| 2012 | 2012 IEEE International Conference on Intelligence and Security Informatics, ISI 2012, Washington, DC, USA, June 11-14, 2012 Daniel Zeng, Lina Zhou, Bojan Cukic, G. Alan Wang, Christopher C. Yang |
| 2012 | A game theory approach to deception strategy in computer mediated communication. Hsien-Ming Chou, Lina Zhou |
| 2012 | A generic cyber attack response resource risk assessment model. Kelly Hughes, Yanzhen Qu |
| 2012 | A robust evaluation of terrorist network based on node-lap degree of triads. Wenju Li, Duoyong Sun, Ben-xian Li, Shu-Quan Guo, Ning Gu |
| 2012 | A unit-circle classification algorithm to characterize back attack and normal traffic for intrusion detection. Shan Suthaharan |
| 2012 | Acquiring netizen group's opinions for modeling food safety events. Zhangwen Tan, Wenji Mao, Daniel Zeng, Xiaochen Li, Xiuguo Bao |
| 2012 | AdaBoost-based sensor fusion for credibility assessment. Hamid Reza Alipour, Daniel Zeng, Douglas C. Derrick |
| 2012 | Agile detection of framing rhetoric in social media. Kristin Glass, Richard Colbaugh |
| 2012 | An active binocular integrated system for intelligent robot vision. Yang Song, Xiaolin Zhang |
| 2012 | An efficient secure comparison protocol. Zhenmin Lin, Jerzy W. Jaromczyk |
| 2012 | An event-driven SIR model for topic diffusion in web forums. Jiyoung Woo, Hsinchun Chen |
| 2012 | Anomaly detection in spatiotemporal data in the maritime domain. Vladimir Avram, Uwe Glässer, Hamed Yaghoubi Shahir |
| 2012 | Building a web collection for online surveillance of U.S. domestic terrorism. Wingyan Chung, Wen Tang |
| 2012 | Categorizing temporal events: A case study of domestic terrorism. Wingyan Chung |
| 2012 | Click frauds and price determination models. Xiarong Li, Daniel Zeng, Lei Wang |
| 2012 | Cloud-enabled data sharing model. Nguyen Thanh Hung, Do Hoang Giang, Wee Keong Ng, Huafei Zhu |
| 2012 | Communication patterns based detection of anomalous network traffic. Do Quoc Le, Taeyoel Jeong, H. Eduardo Roman, James Won-Ki Hong |
| 2012 | Data exploitation using visual analytics. Mohammad S. Habibi |
| 2012 | Deciphering wisdom of crowds from their influenced binary decisions. Weiyun Chen, Xin Li |
| 2012 | Design and implementation of SNODSOC: Novel class detection for social network analysis. Satyen Abrol, Latifur Khan, Vaibhav Khadilkar, Bhavani Thuraisingham, Tyrone Cadenhead |
| 2012 | Detecting criminal networks: SNA models are compared to proprietary models. Fatih Özgül, Murat Gök, Zeki Erdem, Yakup Ozal |
| 2012 | Efficient mining structural motifs for biosequences with intra- and inter-block gap constraints. Vance Chiang-Chi Liao, Ming-Syan Chen |
| 2012 | Emergency decision support using an agent-based modeling approach. Neal Wagner, Vikas Agrawal |
| 2012 | Establishing a foundation for automated human credibility screening. Jay F. Nunamaker Jr., Judee K. Burgoon, Nathan W. Twyman, Jeffrey Gainer Proudfoot, Ryan M. Schuetzler, Justin Scott Giboney |
| 2012 | Evaluating an integrated forum portal for terrorist surveillance and analysis. Paul Jen-Hwa Hu, Xing Wan, Yan Dang, Catherine A. Larson, Hsinchun Chen |
| 2012 | Evaluating source trustability with data provenance: A research note. Antonio Badia |
| 2012 | Evaluation method for node importance based on node condensation in terrorism networks. Ben-xian Li, Meng-Jun Li, Duo-Yong Sun, Jiang Li, Wenju Li |
| 2012 | Exploratory experiments to identify fake websites by using features from the network stack. Jason Koepke, Siddharth Kaza, Ahmed Abbasi |
| 2012 | Extracting action knowledge in security informatics. Ansheng Ge, Wenji Mao, Daniel Zeng, Qingchao Kong, Huachi Zhu |
| 2012 | Extracting opinion explanations from Chinese online reviews. Yuequn Li, Wenji Mao, Daniel Zeng, Luwen Huangfu, Chunyang Liu |
| 2012 | Extracting semantic information structures from free text law enforcement data. James R. (Bob) Johnson, Anita Miller, Latifur Khan, Bhavani Thuraisingham |
| 2012 | Graph search beyond text: Relational searches in semantic hyperlinked data. Mark K. Goldberg, J. Greenman, Bridget Gutting, Malik Magdon-Ismail, John Schwartz, William A. Wallace |
| 2012 | Identifying cliques in dark web forums - An agglomerative clustering approach. Tarique Anwar, Muhammad Abulaish |
| 2012 | Impact of anti-phishing tool performance on attack success rates. Ahmed Abbasi, Fatemeh Zahedi, Yan Chen |
| 2012 | Leveraging sociological models for prediction I: Inferring adversarial relationships. Richard Colbaugh, Kristin Glass |
| 2012 | Leveraging sociological models for prediction II: Early warning for complex contagions. Richard Colbaugh, Kristin Glass |
| 2012 | Machine learning for the automatic identification of terrorist incidents in worldwide news media. Richard Mason, Brian James McInnis, Siddhartha R. Dalal |
| 2012 | Multi-spectral face recognition: Identification of people in difficult environments. Thirimachos Bourlai, Bojan Cukic |
| 2012 | Outlier detection using semantic sensors. David B. Skillicorn |
| 2012 | Partially supervised learning for radical opinion identification in hate group web forums. Ming Yang, Hsinchun Chen |
| 2012 | Payment card fraud: Challenges and solutions. Irina Sakharova |
| 2012 | Phishing website detection using Latent Dirichlet Allocation and AdaBoost. Venkatesh Ramanathan, Harry Wechsler |
| 2012 | Police patrol district design using agent-based simulation and GIS. Yue Zhang, Donald E. Brown |
| 2012 | Predictive defense against evolving adversaries. Richard Colbaugh, Kristin Glass |
| 2012 | Preserving privacy for moving objects data mining. Shen-Shyang Ho |
| 2012 | Ranking documents by internal variability. David B. Skillicorn, P. K. Chandrasekaran |
| 2012 | Rebel with many causes: A computational model of insurgency. Simon F. Pratt, Philippe J. Giabbanelli, Piper J. Jackson, Vijay Kumar Mago |
| 2012 | Research note: Concept to develop a software-based counter-terrorism campaign decision support tool. Joshua Sinai |
| 2012 | Scalable sentiment classification across multiple Dark Web Forums. David Zimbra, Hsinchun Chen |
| 2012 | Securing cyberspace: Identifying key actors in hacker communities. Victor A. Benjamin, Hsinchun Chen |
| 2012 | Spatio-temporal modeling of criminal incidents using geographic, demographic, and twitter-derived information. Xiaofeng Wang, Donald E. Brown, Matthew S. Gerber |
| 2012 | Structural analysis of online criminal social networks. Michael Yip, Nigel Shadbolt, Craig Webber |
| 2012 | Structural inference in political science datasets. Minh Tam Le, John Sweeney, Bruce M. Russett, Steven W. Zucker |
| 2012 | Towards cyber operations - The new role of academic cyber security research and education. Jan Kallberg, Bhavani Thuraisingham |
| 2012 | Unsupervised incremental sequence learning for insider threat detection. Pallabi Parveen, Bhavani Thuraisingham |
| 2012 | Using burst detection techniques to identify suspicious vehicular traffic at border crossings. Siddharth Kaza, Hsin-Min Lu, Daniel Zeng, Hsinchun Chen |
| 2012 | Using semantic networks to counter cyber threats. Peng He, George Karabatis |
| 2012 | Vectors of extremism across the Canada-US border. Christian Leuprecht, Todd Hataley, David B. Skillicorn |