ISI C

82 papers

YearTitle / Authors
2008A fast algorithm for data erasure.
Guomeng Wang, Yanping Zhao
2008A framework for privacy-preserving cluster analysis.
Benjamin C. M. Fung, Ke Wang, Lingyu Wang, Mourad Debbabi
2008A game theory approach for an emergency management security advisory system.
Yi-Ming Chen, Dachrahn Wu, Cheng-Kuang Wu
2008A latent semantic indexing and WordNet based information retrieval model for digital forensics.
Lan Du, Huidong Jin, Olivier Y. de Vel, Nianjun Liu
2008A locality model of the evolution of blog networks.
Mark K. Goldberg, Malik Magdon-Ismail, Stephen Kelley, Konstantin Mertsalov
2008A new classifier for numerical incomplete data.
Jun Wu, Dong-Hun Seo, Chi-Hwa Song, Won Don Lee
2008A new on-line signature verification by Spatio-Temporal neural network.
Maryam Moghadam Fard, Mehdi Moghadam Fard, Nasser Mozayani
2008A new online auction with convertible authenticated encryption and authentication.
Guo-Lun Luo, Henry Ker-Chang Chang
2008A novel risk assessment system for port state control inspection.
Zhong Gao, Guanming Lu, Mengjue Liu, Meng Cui
2008A real-time network intrusion detection system based on incremental mining approach.
Ming-Yang Su, Kai-Chi Chang, Hua-Fu Wei, Chun-Yuen Lin
2008A study of anti-robot agent mechanisms and process on online games.
N. W. Lo, Shiou-Hung Chen
2008A study of integrated criminal justice data base system.
Weiping Chang, Chichao Lu, WenYuan Jen
2008A study of the identification of authorship for Chinese texts.
Jian Zhang, Tianfang Yao
2008A study on critical infrastructure information technology Malfunction controls-- illustration of Taiwan.
Kwo-Jean Farn, Shu-Kuo Lin, Kuo-Sui Lin, Chung-Huang Yang
2008A study on early decision making in objectionable web content classification.
Lung-Hao Lee, Cheng-Jye Luh, Chih-Jie Yang
2008A study on the feature selection of network traffic for intrusion detection purpose.
Wanli Ma, Dat Tran, Dharmendra Sharma
2008A template alignment algorithm for question classification.
Cheng-Lung Sung, Min-Yuh Day, Hsu-Chun Yen, Wen-Lian Hsu
2008Advanced sensor fusion technique for enhanced Intrusion Detection.
Ciza Thomas, N. Balakrishnan
2008An effective surveillance video retrieval method based upon motion detection.
Shih-Hsuan Chiu, Che-Yen Wen, Wei-Chieh Kao
2008An efficient Montgomery exponentiation algorithm for public-key cryptosystems.
Chia-Long Wu, Der-Chyuan Lou, Te-Jen Chang
2008An extended security framework for e-government.
Walid Al-Ahmad, Reem Al-Kaabi
2008An integrated approach to mapping worldwide bioterrorism research capabilities.
Yan Dang, Yulei Zhang, Nichalin Suakkaphong, Cathy Larson, Hsinchun Chen
2008An novel two layer user identification method.
Wen-Pinn Fang, Hong-Ru Lee, Fang-Pan Line
2008Analysis of cyberactivism: A case study of online free Tibet activities.
Tianjun Fu, Hsinchun Chen
2008Analyzing content development and visualizing social interactions in Web forum.
Christopher C. Yang, Tobun Dorbin Ng
2008Anomaly detection in high-dimensional network data streams: A case study.
Ji Zhang, Qigang Gao, Hai H. Wang
2008Anonymous attribute authentication scheme using self-blindable certificates.
Shinsaku Kiyomoto, Toshiaki Tanaka
2008Automated network feature weighting-based anomaly detection.
Dat Tran, Wanli Ma, Dharmendra Sharma
2008Bioterrorism event detection based on the Markov switching model: A simulated anthrax outbreak study.
Hsin-Min Lu, Daniel Zeng, Hsinchun Chen
2008Botnets, and the cybercriminal underground.
Clinton J. Mielke, Hsinchun Chen
2008Constrained k-closest pairs query processing based on growing window in crime databases.
Shaojie Qiao, Changjie Tang, Huidong Jin, Shucheng Dai, Xingshu Chen
2008Countering terrorism.
Jarret Brachman
2008Cyber crime and challenges for crime investigation in the information era.
H. C. Lee
2008Cyber extremism in Web 2.0: An exploratory study of international Jihadist groups.
Hsinchun Chen, S. Thoms, Tianjun Fu
2008Data hiding using VQ index file.
Yu-Jie Chang, Ja-Chen Lin
2008Data mining for security applications: Mining concept-drifting data streams to detect peer to peer botnet traffic.
Bhavani Thuraisingham
2008Data mining for social network analysis.
J. Srivastava
2008Depth evaluation intrusion detection using Coloured Stochastic Petri Nets.
Chien-Chuan Lin, Ming-Shi Wang
2008Design and implementation of honeypot systems based on open-source software.
Chao-Hsi Yeh, Chung-Huang Yang
2008Detecting deception in testimony.
Ayron Little, David B. Skillicorn
2008Developing ideological networks using social network analysis and writeprints: A case study of the international Falun Gong movement.
Yi-Da Chen, Ahmed Abbasi, Hsinchun Chen
2008Discovery of improvised explosive device content in the Dark Web.
Hsinchun Chen
2008Distributed processing of event data and multi-faceted knowledge in a collaboration federation.
Stanley Y. W. Su, Howard W. Beck, Seema Degwekar, Jeff DePree, Xuelian Xiao, Chen Zhou, Minsoo Lee
2008Efficient and complete remote authentication scheme with smart cards.
Wen-Gong Shieh, Wen-Bing Horng
2008Efficient keyword index search over encrypted documents of groups.
Hyun-A Park, Dong Hoon Lee, Justin Zhan, Gary Blosser
2008Evaluating AVDL descriptions for web application vulnerability analysis.
Ha-Thanh Le, Peter Kok Keong Loh
2008Hiding clusters in adversarial settings.
J. G. Dutrisac, David B. Skillicorn
2008Homeland security data mining using social network analysis.
Hsinchun Chen
2008IEDs in the Dark Web: Genre classification of improvised explosive device web pages.
Hsinchun Chen
2008IEEE International Conference on Intelligence and Security Informatics, ISI 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings
2008Identity management architecture.
Uwe Glässer, Mona Vajihollahi
2008Information sharing and privacy protection of terrorist or criminal social networks.
Christopher C. Yang
2008Intelligent pattern recognition and biometrics.
Patrick S. P. Wang
2008Intrusion activity projection for cyber situational awareness.
Shanchieh Jay Yang, Stephen R. Byers, Jared Holsopple, Brian Argauer, Daniel S. Fava
2008KARIS: A multiple-scheme framework for encryption based on an annotation model for enhanced information security.
R. Charles
2008Keying material based key pre-distribution scheme.
Zhihong Liu, Jianfeng Ma, Qiping Huang, Sang-Jae Moon
2008Link analysis based on webpage co-occurrence mining - a case study on a notorious gang leader in Taiwan.
Yiting Peng, Jau-Hwang Wang
2008Models and methods for prediction problem of evolving graphs.
A. Chapanond, M. S. Krishnamoorthy
2008Multiplicatively-weighted order-k Minkowski-metric Voronoi models for disaster decision support systems.
Ickjai Lee, Christopher Torpelund-Bruin
2008Novel position-coded methods for mining web access patterns.
Wenjia Wang, Phuong Thanh Cao-Thai
2008PRM-based identity matching using social context.
Jiexun Li, G. Alan Wang, Hsinchun Chen
2008Preparedness for post-disaster internet traffic management.
Jan-Mou Li, Chung-Hao Chen, Shang-Hsing Hsieh, Wen-Chao Yang, Che-Yen Wen
2008Probabilistic frameworks for privacy-aware data mining.
Joydeep Ghosh
2008Reading order independent grouping proof for RFID tags.
Yuanhung Lien, Xuefei Leng, Keith Mayes, Jung-Hui Chiu
2008Real time intrusion prediction, detection and prevention programs.
Ajith Abraham
2008Restoration of linear motion and out-of-focus blurred images in surveillance systems.
Chung-Hao Chen, TeYu Chien, Wen-Chao Yang, Che-Yen Wen
2008RiskPatrol: A risk management system considering the integration risk management with business continuity processes.
Shi-Cho Cha, Pei-Wen Juo, Li-Ting Liu, Wei-Ning Chen
2008Secure remote control model for information appliances.
Wen-Gong Shieh, Jian-Min Wang, Wen-Bing Horng
2008Sem@ntica: A system for semantic extraction and logical querying of text corpora.
Daniel W. McMichael, Raymond Fu, Simon Williams, Geoff A. Jarrad
2008Sentiment and affect analysis of Dark Web forums: Measuring radicalization on the internet.
Hsinchun Chen
2008Signtiming scheme based on aggregate signature.
Duc-Phong Le, Alexis Bonnecaze, Alban Gabillon
2008Simulating bioterrorism through epidemiology approximation.
Ryan Layfield, Murat Kantarcioglu, Bhavani Thuraisingham
2008Social Computing: Fundamentals and applications.
Fei-Yue Wang
2008Subverting prediction in adversarial settings.
J. G. Dutrisac, David B. Skillicorn
2008Swarm intelligence based rough set reduction scheme for support vector machines.
Ajith Abraham, Hongbo Liu
2008The performance analysis of anti- terrorism intelligence from Taiwan's Investigation Bureau of the Ministry of Justice.
Yu-Ping Fan, Cheng-Wei Chen
2008Transport security using mobile technology.
P. Panjiyar, P. Mourya, Nikhil Bansal, P. Srivastava, A. Mukherjee
2008Unknown malcode detection - A chronological evaluation.
Robert Moskovitch, Clint Feher, Yuval Elovici
2008Unknown malcode detection via text categorization and the imbalance problem.
Robert Moskovitch, Dima Stopel, Clint Feher, Nir Nissim, Yuval Elovici
2008User-centered evaluation of question answering systems.
Chorng-Shyong Ong, Min-Yuh Day, Kuo-Tay Chen, Wen-Lian Hsu
2008Visual Cryptography (VC) with non-expanded shadow images: Hilbert-curve approach.
Sen-Jen Lin, Ja-Chen Lin, Wen-Pinn Fang
2008WikiNetViz: Visualizing friends and adversaries in implicit social networks.
Minh-Tam Le, Hoang-Vu Dang, Ee-Peng Lim, Anwitaman Datta