| 2010 | A multibiometric access control architecture for continuous authentication. Adriana Esmeraldo de Oliveira, Gustavo Henrique Matos Bezerra Motta, Leonardo Vidal Batista |
| 2010 | Agent based correlation model for intrusion detection alerts. Ayman E. Taha, Ismail Abdel Ghaffar, Ayman M. Bahaa Eldin, Hani M. K. Mahdi |
| 2010 | An executive decision support system for longitudinal statistical analysis of crime and law enforcement performance crime analysis system pacific region (CASPR). Amir H. Ghaseminejad, Paul J. Brantingham |
| 2010 | Automated sensing and social network analysis in virtual worlds. Lucas A. Overbey, Gregory McKoy, Jesse Gordon, Shannon McKitrick |
| 2010 | Automatic construction of domain theory for attack planning. Xiaochen Li, Wenji Mao, Daniel Zeng, Fei-Yue Wang |
| 2010 | Automatically identifying the sources of large Internet events. Kristin Glass, Richard Colbaugh, Max Planck |
| 2010 | BI -Intelligence for the business of crime fighting. John Warden |
| 2010 | Balancing security and information sharing in intelligence databases. Antonio Badia |
| 2010 | Breadth-depth triangulation for validation of modeling and simulation of complex systems. William N. Reynolds |
| 2010 | Clustering and mapping related news about violence events on their time-lines. Syed Toufeeq Ahmed, Sukru Tikves, Hasan Davulcu |
| 2010 | Collaborative knowledge discovery & marshalling for intelligence & security applications. Andrew J. Cowell, Russell S. Jensen, Michelle L. Gregory, Peter C. Ellis, Keith Fligg, Liam McGrath, Kelly O'Hara, Eric Belanga Bell |
| 2010 | Combining System Dynamics and Bayesian Belief Networks for Socio-Technical Risk Analysis. Zahra Mohaghegh |
| 2010 | Comparing the virtual linkage intensity and real world proximity of social movements. David Zimbra, Hsinchun Chen |
| 2010 | Computational knowledge and information management in veterinary epidemiology. Svitlana Volkova, William H. Hsu |
| 2010 | Cross Entropy approach for patrol route planning in dynamic environments. Xu Chen, Tak-Shing Peter Yum |
| 2010 | Cross-level behavioral analysis for robust early intrusion detection. Shun-Wen Hsiao, Yeali S. Sun, Meng Chang Chen, Hui Zhang |
| 2010 | Desktop text mining for law enforcement. Jonathan Brett Crawley, Gerhard Wagner |
| 2010 | Developing a Dark Web collection and infrastructure for computational and social sciences. Yulei Zhang, Shuo Zeng, Chunneng Huang, Li Fan, Ximing Yu, Yan Dang, Catherine A. Larson, Dorothy E. Denning, Nancy Roberts, Hsinchun Chen |
| 2010 | Digitally signed document flexible sanitizing scheme based on bilinear maps. Wen-Chung Kuo, Jiin-Chiou Cheng, Yen-Hung Lin, Lih-Chyau Wuu |
| 2010 | Early warning analysis for social diffusion events. Richard Colbaugh, Kristin Glass |
| 2010 | Entity refinement using latent semantic indexing. Roger B. Bradford |
| 2010 | Estimating sentiment orientation in social media for intelligence monitoring and analysis. Richard Colbaugh, Kristin Glass |
| 2010 | GENIUS: A computational modeling framework for counter-terrorism planning and response. Herbert H. Tsang, Andrew J. Park, Mengting Sun, Uwe Glässer |
| 2010 | Generalizing terrorist social networks with K-nearest neighbor and edge betweeness for social network integration and privacy preservation. Xuning Tang, Christopher C. Yang |
| 2010 | Global disease surveillance using social media: HIV/AIDS content intervention in web forums. Yungchang Ku, Chaochang Chiu, Yulei Zhang, Li Fan, Hsinchun Chen |
| 2010 | HPC - privacy model for collaborative skyline processing. Boris Y. L. Chan, Vincent Ng |
| 2010 | IEEE International Conference on Intelligence and Security Informatics, ISI 2010, Vancouver, BC, Canada, May 23-26, 2010, Proceedings Christopher C. Yang, Daniel Zeng, Ke Wang, Antonio Sanfilippo, Herbert H. Tsang, Min-Yuh Day, Uwe Glässer, Patricia L. Brantingham, Hsinchun Chen |
| 2010 | Identifing influential users in an online healthcare social network. Xuning Tang, Christopher C. Yang |
| 2010 | Identifying high risk crime areas using topology. Richard Frank, Andrew J. Park, Patricia L. Brantingham, Joseph Clare, Kathryn Wuschke, Mona Vajihollahi |
| 2010 | Identifying vulgar content in eMule network through text classification. Xiangtao Liu, Xueqi Cheng, Jingyuan Li, Haijun Zhai, Shuo Bai |
| 2010 | Integrated assessment modeling of energy consumption behavior and carbon emissions. Thomas F. Sanquist, Bin Shui, Heather Orr |
| 2010 | Intelligent decision support for Marine safety and Security Operations. Uwe Glässer, Piper J. Jackson, Ali Khalili Araghi, Hamed Yaghoubi Shahir |
| 2010 | Inter-Domain Routing Validator Based Spoofing Defence System. Lei Wang, Tianbing Xia, Jennifer Seberry |
| 2010 | Latent semantic analysis and keyword extraction for phishing classification. Gaston L'Huillier, Alejandro Hevia, Richard Weber, Sebastián A. Ríos |
| 2010 | Measuring behavioral trust in social networks. Sibel Adali, Robert Escriva, Mark K. Goldberg, Mykola Hayvanovych, Malik Magdon-Ismail, Boleslaw K. Szymanski, William A. Wallace, Gregory Todd Williams |
| 2010 | Meta-model driven construction of Timed Influence Nets. Faisal Mansoor, Abbas K. Zaidi, Alexander H. Levis |
| 2010 | Multi-modeling of adversary behaviors. Alexander H. Levis, Lee W. Wagenhals, Abbas K. Zaidi |
| 2010 | Natural Language Processing based on Semantic inferentialism for extracting crime information from text. Vládia Pinheiro, Vasco Furtado, Tarcisio H. C. Pequeno, Douglas Nogueira |
| 2010 | Network neighborhood analysis. Michael D. Porter, Ryan Smith |
| 2010 | News mining for border security Intelligence. Martin Atkinson, Jenya Belayeva, Vanni Zavarella, Jakub Piskorski, Silja Huttunen, Arto Vihavainen, Roman Yangarber |
| 2010 | Parameterizing bayesian network representations of social-behavioral models by expert elicitation. Stephen J. Walsh, Angela Dalton, Paul Whitney, Amanda M. White |
| 2010 | Predicting social ties in mobile phone networks. Huiqi Zhang, Ram Dantu |
| 2010 | Protection of Critical National Information Infrastructure (CNII) against cyber terrorism: Development of strategy and policy framework. Zahri Yunos, Syahrul Hafidz Suid |
| 2010 | Rationalizing police patrol beats using Voronoi Tessellations. Arvind K. Verma, Ramyaa Ramyaa, Suresh Marru, Ye Fan, Raminder Singh |
| 2010 | Real time tracking of a remote moving object by active zoom cameras. Yan Gao, Xiaolin Zhang |
| 2010 | Secure communication between set-top box and smart card for fair use in DTV broadcasting. Wei-Bin Lee, Hsing-Bai Chen, Ching-Chih Cheng |
| 2010 | Similarity kernels via bi-clustering for conventional intergovernmental organizations. Minh Tam Le, John Sweeney, Edo Liberty, Steven W. Zucker |
| 2010 | Social media and social reality. William N. Reynolds, Marta S. Weber, Robert M. Farber, Courtney D. Corley, Andrew J. Cowell, Michelle L. Gregory |
| 2010 | Study of effect of node seniority in social networks. Baojun Qiu, Kristinka Ivanova, John Yen, Peng Liu |
| 2010 | Terrorist threat assessment with formal concept analysis. Paul Elzinga, Jonas Poelmans, Stijn Viaene, Guido Dedene, Shanti Morsing |
| 2010 | Testing perception of crime in a virtual environment. Andrew J. Park, Valerie Spicer, Monique Guterres, Patricia L. Brantingham, Greg Jenion |
| 2010 | Text analysis and entity extraction in asymmetric threat response and prediction. Erwin Chan, Jason Ginsburg, Brian Ten Eyck, Jerzy W. Rozenblit, Mike Dameron |
| 2010 | The U.S. and the EU differences in anti-terrorism efforts. Michael Gallagher |
| 2010 | Towards effective improvement of the Bayesian Belief Network Structure learning. Yan Tang, Kendra M. L. Cooper, João W. Cangussu, Kun Tian, Yin Wu |
| 2010 | Tweets mining using WIKIPEDIA and impurity cluster measurement. Qing Chen, Timothy Shipper, Latifur Khan |
| 2010 | Unsupervised multilingual concept discovery from daily online news extracts. Jenq-Haur Wang |
| 2010 | Workshop on current issues in predictive approaches to intelligence and security analytics. Antonio Sanfilippo |