| 2009 | A Characterization of the problem of secure provenance management. Shouhuai Xu, Qun Ni, Elisa Bertino, Ravi S. Sandhu |
| 2009 | A Higher Order Collective Classifier for detecting and classifying network events. Vikas Menon, William M. Pottenger |
| 2009 | A Voronoi-based model for emergency planning using sequential-scan algorithms. Christopher Torpelund-Bruin, Ickjai Lee |
| 2009 | A framework for harnessing public wisdom to ensure food safety. Tobun Dorbin Ng, Christopher C. Yang |
| 2009 | A game theory approach for the reallocation of security forces against terrorist diversionary attacks. Yi-Ming Chen, Dachrahn Wu, Cheng-Kuang Wu |
| 2009 | A heuristic approach for detection of obfuscated malware. Scott Treadwell, Mian Zhou |
| 2009 | A natural language interface for crime-related spatial queries. Chengyang Zhang, Yan Huang, Rada Mihalcea, Hector Cuellar |
| 2009 | A new quantitative approach for information security risk assessment. Abbas Asosheh, Bijan Dehmoubed, Amir Khani |
| 2009 | A two-level protocol to answer private location-based queries. Roopa Vishwanathan, Yan Huang |
| 2009 | Applying graph-based anomaly detection approaches to the discovery of insider threats. William Eberle, Lawrence B. Holder |
| 2009 | Assessment of impact of variable message signs on traffic surveillance in Kuala Lumpur. Arash Moradkhani Roshandeh, Othman Che Puan |
| 2009 | Assured Information Sharing Life Cycle. Tim Finin, Anupam Joshi, Hillol Kargupta, Yelena Yesha, Joel Sachs, Elisa Bertino, Ninghui Li, Chris Clifton, Gene Spafford, Bhavani Thuraisingham, Murat Kantarcioglu, Alain Bensoussan, Nathan Berg, Latifur Khan, Jiawei Han, ChengXiang Zhai, Ravi S. Sandhu, Shouhuai Xu, Jim Massaro, Lada A. Adamic |
| 2009 | Automated casing event detection in persistent video surveillance. Daniel T. Schmitt, Stuart H. Kurkowski, Michael J. Mendenhall |
| 2009 | Automatically Classifying Documents by Ideological and Organizational Affiliation. Moshe Koppel, Navot Akiva, Eli Alshech, Kfir Bar |
| 2009 | BBN-based privacy management system for facebook. Enkh-Amgalan Baatarjav, Ram Dantu, Yan Tang, João W. Cangussu |
| 2009 | Building Social Networks in Persistent Video Surveillance. Daniel T. Schmitt, Stuart H. Kurkowski, Michael J. Mendenhall |
| 2009 | Building a better password: The role of cognitive load in information security training. Ann-Marie Horcher, Gurvirender P. Tejay |
| 2009 | Change point detection based on call detail records. Huiqi Zhang, Ram Dantu, João W. Cangussu |
| 2009 | Color image watermarking algorithm in cepstrum domain. Min-rui Zhang, Yangmei Zhang |
| 2009 | ContentEx: A framework for automatic content extraction programs. Linhai Song, Xueqi Cheng, Yan Guo, Yue Liu, Guodong Ding |
| 2009 | Dark web forums portal: Searching and analyzing jihadist forums. Yulei Zhang, Shuo Zeng, Li Fan, Yan Dang, Catherine A. Larson, Hsinchun Chen |
| 2009 | Defense against SPIT using community signals. Santi Phithakkitnukoon, Ram Dantu |
| 2009 | Design and implementation of a secure social network system. Ryan Layfield, Bhavani Thuraisingham, Latifur Khan, Murat Kantarcioglu, Jyothsna Rachapalli |
| 2009 | Developing insider attack detection model: A grounded approach. Gary Doss, Gurvirender P. Tejay |
| 2009 | Effective whitelisting for filesystem forensics. Sudarshan S. Chawathe |
| 2009 | Enforcing IRM security policies: Two case studies. Micah Jones, Kevin W. Hamlen |
| 2009 | Experiment setup for temporal distributed intrusion detection system on Amazon's elastic compute cloud. Noah Guilbault, Ratan Guha |
| 2009 | Facilitating wrapper generation with page analysis. Bo Wu, Xueqi Cheng, Yu Wang, Gang Zhang, Guodong Ding |
| 2009 | Factors influencing Bloggers' perceived indentifiability. Chyng-Yang Jang, Michael Stefanone |
| 2009 | Finding leaders from opinion networks. Hengmin Zhou, Daniel Zeng, Changli Zhang |
| 2009 | From digital forensic report to Bayesian network representation. Robert Lee, Sheau-Dong Lang, Kevin Stenger |
| 2009 | Functional requirements of situational awareness in computer network security. Cyril Onwubiko |
| 2009 | Gender difference analysis of political web forums: An experiment on an international islamic women's forum. Yulei Zhang, Yan Dang, Hsinchun Chen |
| 2009 | Handling Class Imbalance Problem in Cultural Modeling. Peng Su, Wenji Mao, Daniel Zeng, Xiaochen Li, Fei-Yue Wang |
| 2009 | Hardening adversarial prediction with anomaly tracking. M. A. J. Bourassa, David B. Skillicorn |
| 2009 | Hiding in a virtual world: Using unconventionally installed operating systems. Richard Arthur Bares |
| 2009 | IEDs in the dark web: Lexicon expansion and genre classification. Hsinchun Chen |
| 2009 | IEEE International Conference on Intelligence and Security Informatics, ISI 2009, Dallas, Texas, USA, June 8-11, 2009, Proceedings |
| 2009 | Identification of extremist videos in online video sharing sites. Tianjun Fu, Chunneng Huang, Hsinchun Chen |
| 2009 | Identifying Google Talk packets. Jessica Ho, Ping Ji, Weifeng Chen, Raymond Hsieh |
| 2009 | Identity theft, computers and behavioral biometrics. Robert Moskovitch, Clint Feher, Arik Messerman, Niklas Kirschnick, Tarik Mustafic, Seyit Ahmet Çamtepe, Bernhard Löhlein, Ulrich Heister, Sebastian Möller, Lior Rokach, Yuval Elovici |
| 2009 | Implementing PII honeytokens to mitigate against the threat of malicous insiders. Jonathan White, Brajendra Panda |
| 2009 | Injecting a permission-based delegation model to secure web-based workflow systems. Xiaoran Wang, Coskun Bayrak |
| 2009 | Intrusion detection based on "Hybrid" propagation in Bayesian Networks. Farah Jemili, Montaceur Zaghdoud, Mohamed Ben Ahmed |
| 2009 | Mining top-k and bottom-k correlative crime patterns through graph representations. Peter Phillips, Ickjai Lee |
| 2009 | MyMemex: A web service-based personal memex system. Youngkun Min, Bogju Lee, Chansu Yu |
| 2009 | New approaches for intrusion detection based on logs correlation. Seyed Omid Azarkasb, Saeed Shiri Ghidary |
| 2009 | Observation of network structure in Amazon.com. Teruhiko Yoneyama, Mukkai S. Krishnamoorthy |
| 2009 | On the mitigation of bioterrorism through game theory. Ryan Layfield, Murat Kantarcioglu, Bhavani Thuraisingham |
| 2009 | Performance evaluation of classification methods in cultural modeling. Xiaochen Li, Wenji Mao, Daniel Dajun Zeng, Peng Su, Fei-Yue Wang |
| 2009 | PerpSearch: An integrated crime detection system. Li Ding, Dana Steil, Matthew Hudnall, Brandon Dixon, Randy K. Smith, David Brown, Allen S. Parrish |
| 2009 | Practical privacy-preserving protocols for criminal investigations. Florian Kerschbaum, Andreas Schaad, Debmalya Biswas |
| 2009 | Prediction of past unsolved terrorist attacks. Fatih Özgül, Zeki Erdem, Chris Bowerman |
| 2009 | Preventing SYN flood DoS attacks (Abstract) An improvement to SYN cookies. Sahand KhakAbi |
| 2009 | Propagation of online news: Dynamic patterns. Youzhong Wang, Daniel Zeng, Xiaolong Zheng, Fei-Yue Wang |
| 2009 | Recognizing human activities from multi-modal sensors. Shu Chen, Yan Huang |
| 2009 | Research about extracting and analyzing accounting data of company to detect financial fraud. Kimin Seo, Jaemin Choi, Yong-Seok Choi, Dong-chan Lee, Sangjin Lee |
| 2009 | Social network classification incorporating link type values. Raymond Heatherly, Murat Kantarcioglu, Bhavani Thuraisingham |
| 2009 | Socio-contextual model of knowledge sharing among user assisting agents. Balaji Rajendran, K. Iyakutti |
| 2009 | Stability of individual and group behavior in a blog network. Stephen Kelley, Mark K. Goldberg, Malik Magdon-Ismail, Konstantin Mertsalov |
| 2009 | Supporting data exploration in databases. Antonio Badia |
| 2009 | Supporting emergent knowledge and team communication in police investigations. Claus Atzenbeck, David L. Hicks, Nasrullah Memon |
| 2009 | Terrorist and criminal social network data sharing and integration. Xuning Tang, Christopher C. Yang |
| 2009 | The software EBox: Integrated information for situational awareness. Naveen Ashish, Jay Lickfett, Sharad Mehrotra, Nalini Venkatasubramanian |
| 2009 | Topic-based web page recommendation using tags. Jing Peng, Daniel Zeng |
| 2009 | Tracking terrorism news threads by extracting event signatures. Syed Toufeeq Ahmed, Ruchi Bhindwale, Hasan Davulcu |
| 2009 | Traffic and security analysis on Sony Playstation 3. Michael Perelman, Ping Ji, Weifeng Chen |
| 2009 | Unifying strategies and tactics: A survivability framework for countering cyber attacks. Yanjun Zuo, Brajendra Panda |
| 2009 | Voronoi representation for areal data processing in data-rich environments. David Breitkreutz, Ickjai Lee |
| 2009 | Weaving ontologies to support digital forensic analysis. Allyson M. Hoss, Doris L. Carver |
| 2009 | Web opinions analysis with scalable distance-based clustering. Christopher C. Yang, Tobun Dorbin Ng |
| 2009 | graphOnt: An ontology based library for conversion from semantic graphs to JUNG. Stephen Kelley, Mark K. Goldberg, Malik Magdon-Ismail, Konstantin Mertsalov, William A. Wallace, Mohammed Javeed Zaki |