![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
ISI 2015: Baltimore, MD, USA
- 2015 IEEE International Conference on Intelligence and Security Informatics, ISI 2015, Baltimore, MD, USA, May 27-29, 2015. IEEE 2015, ISBN 978-1-4799-9889-0
Part I: Long Papers
Data Science and Analytics in Security Informatics
- Quan Zheng, David B. Skillicorn
:
Analysis of criminal social networks with typed and directed edges. 1-6 - Chris Giannella, Eric Bloedorn:
Spectral malware behavior clustering. 7-12 - Weijie Wang, Baijian Yang
, Yingjie Victor Chen:
A visual analytics approach to detecting server redirections and data exfiltration. 13-18 - Ian A. Andrews, Srijan Kumar, Francesca Spezzano
, V. S. Subrahmanian:
SPINN: Suspicion prediction in nuclear networks. 19-24 - Mohammad A. Tayebi, Uwe Glässer, Patricia L. Brantingham:
Learning where to inspect: Location learning for crime prediction. 25-30 - Sagar Samtani
, Ryan Chinn, Hsinchun Chen:
Exploring hacker assets in underground forums. 31-36
Organizational, National, and International Issues in Counter-terrorism or Security Protection
- Ricardo Guedes, Vasco Furtado, Tarcisio H. C. Pequeno:
Multi-objective evolutionary algorithms and multiagent models for optimizing police dispatch. 37-42 - Royal A. Elmore, William S. Charlton:
Nonproliferation informatics: Employing Bayesian analysis, agent based modeling, and information theory for dynamic proliferation pathway studies. 43-48 - Yaqoub Alsarkal, Nan Zhang, Yilu Zhou:
Linking virtual and real-world identities. 49-54 - Wingyan Chung, Saike He, Daniel Dajun Zeng, Victor A. Benjamin:
Emotion extraction and entrainment in social media: The case of U.S. immigration and border security. 55-60 - David B. Skillicorn
:
Empirical assessment of al qaeda, ISIS, and taliban propaganda. 61-66
Human Behavior in the Security Applications
- Jie Gu, Heng Xu, An'an Hu, Lihua Huang:
Exploring the effect of permission notice on users' initial trust to an application store: The case of China's Android application market. 67-72 - Bryan Monk, Russell Allsup, Richard Frank:
LECENing places to hide: Geo-mapping child exploitation material. 73-78 - Victor A. Benjamin, Hsinchun Chen:
Developing understanding of hacker language through the use of lexical semantics. 79-84 - Victor A. Benjamin, Weifeng Li
, Thomas Holt, Hsinchun Chen:
Exploring threats and vulnerabilities in hacker web: Forums, IRC and carding shops. 85-90 - Sanjaya Wijeratne, Derek Doran, Amit P. Sheth, Jack L. Dustin:
Analyzing the social media footprint of street gangs. 91-96 - Jeffrey Gainer Proudfoot, Jeffrey L. Jenkins, Judee K. Burgoon, Jay F. Nunamaker Jr.:
Deception is in the eye of the communicator: Investigating pupil diameter variations in automated deception detection interviews. 97-102
Security Infrastructure and Tools
- Jon R. Ward, Mohamed F. Younis:
Base station anonymity distributed self-assessment in Wireless Sensor Networks. 103-108 - Jayaprakash Kar
, Daniyal M. Alghazzawi
:
On construction of signcryption scheme for smart card security. 109-113 - Elisa Bertino, Nathan W. Hartman:
Cybersecurity for product lifecycle management a research roadmap. 114-119 - Julius Adebayo, Lalana Kagal:
A privacy protection procedure for large scale individual level data. 120-125 - Huseyin Ulusoy, Murat Kantarcioglu, Bhavani Thuraisingham, Latifur Khan
:
Honeypot based unauthorized data access detection in MapReduce systems. 126-131
Part II: Short Papers
Data Science and Analytics in Security Informatics
- Zhipeng Jin, Qiudan Li, Daniel Zeng, Lei Wang:
Filtering spam in Weibo using ensemble imbalanced classification and knowledge expansion. 132-134 - Chuan Luo, Xiaolong Zheng, Daniel Zeng:
Inferring social influence and meme interaction with Hawkes processes. 135-137 - Chuan Luo, Daniel Zeng:
Multivariate embedding based causaltiy detection with short time series. 138-140 - Jinie Pak, Lina Zhou:
A comparison of features for automatic deception detection in synchronous computer-mediated communication. 141-143 - Chase P. Dowling, Joshua J. Harrison, Arun V. Sathanur, Landon H. Sego, Courtney D. Corley:
Social sensor analytics: Making sense of network models in social media. 144-147 - Joshua J. Harrison, Eric Bell, Court D. Corley, Chase P. Dowling, Andrew J. Cowell
:
Assessment of user home location geoinference methods. 148-150 - Junjie Lin, Wenji Mao:
Personality based public sentiment classification in microblog. 151-153
Organizational, National, and International Issues in Counter-terrorism or Security Protection
- Heather Roy, Sue E. Kase:
The relation between microfinacing and corruption by country: An analysis of an open source dataset. 154-156
Human Behavior in the Security Applications
- Shuyuan Mary Ho, Jeffrey T. Hancock
, Cheryl Booth, Xiuwen Liu, Shashanka Surya Timmarajus, Mike Burmester:
Liar, Liar, IM on Fire: Deceptive language-action cues in spontaneous online communication. 157-159 - Saike He, Xiaolong Zheng, Daniel Zeng, Bo Xu, Changliang Li, Guanhua Tian, Lei Wang, Hongwei Hao:
Modeling emotion entrainment of online users in emergency events. 160-162 - Samuel Owusu, Lina Zhou:
Positive bystanding behavior in cyberbullying: The impact of empathy on adolescents' cyber bullied support behavior. 163-165
Security Infrastructure and Tools
- Fangyue Chen, Yunke Wang, Heng Song, Xiangyang Li:
A statistical study of covert timing channels using network packet frequency. 166-168 - Mohammad Vahidalizadehdizaj, Lixin Tao:
A new mobile payment protocol (GMPCP) by using a new key agreement protocol (GC). 169-172 - Tao Ding, Ahmed Aleroud, George Karabatis:
Multi-granular aggregation of network flows for security analysis. 173-175 - Garima Bajwa
, Mohamed Fazeen, Ram Dantu, Sonal Tanpure:
Unintentional bugs to vulnerability mapping in Android applications. 176-178 - Faisal Quader, Vandana Pursnani Janeja, Justin Stauffer:
Persistent threat pattern discovery. 179-181 - Cynthia L. Claiborne, Cathy C. Ncube, Ram Dantu:
Random anonymization of mobile sensor data: Modified Android framework. 182-184 - Josephine M. Namayanja, Vandana Pursnani Janeja:
Change detection in evolving computer networks: Changes in densification and diameter over time. 185-187
Part III: Poster Papers
Data Science and Analytics in Security Informatics
- Peng Su, Wenji Mao:
Power-function-based observation-weighting method for mining actionable behavioral rules. 188 - Naoto Oshiro:
Detection of financial statement fraud: Is accrual really useful as an early warning indicator? 189 - Yuhao Zhang, Wenji Mao, Xiaochen Li:
A bottom-up method for constructing topic hierarchies. 190 - Roger B. Bradford:
Distributed LSI: Parallel preprocessing and vector sharing. 191 - Kun Wang, Duoyong Sun:
Research on construction methods of the Shanghai cooperation organization meta-network model. 192
Security Infrastructure and Tools
- Leonidas Deligiannidis:
Elliptic curve cryptography in Java. 193 - Theogene Hakiza Bucuti, Ram Dantu:
An opportunistic encryption extension for the DNS protocol. 194 - Garima Bajwa
, Ram Dantu, Ryan Aldridge:
Pass-pic: A mobile user authentication. 195 - Jae-Jin Jang, Im Young Jung:
An access control resistant to shoulder-surfing. 196 - Jayaprakash Kar
:
Online/off-line ring signature scheme with provable security. 197
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.