| 2006 | A Child's Story to Illustrate Automated Reasoning Systems Using Opportunity and History. James D. Jones, Hemant Joshi, Umit Topaloglu, Eric Nelson |
| 2006 | A Dictionary-Based Approach to Fast and Accurate Name Matching in Large Law Enforcement Databases. Olcay Kursun, Anna Koufakou, Bing Chen, Michael Georgiopoulos, Kenneth M. Reynolds, Ronald Eaglin |
| 2006 | A First Look at Domestic and International Global Terrorism Events, 1970-1997. Laura Dugan, Gary LaFree, Heather Fogg |
| 2006 | A Flexible Context-Aware Authorization Framework for Mediation Systems. Li Yang, Joseph M. Kizza, Raimund K. Ege |
| 2006 | A Flexible and Scalable Access Control for Ubiquitous Computing Environments. Hung Le Xuan, Nguyen Ngoc Diep, Yonil Zhung, Sungyoung Lee, Young-Koo Lee |
| 2006 | A Formalized Taxonomy of DDoS Attacks Based on Similarity. Jian Kang, Yuan Zhang, Jiu-bin Ju |
| 2006 | A Framework for Exploring Gray Web Forums: Analysis of Forum-Based Communities in Taiwan. Jau-Hwang Wang, Tianjun Fu, Hong-Ming Lin, Hsinchun Chen |
| 2006 | A Home Firewall Solution for Securing Smart Spaces. Pho Duc Giang, Hung Le Xuan, Yonil Zhung, Sungyoung Lee, Young-Koo Lee |
| 2006 | A Multi-layer Naïve Bayes Model for Approximate Identity Matching. G. Alan Wang, Hsinchun Chen, Homa Atabakhsh |
| 2006 | A Multiclass Classifier to Detect Pedestrians and Acquire Their Moving Styles. D. Chen, Xianbin Cao, Hong Qiao, Fei-Yue Wang |
| 2006 | A New Methodology of Analyzing Security Vulnerability for Network Services. Yong Ho Song, Jung Min Park, Yongsu Park, Eul-Gyu Im |
| 2006 | A Novel Key Release Scheme from Biometrics. Thian Song Ong, Andrew Teoh Beng Jin, David Ngo Chek Ling |
| 2006 | A Novel Mechanism to Defend Against Low-Rate Denial-of-Service Attacks. Wei Wei, Yabo Dong, Dongming Lu, Guang Jin, Honglan Lao |
| 2006 | A PCA-LVQ Model for Intrusion Alert Analysis. Jing-Xin Wang, Zhiying Wang, Kui Dai |
| 2006 | A Parallel System Strategy of Evaluation and Forecasting for Security Information with Artificial Society. Dalei Guo, Shuming Tang |
| 2006 | A Review of Public Health Syndromic Surveillance Systems. Ping Yan, Daniel Dajun Zeng, Hsinchun Chen |
| 2006 | A Trust Model for Uncertain Interactions in Ubiquitous Environments. Hung Le Xuan, Hassan Jameel, Seong Jin Cho, Weiwei Yuan, Young-Koo Lee, Sungyoung Lee |
| 2006 | A Trust-Based Security Architecture for Ubiquitous Computing Systems. Hung Le Xuan, Pho Duc Giang, Yonil Zhung, Tran Van Phuong, Sungyoung Lee, Young-Koo Lee |
| 2006 | A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks - A Friend Approach. Shukor Abd Razak, Steven Furnell, Nathan L. Clarke, Phillip J. Brooke |
| 2006 | Abnormal Detection Algorithm Based on Match Range Model. Jungan Chen |
| 2006 | Access Control Requirements for Preventing Insider Threats. Joon S. Park, Joseph Giordano |
| 2006 | Adaptive Method for Monitoring Network and Early Detection of Internet Worms. Chen Bo, Binxing Fang, Xiao-chun Yun |
| 2006 | Advanced Patterns and Matches in Link Analysis. Michael Wolverton, Ian W. Harrison, John D. Lowrance, Andres C. Rodriguez, Jérôme Thoméré |
| 2006 | An Anomaly Detection Algorithm for Detecting Attacks in Wireless Sensor Networks. Tran Van Phuong, Hung Le Xuan, Seong Jin Cho, Young-Koo Lee, Sungyoung Lee |
| 2006 | An Embedded Bayesian Network Hidden Markov Model for Digital Forensics. Olivier Y. de Vel, Nianjun Liu, Terry Caelli, Tibério S. Caetano |
| 2006 | An Evolutionary Approach in Threats Detection for Distributed Security Defence Systems. Cyril Onwubiko, Andrew P. Lenaghan |
| 2006 | An Info-Gap Approach to Policy Selection for Bio-terror Response. Anna Yoffe, Yakov Ben-Haim |
| 2006 | An Ontology-Based Network Intrusion Detection System: A User-Oriented Approach. Shao-Shin Hung, Damon Shing-Min Liu |
| 2006 | Analysis of Abnormalities of Worm Traffic for Obtaining Worm Detection Vectors. Zhengtao Xiang, Yufeng Chen, Yabo Dong, Honglan Lao |
| 2006 | Analyzing Entities and Topics in News Articles Using Statistical Topic Models. David Newman, Chaitanya Chemudugunta, Padhraic Smyth, Mark Steyvers |
| 2006 | Analyzing Social Networks in E-Mail with Rich Syntactic Features. Paul Thompson, Wei Zhang |
| 2006 | Analyzing the Terrorist Social Networks with Visualization Tools. Christopher C. Yang, Nan Liu, Marc Sageman |
| 2006 | Anomaly Detection of Excessive Network Traffic Based on Ratio and Volume Analysis. Hyun Joo Kim, Jung-Chan Na, Jong-Soo Jang |
| 2006 | Application of Latent Semantic Indexing in Generating Graphs of Terrorist Networks. Roger B. Bradford |
| 2006 | Attacking Confidentiality: An Agent Based Approach. Kapil Kumar Gupta, Baikunth Nath, Kotagiri Ramamohanarao, Ashraf U. Kazi |
| 2006 | CC-GiST: Cache Conscious-Generalized Search Tree for Supporting Various Fast Intelligent Applications. Won-Sik Kim, Woong-Kee Loh, Wook-Shin Han |
| 2006 | CWME: A Framework of Group Support System for Emergency Responses. Yaodong Li, Huiguang He, Baihua Xiao, Chunheng Wang, Feiyue Wang |
| 2006 | Classification of Threats Via a Multi-sensor Security Portal. Amar Singh, Lawrence B. Holder |
| 2006 | Collective Sampling and Analysis of High Order Tensors for Chatroom Communications. Evrim Acar, Seyit Ahmet Çamtepe, Bülent Yener |
| 2006 | Combating Terrorism Insurgency Resolution Software: A Research Note. Joshua Sinai |
| 2006 | Computational Modeling and Experimental Validation of Aviation Security Procedures. Uwe Glässer, Sarah Rastkar, Mona Vajihollahi |
| 2006 | Computer-Mediated Collaborative Reasoning and Intelligence Analysis. Douglas Yeung, John D. Lowrance |
| 2006 | Content Analysis of Jihadi Extremist Groups' Videos. Arab Salem, Edna Reid, Hsinchun Chen |
| 2006 | Continuous Authentication by Keystroke Dynamics Using Committee Machines. Sergio Roberto de Lima e Silva Filho, Mauro Roisenberg |
| 2006 | Cost-Sensitive Access Control for Illegitimate Confidential Access by Insiders. Young-Woo Seo, Katia P. Sycara |
| 2006 | Covering Based Granular Computing for Conflict Analysis. William Zhu, Fei-Yue Wang |
| 2006 | Database Security Protection Via Inference Detection. Yu Chen, Wesley W. Chu |
| 2006 | Decider.Track, a Revolutionary Cyber-Tracker for Antiterrorist Fight. Martine Naillon, Jean-François di Chiara, Bruno Eude, Christian Amathieux |
| 2006 | Design and Implementation of FPGA Based High-Performance Intrusion Detection System. Byoung-Koo Kim, Young-Jun Heo, Jintae Oh |
| 2006 | Design and Implementation of a Policy-Based Privacy Authorization System. Hyang-Chang Choi, Seungyong Lee, HyungHyo Lee |
| 2006 | Design of Syntactical Morphological and Semantical Analyzer (SMSA) for Processing Arabic Texts. Samar Mouti, Fadel Sukkar |
| 2006 | Design of a Reliable Hardware Stack to Defend Against Frame Pointer Overwrite Attacks. Yongsu Park, Yong Ho Song, Eul-Gyu Im |
| 2006 | Detecting Anomalies in Cargo Using Graph Properties. William Eberle, Lawrence B. Holder |
| 2006 | Detecting Deception in Person-of-Interest Statements. Christie M. Fuller, David P. Biros, Mark Adkins, Judee K. Burgoon, Jay F. Nunamaker Jr., Steven Coulon |
| 2006 | Detection Using Clustering Query Results. Nazli Goharian, Alana Platt |
| 2006 | Digitized Forensic Investigation at P2P Copyright Controversy, Infringement. Da-Yu Kao, Shiuh-Jeng Wang, Frank Fu-Yuan Huang |
| 2006 | Distributing the Cost of Securing a Transportation Infrastructure. Sudarshan S. Chawathe |
| 2006 | DrillSim: A Simulation Framework for Emergency Response Drills. Vidhya Balasubramanian, Daniel Massaguer, Sharad Mehrotra, Nalini Venkatasubramanian |
| 2006 | E-mail Traffic Analysis Using Visualisation and Decision Trees. Mark Jyn-Huey Lim, Michael Negnevitsky, Jacky Hartnett |
| 2006 | Email Worm Detection Using Naïve Bayes and Support Vector Machine. Mohammad M. Masud, Latifur Khan, Ehab Al-Shaer |
| 2006 | Entity Workspace: An Evidence File That Aids Memory, Inference, and Reading. Eric A. Bier, Edward W. Ishak, Ed Huai-hsin Chi |
| 2006 | Evaluation of Information Retrieval and Text Mining Tools on Automatic Named Entity Extraction. Nishant Kumar, Jan De Beer, Jan Vanthienen, Marie-Francine Moens |
| 2006 | Experimental Analysis of Sequential Decision Making Algorithms for Port of Entry Inspection Procedures. Saket Anand, David Madigan, Richard J. Mammone, Saumitr Pathak, Fred S. Roberts |
| 2006 | Experimental Study on Wireless Sensor Network Security. Taekyoung Kwon, Sang-ho Park |
| 2006 | Experimental Validation and Analysis of an Intelligent Detection and Response Strategy to False Positives and Network Attacks. Emmanuel Hooper |
| 2006 | Exploring the Dark Side of the Web: Collection and Analysis of U.S. Extremist Online Forums. Yilu Zhou, Jialun Qin, Guanpi Lai, Edna Reid, Hsinchun Chen |
| 2006 | Exploring the Detection Process: Integrating Judgment and Outcome Decomposition. Ignacio J. Martinez-Moyano, Eliot H. Rich, Stephen H. Conrad |
| 2006 | Fast Pedestrian Detection Using Color Information. Yanwu Xu, Xianbin Cao, Hong Qiao, Fei-Yue Wang |
| 2006 | Fighting Fear of a Bioterrorism Event with Information Technology: Real-World Examples and Opportunities. David A. Bray, Benn R. Konsynski |
| 2006 | Finding Hidden Group Structure in a Stream of Communications. Jeffrey Baumes, Mark K. Goldberg, Mykola Hayvanovych, Malik Magdon-Ismail, William A. Wallace, Mohammed Javeed Zaki |
| 2006 | Hybrid Modeling for Large-Scale Worm Propagation Simulations. Eul-Gyu Im, Jung Taek Seo, Dong-Soo Kim, Yong Ho Song, Yongsu Park |
| 2006 | Identifying Information Provenance in Support of Intelligence Analysis, Sharing, and Protection. Terrance Goan, Emi Fujioka, Ryan Kaneshiro, Lynn Gasch |
| 2006 | Indicators of Threat: Reflecting New Trends. Yael Shahar |
| 2006 | Inferring Privacy Information from Social Networks. Jianming He, Wesley W. Chu, Zhenyu Liu |
| 2006 | Integrating IDS Alert Correlation and OS-Level Dependency Tracking. Yan Zhai, Peng Ning, Jun Xu |
| 2006 | Integration of Instance-Based Learning and Text Mining for Identification of Potential Virus/Bacterium as Bio-terrorism Weapons. Xiaohua Hu, Xiaodan Zhang, Daniel Duanqing Wu, Xiaohua Zhou, Peter Rumm |
| 2006 | Intelligence Analysis Using High Resolution Displays. Timothy Buennemeyer, John Booker, Andrew J. Sabri, Chris North |
| 2006 | Intelligence Use of Unstructured Data in a Data Warehouse Environment. Jim Wakefield |
| 2006 | Intelligence and Security Informatics, IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006, Proceedings Sharad Mehrotra, Daniel Dajun Zeng, Hsinchun Chen, Bhavani Thuraisingham, Fei-Yue Wang |
| 2006 | Intelligent Face Recognition Using Feature Averaging. Adnan Khashman, Akram A. Garad |
| 2006 | Intelligent Information Retrieval Tools for Police. Nishant Kumar, Jan De Beer, Jan Vanthienen, Marie-Francine Moens |
| 2006 | Interactive Refinement of Filtering Queries on Streaming Intelligence Data. Yiming Ma, Dawit Yimam Seid |
| 2006 | Issues in Merging Internet Autonomous Systems for Emergency Communications. Selwyn Russell |
| 2006 | Iterative Relational Classification Through Three-State Epidemic Dynamics. Aram Galstyan, Paul R. Cohen |
| 2006 | KD Peng Zhang, Yunhai Tong, Shiwei Tang, Dongqing Yang |
| 2006 | Matching Images of Never-Before-Seen Individuals in Large Law Enforcement Databases. Olcay Kursun, Kenneth M. Reynolds, Oleg V. Favorov |
| 2006 | Measures to Detect Word Substitution in Intercepted Communication. SzeWang Fong, David B. Skillicorn, Dmitri Roussinov |
| 2006 | Measuring Effectiveness of Anti-terrorism Programs Using Performance Logic Models. Robert G. Ross |
| 2006 | Mining Weighted Sequential Patterns Based on Length-Decreasing Support Constraints. Unil Yun, John J. Leggett, TeongJoo Ong |
| 2006 | Mining the Acceleration-Like Association Rules. Dechang Pi, Xiaolin Qin, Wangfeng Gu |
| 2006 | Motion-Alert: Automatic Anomaly Detection in Massive Moving Objects. Xiaolei Li, Jiawei Han, Sangkyum Kim |
| 2006 | Multi-document Summarization for Terrorism Information Extraction. Fu Lee Wang, Christopher C. Yang, Xiaodong Shi |
| 2006 | Multi-perspective Video Analysis of Persons and Vehicles for Enhanced Situational Awareness. Sangho Park, Mohan M. Trivedi |
| 2006 | Naturally Occurring Incidents as Facsimiles for Biochemical Terrorist Attacks. Jamie L. Griffiths, Donald J. Berndt, Alan R. Hevner |
| 2006 | On Off-Topic Web Browsing. Nazli Goharian, Alana Platt, Ophir Frieder |
| 2006 | On the Topology of the Dark Web of Terrorist Groups. Jennifer Jie Xu, Hsinchun Chen, Yilu Zhou, Jialun Qin |
| 2006 | Personal Information Management (PIM) for Intelligence Analysis. Antonio Badia |
| 2006 | Practical Algorithms for Destabilizing Terrorist Networks. Nasrullah Memon, Henrik Legind Larsen |
| 2006 | Practical Intrusion Detection Using Genetic-Clustering. Chien-Chuan Lin, Ming-Shi Wang |
| 2006 | Privacy Preserving Artak Amirbekyan, Vladimir Estivill-Castro |
| 2006 | Privacy Preserving Mining of Global Association Rules on Distributed Dataset. Huizhang Shen, Jidi Zhao, Ruipu Yao |
| 2006 | Rational Choice Deterrence and Israeli Counter-Terrorism. Don Radlauer |
| 2006 | SG-Robot: CDMA Network-Operated Mobile Robot for Security Guard at Home. Je-Goon Ryu, Se-Kee Kil, Hyeon-Min Shim, Sang-Moo Lee, Eung-Hyuk Lee, Seung-Hong Hong |
| 2006 | Sanitization of Databases for Refined Privacy Trade-Offs. Ahmed HajYasien, Vladimir Estivill-Castro, Rodney W. Topor |
| 2006 | Semantic Analytics Visualization. Leonidas Deligiannidis, Amit P. Sheth, Boanerges Aleman-Meza |
| 2006 | SemanticSpy: Suspect Tracking Using Semantic Data in a Multimedia Environment. Amit Mathew, Amit P. Sheth, Leonidas Deligiannidis |
| 2006 | Spatial-Temporal Cross-Correlation Analysis: A New Measure and a Case Study in Infectious Disease Informatics. Jian Ma, Daniel Dajun Zeng, Hsinchun Chen |
| 2006 | Strategic Intelligence Analysis: From Information Processing to Meaning-Making. Yair Neuman, Liran Elihay, Meni Adler, Yoav Goldberg, Amir Winer |
| 2006 | Suspect Vehicle Identification for Border Safety with Modified Mutual Information. Siddharth Kaza, Yuan Wang, Hsinchun Chen |
| 2006 | Synergy: A Policy-Driven, Trust-Aware Information Dissemination Framework. Ragib Hasan, Marianne Winslett |
| 2006 | Terrorist Database: A Bangladesh Study. Abu Md. Zafor Alam, Sajjad Waheed |
| 2006 | Terrorist Organizations and Effects of Terrorism in Bangladesh. Abu Md. Zafor Alam, Abu Md. Siddique Alam, Mahjabeen Khan |
| 2006 | The Hats Simulator and Colab: An Integrated Information Fusion Challenge Problem and Collaborative Analysis Environment. Clayton T. Morrison, Paul R. Cohen |
| 2006 | The Role of Information Superiority in the Global War on Terrorism. Annette Sobel |
| 2006 | The Security Performance Evaluation of Digital Watermarking. Xinhong Zhang, Shejiao Li, Fan Zhang |
| 2006 | Towards Automatic Event Tracking. Clive Best, Bruno Pouliquen, Ralf Steinberger, Erik Van der Goot, Ken Blackler, Flavio Fuart, Tamara Oellinger, Camelia Ignat |
| 2006 | Towards Optimal Police Patrol Routes with Genetic Algorithms. Danilo Reis, Adriano Melo, André L. V. Coelho, Vasco Furtado |
| 2006 | Tracing the Event Evolution of Terror Attacks from On-Line News. Christopher C. Yang, Xiaodong Shi, Chih-Ping Wei |
| 2006 | Using Author Topic to Detect Insider Threats from Email Traffic. James S. Okolica, Gilbert L. Peterson, Robert F. Mills |
| 2006 | Using Importance Flooding to Identify Interesting Networks of Criminal Activity. Byron Marshall, Hsinchun Chen |
| 2006 | Using Logic Programming to Detect Deception on the Basis of Actions. James D. Jones |
| 2006 | Using One-Time Password Based Authentication for Wireless IP Network. Binod Vaidya, Sangduck Lee, Eung-Kon Kim, Seung Jo Han |
| 2006 | Venn Diagram Construction of Internet Chatroom Conversations. James F. McCarthy, Mukkai S. Krishnamoorthy |
| 2006 | Viability of Critical Mission of Grid Computing. Fangfang Liu, Yan Chi, Yuliang Shi |
| 2006 | Visualizing Authorship for Identification. Ahmed Abbasi, Hsinchun Chen |
| 2006 | Worm Traffic Modeling for Network Performance Analysis. Yufeng Chen, Yabo Dong, Dongming Lu, Yunhe Pan, Honglan Lao |