| 2005 | A Blind Image Watermarking Using for Copyright Protection and Tracing. Haifeng Li, Shuxun Wang, Weiwei Song, Quan Wen |
| 2005 | A Cognitive Model for Alert Correlation in a Distributed Environment. Ambareen Siraj, Rayford B. Vaughn |
| 2005 | A Conceptual Model of Counterterrorist Operations. David Davis, Allison Frendak-Blume, Jennifer Wheeler, Alexander E. R. Woodcock, Clarence Worrell III |
| 2005 | A Framework for Global Monitoring and Security Assistance Based on IPv6 and Multimedia Data Mining Techniques. Xiaoyan Gong, Haijun Gao |
| 2005 | A Group Decision-Support Method for Search and Rescue Based on Markov Chain. Huizhang Shen, Jidi Zhao, Ying Peng |
| 2005 | A Jackson Network-Based Model for Quantitative Analysis of Network Security. Zhengtao Xiang, Yufeng Chen, Wei Jian, Fei Yan |
| 2005 | A New Conceptual Framework to Resolve Terrorism's Root Causes. Joshua Sinai |
| 2005 | A New Relationship Form in Data Mining. Suwimon Kooptiwoot, Muhammad Abdus Salam |
| 2005 | A Novel Watermarking Algorithm Based on SVD and Zernike Moments. Haifeng Li, Shuxun Wang, Weiwei Song, Quan Wen |
| 2005 | A Secured Mobile Phone Based on Embedded Fingerprint Recognition Systems. Xinjian Chen, Jie Tian, Qi Su, Xin Yang, Fei-Yue Wang |
| 2005 | A Study of "Root Causes of Conflict" Using Latent Semantic Analysis. Mihaela Bobeica, Jean-Paul Jéral, Teofilo Garcia, Clive Best |
| 2005 | A Survey of Software Watermarking. William Zhu, Clark D. Thomborson, Fei-Yue Wang |
| 2005 | A Taxonomy of Cyber Attacks on 3G Networks. Kameswari Kotapati, Peng Liu, Yan Sun, Thomas F. La Porta |
| 2005 | Active Automation of the DITSCAP. Seok Won Lee, Robin A. Gandhi, Gail-Joon Ahn, Deepak S. Yavagal |
| 2005 | An Adaptive Approach to Handle DoS Attack for Web Services. Eul-Gyu Im, Yong Ho Song |
| 2005 | An Agent-Based Framework for a Traffic Security Management System. Shuming Tang, Haijun Gao |
| 2005 | An Architecture for Network Security Using Feedback Control. Ram Dantu, João W. Cangussu |
| 2005 | An Empirical Study on Dynamic Effects on Deception Detection. Tiantian Qin, Judee K. Burgoon |
| 2005 | An Ontological Approach to the Document Access Problem of Insider Threat. Boanerges Aleman-Meza, Phillip Burns, Matthew Eavenson, Devanand Palaniswami, Amit P. Sheth |
| 2005 | Analysis of Three Intrusion Detection System Benchmark Datasets Using Machine Learning Algorithms. Hilmi Günes Kayacik, Nur Zincir-Heywood |
| 2005 | Analyzing Terrorist Networks: A Case Study of the Global Salafi Jihad Network. Jialun Qin, Jennifer Jie Xu, Daning Hu, Marc Sageman, Hsinchun Chen |
| 2005 | Anti Money Laundering Reporting and Investigation - Sorting the Wheat from the Chaff. Ana Isabel Canhoto, James Backhouse |
| 2005 | Application of Cooperative Co-evolution in Pedestrian Detection Systems. Xianbin Cao, Hong Qiao, Fei-Yue Wang, Xinzheng Zhang |
| 2005 | Application of Latent Semantic Indexing to Processing of Noisy Text. Robert J. Price, Anthony E. Zukas |
| 2005 | Application of a Decomposed Support Vector Machine Algorithm in Pedestrian Detection from a Moving Vehicle. Hong Qiao, Fei-Yue Wang, Xianbin Cao |
| 2005 | Applying Authorship Analysis to Arabic Web Content. Ahmed Abbasi, Hsinchun Chen |
| 2005 | Automatic Extraction of Deceptive Behavioral Cues from Video. Thomas O. Meservy, Matthew L. Jensen, John Kruse, Judee K. Burgoon, Jay F. Nunamaker Jr. |
| 2005 | Automatically Determining an Anonymous Author's Native Language. Moshe Koppel, Jonathan Schler, Kfir Zigdon |
| 2005 | Background Use of Sensitive Information to Aid in Analysis of Non-sensitive Data on Threats and Vulnerabilities. Richard A. Smith |
| 2005 | Beyond Keyword Filtering for Message and Conversation Detection. David B. Skillicorn |
| 2005 | BioPortal: Sharing and Analyzing Infectious Disease Information. Daniel Dajun Zeng, Hsinchun Chen, Chunju Tseng, Catherine A. Larson, Wei Chang, Millicent Eidson, Ivan Gotham, Cecil Lynch, Michael Ascher |
| 2005 | Biometric Fingerprints Based Radio Frequency Identification. Sundaram Jayakumar, Senthilkumar Chandramohan |
| 2005 | Biomonitoring, Phylogenetics and Anomaly Aggregation Systems. David R. B. Stockwell, Jason T. L. Wang |
| 2005 | BorderSafe: Cross-Jurisdictional Information Sharing, Analysis, and Visualization. Siddharth Kaza, Byron Marshall, Jennifer Jie Xu, Alan Gang Wang, Hemanth Gowda, Homa Atabakhsh, Tim Petersen, Chuck Violette, Hsinchun Chen |
| 2005 | CODESSEAL: Compiler/FPGA Approach to Secure Applications. Olga Gelbart, Paul Ott, Bhagirath Narahari, Rahul Simha, Alok N. Choudhary, Joseph Zambreno |
| 2005 | Collecting and Analyzing the Presence of Terrorists on the Web: A Case Study of Jihad Websites. Edna Reid, Jialun Qin, Yilu Zhou, Guanpi Lai, Marc Sageman, Gabriel Weimann, Hsinchun Chen |
| 2005 | Collusion Set Detection Through Outlier Discovery. Vandana Pursnani Janeja, Vijayalakshmi Atluri, Jaideep Vaidya, Nabil R. Adam |
| 2005 | Computational Tool in Infrastructure Emergency Total Evacuation Analysis. Kelvin H. L. Wong, Mingchun Luo |
| 2005 | Connections in the World of International Terrorism. Yael Shahar |
| 2005 | Content-Based Detection of Terrorists Browsing the Web Using an Advanced Terror Detection System (ATDS). Yuval Elovici, Bracha Shapira, Mark Last, Omer Zaafrany, Menahem Friedman, Moti Schneider, Abraham Kandel |
| 2005 | DIANE: Revolutionizing the Way We Collect, Analyze, and Share Information. Jin Zhu |
| 2005 | Data Distortion for Privacy Protection in a Terrorist Analysis System. Shuting Xu, Jun Zhang, Dianwei Han, Jie Wang |
| 2005 | Deception Across Cultures: Bottom-Up and Top-Down Approaches. Lina Zhou, Simon Lutterbie |
| 2005 | Defending a Web Browser Against Spying with Browser Helper Objects. Beomsoo Park, Sungjin Hong, Jaewook Oh, Heejo Lee |
| 2005 | Design Principles of Coordinated Multi-incident Emergency Response Systems. Rui Chen, Raj Sharman, H. Raghav Rao, Shambhu J. Upadhyaya |
| 2005 | Detecting Deception in Synchronous Computer-Mediated Communication Using Speech Act Profiling. Douglas P. Twitchell, Nicole Forsgren, Karl Wiers, Judee K. Burgoon, Jay F. Nunamaker Jr. |
| 2005 | Detecting Misuse of Information Retrieval Systems Using Data Mining Techniques. Nazli Goharian, Ling Ma, Chris Meyers |
| 2005 | Digging in the Details: A Case Study in Network Data Mining. John Galloway, Simeon J. Simoff |
| 2005 | Discovering Identity Problems: A Case Study. Alan Gang Wang, Homa Atabakhsh, Tim Petersen, Hsinchun Chen |
| 2005 | Dynamic Security Service Negotiation to Ensure Security for Information Sharing on the Internet. Zhengyou Xia, Yichuan Jiang, Jian Wang |
| 2005 | Efficient Discovery of New Information in Large Text Databases. Roger B. Bradford |
| 2005 | Efficient Identification of Overlapping Communities. Jeffrey Baumes, Mark K. Goldberg, Malik Magdon-Ismail |
| 2005 | Enhancing Spatial Database Access Control by Eliminating the Covert Topology Channel. Young-Hwan Oh, Hae-Young Bae |
| 2005 | Evaluating an Infectious Disease Information Sharing and Analysis System. Paul Jen-Hwa Hu, Daniel Dajun Zeng, Hsinchun Chen, Catherine A. Larson, Wei Chang, Chunju Tseng |
| 2005 | Event-Driven Document Selection for Terrorism Information Extraction. Zhen Sun, Ee-Peng Lim, Kuiyu Chang, Teng-Kwee Ong, Rohan Kumar Gunaratna |
| 2005 | Filtering, Fusion and Dynamic Information Presentation: Towards a General Information Firewall. Gregory J. Conti, Mustaque Ahamad, Robert Norback |
| 2005 | Forecasting Terrorism: Indicators and Proven Analytic Techniques. Sundri K. Khalsa |
| 2005 | Forecasting Terrorist Groups' Warfare: 'Conventional' to CBRN. Joshua Sinai |
| 2005 | Gathering Digital Evidence in Response to Information Security Incidents. Shiuh-Jeng Wang, Cheng-Hsing Yang |
| 2005 | How Question Answering Technology Helps to Locate Malevolent Online Content. Dmitri Roussinov, Jose Antonio Robles-Flores |
| 2005 | Incident and Casualty Databases as a Tool for Understanding Low-Intensity Conflicts. Don Radlauer |
| 2005 | Information Supply Chain: A Unified Framework for Information-Sharing. Shuang Sun, John Yen |
| 2005 | Integrating Private Databases for Data Analysis. Ke Wang, Benjamin C. M. Fung, Guozhu Dong |
| 2005 | Intelligence and Security Informatics, IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, GA, USA, May 19-20, 2005, Proceedings Paul B. Kantor, Gheorghe Muresan, Fred S. Roberts, Daniel Dajun Zeng, Fei-Yue Wang, Hsinchun Chen, Ralph C. Merkle |
| 2005 | Intrusion Detection System Using Sequence and Set Preserving Metric. Pradeep Kumar, M. Venkateswara Rao, P. Radha Krishna, Raju S. Bapi, Arijit Laha |
| 2005 | LSI-Based Taxonomy Generation: The Taxonomist System. Janusz Wnek |
| 2005 | Learning Classifiers for Misuse Detection Using a Bag of System Calls Representation. Dae-Ki Kang, Doug Fuller, Vasant G. Honavar |
| 2005 | Leveraging One-Class SVM and Semantic Analysis to Detect Anomalous Content. Özgür Yilmazel, Svetlana Symonenko, Niranjan Balasubramanian, Elizabeth D. Liddy |
| 2005 | Link Analysis Tools for Intelligence and Counterterrorism. Antonio Badia, Mehmed M. Kantardzic |
| 2005 | Map-Mediated GeoCollaborative Crisis Management. Guoray Cai, Alan M. MacEachren, Isaac Brewer, Michael D. McNeese, Rajeev Sharma, Sven Fuhrmann |
| 2005 | Mapping the Contemporary Terrorism Research Domain: Researchers, Publications, and Institutions Analysis. Edna Reid, Hsinchun Chen |
| 2005 | Measuring Success in Countering Terrorism: Problems and Pitfalls. Peter S. Probst |
| 2005 | Mining Candidate Viruses as Potential Bio-terrorism Weapons from Biomedical Literature. Xiaohua Hu, Illhoi Yoo, Peter Rumm, Michael E. Atwood |
| 2005 | Mining Schemas in Semistructured Data Using Fuzzy Decision Trees. Wei Sun, Daxin Liu |
| 2005 | Modeling and Multiway Analysis of Chatroom Tensors. Evrim Acar, Seyit Ahmet Çamtepe, Mukkai S. Krishnamoorthy, Bülent Yener |
| 2005 | More Than a Summary: Stance-Shift Analysis. Boyd Davis, Vivian Lord, Peyton Mason |
| 2005 | Multi-modal Biometrics with PKI Technologies for Border Control Applications. Taekyoung Kwon, Hyeonjoon Moon |
| 2005 | On the QP Algorithm in Software Watermarking. William Zhu, Clark D. Thomborson |
| 2005 | On the Use of Opaque Predicates in Mobile Agent Code Obfuscation. Anirban Majumdar, Clark D. Thomborson |
| 2005 | Performance Study of a Compiler/Hardware Approach to Embedded Systems Security. Kripashankar Mohan, Bhagirath Narahari, Rahul Simha, Paul Ott, Alok N. Choudhary, Joseph Zambreno |
| 2005 | Principal Component Analysis (PCA) for Data Fusion and Navigation of Mobile Robots. Zeng-Guang Hou |
| 2005 | Private Mining of Association Rules. Justin Zhijun Zhan, Stan Matwin, Liwu Chang |
| 2005 | Processing High-Speed Intelligence Feeds in Real-Time. Alan J. Demers, Johannes Gehrke, Mingsheng Hong, Mirek Riedewald |
| 2005 | Question Answer TARA: A Terrorism Activity Resource Application. Robert P. Schumaker, Hsinchun Chen |
| 2005 | Risk Management Using Behavior Based Bayesian Networks. Ram Dantu, Prakash Kolan |
| 2005 | Secure Contents Distribution Using Flash Memory Technology. Yong Ho Song, Eul-Gyu Im |
| 2005 | Securing Grid-Based Critical Infrastructures. Syed Naqvi, Michel Riguidel |
| 2005 | Selective Fusion for Speaker Verification in Surveillance. Yosef A. Solewicz, Moshe Koppel |
| 2005 | Sensitivity Analysis of an Attack Containment Model. Ram Dantu, João W. Cangussu, Janos Turi |
| 2005 | Some Marginal Learning Algorithms for Unsupervised Problems. Qing Tao, Gao-wei Wu, Fei-Yue Wang, Jue Wang |
| 2005 | Template Based Semantic Similarity for Security Applications. Boanerges Aleman-Meza, Christian Halaschek-Wiener, Satya Sanket Sahoo, Amit P. Sheth, Ismailcem Budak Arpinar |
| 2005 | Testing a Rational Choice Model of Airline Hijackings. Laura Dugan, Gary LaFree, Alex R. Piquero |
| 2005 | The Application of PROACT® RCA to Terrorism/Counter Terrorism Related Events. Robert J. Latino |
| 2005 | The Dark Web Portal Project: Collecting and Analyzing the Presence of Terrorist Groups on the Web. Jialun Qin, Yilu Zhou, Guanpi Lai, Edna Reid, Marc Sageman, Hsinchun Chen |
| 2005 | The Multi-fractal Nature of Worm and Normal Traffic at Individual Source Level. Yufeng Chen, Yabo Dong, Dongming Lu, Yunhe Pan |
| 2005 | The Qualitative Challenge of Insurgency Informatics. Scott Tousley |
| 2005 | The Safety Alliance of Cushing - A Model Example of Cooperation as an Effective Counterterrorism Tool. David Zimmermann |
| 2005 | Thematic Indicators Derived from World News Reports. Clive Best, Erik Van der Goot, Monica de Paola |
| 2005 | Toward a Target-Specific Method of Threat Assessment. Yael Shahar |
| 2005 | Toward an ITS Specific Knowledge Engine. Guanpi Lai, Fei-Yue Wang |
| 2005 | Towards an Effective Wireless Security Policy for Sensitive Organizations. Michael Manley, Cheri McEntee, Anthony Molet, Joon S. Park |