| 2004 | A Framework for a Secure Federated Patient Healthcare System. Raj Sharman, Himabindu Challapalli, H. Raghav Rao, Shambhu J. Upadhyaya |
| 2004 | A Novel Autonomous Trust Management Model for Mobile Agents. Yichuan Jiang, Zhengyou Xia, YiPing Zhong, Shiyong Zhang |
| 2004 | A Novel Policy and Information Flow Security Model for Active Network. Zhengyou Xia, Yichuan Jiang, YiPing Zhong, Shiyong Zhang |
| 2004 | A Tool for Internet Chatroom Surveillance. Seyit Ahmet Çamtepe, Mukkai S. Krishnamoorthy, Bülent Yener |
| 2004 | Aligning Simulation Models of Smallpox Outbreaks. Li-Chiou Chen, Boris Kaminsky, Tiffany Tummino, Kathleen M. Carley, Elizabeth Casman, Douglas B. Fridsma, Alex Yahja |
| 2004 | Analyzing and Visualizing Criminal Network Dynamics: A Case Study. Jennifer Jie Xu, Byron Marshall, Siddharth Kaza, Hsinchun Chen |
| 2004 | Balancing Security and Privacy in the 21 Chris C. Demchak, Kurt D. Fenstermacher |
| 2004 | ChatTrack: Chat Room Topic Detection Using Classification. Jason Bengel, Susan Gauch, Eera Mittur, Rajan Vijayaraghavan |
| 2004 | Composite Role-Based Monitoring (CRBM) for Countering Insider Threats. Joon S. Park, Shuyuan Mary Ho |
| 2004 | Computer-Based Training for Deception Detection: What Users Want? Jinwei Cao, Ming Lin, Amit V. Deokar, Judee K. Burgoon, Janna M. Crews, Mark Adkins |
| 2004 | Critical Infrastructure Integration Modeling and Simulation. William J. Tolone, David Wilson, Anita Raja, Wei-Ning Xiang, Huili Hao, Stuart Phelps, E. Wray Johnson |
| 2004 | Cross-Lingual Semantics for Crime Analysis Using Associate Constraint Network. Christopher C. Yang, Kar Wing Li |
| 2004 | Data Analytics for Bioterrorism Surveillance. Donald J. Berndt, Sunil Bhat, John W. Fisher, Alan R. Hevner, James Studnicki |
| 2004 | Determining the Gender of the Unseen Name through Hyphenation. Robert H. Warren, Christopher Leurer |
| 2004 | Discovering Hidden Groups in Communication Networks. Jeffrey Baumes, Mark K. Goldberg, Malik Magdon-Ismail, William A. Wallace |
| 2004 | Experimental Studies Using Median Polish Procedure to Reduce Alarm Rates in Data Cubes of Intrusion Data. Jorge Levera, Benjamín Barán, Robert L. Grossman |
| 2004 | Finding Unusual Correlation Using Matrix Decompositions. David B. Skillicorn |
| 2004 | Generating Concept Hierarchies from Text for Intelligence Analysis. Jenq-Haur Wang, Chien-Chung Huang, Jei-Wen Teng, Lee-Feng Chien |
| 2004 | Generating Networks of Illegal Drug Users Using Large Samples of Partial Ego-Network Data. Ju-Sung Lee |
| 2004 | IT Security Risk Management under Network Effects and Layered Protection Strategy. Wei T. Yue, Metin Çakanyildirim, Young U. Ryu, Dengpan Liu |
| 2004 | Identifying Multi-ID Users in Open Forums. Hung-Ching Chen, Mark K. Goldberg, Malik Magdon-Ismail |
| 2004 | Information Sharing and Collaboration Policies within Government Agencies. Homa Atabakhsh, Cathy Larson, Tim Petersen, Chuck Violette, Hsinchun Chen |
| 2004 | Intelligence and Security Informatics, Second Symposium on Intelligence and Security Informatics, ISI 2004, Tucson, AZ, USA, June 10-11, 2004, Proceedings Hsinchun Chen, Reagan W. Moore, Daniel Dajun Zeng, John Leavitt |
| 2004 | Interactive Query Languages for Intelligence Tasks. Antonio Badia |
| 2004 | Intrusion-Tolerant Intrusion Detection System. Myung-Kyu Yi, Chong-Sun Hwang |
| 2004 | MIPT: Sharing Terrorism Information Resources. James O. Ellis III |
| 2004 | Mind the Gap: The Growing Distance between Institutional and Technical Capabilities in Organizations Performing Critical Operations. Gene I. Rochlin |
| 2004 | Mining Normal and Intrusive Activity Patterns for Computer Intrusion Detection. Xiangyang Li, Nong Ye |
| 2004 | Optimal Redundancy Allocation for Disaster Recovery Planning in the Network Economy. Benjamin B. M. Shao |
| 2004 | Policy-Based Information Sharing with Semantics. Eric Hughes, Amy Kazura, Arnie Rosenthal |
| 2004 | Post-9/11 Evolution of Al Qaeda. Rohan Kumar Gunaratna |
| 2004 | Privacy-Preserving Inter-database Operations. Gang Liang, Sudarshan S. Chawathe |
| 2004 | Research of Characteristics of Worm Traffic. Yufeng Chen, Yabo Dong, Dongming Lu, Zhengtao Xiang |
| 2004 | Security Informatics: A Paradigm Shift in Information Technology Education. Susan M. Merritt, Allen Stix, Judith E. Sullivan |
| 2004 | Self-efficacy, Training Effectiveness, and Deception Detection: A Longitudinal Study of Lie Detection Training. Kent Marett, David P. Biros, Monti L. Knode |
| 2004 | Semantic Analysis for Monitoring Insider Threats. Svetlana Symonenko, Elizabeth D. Liddy, Özgür Yilmazel, Robert Del Zoppo, Eric Brown, Matt Downey |
| 2004 | Spatial Forecast Methods for Terrorist Events in Urban Environments. Donald E. Brown, Jason Dalton, Heidi Hoyle |
| 2004 | Studying E-Mail Graphs for Intelligence Monitoring and Analysis in the Absence of Semantic Information. Petros Drineas, Mukkai S. Krishnamoorthy, Michael D. Sofka, Bülent Yener |
| 2004 | THEMIS: Threat Evaluation Metamodel for Information Systems. Csilla Farkas, Thomas C. Wingfield, James Bret Michael, Duminda Wijesekera |
| 2004 | Terrorism Knowledge Discovery Project: A Knowledge Discovery Approach to Addressing the Threats of Terrorism. Edna Reid, Jialun Qin, Wingyan Chung, Jennifer Jie Xu, Yilu Zhou, Robert P. Schumaker, Marc Sageman, Hsinchun Chen |
| 2004 | Testing Various Modes of Computer-Based Training for Deception Detection. Joey F. George, David P. Biros, Mark Adkins, Judee K. Burgoon, Jay F. Nunamaker Jr. |
| 2004 | The Architecture of the Cornell Knowledge Broker. Alan J. Demers, Johannes Gehrke, Mirek Riedewald |
| 2004 | The Optimal Deployment of Filters to Limit Forged Address Attacks in Communication Networks. Enock Chisonge Mofya, Jonathan Cole Smith |
| 2004 | The Use of Data Mining Techniques in Operational Crime Fighting. Richard Adderley |
| 2004 | Towards a Social Network Approach for Monitoring Insider Threats to Information Security. Anand Natarajan, Liaquat Hossain |
| 2004 | Using Speech Act Profiling for Deception Detection. Douglas P. Twitchell, Jay F. Nunamaker Jr., Judee K. Burgoon |
| 2004 | Utilizing the Social and Behavioral Sciences to Assess, Model, Forecast and Preemptively Respond to Terrorism. Joshua Sinai |
| 2004 | Vulnerability Analysis and Evaluation within an Intranet. Eung Ki Park, Jung Taek Seo, Eul-Gyu Im, Cheolwon Lee |
| 2004 | Web-Based Intelligence Notification System: Architecture and Design. Alexander Dolotov, Mary Strickler |
| 2004 | West Nile Virus and Botulism Portal: A Case Study in Infectious Disease Informatics. Daniel Dajun Zeng, Hsinchun Chen, Chunju Tseng, Catherine A. Larson, Millicent Eidson, Ivan Gotham, Cecil Lynch, Michael Ascher |