ISI C

57 papers

YearTitle / Authors
2010A multibiometric access control architecture for continuous authentication.
Adriana Esmeraldo de Oliveira, Gustavo Henrique Matos Bezerra Motta, Leonardo Vidal Batista
2010Agent based correlation model for intrusion detection alerts.
Ayman E. Taha, Ismail Abdel Ghaffar, Ayman M. Bahaa Eldin, Hani M. K. Mahdi
2010An executive decision support system for longitudinal statistical analysis of crime and law enforcement performance crime analysis system pacific region (CASPR).
Amir H. Ghaseminejad, Paul J. Brantingham
2010Automated sensing and social network analysis in virtual worlds.
Lucas A. Overbey, Gregory McKoy, Jesse Gordon, Shannon McKitrick
2010Automatic construction of domain theory for attack planning.
Xiaochen Li, Wenji Mao, Daniel Zeng, Fei-Yue Wang
2010Automatically identifying the sources of large Internet events.
Kristin Glass, Richard Colbaugh, Max Planck
2010BI -Intelligence for the business of crime fighting.
John Warden
2010Balancing security and information sharing in intelligence databases.
Antonio Badia
2010Breadth-depth triangulation for validation of modeling and simulation of complex systems.
William N. Reynolds
2010Clustering and mapping related news about violence events on their time-lines.
Syed Toufeeq Ahmed, Sukru Tikves, Hasan Davulcu
2010Collaborative knowledge discovery & marshalling for intelligence & security applications.
Andrew J. Cowell, Russell S. Jensen, Michelle L. Gregory, Peter C. Ellis, Keith Fligg, Liam McGrath, Kelly O'Hara, Eric Belanga Bell
2010Combining System Dynamics and Bayesian Belief Networks for Socio-Technical Risk Analysis.
Zahra Mohaghegh
2010Comparing the virtual linkage intensity and real world proximity of social movements.
David Zimbra, Hsinchun Chen
2010Computational knowledge and information management in veterinary epidemiology.
Svitlana Volkova, William H. Hsu
2010Cross Entropy approach for patrol route planning in dynamic environments.
Xu Chen, Tak-Shing Peter Yum
2010Cross-level behavioral analysis for robust early intrusion detection.
Shun-Wen Hsiao, Yeali S. Sun, Meng Chang Chen, Hui Zhang
2010Desktop text mining for law enforcement.
Jonathan Brett Crawley, Gerhard Wagner
2010Developing a Dark Web collection and infrastructure for computational and social sciences.
Yulei Zhang, Shuo Zeng, Chunneng Huang, Li Fan, Ximing Yu, Yan Dang, Catherine A. Larson, Dorothy E. Denning, Nancy Roberts, Hsinchun Chen
2010Digitally signed document flexible sanitizing scheme based on bilinear maps.
Wen-Chung Kuo, Jiin-Chiou Cheng, Yen-Hung Lin, Lih-Chyau Wuu
2010Early warning analysis for social diffusion events.
Richard Colbaugh, Kristin Glass
2010Entity refinement using latent semantic indexing.
Roger B. Bradford
2010Estimating sentiment orientation in social media for intelligence monitoring and analysis.
Richard Colbaugh, Kristin Glass
2010GENIUS: A computational modeling framework for counter-terrorism planning and response.
Herbert H. Tsang, Andrew J. Park, Mengting Sun, Uwe Glässer
2010Generalizing terrorist social networks with K-nearest neighbor and edge betweeness for social network integration and privacy preservation.
Xuning Tang, Christopher C. Yang
2010Global disease surveillance using social media: HIV/AIDS content intervention in web forums.
Yungchang Ku, Chaochang Chiu, Yulei Zhang, Li Fan, Hsinchun Chen
2010HPC - privacy model for collaborative skyline processing.
Boris Y. L. Chan, Vincent Ng
2010IEEE International Conference on Intelligence and Security Informatics, ISI 2010, Vancouver, BC, Canada, May 23-26, 2010, Proceedings
Christopher C. Yang, Daniel Zeng, Ke Wang, Antonio Sanfilippo, Herbert H. Tsang, Min-Yuh Day, Uwe Glässer, Patricia L. Brantingham, Hsinchun Chen
2010Identifing influential users in an online healthcare social network.
Xuning Tang, Christopher C. Yang
2010Identifying high risk crime areas using topology.
Richard Frank, Andrew J. Park, Patricia L. Brantingham, Joseph Clare, Kathryn Wuschke, Mona Vajihollahi
2010Identifying vulgar content in eMule network through text classification.
Xiangtao Liu, Xueqi Cheng, Jingyuan Li, Haijun Zhai, Shuo Bai
2010Integrated assessment modeling of energy consumption behavior and carbon emissions.
Thomas F. Sanquist, Bin Shui, Heather Orr
2010Intelligent decision support for Marine safety and Security Operations.
Uwe Glässer, Piper J. Jackson, Ali Khalili Araghi, Hamed Yaghoubi Shahir
2010Inter-Domain Routing Validator Based Spoofing Defence System.
Lei Wang, Tianbing Xia, Jennifer Seberry
2010Latent semantic analysis and keyword extraction for phishing classification.
Gaston L'Huillier, Alejandro Hevia, Richard Weber, Sebastián A. Ríos
2010Measuring behavioral trust in social networks.
Sibel Adali, Robert Escriva, Mark K. Goldberg, Mykola Hayvanovych, Malik Magdon-Ismail, Boleslaw K. Szymanski, William A. Wallace, Gregory Todd Williams
2010Meta-model driven construction of Timed Influence Nets.
Faisal Mansoor, Abbas K. Zaidi, Alexander H. Levis
2010Multi-modeling of adversary behaviors.
Alexander H. Levis, Lee W. Wagenhals, Abbas K. Zaidi
2010Natural Language Processing based on Semantic inferentialism for extracting crime information from text.
Vládia Pinheiro, Vasco Furtado, Tarcisio H. C. Pequeno, Douglas Nogueira
2010Network neighborhood analysis.
Michael D. Porter, Ryan Smith
2010News mining for border security Intelligence.
Martin Atkinson, Jenya Belayeva, Vanni Zavarella, Jakub Piskorski, Silja Huttunen, Arto Vihavainen, Roman Yangarber
2010Parameterizing bayesian network representations of social-behavioral models by expert elicitation.
Stephen J. Walsh, Angela Dalton, Paul Whitney, Amanda M. White
2010Predicting social ties in mobile phone networks.
Huiqi Zhang, Ram Dantu
2010Protection of Critical National Information Infrastructure (CNII) against cyber terrorism: Development of strategy and policy framework.
Zahri Yunos, Syahrul Hafidz Suid
2010Rationalizing police patrol beats using Voronoi Tessellations.
Arvind K. Verma, Ramyaa Ramyaa, Suresh Marru, Ye Fan, Raminder Singh
2010Real time tracking of a remote moving object by active zoom cameras.
Yan Gao, Xiaolin Zhang
2010Secure communication between set-top box and smart card for fair use in DTV broadcasting.
Wei-Bin Lee, Hsing-Bai Chen, Ching-Chih Cheng
2010Similarity kernels via bi-clustering for conventional intergovernmental organizations.
Minh Tam Le, John Sweeney, Edo Liberty, Steven W. Zucker
2010Social media and social reality.
William N. Reynolds, Marta S. Weber, Robert M. Farber, Courtney D. Corley, Andrew J. Cowell, Michelle L. Gregory
2010Study of effect of node seniority in social networks.
Baojun Qiu, Kristinka Ivanova, John Yen, Peng Liu
2010Terrorist threat assessment with formal concept analysis.
Paul Elzinga, Jonas Poelmans, Stijn Viaene, Guido Dedene, Shanti Morsing
2010Testing perception of crime in a virtual environment.
Andrew J. Park, Valerie Spicer, Monique Guterres, Patricia L. Brantingham, Greg Jenion
2010Text analysis and entity extraction in asymmetric threat response and prediction.
Erwin Chan, Jason Ginsburg, Brian Ten Eyck, Jerzy W. Rozenblit, Mike Dameron
2010The U.S. and the EU differences in anti-terrorism efforts.
Michael Gallagher
2010Towards effective improvement of the Bayesian Belief Network Structure learning.
Yan Tang, Kendra M. L. Cooper, João W. Cangussu, Kun Tian, Yin Wu
2010Tweets mining using WIKIPEDIA and impurity cluster measurement.
Qing Chen, Timothy Shipper, Latifur Khan
2010Unsupervised multilingual concept discovery from daily online news extracts.
Jenq-Haur Wang
2010Workshop on current issues in predictive approaches to intelligence and security analytics.
Antonio Sanfilippo