ISI C

72 papers

YearTitle / Authors
2009A Characterization of the problem of secure provenance management.
Shouhuai Xu, Qun Ni, Elisa Bertino, Ravi S. Sandhu
2009A Higher Order Collective Classifier for detecting and classifying network events.
Vikas Menon, William M. Pottenger
2009A Voronoi-based model for emergency planning using sequential-scan algorithms.
Christopher Torpelund-Bruin, Ickjai Lee
2009A framework for harnessing public wisdom to ensure food safety.
Tobun Dorbin Ng, Christopher C. Yang
2009A game theory approach for the reallocation of security forces against terrorist diversionary attacks.
Yi-Ming Chen, Dachrahn Wu, Cheng-Kuang Wu
2009A heuristic approach for detection of obfuscated malware.
Scott Treadwell, Mian Zhou
2009A natural language interface for crime-related spatial queries.
Chengyang Zhang, Yan Huang, Rada Mihalcea, Hector Cuellar
2009A new quantitative approach for information security risk assessment.
Abbas Asosheh, Bijan Dehmoubed, Amir Khani
2009A two-level protocol to answer private location-based queries.
Roopa Vishwanathan, Yan Huang
2009Applying graph-based anomaly detection approaches to the discovery of insider threats.
William Eberle, Lawrence B. Holder
2009Assessment of impact of variable message signs on traffic surveillance in Kuala Lumpur.
Arash Moradkhani Roshandeh, Othman Che Puan
2009Assured Information Sharing Life Cycle.
Tim Finin, Anupam Joshi, Hillol Kargupta, Yelena Yesha, Joel Sachs, Elisa Bertino, Ninghui Li, Chris Clifton, Gene Spafford, Bhavani Thuraisingham, Murat Kantarcioglu, Alain Bensoussan, Nathan Berg, Latifur Khan, Jiawei Han, ChengXiang Zhai, Ravi S. Sandhu, Shouhuai Xu, Jim Massaro, Lada A. Adamic
2009Automated casing event detection in persistent video surveillance.
Daniel T. Schmitt, Stuart H. Kurkowski, Michael J. Mendenhall
2009Automatically Classifying Documents by Ideological and Organizational Affiliation.
Moshe Koppel, Navot Akiva, Eli Alshech, Kfir Bar
2009BBN-based privacy management system for facebook.
Enkh-Amgalan Baatarjav, Ram Dantu, Yan Tang, João W. Cangussu
2009Building Social Networks in Persistent Video Surveillance.
Daniel T. Schmitt, Stuart H. Kurkowski, Michael J. Mendenhall
2009Building a better password: The role of cognitive load in information security training.
Ann-Marie Horcher, Gurvirender P. Tejay
2009Change point detection based on call detail records.
Huiqi Zhang, Ram Dantu, João W. Cangussu
2009Color image watermarking algorithm in cepstrum domain.
Min-rui Zhang, Yangmei Zhang
2009ContentEx: A framework for automatic content extraction programs.
Linhai Song, Xueqi Cheng, Yan Guo, Yue Liu, Guodong Ding
2009Dark web forums portal: Searching and analyzing jihadist forums.
Yulei Zhang, Shuo Zeng, Li Fan, Yan Dang, Catherine A. Larson, Hsinchun Chen
2009Defense against SPIT using community signals.
Santi Phithakkitnukoon, Ram Dantu
2009Design and implementation of a secure social network system.
Ryan Layfield, Bhavani Thuraisingham, Latifur Khan, Murat Kantarcioglu, Jyothsna Rachapalli
2009Developing insider attack detection model: A grounded approach.
Gary Doss, Gurvirender P. Tejay
2009Effective whitelisting for filesystem forensics.
Sudarshan S. Chawathe
2009Enforcing IRM security policies: Two case studies.
Micah Jones, Kevin W. Hamlen
2009Experiment setup for temporal distributed intrusion detection system on Amazon's elastic compute cloud.
Noah Guilbault, Ratan Guha
2009Facilitating wrapper generation with page analysis.
Bo Wu, Xueqi Cheng, Yu Wang, Gang Zhang, Guodong Ding
2009Factors influencing Bloggers' perceived indentifiability.
Chyng-Yang Jang, Michael Stefanone
2009Finding leaders from opinion networks.
Hengmin Zhou, Daniel Zeng, Changli Zhang
2009From digital forensic report to Bayesian network representation.
Robert Lee, Sheau-Dong Lang, Kevin Stenger
2009Functional requirements of situational awareness in computer network security.
Cyril Onwubiko
2009Gender difference analysis of political web forums: An experiment on an international islamic women's forum.
Yulei Zhang, Yan Dang, Hsinchun Chen
2009Handling Class Imbalance Problem in Cultural Modeling.
Peng Su, Wenji Mao, Daniel Zeng, Xiaochen Li, Fei-Yue Wang
2009Hardening adversarial prediction with anomaly tracking.
M. A. J. Bourassa, David B. Skillicorn
2009Hiding in a virtual world: Using unconventionally installed operating systems.
Richard Arthur Bares
2009IEDs in the dark web: Lexicon expansion and genre classification.
Hsinchun Chen
2009IEEE International Conference on Intelligence and Security Informatics, ISI 2009, Dallas, Texas, USA, June 8-11, 2009, Proceedings
2009Identification of extremist videos in online video sharing sites.
Tianjun Fu, Chunneng Huang, Hsinchun Chen
2009Identifying Google Talk packets.
Jessica Ho, Ping Ji, Weifeng Chen, Raymond Hsieh
2009Identity theft, computers and behavioral biometrics.
Robert Moskovitch, Clint Feher, Arik Messerman, Niklas Kirschnick, Tarik Mustafic, Seyit Ahmet Çamtepe, Bernhard Löhlein, Ulrich Heister, Sebastian Möller, Lior Rokach, Yuval Elovici
2009Implementing PII honeytokens to mitigate against the threat of malicous insiders.
Jonathan White, Brajendra Panda
2009Injecting a permission-based delegation model to secure web-based workflow systems.
Xiaoran Wang, Coskun Bayrak
2009Intrusion detection based on "Hybrid" propagation in Bayesian Networks.
Farah Jemili, Montaceur Zaghdoud, Mohamed Ben Ahmed
2009Mining top-k and bottom-k correlative crime patterns through graph representations.
Peter Phillips, Ickjai Lee
2009MyMemex: A web service-based personal memex system.
Youngkun Min, Bogju Lee, Chansu Yu
2009New approaches for intrusion detection based on logs correlation.
Seyed Omid Azarkasb, Saeed Shiri Ghidary
2009Observation of network structure in Amazon.com.
Teruhiko Yoneyama, Mukkai S. Krishnamoorthy
2009On the mitigation of bioterrorism through game theory.
Ryan Layfield, Murat Kantarcioglu, Bhavani Thuraisingham
2009Performance evaluation of classification methods in cultural modeling.
Xiaochen Li, Wenji Mao, Daniel Dajun Zeng, Peng Su, Fei-Yue Wang
2009PerpSearch: An integrated crime detection system.
Li Ding, Dana Steil, Matthew Hudnall, Brandon Dixon, Randy K. Smith, David Brown, Allen S. Parrish
2009Practical privacy-preserving protocols for criminal investigations.
Florian Kerschbaum, Andreas Schaad, Debmalya Biswas
2009Prediction of past unsolved terrorist attacks.
Fatih Özgül, Zeki Erdem, Chris Bowerman
2009Preventing SYN flood DoS attacks (Abstract) An improvement to SYN cookies.
Sahand KhakAbi
2009Propagation of online news: Dynamic patterns.
Youzhong Wang, Daniel Zeng, Xiaolong Zheng, Fei-Yue Wang
2009Recognizing human activities from multi-modal sensors.
Shu Chen, Yan Huang
2009Research about extracting and analyzing accounting data of company to detect financial fraud.
Kimin Seo, Jaemin Choi, Yong-Seok Choi, Dong-chan Lee, Sangjin Lee
2009Social network classification incorporating link type values.
Raymond Heatherly, Murat Kantarcioglu, Bhavani Thuraisingham
2009Socio-contextual model of knowledge sharing among user assisting agents.
Balaji Rajendran, K. Iyakutti
2009Stability of individual and group behavior in a blog network.
Stephen Kelley, Mark K. Goldberg, Malik Magdon-Ismail, Konstantin Mertsalov
2009Supporting data exploration in databases.
Antonio Badia
2009Supporting emergent knowledge and team communication in police investigations.
Claus Atzenbeck, David L. Hicks, Nasrullah Memon
2009Terrorist and criminal social network data sharing and integration.
Xuning Tang, Christopher C. Yang
2009The software EBox: Integrated information for situational awareness.
Naveen Ashish, Jay Lickfett, Sharad Mehrotra, Nalini Venkatasubramanian
2009Topic-based web page recommendation using tags.
Jing Peng, Daniel Zeng
2009Tracking terrorism news threads by extracting event signatures.
Syed Toufeeq Ahmed, Ruchi Bhindwale, Hasan Davulcu
2009Traffic and security analysis on Sony Playstation 3.
Michael Perelman, Ping Ji, Weifeng Chen
2009Unifying strategies and tactics: A survivability framework for countering cyber attacks.
Yanjun Zuo, Brajendra Panda
2009Voronoi representation for areal data processing in data-rich environments.
David Breitkreutz, Ickjai Lee
2009Weaving ontologies to support digital forensic analysis.
Allyson M. Hoss, Doris L. Carver
2009Web opinions analysis with scalable distance-based clustering.
Christopher C. Yang, Tobun Dorbin Ng
2009graphOnt: An ontology based library for conversion from semantic graphs to JUNG.
Stephen Kelley, Mark K. Goldberg, Malik Magdon-Ismail, Konstantin Mertsalov, William A. Wallace, Mohammed Javeed Zaki