ISI C

101 papers

YearTitle / Authors
2005A Blind Image Watermarking Using for Copyright Protection and Tracing.
Haifeng Li, Shuxun Wang, Weiwei Song, Quan Wen
2005A Cognitive Model for Alert Correlation in a Distributed Environment.
Ambareen Siraj, Rayford B. Vaughn
2005A Conceptual Model of Counterterrorist Operations.
David Davis, Allison Frendak-Blume, Jennifer Wheeler, Alexander E. R. Woodcock, Clarence Worrell III
2005A Framework for Global Monitoring and Security Assistance Based on IPv6 and Multimedia Data Mining Techniques.
Xiaoyan Gong, Haijun Gao
2005A Group Decision-Support Method for Search and Rescue Based on Markov Chain.
Huizhang Shen, Jidi Zhao, Ying Peng
2005A Jackson Network-Based Model for Quantitative Analysis of Network Security.
Zhengtao Xiang, Yufeng Chen, Wei Jian, Fei Yan
2005A New Conceptual Framework to Resolve Terrorism's Root Causes.
Joshua Sinai
2005A New Relationship Form in Data Mining.
Suwimon Kooptiwoot, Muhammad Abdus Salam
2005A Novel Watermarking Algorithm Based on SVD and Zernike Moments.
Haifeng Li, Shuxun Wang, Weiwei Song, Quan Wen
2005A Secured Mobile Phone Based on Embedded Fingerprint Recognition Systems.
Xinjian Chen, Jie Tian, Qi Su, Xin Yang, Fei-Yue Wang
2005A Study of "Root Causes of Conflict" Using Latent Semantic Analysis.
Mihaela Bobeica, Jean-Paul Jéral, Teofilo Garcia, Clive Best
2005A Survey of Software Watermarking.
William Zhu, Clark D. Thomborson, Fei-Yue Wang
2005A Taxonomy of Cyber Attacks on 3G Networks.
Kameswari Kotapati, Peng Liu, Yan Sun, Thomas F. La Porta
2005Active Automation of the DITSCAP.
Seok Won Lee, Robin A. Gandhi, Gail-Joon Ahn, Deepak S. Yavagal
2005An Adaptive Approach to Handle DoS Attack for Web Services.
Eul-Gyu Im, Yong Ho Song
2005An Agent-Based Framework for a Traffic Security Management System.
Shuming Tang, Haijun Gao
2005An Architecture for Network Security Using Feedback Control.
Ram Dantu, João W. Cangussu
2005An Empirical Study on Dynamic Effects on Deception Detection.
Tiantian Qin, Judee K. Burgoon
2005An Ontological Approach to the Document Access Problem of Insider Threat.
Boanerges Aleman-Meza, Phillip Burns, Matthew Eavenson, Devanand Palaniswami, Amit P. Sheth
2005Analysis of Three Intrusion Detection System Benchmark Datasets Using Machine Learning Algorithms.
Hilmi Günes Kayacik, Nur Zincir-Heywood
2005Analyzing Terrorist Networks: A Case Study of the Global Salafi Jihad Network.
Jialun Qin, Jennifer Jie Xu, Daning Hu, Marc Sageman, Hsinchun Chen
2005Anti Money Laundering Reporting and Investigation - Sorting the Wheat from the Chaff.
Ana Isabel Canhoto, James Backhouse
2005Application of Cooperative Co-evolution in Pedestrian Detection Systems.
Xianbin Cao, Hong Qiao, Fei-Yue Wang, Xinzheng Zhang
2005Application of Latent Semantic Indexing to Processing of Noisy Text.
Robert J. Price, Anthony E. Zukas
2005Application of a Decomposed Support Vector Machine Algorithm in Pedestrian Detection from a Moving Vehicle.
Hong Qiao, Fei-Yue Wang, Xianbin Cao
2005Applying Authorship Analysis to Arabic Web Content.
Ahmed Abbasi, Hsinchun Chen
2005Automatic Extraction of Deceptive Behavioral Cues from Video.
Thomas O. Meservy, Matthew L. Jensen, John Kruse, Judee K. Burgoon, Jay F. Nunamaker Jr.
2005Automatically Determining an Anonymous Author's Native Language.
Moshe Koppel, Jonathan Schler, Kfir Zigdon
2005Background Use of Sensitive Information to Aid in Analysis of Non-sensitive Data on Threats and Vulnerabilities.
Richard A. Smith
2005Beyond Keyword Filtering for Message and Conversation Detection.
David B. Skillicorn
2005BioPortal: Sharing and Analyzing Infectious Disease Information.
Daniel Dajun Zeng, Hsinchun Chen, Chunju Tseng, Catherine A. Larson, Wei Chang, Millicent Eidson, Ivan Gotham, Cecil Lynch, Michael Ascher
2005Biometric Fingerprints Based Radio Frequency Identification.
Sundaram Jayakumar, Senthilkumar Chandramohan
2005Biomonitoring, Phylogenetics and Anomaly Aggregation Systems.
David R. B. Stockwell, Jason T. L. Wang
2005BorderSafe: Cross-Jurisdictional Information Sharing, Analysis, and Visualization.
Siddharth Kaza, Byron Marshall, Jennifer Jie Xu, Alan Gang Wang, Hemanth Gowda, Homa Atabakhsh, Tim Petersen, Chuck Violette, Hsinchun Chen
2005CODESSEAL: Compiler/FPGA Approach to Secure Applications.
Olga Gelbart, Paul Ott, Bhagirath Narahari, Rahul Simha, Alok N. Choudhary, Joseph Zambreno
2005Collecting and Analyzing the Presence of Terrorists on the Web: A Case Study of Jihad Websites.
Edna Reid, Jialun Qin, Yilu Zhou, Guanpi Lai, Marc Sageman, Gabriel Weimann, Hsinchun Chen
2005Collusion Set Detection Through Outlier Discovery.
Vandana Pursnani Janeja, Vijayalakshmi Atluri, Jaideep Vaidya, Nabil R. Adam
2005Computational Tool in Infrastructure Emergency Total Evacuation Analysis.
Kelvin H. L. Wong, Mingchun Luo
2005Connections in the World of International Terrorism.
Yael Shahar
2005Content-Based Detection of Terrorists Browsing the Web Using an Advanced Terror Detection System (ATDS).
Yuval Elovici, Bracha Shapira, Mark Last, Omer Zaafrany, Menahem Friedman, Moti Schneider, Abraham Kandel
2005DIANE: Revolutionizing the Way We Collect, Analyze, and Share Information.
Jin Zhu
2005Data Distortion for Privacy Protection in a Terrorist Analysis System.
Shuting Xu, Jun Zhang, Dianwei Han, Jie Wang
2005Deception Across Cultures: Bottom-Up and Top-Down Approaches.
Lina Zhou, Simon Lutterbie
2005Defending a Web Browser Against Spying with Browser Helper Objects.
Beomsoo Park, Sungjin Hong, Jaewook Oh, Heejo Lee
2005Design Principles of Coordinated Multi-incident Emergency Response Systems.
Rui Chen, Raj Sharman, H. Raghav Rao, Shambhu J. Upadhyaya
2005Detecting Deception in Synchronous Computer-Mediated Communication Using Speech Act Profiling.
Douglas P. Twitchell, Nicole Forsgren, Karl Wiers, Judee K. Burgoon, Jay F. Nunamaker Jr.
2005Detecting Misuse of Information Retrieval Systems Using Data Mining Techniques.
Nazli Goharian, Ling Ma, Chris Meyers
2005Digging in the Details: A Case Study in Network Data Mining.
John Galloway, Simeon J. Simoff
2005Discovering Identity Problems: A Case Study.
Alan Gang Wang, Homa Atabakhsh, Tim Petersen, Hsinchun Chen
2005Dynamic Security Service Negotiation to Ensure Security for Information Sharing on the Internet.
Zhengyou Xia, Yichuan Jiang, Jian Wang
2005Efficient Discovery of New Information in Large Text Databases.
Roger B. Bradford
2005Efficient Identification of Overlapping Communities.
Jeffrey Baumes, Mark K. Goldberg, Malik Magdon-Ismail
2005Enhancing Spatial Database Access Control by Eliminating the Covert Topology Channel.
Young-Hwan Oh, Hae-Young Bae
2005Evaluating an Infectious Disease Information Sharing and Analysis System.
Paul Jen-Hwa Hu, Daniel Dajun Zeng, Hsinchun Chen, Catherine A. Larson, Wei Chang, Chunju Tseng
2005Event-Driven Document Selection for Terrorism Information Extraction.
Zhen Sun, Ee-Peng Lim, Kuiyu Chang, Teng-Kwee Ong, Rohan Kumar Gunaratna
2005Filtering, Fusion and Dynamic Information Presentation: Towards a General Information Firewall.
Gregory J. Conti, Mustaque Ahamad, Robert Norback
2005Forecasting Terrorism: Indicators and Proven Analytic Techniques.
Sundri K. Khalsa
2005Forecasting Terrorist Groups' Warfare: 'Conventional' to CBRN.
Joshua Sinai
2005Gathering Digital Evidence in Response to Information Security Incidents.
Shiuh-Jeng Wang, Cheng-Hsing Yang
2005How Question Answering Technology Helps to Locate Malevolent Online Content.
Dmitri Roussinov, Jose Antonio Robles-Flores
2005Incident and Casualty Databases as a Tool for Understanding Low-Intensity Conflicts.
Don Radlauer
2005Information Supply Chain: A Unified Framework for Information-Sharing.
Shuang Sun, John Yen
2005Integrating Private Databases for Data Analysis.
Ke Wang, Benjamin C. M. Fung, Guozhu Dong
2005Intelligence and Security Informatics, IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, GA, USA, May 19-20, 2005, Proceedings
Paul B. Kantor, Gheorghe Muresan, Fred S. Roberts, Daniel Dajun Zeng, Fei-Yue Wang, Hsinchun Chen, Ralph C. Merkle
2005Intrusion Detection System Using Sequence and Set Preserving Metric.
Pradeep Kumar, M. Venkateswara Rao, P. Radha Krishna, Raju S. Bapi, Arijit Laha
2005LSI-Based Taxonomy Generation: The Taxonomist System.
Janusz Wnek
2005Learning Classifiers for Misuse Detection Using a Bag of System Calls Representation.
Dae-Ki Kang, Doug Fuller, Vasant G. Honavar
2005Leveraging One-Class SVM and Semantic Analysis to Detect Anomalous Content.
Özgür Yilmazel, Svetlana Symonenko, Niranjan Balasubramanian, Elizabeth D. Liddy
2005Link Analysis Tools for Intelligence and Counterterrorism.
Antonio Badia, Mehmed M. Kantardzic
2005Map-Mediated GeoCollaborative Crisis Management.
Guoray Cai, Alan M. MacEachren, Isaac Brewer, Michael D. McNeese, Rajeev Sharma, Sven Fuhrmann
2005Mapping the Contemporary Terrorism Research Domain: Researchers, Publications, and Institutions Analysis.
Edna Reid, Hsinchun Chen
2005Measuring Success in Countering Terrorism: Problems and Pitfalls.
Peter S. Probst
2005Mining Candidate Viruses as Potential Bio-terrorism Weapons from Biomedical Literature.
Xiaohua Hu, Illhoi Yoo, Peter Rumm, Michael E. Atwood
2005Mining Schemas in Semistructured Data Using Fuzzy Decision Trees.
Wei Sun, Daxin Liu
2005Modeling and Multiway Analysis of Chatroom Tensors.
Evrim Acar, Seyit Ahmet Çamtepe, Mukkai S. Krishnamoorthy, Bülent Yener
2005More Than a Summary: Stance-Shift Analysis.
Boyd Davis, Vivian Lord, Peyton Mason
2005Multi-modal Biometrics with PKI Technologies for Border Control Applications.
Taekyoung Kwon, Hyeonjoon Moon
2005On the QP Algorithm in Software Watermarking.
William Zhu, Clark D. Thomborson
2005On the Use of Opaque Predicates in Mobile Agent Code Obfuscation.
Anirban Majumdar, Clark D. Thomborson
2005Performance Study of a Compiler/Hardware Approach to Embedded Systems Security.
Kripashankar Mohan, Bhagirath Narahari, Rahul Simha, Paul Ott, Alok N. Choudhary, Joseph Zambreno
2005Principal Component Analysis (PCA) for Data Fusion and Navigation of Mobile Robots.
Zeng-Guang Hou
2005Private Mining of Association Rules.
Justin Zhijun Zhan, Stan Matwin, Liwu Chang
2005Processing High-Speed Intelligence Feeds in Real-Time.
Alan J. Demers, Johannes Gehrke, Mingsheng Hong, Mirek Riedewald
2005Question Answer TARA: A Terrorism Activity Resource Application.
Robert P. Schumaker, Hsinchun Chen
2005Risk Management Using Behavior Based Bayesian Networks.
Ram Dantu, Prakash Kolan
2005Secure Contents Distribution Using Flash Memory Technology.
Yong Ho Song, Eul-Gyu Im
2005Securing Grid-Based Critical Infrastructures.
Syed Naqvi, Michel Riguidel
2005Selective Fusion for Speaker Verification in Surveillance.
Yosef A. Solewicz, Moshe Koppel
2005Sensitivity Analysis of an Attack Containment Model.
Ram Dantu, João W. Cangussu, Janos Turi
2005Some Marginal Learning Algorithms for Unsupervised Problems.
Qing Tao, Gao-wei Wu, Fei-Yue Wang, Jue Wang
2005Template Based Semantic Similarity for Security Applications.
Boanerges Aleman-Meza, Christian Halaschek-Wiener, Satya Sanket Sahoo, Amit P. Sheth, Ismailcem Budak Arpinar
2005Testing a Rational Choice Model of Airline Hijackings.
Laura Dugan, Gary LaFree, Alex R. Piquero
2005The Application of PROACT® RCA to Terrorism/Counter Terrorism Related Events.
Robert J. Latino
2005The Dark Web Portal Project: Collecting and Analyzing the Presence of Terrorist Groups on the Web.
Jialun Qin, Yilu Zhou, Guanpi Lai, Edna Reid, Marc Sageman, Hsinchun Chen
2005The Multi-fractal Nature of Worm and Normal Traffic at Individual Source Level.
Yufeng Chen, Yabo Dong, Dongming Lu, Yunhe Pan
2005The Qualitative Challenge of Insurgency Informatics.
Scott Tousley
2005The Safety Alliance of Cushing - A Model Example of Cooperation as an Effective Counterterrorism Tool.
David Zimmermann
2005Thematic Indicators Derived from World News Reports.
Clive Best, Erik Van der Goot, Monica de Paola
2005Toward a Target-Specific Method of Threat Assessment.
Yael Shahar
2005Toward an ITS Specific Knowledge Engine.
Guanpi Lai, Fei-Yue Wang
2005Towards an Effective Wireless Security Policy for Sensitive Organizations.
Michael Manley, Cheri McEntee, Anthony Molet, Joon S. Park