| 2003 | "Atrium" - A Knowledge Model for Modern Security Forces in the Information and Terrorism Age. Chris C. Demchak |
| 2003 | "TalkPrinting": Improving Speaker Recognition by Modeling Stylistic Features. Sachin S. Kajarekar, M. Kemal Sönmez, Luciana Ferrer, Venkata Ramana Rao Gadde, Anand Venkataraman, Elizabeth Shriberg, Andreas Stolcke, Harry Bratt |
| 2003 | A Longitudinal Analysis of Language Behavior of Deception in E-mail. Lina Zhou, Judee K. Burgoon, Douglas P. Twitchell |
| 2003 | A Spatio Temporal Visualizer for Law Enforcement. Ty Buetow, Luis G. Chaboya, Christopher D. O'Toole, Tom Cushna, Damien Daspit, Tim Petersen, Homa Atabakhsh, Hsinchun Chen |
| 2003 | Active Database Systems for Monitoring and Surveillance. Antonio Badia |
| 2003 | Addressing the Homeland Security Problem: A Collaborative Decision-Making Framework. T. S. Raghu, Ram Ramesh, Andrew B. Whinston |
| 2003 | An E-mail Monitoring System for Detecting Outflow of Confidential Documents. Bogju Lee, Youna Park |
| 2003 | An International Perspective on Fighting Cybercrime. Weiping Chang, Wingyan Chung, Hsinchun Chen, Shihchieh Chou |
| 2003 | Authorship Analysis in Cybercrime Investigation. Rong Zheng, Yi Qin, Zan Huang, Hsinchun Chen |
| 2003 | Automatic Construction of Cross-Lingual Networks of Concepts from the Hong Kong SAR Police Department. Kar Wing Li, Christopher C. Yang |
| 2003 | Behavior Profiling of Email. Salvatore J. Stolfo, Shlomo Hershkop, Ke Wang, Olivier Nimeskern, Chia-Wei Hu |
| 2003 | Bioterrorism Surveillance with Real-Time Data Warehousing. Donald J. Berndt, Alan R. Hevner, James Studnicki |
| 2003 | COPLINK Agent: An Architecture for Information Monitoring and Sharing in Law Enforcement. Daniel Dajun Zeng, Hsinchun Chen, Damien Daspit, Fu Shan, Suresh Nandiraju, Michael Chau, Chienting Lin |
| 2003 | Collaborative Workflow Management for Interagency Crime Analysis. J. Leon Zhao, Henry H. Bi, Hsinchun Chen |
| 2003 | CrimeLink Explorer: Using Domain Knowledge to Facilitate Automated Crime Association Analysis. Jennifer Schroeder, Jennifer Jie Xu, Hsinchun Chen |
| 2003 | Criminal Incident Data Association Using the OLAP Technology. Song Lin, Donald E. Brown |
| 2003 | Criminal Record Matching Based on the Vector Space Model. Jau-Hwang Wang, Bill T. Lin, Ching-Chin Shieh, Peter S. Deng |
| 2003 | Database Support for Exploring Criminal Networks. Mathew Neville Smith, Peter J. H. King |
| 2003 | Decision Based Spatial Analysis of Crime. Yifei Xue, Donald E. Brown |
| 2003 | Designing Agent99 Trainer: A Learner-Centered, Web-Based Training System for Deception Detection. Jinwei Cao, Janna M. Crews, Ming Lin, Judee K. Burgoon, Jay F. Nunamaker Jr. |
| 2003 | Detecting Deception through Linguistic Analysis. Judee K. Burgoon, J. P. Blair, Tiantian Qin, Jay F. Nunamaker Jr. |
| 2003 | Emergent Semantics from Users' Browsing Paths. D. V. Sreenath, William I. Grosky, Farshad Fotouhi |
| 2003 | Evacuation Planning: A Capacity Constrained Routing Approach. Qingsong Lu, Yan Huang, Shashi Shekhar |
| 2003 | Examining Technology Acceptance by Individual Law Enforcement Officers: An Exploratory Study. Paul Jen-Hwa Hu, Chienting Lin, Hsinchun Chen |
| 2003 | Hiding Data and Code Security for Application Hosting Infrastructure. Ping Lin, K. Selçuk Candan, Rida A. Bazzi, Zhichao Liu |
| 2003 | Hiding Traversal of Tree Structured Data from Untrusted Data Stores. Ping Lin, K. Selçuk Candan |
| 2003 | Integrated "Mixed" Networks Security Monitoring - A Proposed Framework. William T. Scherer, Leah L. Spradley, Marc H. Evans |
| 2003 | Intelligence and Security Informatics, First NSF/NIJ Symposium, ISI 2003, Tucson, AZ, USA, June 2-3, 2003, Proceedings Hsinchun Chen, Richard Miranda, Daniel Dajun Zeng, Chris C. Demchak, Jennifer Schroeder, Therani Madhusudan |
| 2003 | Intelligence and Security Informatics: An Information Economics Perspective. Lihui Lin, Xianjun Geng, Andrew B. Whinston |
| 2003 | Locating Hidden Groups in Communication Networks Using Hidden Markov Models. Malik Magdon-Ismail, Mark K. Goldberg, William A. Wallace, David Siebecker |
| 2003 | Names: A New Frontier in Text Mining. Frankie Patman, Paul Thompson |
| 2003 | PROGENIE: Biographical Descriptions for Intelligence Analysis. Pablo Ariel Duboue, Kathleen R. McKeown, Vasileios Hatzivassiloglou |
| 2003 | Privacy Sensitive Distributed Data Mining from Multi-party Data. Hillol Kargupta, Kun Liu, Jessica Ryan |
| 2003 | Scalable Knowledge Extraction from Legacy Sources with SEEK. Joachim Hammer, William J. O'Brien, Mark S. Schmalz |
| 2003 | Secure Information Sharing and Information Retrieval Infrastructure with GridIR. Gregory B. Newby, Kevin Gamiel |
| 2003 | Semantic Hacking and Intelligence and Security Informatics (Extended Abstract). Paul Thompson |
| 2003 | Tracking Hidden Groups Using Communications. Sudarshan S. Chawathe |
| 2003 | Training Professionals to Detect Deception. Joey F. George, David P. Biros, Judee K. Burgoon, Jay F. Nunamaker Jr. |
| 2003 | Untangling Criminal Networks: A Case Study. Jennifer Jie Xu, Hsinchun Chen |
| 2003 | Using Support Vector Machines for Terrorism Information Extraction. Aixin Sun, Myo-Myo Naing, Ee-Peng Lim, Wai Lam |
| 2003 | Web-Based Intelligence Reports System. Alexander Dolotov, Mary Strickler |