


default search action
1. WISI 2006: Singapore
- Hsinchun Chen, Fei-Yue Wang, Christopher C. Yang, Daniel Dajun Zeng, Michael Chau, Kuiyu Chang:

Intelligence and Security Informatics, International Workshop, WISI 2006, Singapore, April 9, 2006, Proceedings. Lecture Notes in Computer Science 3917, Springer 2006, ISBN 3-540-33361-4
Keynote Speech
- Bhavani M. Thuraisingham:

Data Mining for Security Applications. 1-3
Web and Text Mining for Terrorism Informatics
- Jialun Qin, Yilu Zhou, Edna Reid, Guanpi Lai, Hsinchun Chen:

Unraveling International Terrorist Groups' Exploitation of the Web: Technical Sophistication, Media Richness, and Web Interactivity. 4-15 - Mark Last, Alex Markov, Abraham Kandel:

Multi-lingual Detection of Terrorist Content on the Web. 16-30 - Zhen Sun, Ee-Peng Lim

:
INEXT: An Investigative Search Tool for Knowledge Extraction. 31-37
Cybercrime Analysis
- WenYuan Jen, Weiping Chang, Shihchieh Chou:

Cybercrime in Taiwan - An Analysis of Suspect Records. 38-48 - You-Lu Liao, Cynthia Tsai:

Analysis of Computer Crime Characteristics in Taiwan. 49-57 - Tang Jun:

A Cross Datasets Referring Outlier Detection Model Applied to Suspicious Financial Transaction Discrimination. 58-65
Network Security
- Feng Xie, Shuo Bai:

Detecting Novel Network Attacks with a Data Field. 66-72 - Seongseob Hwang, Hyoungjoo Lee, Sungzoon Cho:

Improving Authentication Accuracy of Unfamiliar Passwords with Pauses and Cues for Keystroke Dynamics-Based Authentication. 73-78 - Huizhang Shen, Jidi Zhao, Huanchen Wang:

Illegal Intrusion Detection Based on Hidden Information Database. 79-84 - Tara Whalen, Carrie Gates:

Defender Personality Traits. 85-90
Crime Data Mining
- Patrick S. Chen, K. C. Chang, Tai-Ping Hsing, Shihchieh Chou:

Mining Criminal Databases to Finding Investigation Clues-By Example of Stolen Automobiles Database. 91-102 - Johan Huysmans, David Martens, Bart Baesens, Jan Vanthienen

, Tony Van Gestel:
Country Corruption Analysis with Self Organizing Maps and Support Vector Machines. 103-114 - Clifton Phua, Vincent C. S. Lee, Ross W. Gayler

, Kate A. Smith
:
Temporal Representation in Spike Detection of Sparse Personal Identity Streams. 115-126 - Peter Phillips, Ickjai Lee

:
Mining Positive Associations of Urban Criminal Activities Using Hierarchical Crime Hot Spots. 127-132 - Shaojie Qiao, Changjie Tang, Jing Peng, Hongjian Fan, Yong Xiang:

VCCM Mining: Mining Virtual Community Core Members Based on Gene Expression Programming. 133-138
Posters
- SeongKi Kim, WanJin Park, Seok Kyoo Kim, Sunil Ahn, Sangyong Han:

Integration of a Cryptographic File System and Access Control. 139-151 - William Zhu, Clark D. Thomborson, Fei-Yue Wang:

Applications of Homomorphic Functions to Software Obfuscation. 152-153 - Sabah S. Al-Fedaghi

:
Security Model for Informational Privacy. 154-155 - Hyun-Ho Kang, Brian M. Kurkoski, Young-Ran Park, Sanguk Shin, Kazuhiko Yamaguchi, Kingo Kobayashi:

A Viable System for Tracing Illegal Users of Video. 156-158 - Ickjai Lee, Hossein Ghodosi:

Privacy and Security Enhanced Offline Oblivious Transfer for Massive Data Distribution. 159-160 - Pilsung Kang, Sunghoon Park, Sungzoon Cho, Seongseob Hwang, Hyoungjoo Lee:

The Effectiveness of Artificial Rhythms and Cues in Keystroke Dynamics Based User Authentication. 161-162 - Taek Lee, Hoh Peter In, Eul-Gyu Im, Heejo Lee:

Cascade Damage Estimation Model for Internet Attacks. 163-164 - Eun-Jun Yoon, Kee-Young Yoo:

A New Secure Key Exchange Protocol Between STB and Smart Card in DTV Broadcasting. 165-166 - Dan Li, Kefei Wang, Jitender S. Deogun:

A Fuzzy Anomaly Detection System. 167-168 - Zhiyong Liu, Hong Qiao:

Hidden Markov Model Based Intrusion Detection. 169-170 - Qing Tao, Gao-wei Wu, Jue Wang:

One-Class Strategies for Security Information Detection. 171-172 - Zeng-Guang Hou, Min Tan:

Design of an Emergency Prediction and Prevention Platform for Societal Security Decision Support Using Neural Networks. 173-174 - Liang Li, Jie Tian, Xin Yang:

A Novel Identity Authentication Technique Without Trustworthy Third-Party Based on Fingerprint Verification. 175-176 - Baihua Xiao, Huiguang He

, Yaodong Li, Chunheng Wang:
Cyberspace Community Analysis and Simulation Using Complex Dynamic Social Networks. 177-178 - Dongbin Zhao

, Jianqiang Yi:
Analysis of Infectious Disease Data Based on Evolutionary Computation. 179-180 - Jue Wang, Fei-Yue Wang, Daniel Dajun Zeng:

Rule+Exception Learning-Based Class Specification and Labeling in Intelligence and Security Analysis. 181-182 - Fei-Yue Wang:

A Computational Framework for Decision Analysis and Support in ISI: Artificial Societies, Computational Experiments, and Parallel Systems. 183-184

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














