| 2008 | A fast algorithm for data erasure. Guomeng Wang, Yanping Zhao |
| 2008 | A framework for privacy-preserving cluster analysis. Benjamin C. M. Fung, Ke Wang, Lingyu Wang, Mourad Debbabi |
| 2008 | A game theory approach for an emergency management security advisory system. Yi-Ming Chen, Dachrahn Wu, Cheng-Kuang Wu |
| 2008 | A latent semantic indexing and WordNet based information retrieval model for digital forensics. Lan Du, Huidong Jin, Olivier Y. de Vel, Nianjun Liu |
| 2008 | A locality model of the evolution of blog networks. Mark K. Goldberg, Malik Magdon-Ismail, Stephen Kelley, Konstantin Mertsalov |
| 2008 | A new classifier for numerical incomplete data. Jun Wu, Dong-Hun Seo, Chi-Hwa Song, Won Don Lee |
| 2008 | A new on-line signature verification by Spatio-Temporal neural network. Maryam Moghadam Fard, Mehdi Moghadam Fard, Nasser Mozayani |
| 2008 | A new online auction with convertible authenticated encryption and authentication. Guo-Lun Luo, Henry Ker-Chang Chang |
| 2008 | A novel risk assessment system for port state control inspection. Zhong Gao, Guanming Lu, Mengjue Liu, Meng Cui |
| 2008 | A real-time network intrusion detection system based on incremental mining approach. Ming-Yang Su, Kai-Chi Chang, Hua-Fu Wei, Chun-Yuen Lin |
| 2008 | A study of anti-robot agent mechanisms and process on online games. N. W. Lo, Shiou-Hung Chen |
| 2008 | A study of integrated criminal justice data base system. Weiping Chang, Chichao Lu, WenYuan Jen |
| 2008 | A study of the identification of authorship for Chinese texts. Jian Zhang, Tianfang Yao |
| 2008 | A study on critical infrastructure information technology Malfunction controls-- illustration of Taiwan. Kwo-Jean Farn, Shu-Kuo Lin, Kuo-Sui Lin, Chung-Huang Yang |
| 2008 | A study on early decision making in objectionable web content classification. Lung-Hao Lee, Cheng-Jye Luh, Chih-Jie Yang |
| 2008 | A study on the feature selection of network traffic for intrusion detection purpose. Wanli Ma, Dat Tran, Dharmendra Sharma |
| 2008 | A template alignment algorithm for question classification. Cheng-Lung Sung, Min-Yuh Day, Hsu-Chun Yen, Wen-Lian Hsu |
| 2008 | Advanced sensor fusion technique for enhanced Intrusion Detection. Ciza Thomas, N. Balakrishnan |
| 2008 | An effective surveillance video retrieval method based upon motion detection. Shih-Hsuan Chiu, Che-Yen Wen, Wei-Chieh Kao |
| 2008 | An efficient Montgomery exponentiation algorithm for public-key cryptosystems. Chia-Long Wu, Der-Chyuan Lou, Te-Jen Chang |
| 2008 | An extended security framework for e-government. Walid Al-Ahmad, Reem Al-Kaabi |
| 2008 | An integrated approach to mapping worldwide bioterrorism research capabilities. Yan Dang, Yulei Zhang, Nichalin Suakkaphong, Cathy Larson, Hsinchun Chen |
| 2008 | An novel two layer user identification method. Wen-Pinn Fang, Hong-Ru Lee, Fang-Pan Line |
| 2008 | Analysis of cyberactivism: A case study of online free Tibet activities. Tianjun Fu, Hsinchun Chen |
| 2008 | Analyzing content development and visualizing social interactions in Web forum. Christopher C. Yang, Tobun Dorbin Ng |
| 2008 | Anomaly detection in high-dimensional network data streams: A case study. Ji Zhang, Qigang Gao, Hai H. Wang |
| 2008 | Anonymous attribute authentication scheme using self-blindable certificates. Shinsaku Kiyomoto, Toshiaki Tanaka |
| 2008 | Automated network feature weighting-based anomaly detection. Dat Tran, Wanli Ma, Dharmendra Sharma |
| 2008 | Bioterrorism event detection based on the Markov switching model: A simulated anthrax outbreak study. Hsin-Min Lu, Daniel Zeng, Hsinchun Chen |
| 2008 | Botnets, and the cybercriminal underground. Clinton J. Mielke, Hsinchun Chen |
| 2008 | Constrained k-closest pairs query processing based on growing window in crime databases. Shaojie Qiao, Changjie Tang, Huidong Jin, Shucheng Dai, Xingshu Chen |
| 2008 | Countering terrorism. Jarret Brachman |
| 2008 | Cyber crime and challenges for crime investigation in the information era. H. C. Lee |
| 2008 | Cyber extremism in Web 2.0: An exploratory study of international Jihadist groups. Hsinchun Chen, S. Thoms, Tianjun Fu |
| 2008 | Data hiding using VQ index file. Yu-Jie Chang, Ja-Chen Lin |
| 2008 | Data mining for security applications: Mining concept-drifting data streams to detect peer to peer botnet traffic. Bhavani Thuraisingham |
| 2008 | Data mining for social network analysis. J. Srivastava |
| 2008 | Depth evaluation intrusion detection using Coloured Stochastic Petri Nets. Chien-Chuan Lin, Ming-Shi Wang |
| 2008 | Design and implementation of honeypot systems based on open-source software. Chao-Hsi Yeh, Chung-Huang Yang |
| 2008 | Detecting deception in testimony. Ayron Little, David B. Skillicorn |
| 2008 | Developing ideological networks using social network analysis and writeprints: A case study of the international Falun Gong movement. Yi-Da Chen, Ahmed Abbasi, Hsinchun Chen |
| 2008 | Discovery of improvised explosive device content in the Dark Web. Hsinchun Chen |
| 2008 | Distributed processing of event data and multi-faceted knowledge in a collaboration federation. Stanley Y. W. Su, Howard W. Beck, Seema Degwekar, Jeff DePree, Xuelian Xiao, Chen Zhou, Minsoo Lee |
| 2008 | Efficient and complete remote authentication scheme with smart cards. Wen-Gong Shieh, Wen-Bing Horng |
| 2008 | Efficient keyword index search over encrypted documents of groups. Hyun-A Park, Dong Hoon Lee, Justin Zhan, Gary Blosser |
| 2008 | Evaluating AVDL descriptions for web application vulnerability analysis. Ha-Thanh Le, Peter Kok Keong Loh |
| 2008 | Hiding clusters in adversarial settings. J. G. Dutrisac, David B. Skillicorn |
| 2008 | Homeland security data mining using social network analysis. Hsinchun Chen |
| 2008 | IEDs in the Dark Web: Genre classification of improvised explosive device web pages. Hsinchun Chen |
| 2008 | IEEE International Conference on Intelligence and Security Informatics, ISI 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings |
| 2008 | Identity management architecture. Uwe Glässer, Mona Vajihollahi |
| 2008 | Information sharing and privacy protection of terrorist or criminal social networks. Christopher C. Yang |
| 2008 | Intelligent pattern recognition and biometrics. Patrick S. P. Wang |
| 2008 | Intrusion activity projection for cyber situational awareness. Shanchieh Jay Yang, Stephen R. Byers, Jared Holsopple, Brian Argauer, Daniel S. Fava |
| 2008 | KARIS: A multiple-scheme framework for encryption based on an annotation model for enhanced information security. R. Charles |
| 2008 | Keying material based key pre-distribution scheme. Zhihong Liu, Jianfeng Ma, Qiping Huang, Sang-Jae Moon |
| 2008 | Link analysis based on webpage co-occurrence mining - a case study on a notorious gang leader in Taiwan. Yiting Peng, Jau-Hwang Wang |
| 2008 | Models and methods for prediction problem of evolving graphs. A. Chapanond, M. S. Krishnamoorthy |
| 2008 | Multiplicatively-weighted order-k Minkowski-metric Voronoi models for disaster decision support systems. Ickjai Lee, Christopher Torpelund-Bruin |
| 2008 | Novel position-coded methods for mining web access patterns. Wenjia Wang, Phuong Thanh Cao-Thai |
| 2008 | PRM-based identity matching using social context. Jiexun Li, G. Alan Wang, Hsinchun Chen |
| 2008 | Preparedness for post-disaster internet traffic management. Jan-Mou Li, Chung-Hao Chen, Shang-Hsing Hsieh, Wen-Chao Yang, Che-Yen Wen |
| 2008 | Probabilistic frameworks for privacy-aware data mining. Joydeep Ghosh |
| 2008 | Reading order independent grouping proof for RFID tags. Yuanhung Lien, Xuefei Leng, Keith Mayes, Jung-Hui Chiu |
| 2008 | Real time intrusion prediction, detection and prevention programs. Ajith Abraham |
| 2008 | Restoration of linear motion and out-of-focus blurred images in surveillance systems. Chung-Hao Chen, TeYu Chien, Wen-Chao Yang, Che-Yen Wen |
| 2008 | RiskPatrol: A risk management system considering the integration risk management with business continuity processes. Shi-Cho Cha, Pei-Wen Juo, Li-Ting Liu, Wei-Ning Chen |
| 2008 | Secure remote control model for information appliances. Wen-Gong Shieh, Jian-Min Wang, Wen-Bing Horng |
| 2008 | Sem@ntica: A system for semantic extraction and logical querying of text corpora. Daniel W. McMichael, Raymond Fu, Simon Williams, Geoff A. Jarrad |
| 2008 | Sentiment and affect analysis of Dark Web forums: Measuring radicalization on the internet. Hsinchun Chen |
| 2008 | Signtiming scheme based on aggregate signature. Duc-Phong Le, Alexis Bonnecaze, Alban Gabillon |
| 2008 | Simulating bioterrorism through epidemiology approximation. Ryan Layfield, Murat Kantarcioglu, Bhavani Thuraisingham |
| 2008 | Social Computing: Fundamentals and applications. Fei-Yue Wang |
| 2008 | Subverting prediction in adversarial settings. J. G. Dutrisac, David B. Skillicorn |
| 2008 | Swarm intelligence based rough set reduction scheme for support vector machines. Ajith Abraham, Hongbo Liu |
| 2008 | The performance analysis of anti- terrorism intelligence from Taiwan's Investigation Bureau of the Ministry of Justice. Yu-Ping Fan, Cheng-Wei Chen |
| 2008 | Transport security using mobile technology. P. Panjiyar, P. Mourya, Nikhil Bansal, P. Srivastava, A. Mukherjee |
| 2008 | Unknown malcode detection - A chronological evaluation. Robert Moskovitch, Clint Feher, Yuval Elovici |
| 2008 | Unknown malcode detection via text categorization and the imbalance problem. Robert Moskovitch, Dima Stopel, Clint Feher, Nir Nissim, Yuval Elovici |
| 2008 | User-centered evaluation of question answering systems. Chorng-Shyong Ong, Min-Yuh Day, Kuo-Tay Chen, Wen-Lian Hsu |
| 2008 | Visual Cryptography (VC) with non-expanded shadow images: Hilbert-curve approach. Sen-Jen Lin, Ja-Chen Lin, Wen-Pinn Fang |
| 2008 | WikiNetViz: Visualizing friends and adversaries in implicit social networks. Minh-Tam Le, Hoang-Vu Dang, Ee-Peng Lim, Anwitaman Datta |