ISI C

77 papers

YearTitle / Authors
2007A Bayesian, Nonlinear Particle Filtering Approach for Tracking the State of Terrorist Operations.
Gregory A. Godfrey, John Cunningham, Tuan Tran
2007A Combinatorial Approach to Measuring Anonymity.
Matthew Edman, Fikret Sivrikaya, Bülent Yener
2007A Dynamic Social Network Software Platform for Counter-Terrorism Decision Support.
Richard M. Adler
2007A Framework for an Adaptive Intrusion Detection System using Bayesian Network.
Farah Jemili, Montaceur Zaghdoud, Mohamed Ben Ahmed
2007A Host Architecture for Automobile License Plate Recognition.
Maury Mitchell, Matthew Hudnall, David Brown, David Cordes, Randy K. Smith, Allen S. Parrish
2007A Layered Dempster-Shafer Approach to Scenario Construction and Analysis.
Antonio Sanfilippo, Bob Baddeley, Christian Posse, Paul Whitney
2007A Networking Identity Authentication Scheme Combining Fingerprint Coding and Identity Based Encryption.
Liang Li, Wei-Qiang Jiang, Jie Tian, Yixian Yang, Cai-Ping Jiang, Zhe Wu, Xin Yang
2007A Quick Group Decision-making Planning Method for Emergency Response.
Huizhang Shen, Jidi Zhao
2007A SOC Framework for ISP Federation and Attack Forecast by Learning Propagation Patterns.
Keisuke Takemori, Yutaka Miyake, Chie Ishida, Iwao Sasase
2007A Secure Email System Based on Fingerprint Authentication Scheme.
Zhe Wu, Jie Tian, Liang Li, Cai-Ping Jiang, Xin Yang
2007Addressing Accuracy Issues in Privacy Preserving Data Mining through Matrix Factorization.
Jie Wang, Jun Zhang
2007Affect Intensity Analysis of Dark Web Forums.
Ahmed Abbasi, Hsinchun Chen
2007An Adaptive Modeling for Security Infrastructure Fault Response.
Zhongjie Cui, Shuping Yao
2007An Efficient Algorithm for Content Security Filtering Based on Double-Byte.
Yanping Zhao, Wei Lu
2007An Investigation of Heuristics of Human Judgment in Detecting Deception and Potential Implications in Countering Social Engineering.
Tiantian Qin, Judee K. Burgoon
2007An LDA-based Community Structure Discovery Approach for Large-Scale Social Networks.
Haizheng Zhang, Baojun Qiu, C. Lee Giles, Henry C. Foley, John Yen
2007Approach for Discovering and Handling Crisis in a Service-Oriented Environment.
Nabil R. Adam, Vandana Pursnani Janeja, Aabhas V. Paliwal, Basit Shafiq, Cédric Ulmer, Volker Gersabeck, Anne Hardy, Christof Bornhövd, Joachim Schaper
2007Architecture for an Automatic Customized Warning System.
Mirko Montanari, Sharad Mehrotra, Nalini Venkatasubramanian
2007Association Rule Mining for Suspicious Email Detection: A Data Mining Approach.
Subramanian Appavu, Ramasamy Rajaram
2007Categorization of Blogs through Similarity Analysis.
Hwan-Joon Choi, Mukkai S. Krishnamoorthy
2007Classification of Attributes and Behavior in Risk Management Using Bayesian Networks.
Ram Dantu, Prakash Kolan, Robert Akl, Kall Loper
2007Connecting the Dots: Revealing the Invisible Hand for Sharing Information.
David D. Sulek, McClain L. Howarth, Virginia A. Ruebensaal
2007Countering Insider Threats in Personal Devices.
Luk Boral, Maria Disla, Shivraj Patil, Jari Williams, Joon S. Park
2007DOTS: Detection of Off-Topic Search via Result Clustering.
Nazli Goharian, Alana Platt
2007Dependence Centrality: Identifying Dependence of Nodes in Terrorist Networks.
Nasrullah Memon, David L. Hicks, Henrik Legind Larsen
2007Deployment of DNIDS in Social Networks.
Meytal Tubi, Rami Puzis, Yuval Elovici
2007Design and Implementation of a Middleware for Sentient Spaces.
Bijit Hore, Hojjat Jafarpour, Ramesh C. Jain, Shengyue Ji, Daniel Massaguer, Sharad Mehrotra, Nalini Venkatasubramanian, Utz Westermann
2007Detecting Anomalies in Graphs.
David B. Skillicorn
2007Detection of Port and Network Scan Using Time Independent Feature Set.
Habib Ullah Baig, Farrukh Kamran
2007Distributed Web Police: A Peer-to-Peer Approach to Collaborative Copy Detection.
Jenq-Haur Wang, Hung-Chi Chang
2007Dynamic Social Network Analysis of a Dark Network: Identifying Significant Facilitators.
Siddharth Kaza, Daning Hu, Hsinchun Chen
2007Emergency Management in Australia, New Zealand and Europe - The 2006 EMANZE Survey.
Andreas Meissner
2007Environmental Impact on Underwater Surveillance Systems in Estuary Areas.
Hongyuan Shi, Dov Kruger, Jeffrey V. Nickerson
2007FACT: Fast Algorithm for Categorizing Text.
Saket S. R. Mengle, Nazli Goharian, Alana Platt
2007Fast Fourier Transform Based Data Perturbation Method for Privacy Protection.
Shuting Xu, Shuhua Lai
2007Fast Private Association Rule Mining by A Protocol for Securely Sharing Distributed Data.
Vladimir Estivill-Castro, Ahmed HajYasien
2007Fine-Grained Reputation-based Routing in Wireless Ad Hoc Networks.
Li Yang, Joseph M. Kizza, Alma Cemerlic, Feiqiong Liu
2007Forecasting Terrorist Groups' Warfare: Conventional to CBRN.
Joshua Sinai
2007Geospatial Data Mining for National Security: Land Cover Classification and Semantic Grouping.
Chuanjun Li, Latifur Khan, Bhavani Thuraisingham, M. Husain, Shaofei Chen, Fang Qiu
2007Host Based Intrusion Detection using Machine Learning.
Robert Moskovitch, Shay Pluderman, Ido Gus, Dima Stopel, Clint Feher, Yisrael Parmet, Yuval Shahar, Yuval Elovici
2007IEEE International Conference on Intelligence and Security Informatics, ISI 2007, New Brunswick, New Jersey, USA, May 23-24, 2007, Proceedings
2007Importance of Information Collection and Dissemination for Evacuation Modeling and Management.
M. Anil Yazici, Kaan Özbay
2007Inferring Meaning and Intent of Discovered Data Sources.
Wayne L. Bethea, R. Scott Cost, Paul A. Frank, Frank B. Weiskopf
2007Interaction Coherence Analysis for Dark Web Forums.
Tianjun Fu, Ahmed Abbasi, Hsinchun Chen
2007Knowledge Reachback for WMD Events.
Steven R. Haynes, Jonathan A. Singel
2007MCA2CM: Multimedia Context-Aware Access Control Model.
Bechara al Bouna, Richard Chbeir, Johel Mitéran
2007Making Sense of VAST Data.
Summer Adams, Ashok K. Goel
2007Malicious Code Detection and Acquisition Using Active Learning.
Robert Moskovitch, Nir Nissim, Yuval Elovici
2007Managing Security Threats and Vulnerabilities for Small to Medium Enterprises.
Cyril Onwubiko, Andrew P. Lenaghan
2007Medical Ontology-Enhanced Text Processing for Infectious Disease Informatics.
Hsin-Min Lu, Daniel Dajun Zeng, Hsinchun Chen
2007Mining Higher-Order Association Rules from Distributed Named Entity Databases.
Shenzhi Li, Christopher D. Janneck, Aditya P. Belapurkar, Murat Can Ganiz, Xiaoning Yang, Mark Dilsizian, Tianhao Wu, John M. Bright, William M. Pottenger
2007On the Communication Complexity of Privacy-Preserving Information Sharing Protocols.
Nan Zhang
2007On-Demand Information Portals for Disaster Situations.
Yiming Ma, Dmitri V. Kalashnikov, Ramaswamy Hariharan, Sharad Mehrotra, Nalini Venkatasubramanian, Naveen Ashish, Jay Lickfett
2007Ontology Based Analysis of Violent Events.
Pinar Oezden Wennerberg, Hristo Tanev, Jakub Piskorski, Clive Best
2007Optimization of Multi-Attribute Tasks for Underwater Motion of Robotic Sensor Agents.
Irina Goldman, Samuel Barrett, Jeffrey V. Nickerson
2007Optimizing Sensor Placement for Intruder Detection with Genetic Algorithms.
Samuel R. Barrett
2007Organizing Hot-Spot Police Patrol Routes.
Sudarshan S. Chawathe
2007Periodicity and Application for a kind of n-dimensional Arnold-type Transformation.
Ji-Zhi Wang, Yinglong Wang, Mei-Qin Wang
2007Privacy Preserving Collaborative Data Mining.
Justin Z. Zhan
2007Profiling and Visualizing Cyber-criminal Activities: A General Framework.
Wingyan Chung, G. Alan Wang
2007Protecting Location Privacy with Dynamic Mac Address Exchanging in Wireless Networks.
Ming Lei, Zijie Qi, Xiaoyan Hong, Susan V. Vrbsky
2007Recursive Algorithm of River and Basin Data Model based on Composite Design Pattern.
Hyung Moo Kim, Jae Soo Yoo
2007Relationally Mapping XML Queries For Scalable XML Search.
Rebecca Cathey, Steven M. Beitzel, Eric C. Jensen, David A. Grossman, Ophir Frieder
2007SIGHTS: A Software System for Finding Coalitions and Leaders in a Social Network.
Jeffrey Baumes, Mark K. Goldberg, Mykola Hayvanovych, Stephen Kelley, Malik Magdon-Ismail, Konstantin Mertsalov, William A. Wallace
2007Security Event Management System based on Mobile Agent Technology.
Wang Jingxin, Zhiying Wang, Kui Dai
2007Semantically Ranked Graph Pattern Queries for Link Analysis.
Dawit Yimam Seid, Sharad Mehrotra
2007Sequential Decision Making Algorithms for Port of Entry Inspection: Overcoming Computational Challenges.
David Madigan, Sushil Mittal, Fred S. Roberts
2007Short Query Sequences in Misuse Detection.
Alana Platt, Nazli Goharian
2007Simulating Threats Propagation within the NSP Infrastructure.
Rami Puzis, Meytal Tubi, Gil Tahan, Yuval Elovici
2007Social Behavior in a Team of Autonomous Sensors.
Yasuaki Sakamoto, Jeffrey V. Nickerson
2007Surface Transportation and Cyber-Infrastructure: An Exploratory Study.
Sangmi Chai, Raj Sharman, Smitha Patil, Shruta Satam, H. Raghav Rao, Shambhu J. Upadhyaya
2007Terrorism and Crime Related Weblog Social Network: Link, Content Analysis and Information Visualization.
Christopher C. Yang, Tobun D. Ng
2007Text Extraction of Spatial and Temporal Information.
Antonio Badia, Jothi Ravishankar, Tulay Muezzinoglu
2007The Arizona IDMatcher: A Probabilistic Identity Matching System.
G. Alan Wang, Siddharth Kaza, Shailesh Joshi, Kris Chang, Homa Atabakhsh, Hsinchun Chen
2007Using Digital Chains of Custody on Constrained Devices to Verify Evidence.
Phillip G. Bradford, Daniel A. Ray
2007Using Homomorphic Encryption and Digital Envelope Techniques for Privacy Preserving Collaborative Sequential Pattern Mining.
Justin Z. Zhan
2007Visualization of Events in a Spatially and Multimedia Enriched Virtual Environment.
Leonidas Deligiannidis, Farshad Hakimpour, Amit P. Sheth