ISI C

58 papers

YearTitle / Authors
20122012 IEEE International Conference on Intelligence and Security Informatics, ISI 2012, Washington, DC, USA, June 11-14, 2012
Daniel Zeng, Lina Zhou, Bojan Cukic, G. Alan Wang, Christopher C. Yang
2012A game theory approach to deception strategy in computer mediated communication.
Hsien-Ming Chou, Lina Zhou
2012A generic cyber attack response resource risk assessment model.
Kelly Hughes, Yanzhen Qu
2012A robust evaluation of terrorist network based on node-lap degree of triads.
Wenju Li, Duoyong Sun, Ben-xian Li, Shu-Quan Guo, Ning Gu
2012A unit-circle classification algorithm to characterize back attack and normal traffic for intrusion detection.
Shan Suthaharan
2012Acquiring netizen group's opinions for modeling food safety events.
Zhangwen Tan, Wenji Mao, Daniel Zeng, Xiaochen Li, Xiuguo Bao
2012AdaBoost-based sensor fusion for credibility assessment.
Hamid Reza Alipour, Daniel Zeng, Douglas C. Derrick
2012Agile detection of framing rhetoric in social media.
Kristin Glass, Richard Colbaugh
2012An active binocular integrated system for intelligent robot vision.
Yang Song, Xiaolin Zhang
2012An efficient secure comparison protocol.
Zhenmin Lin, Jerzy W. Jaromczyk
2012An event-driven SIR model for topic diffusion in web forums.
Jiyoung Woo, Hsinchun Chen
2012Anomaly detection in spatiotemporal data in the maritime domain.
Vladimir Avram, Uwe Glässer, Hamed Yaghoubi Shahir
2012Building a web collection for online surveillance of U.S. domestic terrorism.
Wingyan Chung, Wen Tang
2012Categorizing temporal events: A case study of domestic terrorism.
Wingyan Chung
2012Click frauds and price determination models.
Xiarong Li, Daniel Zeng, Lei Wang
2012Cloud-enabled data sharing model.
Nguyen Thanh Hung, Do Hoang Giang, Wee Keong Ng, Huafei Zhu
2012Communication patterns based detection of anomalous network traffic.
Do Quoc Le, Taeyoel Jeong, H. Eduardo Roman, James Won-Ki Hong
2012Data exploitation using visual analytics.
Mohammad S. Habibi
2012Deciphering wisdom of crowds from their influenced binary decisions.
Weiyun Chen, Xin Li
2012Design and implementation of SNODSOC: Novel class detection for social network analysis.
Satyen Abrol, Latifur Khan, Vaibhav Khadilkar, Bhavani Thuraisingham, Tyrone Cadenhead
2012Detecting criminal networks: SNA models are compared to proprietary models.
Fatih Özgül, Murat Gök, Zeki Erdem, Yakup Ozal
2012Efficient mining structural motifs for biosequences with intra- and inter-block gap constraints.
Vance Chiang-Chi Liao, Ming-Syan Chen
2012Emergency decision support using an agent-based modeling approach.
Neal Wagner, Vikas Agrawal
2012Establishing a foundation for automated human credibility screening.
Jay F. Nunamaker Jr., Judee K. Burgoon, Nathan W. Twyman, Jeffrey Gainer Proudfoot, Ryan M. Schuetzler, Justin Scott Giboney
2012Evaluating an integrated forum portal for terrorist surveillance and analysis.
Paul Jen-Hwa Hu, Xing Wan, Yan Dang, Catherine A. Larson, Hsinchun Chen
2012Evaluating source trustability with data provenance: A research note.
Antonio Badia
2012Evaluation method for node importance based on node condensation in terrorism networks.
Ben-xian Li, Meng-Jun Li, Duo-Yong Sun, Jiang Li, Wenju Li
2012Exploratory experiments to identify fake websites by using features from the network stack.
Jason Koepke, Siddharth Kaza, Ahmed Abbasi
2012Extracting action knowledge in security informatics.
Ansheng Ge, Wenji Mao, Daniel Zeng, Qingchao Kong, Huachi Zhu
2012Extracting opinion explanations from Chinese online reviews.
Yuequn Li, Wenji Mao, Daniel Zeng, Luwen Huangfu, Chunyang Liu
2012Extracting semantic information structures from free text law enforcement data.
James R. (Bob) Johnson, Anita Miller, Latifur Khan, Bhavani Thuraisingham
2012Graph search beyond text: Relational searches in semantic hyperlinked data.
Mark K. Goldberg, J. Greenman, Bridget Gutting, Malik Magdon-Ismail, John Schwartz, William A. Wallace
2012Identifying cliques in dark web forums - An agglomerative clustering approach.
Tarique Anwar, Muhammad Abulaish
2012Impact of anti-phishing tool performance on attack success rates.
Ahmed Abbasi, Fatemeh Zahedi, Yan Chen
2012Leveraging sociological models for prediction I: Inferring adversarial relationships.
Richard Colbaugh, Kristin Glass
2012Leveraging sociological models for prediction II: Early warning for complex contagions.
Richard Colbaugh, Kristin Glass
2012Machine learning for the automatic identification of terrorist incidents in worldwide news media.
Richard Mason, Brian James McInnis, Siddhartha R. Dalal
2012Multi-spectral face recognition: Identification of people in difficult environments.
Thirimachos Bourlai, Bojan Cukic
2012Outlier detection using semantic sensors.
David B. Skillicorn
2012Partially supervised learning for radical opinion identification in hate group web forums.
Ming Yang, Hsinchun Chen
2012Payment card fraud: Challenges and solutions.
Irina Sakharova
2012Phishing website detection using Latent Dirichlet Allocation and AdaBoost.
Venkatesh Ramanathan, Harry Wechsler
2012Police patrol district design using agent-based simulation and GIS.
Yue Zhang, Donald E. Brown
2012Predictive defense against evolving adversaries.
Richard Colbaugh, Kristin Glass
2012Preserving privacy for moving objects data mining.
Shen-Shyang Ho
2012Ranking documents by internal variability.
David B. Skillicorn, P. K. Chandrasekaran
2012Rebel with many causes: A computational model of insurgency.
Simon F. Pratt, Philippe J. Giabbanelli, Piper J. Jackson, Vijay Kumar Mago
2012Research note: Concept to develop a software-based counter-terrorism campaign decision support tool.
Joshua Sinai
2012Scalable sentiment classification across multiple Dark Web Forums.
David Zimbra, Hsinchun Chen
2012Securing cyberspace: Identifying key actors in hacker communities.
Victor A. Benjamin, Hsinchun Chen
2012Spatio-temporal modeling of criminal incidents using geographic, demographic, and twitter-derived information.
Xiaofeng Wang, Donald E. Brown, Matthew S. Gerber
2012Structural analysis of online criminal social networks.
Michael Yip, Nigel Shadbolt, Craig Webber
2012Structural inference in political science datasets.
Minh Tam Le, John Sweeney, Bruce M. Russett, Steven W. Zucker
2012Towards cyber operations - The new role of academic cyber security research and education.
Jan Kallberg, Bhavani Thuraisingham
2012Unsupervised incremental sequence learning for insider threat detection.
Pallabi Parveen, Bhavani Thuraisingham
2012Using burst detection techniques to identify suspicious vehicular traffic at border crossings.
Siddharth Kaza, Hsin-Min Lu, Daniel Zeng, Hsinchun Chen
2012Using semantic networks to counter cyber threats.
Peng He, George Karabatis
2012Vectors of extremism across the Canada-US border.
Christian Leuprecht, Todd Hataley, David B. Skillicorn