ISI C

92 papers

YearTitle / Authors
20132013 IEEE International Conference on Intelligence and Security Informatics, Seattle, WA, USA, June 4-7, 2013
Kristin Glass, Richard Colbaugh, Antonio Sanfilippo, Anne Kao, Michael Gabbay, Courtney D. Corley, Jiexun Li, Latifur Khan, Adam Wynne, Lisa Coote, Wenji Mao, Daniel Zeng, Ahmad Yaghoobi
2013A generalized bio-inspired method for discovering sequence-based signatures.
Elena S. Peterson, Darren S. Curtis, Aaron R. Phillips, Jeremy Teuton, Christopher S. Oehmen
2013A graph analytic metric for mitigating advanced persistent threat.
John R. Johnson, Emilie Hogan
2013A model docking system for understanding radicalization.
Lora Weiss, Erica Briscoe, Walter Wright, Sim Harbert, Keith Kline, John Horgan, Lily Cushenbery, Casey Hilland
2013A multi-modality attributes representation scheme for Group Activity characterization and data fusion.
Vinayak Elangovan, Amjad Alkilani, Amir Shirkhodaie
2013A new pruning method for resolving conflicts in actionable behavioral rules.
Peng Su, Dan Zhu, Daniel Dajun Zeng
2013Action knowledge extraction from Web text.
Ansheng Ge, Wenji Mao, Daniel Zeng, Lei Wang
2013An interdisciplinary approach to studying and improving terrorism analysis.
Donald R. Kretz, Charles W. Granderson
2013An investigation into label fusion on sparse data.
Alexander M. Venzin, Mark E. Oxley, Nathaniel Beagley
2013Analyzing security threats as reported by the United States Computer Emergency Readiness Team (US-CERT).
Yolanda S. Baker, Rajeev Agrawal, Sambit Bhattacharya
2013Analyzing users' web surfing patterns to trace terrorists and criminals.
Gabi Kedma, Mordechai Guri, Tom Sela, Yuval Elovici
2013Anomalies in network traffic.
Alan S. Ratner, Phillip Kelly
2013Armored ads.
Wesley Brandi, Brendan Kitts, Raj Mahato, Jing Ying Zhang
2013Assessing the quality of bioforensic signatures.
Landon H. Sego, Aimee E. Holmes, Luke J. Gosink, Bobbie-Jo M. Webb-Robertson, Helen W. Kreuzer, Richard M. Anderson, Alan J. Brothers, Courtney D. Corley, Mark R. Tardiff
2013Assessment of malicious applications using permissions and enhanced user interfaces on Android.
Sangho Lee, Da Young Ju
2013Auto-Highlighter: Identifying Salient Sentences in Text.
Jessica Zeitz Self, Rebecca Zeitz, Chris North, Alan L. Breitler
2013Behavioral targeting with social regularization.
Yanmin Shang, Peng Zhang, Yanan Cao, Li Guo
2013Building a better intelligence machine: A new approach to capability review and development.
Duncan Hodges, Sadie Creese
2013Capturing human cognition in cyber-security simulations with NETS.
Nicklaus A. Giacobe, Michael D. McNeese, Vincent F. Mancuso, Dev Minotra
2013Capturing signatures of anomalous behavior in online social networks.
Arun V. Sathanur, Vikram Jandhyala, Chuanjia Xing
2013Christopher Alexander's fifteen properties: Toward developing evaluation metrics for security visualizations.
Ziyad Alshaikh, Abdulrahman Alarifi, Mansour Alsaleh
2013Click Fraud Detection with Bot Signatures.
Brendan Kitts, Jing Ying Zhang, Albert Roux, Ron Mills
2013Click fraud botnet detection by calculating mix adjusted traffic value: A method for de-cloaking click fraud attacks that is resistant to spoofing.
Brendan Kitts, Jing Ying Zhang, Gang Wu, Raj Mahato
2013Conceptual framework to enable early warning of relevant phenomena "Emerging phenomena and big data".
Bob G. Schlicher, Robert K. Abercrombie, Lee M. Hively
2013Context matters: Improving the uses of big data for forecasting civil unrest: Emerging phenomena and big data.
Pedro D. Manrique, Hong Qi, Ana Morgenstern, Nicolas Velasquez, Tsai-Ching Lu, Neil F. Johnson
2013Crime linkage: A fuzzy MCDM approach.
Fabrizio Albertetti, Paul Cotofrei, Lionel Grossrieder, Olivier Ribaux, Kilian Stoffel
2013Crowdsourcing and gamification techniques in Inspire (AQAP online magazine).
Edna F. Reid
2013Cyber friendly fire: Research challenges for security informatics.
Frank L. Greitzer, Thomas E. Carroll, Adam D. Roberts
2013Detecting collaboration from behavior.
Travis L. Bauer, Daniel Garcia, Richard Colbaugh, Kristin Glass
2013Detecting deception in interrogation settings.
C. E. Lamb, David B. Skillicorn
2013Detecting future social unrest in unprocessed Twitter data: "Emerging phenomena and big data".
Ryan Compton, Craig Lee, Tsai-Ching Lu, Lalindra De Silva, Michael Macy
2013Detecting unfolding crises with Visual Analytics and Conceptual Maps Emerging phenomena and big data.
Simon F. Pratt, Philippe J. Giabbanelli, Jean-Sebastien Mercier
2013Differences between individuals with and without experience with assault in identifying facial signs of imminent aggression.
David Matsumoto, Hyisung C. Hwang
2013Discovering seasonal patterns of smoking behavior using online search information.
Zhu Zhang, Xiaolong Zheng, Daniel Dajun Zeng, Kainan Cui, Chuan Luo, Saike He, Scott Leischow
2013Discovering the rating pattern of online reviewers through data coclustering.
Jie Wang, Xuwei Liang
2013Discovering thematic structure in political datasets.
Minh Tam Le, John Sweeney, Matthew Lawlor, Steven W. Zucker
2013Discovery of persistent threat structures through temporal and geo-spatial characterization in evolving networks.
Josephine M. Namayanja, Vandana Pursnani Janeja
2013Dynamic information-theoretic measures for security informatics.
Richard Colbaugh, Kristin Glass, Travis L. Bauer
2013Effects of Fear appeals and point of reference on the persuasiveness of IT security communications.
Honglu Du, Heng Xu, Mary Beth Rosson, John M. Carroll
2013Efficient anomaly detection in dynamic, attributed graphs: Emerging phenomena and big data.
Benjamin A. Miller, Nicholas Arcolano, Nadya T. Bliss
2013Ensemble classification over stock market time series and economy news.
Sadi Evren Seker, Cihan Mert, Khaled Al-Naami, Ugur Ayan, Nuri Ozalp
2013Evaluating text visualization: An experiment in authorship analysis.
Victor A. Benjamin, Wingyan Chung, Ahmed Abbasi, Joshua Chuang, Catherine A. Larson, Hsinchun Chen
2013Exploring the structural characteristics of social networks in a large criminal court database.
Andrew A. Reid, Mohammad A. Tayebi, Richard Frank
2013Exploring trajectory behavior model for anomaly detection in maritime moving objects.
Po-Ruey Lei
2013Flexible creation of indicators of scientific and technological emergence: Emerging phenomena and big data.
Olga Babko-Malaya, Daniel Hunter, Andy Seidel, Fotios Barlos
2013From when and what to where: Linking spatio-temporal visualizations in visual analytics.
Yingjie Victor Chen, Zhenyu Cheryl Qian
2013Gamification of emergency response training: A public health example.
Irfan E. Kanat, Sathananda Siloju, T. S. Raghu, Ajay S. Vinze
2013Graph analytics for signature discovery.
Emilie Hogan, John R. Johnson, Mahantesh Halappanavar, Chaomei Lo
2013How analysts cognitively "connect the dots".
Lauren Bradel, Jessica Zeitz Self, Alex Endert, Mahmud Shahriar Hossain, Chris North, Naren Ramakrishnan
2013How to use experience in cyber analysis: An analytical reasoning support system.
Chen Zhong, Deepak S. Kirubakaran, John Yen, Peng Liu, Steve E. Hutchinson, Hasan Cam
2013Identifying groups of interest through temporal analysis and event response monitoring.
Jonathan Mugan, Eric McDermid, Abbey McGrew, Laura Hitt
2013Identifying threatening networks from transactional data.
Laura Hitt, Matt McClain
2013Implementation of framework to identify potential phishing websites.
Doowon Kim, Chaitanya Achan, Jinsuk Baek, Paul S. Fisher
2013Improving expert judgment by coherence weighting.
Kenneth C. Olson, Christopher W. Karvetski
2013Improving supply chain security using big data.
David Zage, Kristin Glass, Richard Colbaugh
2013Information graphs of event threads: Identifying and building forward and backward event threads for societal events.
James R. Johnson
2013Information visualization metrics and methods for cyber security evaluation.
John T. Langton, Alex Baker
2013Investigating the efficacy of network visualizations for intelligence tasks.
Christopher W. Berardi, Erin Treacy Solovey, Mary L. Cummings
2013Jargon and graph modularity on twitter.
Chase P. Dowling, Courtney D. Corley, Robert M. Farber, William N. Reynolds
2013Lame' curve-based signature discovery learning technique for network traffic classification.
Shan Suthaharan, Laxmi Sunkara, Sweta Keshapagu
2013Language use in Inspire magazine.
David B. Skillicorn, Edna F. Reid
2013Layered behavioral trace modeling for threat detection.
Rudolph Louis Mappus IV, Erica Briscoe
2013Learning to classify emotional content in crisis-related tweets.
Joel Brynielsson, Fredrik Johansson, Anders Westling
2013Machine learning for attack vector identification in malicious source code.
Victor A. Benjamin, Hsinchun Chen
2013Maritime situation analysis.
Hamed Yaghoubi Shahir, Uwe Glässer, Narek Nalbandyan, Hans Wehn
2013Measuring expertise and bias in cyber security using cognitive and neuroscience approaches.
Daniel C. Krawczyk, James Bartlett, Murat Kantarcioglu, Kevin W. Hamlen, Bhavani Thuraisingham
2013Modeling and detecting anomalous topic access.
Siddharth Gupta, Casey Hanson, Carl A. Gunter, Mario Frank, David M. Liebovitz, Bradley A. Malin
2013Moving target defense for adaptive adversaries.
Richard Colbaugh, Kristin Glass
2013OCC model-based emotion extraction from online reviews.
Luwen Huangfu, Wenji Mao, Daniel Zeng, Lei Wang
2013Occupational fraud detection through visualization.
Evmorfia N. Argyriou, Aikaterini A. Sotiraki, Antonios Symvonis
2013PHYSENSE: Scalable sociological interaction models for influence estimation on online social networks.
Arun V. Sathanur, Vikram Jandhyala, Chuanjia Xing
2013Phishing detection using traffic behavior, spectral clustering, and random forests.
Dave DeBarr, Venkatesh Ramanathan, Harry Wechsler
2013Predicting user participation in social networking sites.
Qingchao Kong, Wenji Mao, Daniel Zeng
2013Reflecting on visualization for cyber security.
Carrie Gates, Sophie Engle
2013Research towards a systematic signature discovery process.
Nathan A. Baker, Jonathan L. Barr, George T. Bonheyo, Cliff A. Joslyn, Kannan Krishnaswami, Mark E. Oxley, Rich Quadrel, Landon H. Sego, Mark F. Tardiff, Adam S. Wynne
2013Saudi Arabia's response to cyber conflict: A case study of the Shamoon malware incident.
Zakariya Dehlawi, Norah Abokhodair
2013Side-view face authentication based on wavelet and random forest with subsets.
Sihao Ding, Qiang Zhai, Yuan F. Zheng, Dong Xuan
2013Signature discovery for personalized medicine.
Ka Yee Yeung
2013SociAL Sensor Analytics: Measuring phenomenology at scale.
Courtney D. Corley, Chase P. Dowling, Stuart J. Rose, Taylor McKenzie
2013Sociolect-based community detection.
William N. Reynolds, William J. Salter, Robert M. Farber, Courtney D. Corley, Chase P. Dowling, William O. Beeman, Lynn Smith-Lovin, Joon Nak Choi
2013Stealthy software: Next-generation cyber-attacks and defenses.
Kevin W. Hamlen
2013Stochastic game model for information dissemination of emergency events in social network.
Li Liu, Yuanzhuo Wang, Jing Ding
2013TALISON - Tensor analysis of social media data.
Anne Kao, William Ferng, Stephen R. Poteet, Lesley Quach, Rodney Tjoelker
2013The CommonGround visual paradigm for biosurveillance.
Yarden Livnat, Elizabeth Jurrus, Adi V. Gundlapalli, Per Gestland
2013The edge effect: Exploring high crime zones near residential neighborhoods.
Justin Song, Valerie Spicer, Patricia L. Brantingham
2013The lifecycle of Bayesian network models developed for Multi-Source Signature assessment of Nuclear Programs.
Zoe N. Gastelum, Amanda M. White, Paul D. Whitney, Luke J. Gosink, Landon H. Sego
2013Towards a network-of-networks framework for cyber security.
Mahantesh Halappanavar, Sutanay Choudhury, Emilie Hogan, Peter Hui, John R. Johnson, Indrajit Ray, Lawrence B. Holder
2013Towards task-centered network models through semantic workflows.
Yolanda Gil
2013Unsupervised ranking and characterization of differentiated clusters.
Luca Cazzanti, Courosh Mehanian, Julie Penzotti, Doug Scott, Oliver Downs
2013Use of latent semantic indexing to identify name variants in large data collections.
Roger B. Bradford
2013Visualization techniques for efficient malware detection.
John Donahue, Anand Paturi, Srinivas Mukkamala
2013Welcome message from conference co-chairs.