| 2011 | 2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011, Beijing, China, 10-12 July, 2011 |
| 2011 | A cost-based FMEA decision tool for product quality design and management. Michael H. Wang |
| 2011 | A decomposition approach to imbalanced classification. Abhishek K. Shrivastava, Junjie Cao |
| 2011 | A digraph model for risk identification and mangement in SCADA systems. Jian Guan, James H. Graham, Jeffrey L. Hieb |
| 2011 | A geographic analysis of P2P-TV viewership. Zhihong Jiang, Hui Wang, Yubao Zhang, Pei Li |
| 2011 | A nonparametric fault isolation approach through hybrid novelty score. Gulanbaier Tuerhong, Seoung Bum Kim |
| 2011 | A reliability integrated acceptance test plan for series systems whose components following exponential distributions. Xue-Jing Li, Dan Yu |
| 2011 | A tamper-proof software watermark using code encryption. Zhanyong Tang, Dingyi Fang |
| 2011 | A theoretical model to minimize the operational cost for canary-equipped electronic system's health management. Wenbin Wang, Yifang Liu, Michael G. Pecht |
| 2011 | Al Qaeda terrorist financing and technologies to track the finance network. Irina Sakharova |
| 2011 | An SIR model for violent topic diffusion in social media. Jiyoung Woo, Jaebong Son, Hsinchun Chen |
| 2011 | An extensible decision engine for Marine Safety and Security. Piper J. Jackson, Uwe Glässer, Hamed Yaghoubi Shahir, Hans Wehn |
| 2011 | An new approach for newsboy problem with fuzzy demand. Jinsong Hu, Ling Cui, Zengqiang Li, Xiaogen Hu, Haixiang Wu |
| 2011 | An optimal control algorithm based on Kalman filter for ARMA disturbances. Fangyi He |
| 2011 | Analysis of accelerated degradation test under constant stress with errors for longitudinal data. Sai-Yin Zhang, Zhong-Zhan Zhang |
| 2011 | Analysis of cyberspace security situational awareness based on fuzz reason. Haidong Xiao, Ning Chen |
| 2011 | Analyzing group communication for preventing data leakage via email. Polina Zilberman, Shlomi Dolev, Gilad Katz, Yuval Elovici, Asaf Shabtai |
| 2011 | Analyzing social media in escalating crisis situations. Il-Chul Moon, Alice H. Oh, Kathleen M. Carley |
| 2011 | Anomaly detection using weak estimators. Justin Zhan, B. John Oommen, Johanna Crisostomo |
| 2011 | Automatic behavior model selection by iterative learning and abnormality recognition. Heping Li, Jie Liu, Shuwu Zhang |
| 2011 | Bayesian reliability modeling of multi-level system with interdependent subsystems and components. Jian Liu, Jing Li, Byoung Uk Kim |
| 2011 | Boosting rank with predictable training error. Yongqing Wang, Wenji Mao, Daniel Zeng, Ning Bao |
| 2011 | Citizen-generated spatial data and information: Risks and opportunities. Peter Mooney, Huabo Sun, Padraig Corcoran, Lei Yan |
| 2011 | Clustering algorithm-based control charts. Ji Hoon Kang, Seoung Bum Kim |
| 2011 | Compiling the marine environment spectrum based on inversion satellite remote sensing data. Tai Feng Zhang, Wei Yi Zhao, Xiao-Hua Yang, Zeng Jie Cai |
| 2011 | Criminal identity resolution using social behavior and relationship attributes. Jiexun Li, G. Alan Wang |
| 2011 | Daily, seasonal, and spatial patterns of PM10 in Seoul, Korea. Kyu Jong Lee, Seoung Bum Kim, Sun-Kyoung Park |
| 2011 | Decision modeling for resilient infrastructures. Jing Gong, William A. Wallace, John E. Mitchell |
| 2011 | Design of logic processes for prognostics and health management in an avionics system. Defeng Shen, Shunong Zhang |
| 2011 | Detecting emerging topics and trends via predictive analysis of 'meme' dynamics. Richard Colbaugh, Kristin Glass |
| 2011 | Distribution rule of corrosion damage morphology parameters for aluminum alloy. Danfeng Zhang, Xiaoming Tan, Yueliang Chen |
| 2011 | Dynamic Sensitivity-Based Access Control. Amir Harel, Asaf Shabtai, Lior Rokach, Yuval Elovici |
| 2011 | Dynamic user-level affect analysis in social media: Modeling violence in the Dark Web. Shuo Zeng, Mingfeng Lin, Hsinchun Chen |
| 2011 | Empirical analysis on causal relationship between institution and economic development based on VAR method. Jinyu Yuan, Zhixing He |
| 2011 | Enabling dynamic linkage of linguistic census data at Statistics Canada (extended abstract). Arnaud Casteigts, Marie-Hélène Chomienne, Louise Bouchard, Guy-Vincent Jourdan |
| 2011 | Enhancing unlinkability in Vehicular Ad Hoc Networks. Hesiri Weerasinghe, Huirong Fu, Supeng Leng, Ye Zhu |
| 2011 | Estimating the sentiment of social media content for security informatics applications. Kristin Glass, Richard Colbaugh |
| 2011 | Extended approximate string matching algorithms to detect name aliases. Muniba Shaikh, Nasrullah Memon, Uffe Kock Wiil |
| 2011 | Extending the classification of nodes in social networks. Raymond Heatherly, Murat Kantarcioglu |
| 2011 | Extraction of expanded entity phrases. James R. (Bob) Johnson, Anita Miller, Latifur Khan, Bhavani Thuraisingham, Murat Kantarcioglu |
| 2011 | Forecasting group behavior via multiple plan recognition. Xiaochen Li, Wenji Mao, Daniel Zeng, Huachi Zhu |
| 2011 | Game analysis in international anti-terrorism strike. Ben-xian Li, Meng-Jun Li |
| 2011 | HoneyGen: An automated honeytokens generator. Maya Bercovitch, Meir Renford, Lior Hasson, Asaf Shabtai, Lior Rokach, Yuval Elovici |
| 2011 | Identification of related information of interest across free text documents. James R. (Bob) Johnson, Anita Miller, Latifur Khan, Bhavani Thuraisingham, Murat Kantarcioglu |
| 2011 | Identifying Dark Web clusters with temporal coherence analysis. Christopher C. Yang, Xuning Tang, Xiajing Gong |
| 2011 | Improving the security of the distributed enterprise data warehouse system. Yanzhen Qu, Weiwen Yang |
| 2011 | Incorporating data sources and methodologies for crime data mining. Fatih Özgül, Claus Atzenbeck, Ahmet Çelik, Zeki Erdem |
| 2011 | Integrating online social networks for enhancing reputation systems of e-commerce. Xing Fang, Justin Zhan, Nicholas Koceja, Kenneth Williams, Justin Brewton |
| 2011 | LanguageNet: A novel framework for processing unstructured text information. Pir Abdul Rasool Qureshi, Nasrullah Memon, Uffe Kock Wiil |
| 2011 | Lessons from method: A successful Electronic Medical Record (EMR) system implementation. Yun Wan, William Perry |
| 2011 | Leveraging social networks to detect anomalous insider actions in collaborative environments. You Chen, Steve Nyemba, Wen Zhang, Bradley A. Malin |
| 2011 | Lifespan and popularity measurement of online content on social networks. Beiming Sun, Vincent T. Y. Ng |
| 2011 | Logistic regression analysis for Predicting Methicillin-resistant Staphylococcus Aureus (MRSA) in-hospital mortality. Yizhen Hai, Vincent C. Cheng, Shui Yee Wong, Kwok-Leung Tsui, Kwok-Yung Yuen |
| 2011 | Managing changes with legacy security engineering processes. Edith Felix, Olivier Delande, Fabio Massacci, Federica Paci |
| 2011 | Measurement and analysis of topology and information propagation on Sina-Microblog. Pengyi Fan, Pei Li, Zhihong Jiang, Wei Li, Hui Wang |
| 2011 | Mining actionable behavioral rules from group data. Peng Su, Wenji Mao, Daniel Zeng, Huimin Zhao |
| 2011 | Multivariate process monitoring and fault identification model using decision tree learning techniques. Shuguang He, Chenghang Xiao |
| 2011 | On image similarity in the context of multimedia social computing. Chao Gao, Xin Zhang, Liang Zheng, Hui Wang |
| 2011 | On the analysis of the applications and social influence of mobile phone reading in the medium and small cities in China: Take the first pilot city Baoding for an example. Ran Zhao, Guochun Fu, Jianhui Cheng |
| 2011 | Organization of social network messages to improve understanding of an evolving crisis. Alana Platt, Cynthia Hood, Levi Citrin |
| 2011 | Preserving privacy in social network integration with τ-tolerance. Christopher C. Yang |
| 2011 | Privacy preserving two-party k-means clustering over vertically partitioned dataset. Zhenmin Lin, Jerzy W. Jaromczyk |
| 2011 | Proactive defense for evolving cyber threats. Richard Colbaugh, Kristin Glass |
| 2011 | Prognostics and health monitoring for lithium-ion battery. Yinjiao Xing, Qiang Miao, Kwok-Leung Tsui, Michael G. Pecht |
| 2011 | Publisher click fraud in the pay-per-click advertising market: Incentives and consequences. Xiarong Li, Yong Liu, Daniel Zeng |
| 2011 | Quantitative risk analysis model of integrating fuzzy fault tree with Bayesian Network. Yan Fu Wang, Min Xie, Kien Ming Ng, Yi Fei Meng |
| 2011 | Research on application of the minimum error average fitting method in computer color matching. Bingsen Zhang, Yaping Shi, HouJun Yang, Xiaojie Liu, Anling Zhang |
| 2011 | Research on government on-line information management and service. Yin-zhi Lei, Xiao-yin Zhou, Xi-peng Wei |
| 2011 | Research on numerical analysis for color matching in textile dyeing based on least square Fitting. Bingsen Zhang, Yongchang Zhang, HouJun Yang, Xiaojie Liu, Anling Zhang, Zhongwen Zhang |
| 2011 | Session-wise private data exchange in eHealth peer-to-peer database management systems. Sk. Md. Mizanur Rahman, Md. Mehedi Masud, Carlisle Adams, Hussein T. Mouftah, Atsuo Inomata |
| 2011 | Situational awareness on disruption management: A system information propagation approach. Haidong Xiao, Ning Chen, Yan Hu |
| 2011 | Solving incidents in telecommunications using a multi-agent system. Lilyam Paolino, Horacio Paggi, Fernando Alonso, Genoveva López Gómez |
| 2011 | Study on covert networks of terroristic organizations based on text analysis. Duo-Yong Sun, Shu-Quan Guo, Hai Zhang, Ben-xian Li |
| 2011 | Study on covert networks of terrorists based on interactive relationship hypothesis. Duo-Yong Sun, Shu-Quan Guo, Ben-xian Li, Xiao-Peng Liu |
| 2011 | Study on distributions of fatigue crack-nucleating particle sizes and cracks formation in aluminum alloy. Yueliang Chen, Guixue Bian, Lin Yi, Jianjun Hu |
| 2011 | Studying on influencing factors of Fretting fatigue life of aluminum alloy. Maosheng Yang, Yuquan Bi, Yueliang Chen, Li Xu |
| 2011 | Supervised term weighting for sentiment analysis. Tam T. Nguyen, Kuiyu Chang, Siu Cheung Hui |
| 2011 | Test-case generation for marine safety and security scenarios. Hamed Yaghoubi Shahir, Uwe Glässer, Piper J. Jackson, Hans Wehn |
| 2011 | The Dark Web Forum Portal: From multi-lingual to video. Hsinchun Chen, Dorothy E. Denning, Nancy Roberts, Catherine A. Larson, Ximing Yu, Chunneng Huang |
| 2011 | The Geopolitical Web: Assessing societal risk in an uncertain world. Hsinchun Chen, Catherine A. Larson, Theodore Elhourani, David Zimbra, David Ware |
| 2011 | The analysis of military intelligence early warning based on open source intelligence. Jiwei Song |
| 2011 | The construction of accounting information system under the environment of the network. Xiaoting Li, Jingfu Yang, Zishan Wang |
| 2011 | The distribution of event complexity in the British Columbia court system. Patricia L. Brantingham, Paul J. Brantingham, Amir H. Ghaseminejad |
| 2011 | The polynomial representation of Gray map on Zp2. Liu Lan-Lan, Zhou Meng |
| 2011 | The spatio-temporal generalized additive model for criminal incidents. Xiaofeng Wang, Donald E. Brown |
| 2011 | Topic discovery based on dual EM merging. Jianping Zeng, Jiangjiao Duan, Chengrong Wu |
| 2011 | Trojan characteristics analysis based on Stochastic Petri Nets. He Gao, Yuanzhuo Wang, Li Wang, Li Liu, Jinming Li, Xueqi Cheng |
| 2011 | Utilizing infrared technology to prevent terrorist attacks. Timmy Nguyen, Leonidas Deligiannidis |
| 2011 | Web content mining for alias identification: A first step towards suspect tracking. Tarique Anwar, Muhammad Abulaish, Khaled Alghathbar |
| 2011 | heteroHarvest: Harvesting information from heterogeneous sources. Pir Abdul Rasool Qureshi, Nasrullah Memon, Uffe Kock Wiil, Panagiotis Karampelas, Jose Ignacio Nieto Sancheze |