ISI C

126 papers

YearTitle / Authors
2006A Child's Story to Illustrate Automated Reasoning Systems Using Opportunity and History.
James D. Jones, Hemant Joshi, Umit Topaloglu, Eric Nelson
2006A Dictionary-Based Approach to Fast and Accurate Name Matching in Large Law Enforcement Databases.
Olcay Kursun, Anna Koufakou, Bing Chen, Michael Georgiopoulos, Kenneth M. Reynolds, Ronald Eaglin
2006A First Look at Domestic and International Global Terrorism Events, 1970-1997.
Laura Dugan, Gary LaFree, Heather Fogg
2006A Flexible Context-Aware Authorization Framework for Mediation Systems.
Li Yang, Joseph M. Kizza, Raimund K. Ege
2006A Flexible and Scalable Access Control for Ubiquitous Computing Environments.
Hung Le Xuan, Nguyen Ngoc Diep, Yonil Zhung, Sungyoung Lee, Young-Koo Lee
2006A Formalized Taxonomy of DDoS Attacks Based on Similarity.
Jian Kang, Yuan Zhang, Jiu-bin Ju
2006A Framework for Exploring Gray Web Forums: Analysis of Forum-Based Communities in Taiwan.
Jau-Hwang Wang, Tianjun Fu, Hong-Ming Lin, Hsinchun Chen
2006A Home Firewall Solution for Securing Smart Spaces.
Pho Duc Giang, Hung Le Xuan, Yonil Zhung, Sungyoung Lee, Young-Koo Lee
2006A Multi-layer Naïve Bayes Model for Approximate Identity Matching.
G. Alan Wang, Hsinchun Chen, Homa Atabakhsh
2006A Multiclass Classifier to Detect Pedestrians and Acquire Their Moving Styles.
D. Chen, Xianbin Cao, Hong Qiao, Fei-Yue Wang
2006A New Methodology of Analyzing Security Vulnerability for Network Services.
Yong Ho Song, Jung Min Park, Yongsu Park, Eul-Gyu Im
2006A Novel Key Release Scheme from Biometrics.
Thian Song Ong, Andrew Teoh Beng Jin, David Ngo Chek Ling
2006A Novel Mechanism to Defend Against Low-Rate Denial-of-Service Attacks.
Wei Wei, Yabo Dong, Dongming Lu, Guang Jin, Honglan Lao
2006A PCA-LVQ Model for Intrusion Alert Analysis.
Jing-Xin Wang, Zhiying Wang, Kui Dai
2006A Parallel System Strategy of Evaluation and Forecasting for Security Information with Artificial Society.
Dalei Guo, Shuming Tang
2006A Review of Public Health Syndromic Surveillance Systems.
Ping Yan, Daniel Dajun Zeng, Hsinchun Chen
2006A Trust Model for Uncertain Interactions in Ubiquitous Environments.
Hung Le Xuan, Hassan Jameel, Seong Jin Cho, Weiwei Yuan, Young-Koo Lee, Sungyoung Lee
2006A Trust-Based Security Architecture for Ubiquitous Computing Systems.
Hung Le Xuan, Pho Duc Giang, Yonil Zhung, Tran Van Phuong, Sungyoung Lee, Young-Koo Lee
2006A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks - A Friend Approach.
Shukor Abd Razak, Steven Furnell, Nathan L. Clarke, Phillip J. Brooke
2006Abnormal Detection Algorithm Based on Match Range Model.
Jungan Chen
2006Access Control Requirements for Preventing Insider Threats.
Joon S. Park, Joseph Giordano
2006Adaptive Method for Monitoring Network and Early Detection of Internet Worms.
Chen Bo, Binxing Fang, Xiao-chun Yun
2006Advanced Patterns and Matches in Link Analysis.
Michael Wolverton, Ian W. Harrison, John D. Lowrance, Andres C. Rodriguez, Jérôme Thoméré
2006An Anomaly Detection Algorithm for Detecting Attacks in Wireless Sensor Networks.
Tran Van Phuong, Hung Le Xuan, Seong Jin Cho, Young-Koo Lee, Sungyoung Lee
2006An Embedded Bayesian Network Hidden Markov Model for Digital Forensics.
Olivier Y. de Vel, Nianjun Liu, Terry Caelli, Tibério S. Caetano
2006An Evolutionary Approach in Threats Detection for Distributed Security Defence Systems.
Cyril Onwubiko, Andrew P. Lenaghan
2006An Info-Gap Approach to Policy Selection for Bio-terror Response.
Anna Yoffe, Yakov Ben-Haim
2006An Ontology-Based Network Intrusion Detection System: A User-Oriented Approach.
Shao-Shin Hung, Damon Shing-Min Liu
2006Analysis of Abnormalities of Worm Traffic for Obtaining Worm Detection Vectors.
Zhengtao Xiang, Yufeng Chen, Yabo Dong, Honglan Lao
2006Analyzing Entities and Topics in News Articles Using Statistical Topic Models.
David Newman, Chaitanya Chemudugunta, Padhraic Smyth, Mark Steyvers
2006Analyzing Social Networks in E-Mail with Rich Syntactic Features.
Paul Thompson, Wei Zhang
2006Analyzing the Terrorist Social Networks with Visualization Tools.
Christopher C. Yang, Nan Liu, Marc Sageman
2006Anomaly Detection of Excessive Network Traffic Based on Ratio and Volume Analysis.
Hyun Joo Kim, Jung-Chan Na, Jong-Soo Jang
2006Application of Latent Semantic Indexing in Generating Graphs of Terrorist Networks.
Roger B. Bradford
2006Attacking Confidentiality: An Agent Based Approach.
Kapil Kumar Gupta, Baikunth Nath, Kotagiri Ramamohanarao, Ashraf U. Kazi
2006CC-GiST: Cache Conscious-Generalized Search Tree for Supporting Various Fast Intelligent Applications.
Won-Sik Kim, Woong-Kee Loh, Wook-Shin Han
2006CWME: A Framework of Group Support System for Emergency Responses.
Yaodong Li, Huiguang He, Baihua Xiao, Chunheng Wang, Feiyue Wang
2006Classification of Threats Via a Multi-sensor Security Portal.
Amar Singh, Lawrence B. Holder
2006Collective Sampling and Analysis of High Order Tensors for Chatroom Communications.
Evrim Acar, Seyit Ahmet Çamtepe, Bülent Yener
2006Combating Terrorism Insurgency Resolution Software: A Research Note.
Joshua Sinai
2006Computational Modeling and Experimental Validation of Aviation Security Procedures.
Uwe Glässer, Sarah Rastkar, Mona Vajihollahi
2006Computer-Mediated Collaborative Reasoning and Intelligence Analysis.
Douglas Yeung, John D. Lowrance
2006Content Analysis of Jihadi Extremist Groups' Videos.
Arab Salem, Edna Reid, Hsinchun Chen
2006Continuous Authentication by Keystroke Dynamics Using Committee Machines.
Sergio Roberto de Lima e Silva Filho, Mauro Roisenberg
2006Cost-Sensitive Access Control for Illegitimate Confidential Access by Insiders.
Young-Woo Seo, Katia P. Sycara
2006Covering Based Granular Computing for Conflict Analysis.
William Zhu, Fei-Yue Wang
2006Database Security Protection Via Inference Detection.
Yu Chen, Wesley W. Chu
2006Decider.Track, a Revolutionary Cyber-Tracker for Antiterrorist Fight.
Martine Naillon, Jean-François di Chiara, Bruno Eude, Christian Amathieux
2006Design and Implementation of FPGA Based High-Performance Intrusion Detection System.
Byoung-Koo Kim, Young-Jun Heo, Jintae Oh
2006Design and Implementation of a Policy-Based Privacy Authorization System.
Hyang-Chang Choi, Seungyong Lee, HyungHyo Lee
2006Design of Syntactical Morphological and Semantical Analyzer (SMSA) for Processing Arabic Texts.
Samar Mouti, Fadel Sukkar
2006Design of a Reliable Hardware Stack to Defend Against Frame Pointer Overwrite Attacks.
Yongsu Park, Yong Ho Song, Eul-Gyu Im
2006Detecting Anomalies in Cargo Using Graph Properties.
William Eberle, Lawrence B. Holder
2006Detecting Deception in Person-of-Interest Statements.
Christie M. Fuller, David P. Biros, Mark Adkins, Judee K. Burgoon, Jay F. Nunamaker Jr., Steven Coulon
2006Detection Using Clustering Query Results.
Nazli Goharian, Alana Platt
2006Digitized Forensic Investigation at P2P Copyright Controversy, Infringement.
Da-Yu Kao, Shiuh-Jeng Wang, Frank Fu-Yuan Huang
2006Distributing the Cost of Securing a Transportation Infrastructure.
Sudarshan S. Chawathe
2006DrillSim: A Simulation Framework for Emergency Response Drills.
Vidhya Balasubramanian, Daniel Massaguer, Sharad Mehrotra, Nalini Venkatasubramanian
2006E-mail Traffic Analysis Using Visualisation and Decision Trees.
Mark Jyn-Huey Lim, Michael Negnevitsky, Jacky Hartnett
2006Email Worm Detection Using Naïve Bayes and Support Vector Machine.
Mohammad M. Masud, Latifur Khan, Ehab Al-Shaer
2006Entity Workspace: An Evidence File That Aids Memory, Inference, and Reading.
Eric A. Bier, Edward W. Ishak, Ed Huai-hsin Chi
2006Evaluation of Information Retrieval and Text Mining Tools on Automatic Named Entity Extraction.
Nishant Kumar, Jan De Beer, Jan Vanthienen, Marie-Francine Moens
2006Experimental Analysis of Sequential Decision Making Algorithms for Port of Entry Inspection Procedures.
Saket Anand, David Madigan, Richard J. Mammone, Saumitr Pathak, Fred S. Roberts
2006Experimental Study on Wireless Sensor Network Security.
Taekyoung Kwon, Sang-ho Park
2006Experimental Validation and Analysis of an Intelligent Detection and Response Strategy to False Positives and Network Attacks.
Emmanuel Hooper
2006Exploring the Dark Side of the Web: Collection and Analysis of U.S. Extremist Online Forums.
Yilu Zhou, Jialun Qin, Guanpi Lai, Edna Reid, Hsinchun Chen
2006Exploring the Detection Process: Integrating Judgment and Outcome Decomposition.
Ignacio J. Martinez-Moyano, Eliot H. Rich, Stephen H. Conrad
2006Fast Pedestrian Detection Using Color Information.
Yanwu Xu, Xianbin Cao, Hong Qiao, Fei-Yue Wang
2006Fighting Fear of a Bioterrorism Event with Information Technology: Real-World Examples and Opportunities.
David A. Bray, Benn R. Konsynski
2006Finding Hidden Group Structure in a Stream of Communications.
Jeffrey Baumes, Mark K. Goldberg, Mykola Hayvanovych, Malik Magdon-Ismail, William A. Wallace, Mohammed Javeed Zaki
2006Hybrid Modeling for Large-Scale Worm Propagation Simulations.
Eul-Gyu Im, Jung Taek Seo, Dong-Soo Kim, Yong Ho Song, Yongsu Park
2006Identifying Information Provenance in Support of Intelligence Analysis, Sharing, and Protection.
Terrance Goan, Emi Fujioka, Ryan Kaneshiro, Lynn Gasch
2006Indicators of Threat: Reflecting New Trends.
Yael Shahar
2006Inferring Privacy Information from Social Networks.
Jianming He, Wesley W. Chu, Zhenyu Liu
2006Integrating IDS Alert Correlation and OS-Level Dependency Tracking.
Yan Zhai, Peng Ning, Jun Xu
2006Integration of Instance-Based Learning and Text Mining for Identification of Potential Virus/Bacterium as Bio-terrorism Weapons.
Xiaohua Hu, Xiaodan Zhang, Daniel Duanqing Wu, Xiaohua Zhou, Peter Rumm
2006Intelligence Analysis Using High Resolution Displays.
Timothy Buennemeyer, John Booker, Andrew J. Sabri, Chris North
2006Intelligence Use of Unstructured Data in a Data Warehouse Environment.
Jim Wakefield
2006Intelligence and Security Informatics, IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006, Proceedings
Sharad Mehrotra, Daniel Dajun Zeng, Hsinchun Chen, Bhavani Thuraisingham, Fei-Yue Wang
2006Intelligent Face Recognition Using Feature Averaging.
Adnan Khashman, Akram A. Garad
2006Intelligent Information Retrieval Tools for Police.
Nishant Kumar, Jan De Beer, Jan Vanthienen, Marie-Francine Moens
2006Interactive Refinement of Filtering Queries on Streaming Intelligence Data.
Yiming Ma, Dawit Yimam Seid
2006Issues in Merging Internet Autonomous Systems for Emergency Communications.
Selwyn Russell
2006Iterative Relational Classification Through Three-State Epidemic Dynamics.
Aram Galstyan, Paul R. Cohen
2006KD
Peng Zhang, Yunhai Tong, Shiwei Tang, Dongqing Yang
2006Matching Images of Never-Before-Seen Individuals in Large Law Enforcement Databases.
Olcay Kursun, Kenneth M. Reynolds, Oleg V. Favorov
2006Measures to Detect Word Substitution in Intercepted Communication.
SzeWang Fong, David B. Skillicorn, Dmitri Roussinov
2006Measuring Effectiveness of Anti-terrorism Programs Using Performance Logic Models.
Robert G. Ross
2006Mining Weighted Sequential Patterns Based on Length-Decreasing Support Constraints.
Unil Yun, John J. Leggett, TeongJoo Ong
2006Mining the Acceleration-Like Association Rules.
Dechang Pi, Xiaolin Qin, Wangfeng Gu
2006Motion-Alert: Automatic Anomaly Detection in Massive Moving Objects.
Xiaolei Li, Jiawei Han, Sangkyum Kim
2006Multi-document Summarization for Terrorism Information Extraction.
Fu Lee Wang, Christopher C. Yang, Xiaodong Shi
2006Multi-perspective Video Analysis of Persons and Vehicles for Enhanced Situational Awareness.
Sangho Park, Mohan M. Trivedi
2006Naturally Occurring Incidents as Facsimiles for Biochemical Terrorist Attacks.
Jamie L. Griffiths, Donald J. Berndt, Alan R. Hevner
2006On Off-Topic Web Browsing.
Nazli Goharian, Alana Platt, Ophir Frieder
2006On the Topology of the Dark Web of Terrorist Groups.
Jennifer Jie Xu, Hsinchun Chen, Yilu Zhou, Jialun Qin
2006Personal Information Management (PIM) for Intelligence Analysis.
Antonio Badia
2006Practical Algorithms for Destabilizing Terrorist Networks.
Nasrullah Memon, Henrik Legind Larsen
2006Practical Intrusion Detection Using Genetic-Clustering.
Chien-Chuan Lin, Ming-Shi Wang
2006Privacy Preserving
Artak Amirbekyan, Vladimir Estivill-Castro
2006Privacy Preserving Mining of Global Association Rules on Distributed Dataset.
Huizhang Shen, Jidi Zhao, Ruipu Yao
2006Rational Choice Deterrence and Israeli Counter-Terrorism.
Don Radlauer
2006SG-Robot: CDMA Network-Operated Mobile Robot for Security Guard at Home.
Je-Goon Ryu, Se-Kee Kil, Hyeon-Min Shim, Sang-Moo Lee, Eung-Hyuk Lee, Seung-Hong Hong
2006Sanitization of Databases for Refined Privacy Trade-Offs.
Ahmed HajYasien, Vladimir Estivill-Castro, Rodney W. Topor
2006Semantic Analytics Visualization.
Leonidas Deligiannidis, Amit P. Sheth, Boanerges Aleman-Meza
2006SemanticSpy: Suspect Tracking Using Semantic Data in a Multimedia Environment.
Amit Mathew, Amit P. Sheth, Leonidas Deligiannidis
2006Spatial-Temporal Cross-Correlation Analysis: A New Measure and a Case Study in Infectious Disease Informatics.
Jian Ma, Daniel Dajun Zeng, Hsinchun Chen
2006Strategic Intelligence Analysis: From Information Processing to Meaning-Making.
Yair Neuman, Liran Elihay, Meni Adler, Yoav Goldberg, Amir Winer
2006Suspect Vehicle Identification for Border Safety with Modified Mutual Information.
Siddharth Kaza, Yuan Wang, Hsinchun Chen
2006Synergy: A Policy-Driven, Trust-Aware Information Dissemination Framework.
Ragib Hasan, Marianne Winslett
2006Terrorist Database: A Bangladesh Study.
Abu Md. Zafor Alam, Sajjad Waheed
2006Terrorist Organizations and Effects of Terrorism in Bangladesh.
Abu Md. Zafor Alam, Abu Md. Siddique Alam, Mahjabeen Khan
2006The Hats Simulator and Colab: An Integrated Information Fusion Challenge Problem and Collaborative Analysis Environment.
Clayton T. Morrison, Paul R. Cohen
2006The Role of Information Superiority in the Global War on Terrorism.
Annette Sobel
2006The Security Performance Evaluation of Digital Watermarking.
Xinhong Zhang, Shejiao Li, Fan Zhang
2006Towards Automatic Event Tracking.
Clive Best, Bruno Pouliquen, Ralf Steinberger, Erik Van der Goot, Ken Blackler, Flavio Fuart, Tamara Oellinger, Camelia Ignat
2006Towards Optimal Police Patrol Routes with Genetic Algorithms.
Danilo Reis, Adriano Melo, André L. V. Coelho, Vasco Furtado
2006Tracing the Event Evolution of Terror Attacks from On-Line News.
Christopher C. Yang, Xiaodong Shi, Chih-Ping Wei
2006Using Author Topic to Detect Insider Threats from Email Traffic.
James S. Okolica, Gilbert L. Peterson, Robert F. Mills
2006Using Importance Flooding to Identify Interesting Networks of Criminal Activity.
Byron Marshall, Hsinchun Chen
2006Using Logic Programming to Detect Deception on the Basis of Actions.
James D. Jones
2006Using One-Time Password Based Authentication for Wireless IP Network.
Binod Vaidya, Sangduck Lee, Eung-Kon Kim, Seung Jo Han
2006Venn Diagram Construction of Internet Chatroom Conversations.
James F. McCarthy, Mukkai S. Krishnamoorthy
2006Viability of Critical Mission of Grid Computing.
Fangfang Liu, Yan Chi, Yuliang Shi
2006Visualizing Authorship for Identification.
Ahmed Abbasi, Hsinchun Chen
2006Worm Traffic Modeling for Network Performance Analysis.
Yufeng Chen, Yabo Dong, Dongming Lu, Yunhe Pan, Honglan Lao