ISI C

41 papers

YearTitle / Authors
2003"Atrium" - A Knowledge Model for Modern Security Forces in the Information and Terrorism Age.
Chris C. Demchak
2003"TalkPrinting": Improving Speaker Recognition by Modeling Stylistic Features.
Sachin S. Kajarekar, M. Kemal Sönmez, Luciana Ferrer, Venkata Ramana Rao Gadde, Anand Venkataraman, Elizabeth Shriberg, Andreas Stolcke, Harry Bratt
2003A Longitudinal Analysis of Language Behavior of Deception in E-mail.
Lina Zhou, Judee K. Burgoon, Douglas P. Twitchell
2003A Spatio Temporal Visualizer for Law Enforcement.
Ty Buetow, Luis G. Chaboya, Christopher D. O'Toole, Tom Cushna, Damien Daspit, Tim Petersen, Homa Atabakhsh, Hsinchun Chen
2003Active Database Systems for Monitoring and Surveillance.
Antonio Badia
2003Addressing the Homeland Security Problem: A Collaborative Decision-Making Framework.
T. S. Raghu, Ram Ramesh, Andrew B. Whinston
2003An E-mail Monitoring System for Detecting Outflow of Confidential Documents.
Bogju Lee, Youna Park
2003An International Perspective on Fighting Cybercrime.
Weiping Chang, Wingyan Chung, Hsinchun Chen, Shihchieh Chou
2003Authorship Analysis in Cybercrime Investigation.
Rong Zheng, Yi Qin, Zan Huang, Hsinchun Chen
2003Automatic Construction of Cross-Lingual Networks of Concepts from the Hong Kong SAR Police Department.
Kar Wing Li, Christopher C. Yang
2003Behavior Profiling of Email.
Salvatore J. Stolfo, Shlomo Hershkop, Ke Wang, Olivier Nimeskern, Chia-Wei Hu
2003Bioterrorism Surveillance with Real-Time Data Warehousing.
Donald J. Berndt, Alan R. Hevner, James Studnicki
2003COPLINK Agent: An Architecture for Information Monitoring and Sharing in Law Enforcement.
Daniel Dajun Zeng, Hsinchun Chen, Damien Daspit, Fu Shan, Suresh Nandiraju, Michael Chau, Chienting Lin
2003Collaborative Workflow Management for Interagency Crime Analysis.
J. Leon Zhao, Henry H. Bi, Hsinchun Chen
2003CrimeLink Explorer: Using Domain Knowledge to Facilitate Automated Crime Association Analysis.
Jennifer Schroeder, Jennifer Jie Xu, Hsinchun Chen
2003Criminal Incident Data Association Using the OLAP Technology.
Song Lin, Donald E. Brown
2003Criminal Record Matching Based on the Vector Space Model.
Jau-Hwang Wang, Bill T. Lin, Ching-Chin Shieh, Peter S. Deng
2003Database Support for Exploring Criminal Networks.
Mathew Neville Smith, Peter J. H. King
2003Decision Based Spatial Analysis of Crime.
Yifei Xue, Donald E. Brown
2003Designing Agent99 Trainer: A Learner-Centered, Web-Based Training System for Deception Detection.
Jinwei Cao, Janna M. Crews, Ming Lin, Judee K. Burgoon, Jay F. Nunamaker Jr.
2003Detecting Deception through Linguistic Analysis.
Judee K. Burgoon, J. P. Blair, Tiantian Qin, Jay F. Nunamaker Jr.
2003Emergent Semantics from Users' Browsing Paths.
D. V. Sreenath, William I. Grosky, Farshad Fotouhi
2003Evacuation Planning: A Capacity Constrained Routing Approach.
Qingsong Lu, Yan Huang, Shashi Shekhar
2003Examining Technology Acceptance by Individual Law Enforcement Officers: An Exploratory Study.
Paul Jen-Hwa Hu, Chienting Lin, Hsinchun Chen
2003Hiding Data and Code Security for Application Hosting Infrastructure.
Ping Lin, K. Selçuk Candan, Rida A. Bazzi, Zhichao Liu
2003Hiding Traversal of Tree Structured Data from Untrusted Data Stores.
Ping Lin, K. Selçuk Candan
2003Integrated "Mixed" Networks Security Monitoring - A Proposed Framework.
William T. Scherer, Leah L. Spradley, Marc H. Evans
2003Intelligence and Security Informatics, First NSF/NIJ Symposium, ISI 2003, Tucson, AZ, USA, June 2-3, 2003, Proceedings
Hsinchun Chen, Richard Miranda, Daniel Dajun Zeng, Chris C. Demchak, Jennifer Schroeder, Therani Madhusudan
2003Intelligence and Security Informatics: An Information Economics Perspective.
Lihui Lin, Xianjun Geng, Andrew B. Whinston
2003Locating Hidden Groups in Communication Networks Using Hidden Markov Models.
Malik Magdon-Ismail, Mark K. Goldberg, William A. Wallace, David Siebecker
2003Names: A New Frontier in Text Mining.
Frankie Patman, Paul Thompson
2003PROGENIE: Biographical Descriptions for Intelligence Analysis.
Pablo Ariel Duboue, Kathleen R. McKeown, Vasileios Hatzivassiloglou
2003Privacy Sensitive Distributed Data Mining from Multi-party Data.
Hillol Kargupta, Kun Liu, Jessica Ryan
2003Scalable Knowledge Extraction from Legacy Sources with SEEK.
Joachim Hammer, William J. O'Brien, Mark S. Schmalz
2003Secure Information Sharing and Information Retrieval Infrastructure with GridIR.
Gregory B. Newby, Kevin Gamiel
2003Semantic Hacking and Intelligence and Security Informatics (Extended Abstract).
Paul Thompson
2003Tracking Hidden Groups Using Communications.
Sudarshan S. Chawathe
2003Training Professionals to Detect Deception.
Joey F. George, David P. Biros, Judee K. Burgoon, Jay F. Nunamaker Jr.
2003Untangling Criminal Networks: A Case Study.
Jennifer Jie Xu, Hsinchun Chen
2003Using Support Vector Machines for Terrorism Information Extraction.
Aixin Sun, Myo-Myo Naing, Ee-Peng Lim, Wai Lam
2003Web-Based Intelligence Reports System.
Alexander Dolotov, Mary Strickler