist network based on node-lap degree of triads. 194 - Wingyan Chung, Wen Tang:

Building a web collection for online surveillance of U.S. domestic terrorism. 195 - Thirimachos Bourlai

, Bojan Cukic
:
Multi-spectral face recognition: Identification of people in difficult environments. 196-201 - Jay F. Nunamaker Jr., Judee K. Burgoon, Nathan W. Twyman

, Jeffrey Gainer Proudfoot, Ryan M. Schuetzler
, Justin Scott Giboney:
Establishing a foundation for automated human credibility screening. 202-211 - Siddharth Kaza, Hsin-Min Lu

, Daniel Zeng, Hsinchun Chen:
Using burst detection techniques to identify suspicious vehicular traffic at border crossings. 212-214 - Satyen Abrol, Latifur Khan

, Vaibhav Khadilkar, Bhavani Thuraisingham, Tyrone Cadenhead:
Design and implementation of SNODSOC: Novel class detection for social network analysis. 215-220 - Yuequn Li, Wenji Mao, Daniel Zeng, Luwen Huangfu, Chunyang Liu:

Extracting opinion explanations from Chinese online reviews. 221-223 - Hamid Reza Alipour, Daniel Zeng, Douglas C. Derrick:

AdaBoost-based sensor fusion for credibility assessment. 224-226 - Irina Sakharova:

Payment card fraud: Challenges and solutions. 227-234 - Weiyun Chen, Xin Li

:
Deciphering wisdom of crowds from their influenced binary decisions. 235-240

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














