| 2007 | A Bayesian, Nonlinear Particle Filtering Approach for Tracking the State of Terrorist Operations. Gregory A. Godfrey, John Cunningham, Tuan Tran |
| 2007 | A Combinatorial Approach to Measuring Anonymity. Matthew Edman, Fikret Sivrikaya, Bülent Yener |
| 2007 | A Dynamic Social Network Software Platform for Counter-Terrorism Decision Support. Richard M. Adler |
| 2007 | A Framework for an Adaptive Intrusion Detection System using Bayesian Network. Farah Jemili, Montaceur Zaghdoud, Mohamed Ben Ahmed |
| 2007 | A Host Architecture for Automobile License Plate Recognition. Maury Mitchell, Matthew Hudnall, David Brown, David Cordes, Randy K. Smith, Allen S. Parrish |
| 2007 | A Layered Dempster-Shafer Approach to Scenario Construction and Analysis. Antonio Sanfilippo, Bob Baddeley, Christian Posse, Paul Whitney |
| 2007 | A Networking Identity Authentication Scheme Combining Fingerprint Coding and Identity Based Encryption. Liang Li, Wei-Qiang Jiang, Jie Tian, Yixian Yang, Cai-Ping Jiang, Zhe Wu, Xin Yang |
| 2007 | A Quick Group Decision-making Planning Method for Emergency Response. Huizhang Shen, Jidi Zhao |
| 2007 | A SOC Framework for ISP Federation and Attack Forecast by Learning Propagation Patterns. Keisuke Takemori, Yutaka Miyake, Chie Ishida, Iwao Sasase |
| 2007 | A Secure Email System Based on Fingerprint Authentication Scheme. Zhe Wu, Jie Tian, Liang Li, Cai-Ping Jiang, Xin Yang |
| 2007 | Addressing Accuracy Issues in Privacy Preserving Data Mining through Matrix Factorization. Jie Wang, Jun Zhang |
| 2007 | Affect Intensity Analysis of Dark Web Forums. Ahmed Abbasi, Hsinchun Chen |
| 2007 | An Adaptive Modeling for Security Infrastructure Fault Response. Zhongjie Cui, Shuping Yao |
| 2007 | An Efficient Algorithm for Content Security Filtering Based on Double-Byte. Yanping Zhao, Wei Lu |
| 2007 | An Investigation of Heuristics of Human Judgment in Detecting Deception and Potential Implications in Countering Social Engineering. Tiantian Qin, Judee K. Burgoon |
| 2007 | An LDA-based Community Structure Discovery Approach for Large-Scale Social Networks. Haizheng Zhang, Baojun Qiu, C. Lee Giles, Henry C. Foley, John Yen |
| 2007 | Approach for Discovering and Handling Crisis in a Service-Oriented Environment. Nabil R. Adam, Vandana Pursnani Janeja, Aabhas V. Paliwal, Basit Shafiq, Cédric Ulmer, Volker Gersabeck, Anne Hardy, Christof Bornhövd, Joachim Schaper |
| 2007 | Architecture for an Automatic Customized Warning System. Mirko Montanari, Sharad Mehrotra, Nalini Venkatasubramanian |
| 2007 | Association Rule Mining for Suspicious Email Detection: A Data Mining Approach. Subramanian Appavu, Ramasamy Rajaram |
| 2007 | Categorization of Blogs through Similarity Analysis. Hwan-Joon Choi, Mukkai S. Krishnamoorthy |
| 2007 | Classification of Attributes and Behavior in Risk Management Using Bayesian Networks. Ram Dantu, Prakash Kolan, Robert Akl, Kall Loper |
| 2007 | Connecting the Dots: Revealing the Invisible Hand for Sharing Information. David D. Sulek, McClain L. Howarth, Virginia A. Ruebensaal |
| 2007 | Countering Insider Threats in Personal Devices. Luk Boral, Maria Disla, Shivraj Patil, Jari Williams, Joon S. Park |
| 2007 | DOTS: Detection of Off-Topic Search via Result Clustering. Nazli Goharian, Alana Platt |
| 2007 | Dependence Centrality: Identifying Dependence of Nodes in Terrorist Networks. Nasrullah Memon, David L. Hicks, Henrik Legind Larsen |
| 2007 | Deployment of DNIDS in Social Networks. Meytal Tubi, Rami Puzis, Yuval Elovici |
| 2007 | Design and Implementation of a Middleware for Sentient Spaces. Bijit Hore, Hojjat Jafarpour, Ramesh C. Jain, Shengyue Ji, Daniel Massaguer, Sharad Mehrotra, Nalini Venkatasubramanian, Utz Westermann |
| 2007 | Detecting Anomalies in Graphs. David B. Skillicorn |
| 2007 | Detection of Port and Network Scan Using Time Independent Feature Set. Habib Ullah Baig, Farrukh Kamran |
| 2007 | Distributed Web Police: A Peer-to-Peer Approach to Collaborative Copy Detection. Jenq-Haur Wang, Hung-Chi Chang |
| 2007 | Dynamic Social Network Analysis of a Dark Network: Identifying Significant Facilitators. Siddharth Kaza, Daning Hu, Hsinchun Chen |
| 2007 | Emergency Management in Australia, New Zealand and Europe - The 2006 EMANZE Survey. Andreas Meissner |
| 2007 | Environmental Impact on Underwater Surveillance Systems in Estuary Areas. Hongyuan Shi, Dov Kruger, Jeffrey V. Nickerson |
| 2007 | FACT: Fast Algorithm for Categorizing Text. Saket S. R. Mengle, Nazli Goharian, Alana Platt |
| 2007 | Fast Fourier Transform Based Data Perturbation Method for Privacy Protection. Shuting Xu, Shuhua Lai |
| 2007 | Fast Private Association Rule Mining by A Protocol for Securely Sharing Distributed Data. Vladimir Estivill-Castro, Ahmed HajYasien |
| 2007 | Fine-Grained Reputation-based Routing in Wireless Ad Hoc Networks. Li Yang, Joseph M. Kizza, Alma Cemerlic, Feiqiong Liu |
| 2007 | Forecasting Terrorist Groups' Warfare: Conventional to CBRN. Joshua Sinai |
| 2007 | Geospatial Data Mining for National Security: Land Cover Classification and Semantic Grouping. Chuanjun Li, Latifur Khan, Bhavani Thuraisingham, M. Husain, Shaofei Chen, Fang Qiu |
| 2007 | Host Based Intrusion Detection using Machine Learning. Robert Moskovitch, Shay Pluderman, Ido Gus, Dima Stopel, Clint Feher, Yisrael Parmet, Yuval Shahar, Yuval Elovici |
| 2007 | IEEE International Conference on Intelligence and Security Informatics, ISI 2007, New Brunswick, New Jersey, USA, May 23-24, 2007, Proceedings |
| 2007 | Importance of Information Collection and Dissemination for Evacuation Modeling and Management. M. Anil Yazici, Kaan Özbay |
| 2007 | Inferring Meaning and Intent of Discovered Data Sources. Wayne L. Bethea, R. Scott Cost, Paul A. Frank, Frank B. Weiskopf |
| 2007 | Interaction Coherence Analysis for Dark Web Forums. Tianjun Fu, Ahmed Abbasi, Hsinchun Chen |
| 2007 | Knowledge Reachback for WMD Events. Steven R. Haynes, Jonathan A. Singel |
| 2007 | MCA2CM: Multimedia Context-Aware Access Control Model. Bechara al Bouna, Richard Chbeir, Johel Mitéran |
| 2007 | Making Sense of VAST Data. Summer Adams, Ashok K. Goel |
| 2007 | Malicious Code Detection and Acquisition Using Active Learning. Robert Moskovitch, Nir Nissim, Yuval Elovici |
| 2007 | Managing Security Threats and Vulnerabilities for Small to Medium Enterprises. Cyril Onwubiko, Andrew P. Lenaghan |
| 2007 | Medical Ontology-Enhanced Text Processing for Infectious Disease Informatics. Hsin-Min Lu, Daniel Dajun Zeng, Hsinchun Chen |
| 2007 | Mining Higher-Order Association Rules from Distributed Named Entity Databases. Shenzhi Li, Christopher D. Janneck, Aditya P. Belapurkar, Murat Can Ganiz, Xiaoning Yang, Mark Dilsizian, Tianhao Wu, John M. Bright, William M. Pottenger |
| 2007 | On the Communication Complexity of Privacy-Preserving Information Sharing Protocols. Nan Zhang |
| 2007 | On-Demand Information Portals for Disaster Situations. Yiming Ma, Dmitri V. Kalashnikov, Ramaswamy Hariharan, Sharad Mehrotra, Nalini Venkatasubramanian, Naveen Ashish, Jay Lickfett |
| 2007 | Ontology Based Analysis of Violent Events. Pinar Oezden Wennerberg, Hristo Tanev, Jakub Piskorski, Clive Best |
| 2007 | Optimization of Multi-Attribute Tasks for Underwater Motion of Robotic Sensor Agents. Irina Goldman, Samuel Barrett, Jeffrey V. Nickerson |
| 2007 | Optimizing Sensor Placement for Intruder Detection with Genetic Algorithms. Samuel R. Barrett |
| 2007 | Organizing Hot-Spot Police Patrol Routes. Sudarshan S. Chawathe |
| 2007 | Periodicity and Application for a kind of n-dimensional Arnold-type Transformation. Ji-Zhi Wang, Yinglong Wang, Mei-Qin Wang |
| 2007 | Privacy Preserving Collaborative Data Mining. Justin Z. Zhan |
| 2007 | Profiling and Visualizing Cyber-criminal Activities: A General Framework. Wingyan Chung, G. Alan Wang |
| 2007 | Protecting Location Privacy with Dynamic Mac Address Exchanging in Wireless Networks. Ming Lei, Zijie Qi, Xiaoyan Hong, Susan V. Vrbsky |
| 2007 | Recursive Algorithm of River and Basin Data Model based on Composite Design Pattern. Hyung Moo Kim, Jae Soo Yoo |
| 2007 | Relationally Mapping XML Queries For Scalable XML Search. Rebecca Cathey, Steven M. Beitzel, Eric C. Jensen, David A. Grossman, Ophir Frieder |
| 2007 | SIGHTS: A Software System for Finding Coalitions and Leaders in a Social Network. Jeffrey Baumes, Mark K. Goldberg, Mykola Hayvanovych, Stephen Kelley, Malik Magdon-Ismail, Konstantin Mertsalov, William A. Wallace |
| 2007 | Security Event Management System based on Mobile Agent Technology. Wang Jingxin, Zhiying Wang, Kui Dai |
| 2007 | Semantically Ranked Graph Pattern Queries for Link Analysis. Dawit Yimam Seid, Sharad Mehrotra |
| 2007 | Sequential Decision Making Algorithms for Port of Entry Inspection: Overcoming Computational Challenges. David Madigan, Sushil Mittal, Fred S. Roberts |
| 2007 | Short Query Sequences in Misuse Detection. Alana Platt, Nazli Goharian |
| 2007 | Simulating Threats Propagation within the NSP Infrastructure. Rami Puzis, Meytal Tubi, Gil Tahan, Yuval Elovici |
| 2007 | Social Behavior in a Team of Autonomous Sensors. Yasuaki Sakamoto, Jeffrey V. Nickerson |
| 2007 | Surface Transportation and Cyber-Infrastructure: An Exploratory Study. Sangmi Chai, Raj Sharman, Smitha Patil, Shruta Satam, H. Raghav Rao, Shambhu J. Upadhyaya |
| 2007 | Terrorism and Crime Related Weblog Social Network: Link, Content Analysis and Information Visualization. Christopher C. Yang, Tobun D. Ng |
| 2007 | Text Extraction of Spatial and Temporal Information. Antonio Badia, Jothi Ravishankar, Tulay Muezzinoglu |
| 2007 | The Arizona IDMatcher: A Probabilistic Identity Matching System. G. Alan Wang, Siddharth Kaza, Shailesh Joshi, Kris Chang, Homa Atabakhsh, Hsinchun Chen |
| 2007 | Using Digital Chains of Custody on Constrained Devices to Verify Evidence. Phillip G. Bradford, Daniel A. Ray |
| 2007 | Using Homomorphic Encryption and Digital Envelope Techniques for Privacy Preserving Collaborative Sequential Pattern Mining. Justin Z. Zhan |
| 2007 | Visualization of Events in a Spatially and Multimedia Enriched Virtual Environment. Leonidas Deligiannidis, Farshad Hakimpour, Amit P. Sheth |