ISI C

50 papers

YearTitle / Authors
2004A Framework for a Secure Federated Patient Healthcare System.
Raj Sharman, Himabindu Challapalli, H. Raghav Rao, Shambhu J. Upadhyaya
2004A Novel Autonomous Trust Management Model for Mobile Agents.
Yichuan Jiang, Zhengyou Xia, YiPing Zhong, Shiyong Zhang
2004A Novel Policy and Information Flow Security Model for Active Network.
Zhengyou Xia, Yichuan Jiang, YiPing Zhong, Shiyong Zhang
2004A Tool for Internet Chatroom Surveillance.
Seyit Ahmet Çamtepe, Mukkai S. Krishnamoorthy, Bülent Yener
2004Aligning Simulation Models of Smallpox Outbreaks.
Li-Chiou Chen, Boris Kaminsky, Tiffany Tummino, Kathleen M. Carley, Elizabeth Casman, Douglas B. Fridsma, Alex Yahja
2004Analyzing and Visualizing Criminal Network Dynamics: A Case Study.
Jennifer Jie Xu, Byron Marshall, Siddharth Kaza, Hsinchun Chen
2004Balancing Security and Privacy in the 21
Chris C. Demchak, Kurt D. Fenstermacher
2004ChatTrack: Chat Room Topic Detection Using Classification.
Jason Bengel, Susan Gauch, Eera Mittur, Rajan Vijayaraghavan
2004Composite Role-Based Monitoring (CRBM) for Countering Insider Threats.
Joon S. Park, Shuyuan Mary Ho
2004Computer-Based Training for Deception Detection: What Users Want?
Jinwei Cao, Ming Lin, Amit V. Deokar, Judee K. Burgoon, Janna M. Crews, Mark Adkins
2004Critical Infrastructure Integration Modeling and Simulation.
William J. Tolone, David Wilson, Anita Raja, Wei-Ning Xiang, Huili Hao, Stuart Phelps, E. Wray Johnson
2004Cross-Lingual Semantics for Crime Analysis Using Associate Constraint Network.
Christopher C. Yang, Kar Wing Li
2004Data Analytics for Bioterrorism Surveillance.
Donald J. Berndt, Sunil Bhat, John W. Fisher, Alan R. Hevner, James Studnicki
2004Determining the Gender of the Unseen Name through Hyphenation.
Robert H. Warren, Christopher Leurer
2004Discovering Hidden Groups in Communication Networks.
Jeffrey Baumes, Mark K. Goldberg, Malik Magdon-Ismail, William A. Wallace
2004Experimental Studies Using Median Polish Procedure to Reduce Alarm Rates in Data Cubes of Intrusion Data.
Jorge Levera, Benjamín Barán, Robert L. Grossman
2004Finding Unusual Correlation Using Matrix Decompositions.
David B. Skillicorn
2004Generating Concept Hierarchies from Text for Intelligence Analysis.
Jenq-Haur Wang, Chien-Chung Huang, Jei-Wen Teng, Lee-Feng Chien
2004Generating Networks of Illegal Drug Users Using Large Samples of Partial Ego-Network Data.
Ju-Sung Lee
2004IT Security Risk Management under Network Effects and Layered Protection Strategy.
Wei T. Yue, Metin Çakanyildirim, Young U. Ryu, Dengpan Liu
2004Identifying Multi-ID Users in Open Forums.
Hung-Ching Chen, Mark K. Goldberg, Malik Magdon-Ismail
2004Information Sharing and Collaboration Policies within Government Agencies.
Homa Atabakhsh, Cathy Larson, Tim Petersen, Chuck Violette, Hsinchun Chen
2004Intelligence and Security Informatics, Second Symposium on Intelligence and Security Informatics, ISI 2004, Tucson, AZ, USA, June 10-11, 2004, Proceedings
Hsinchun Chen, Reagan W. Moore, Daniel Dajun Zeng, John Leavitt
2004Interactive Query Languages for Intelligence Tasks.
Antonio Badia
2004Intrusion-Tolerant Intrusion Detection System.
Myung-Kyu Yi, Chong-Sun Hwang
2004MIPT: Sharing Terrorism Information Resources.
James O. Ellis III
2004Mind the Gap: The Growing Distance between Institutional and Technical Capabilities in Organizations Performing Critical Operations.
Gene I. Rochlin
2004Mining Normal and Intrusive Activity Patterns for Computer Intrusion Detection.
Xiangyang Li, Nong Ye
2004Optimal Redundancy Allocation for Disaster Recovery Planning in the Network Economy.
Benjamin B. M. Shao
2004Policy-Based Information Sharing with Semantics.
Eric Hughes, Amy Kazura, Arnie Rosenthal
2004Post-9/11 Evolution of Al Qaeda.
Rohan Kumar Gunaratna
2004Privacy-Preserving Inter-database Operations.
Gang Liang, Sudarshan S. Chawathe
2004Research of Characteristics of Worm Traffic.
Yufeng Chen, Yabo Dong, Dongming Lu, Zhengtao Xiang
2004Security Informatics: A Paradigm Shift in Information Technology Education.
Susan M. Merritt, Allen Stix, Judith E. Sullivan
2004Self-efficacy, Training Effectiveness, and Deception Detection: A Longitudinal Study of Lie Detection Training.
Kent Marett, David P. Biros, Monti L. Knode
2004Semantic Analysis for Monitoring Insider Threats.
Svetlana Symonenko, Elizabeth D. Liddy, Özgür Yilmazel, Robert Del Zoppo, Eric Brown, Matt Downey
2004Spatial Forecast Methods for Terrorist Events in Urban Environments.
Donald E. Brown, Jason Dalton, Heidi Hoyle
2004Studying E-Mail Graphs for Intelligence Monitoring and Analysis in the Absence of Semantic Information.
Petros Drineas, Mukkai S. Krishnamoorthy, Michael D. Sofka, Bülent Yener
2004THEMIS: Threat Evaluation Metamodel for Information Systems.
Csilla Farkas, Thomas C. Wingfield, James Bret Michael, Duminda Wijesekera
2004Terrorism Knowledge Discovery Project: A Knowledge Discovery Approach to Addressing the Threats of Terrorism.
Edna Reid, Jialun Qin, Wingyan Chung, Jennifer Jie Xu, Yilu Zhou, Robert P. Schumaker, Marc Sageman, Hsinchun Chen
2004Testing Various Modes of Computer-Based Training for Deception Detection.
Joey F. George, David P. Biros, Mark Adkins, Judee K. Burgoon, Jay F. Nunamaker Jr.
2004The Architecture of the Cornell Knowledge Broker.
Alan J. Demers, Johannes Gehrke, Mirek Riedewald
2004The Optimal Deployment of Filters to Limit Forged Address Attacks in Communication Networks.
Enock Chisonge Mofya, Jonathan Cole Smith
2004The Use of Data Mining Techniques in Operational Crime Fighting.
Richard Adderley
2004Towards a Social Network Approach for Monitoring Insider Threats to Information Security.
Anand Natarajan, Liaquat Hossain
2004Using Speech Act Profiling for Deception Detection.
Douglas P. Twitchell, Jay F. Nunamaker Jr., Judee K. Burgoon
2004Utilizing the Social and Behavioral Sciences to Assess, Model, Forecast and Preemptively Respond to Terrorism.
Joshua Sinai
2004Vulnerability Analysis and Evaluation within an Intranet.
Eung Ki Park, Jung Taek Seo, Eul-Gyu Im, Cheolwon Lee
2004Web-Based Intelligence Notification System: Architecture and Design.
Alexander Dolotov, Mary Strickler
2004West Nile Virus and Botulism Portal: A Case Study in Infectious Disease Informatics.
Daniel Dajun Zeng, Hsinchun Chen, Chunju Tseng, Catherine A. Larson, Millicent Eidson, Ivan Gotham, Cecil Lynch, Michael Ascher