| 2013 | 2013 IEEE International Conference on Intelligence and Security Informatics, Seattle, WA, USA, June 4-7, 2013 Kristin Glass, Richard Colbaugh, Antonio Sanfilippo, Anne Kao, Michael Gabbay, Courtney D. Corley, Jiexun Li, Latifur Khan, Adam Wynne, Lisa Coote, Wenji Mao, Daniel Zeng, Ahmad Yaghoobi |
| 2013 | A generalized bio-inspired method for discovering sequence-based signatures. Elena S. Peterson, Darren S. Curtis, Aaron R. Phillips, Jeremy Teuton, Christopher S. Oehmen |
| 2013 | A graph analytic metric for mitigating advanced persistent threat. John R. Johnson, Emilie Hogan |
| 2013 | A model docking system for understanding radicalization. Lora Weiss, Erica Briscoe, Walter Wright, Sim Harbert, Keith Kline, John Horgan, Lily Cushenbery, Casey Hilland |
| 2013 | A multi-modality attributes representation scheme for Group Activity characterization and data fusion. Vinayak Elangovan, Amjad Alkilani, Amir Shirkhodaie |
| 2013 | A new pruning method for resolving conflicts in actionable behavioral rules. Peng Su, Dan Zhu, Daniel Dajun Zeng |
| 2013 | Action knowledge extraction from Web text. Ansheng Ge, Wenji Mao, Daniel Zeng, Lei Wang |
| 2013 | An interdisciplinary approach to studying and improving terrorism analysis. Donald R. Kretz, Charles W. Granderson |
| 2013 | An investigation into label fusion on sparse data. Alexander M. Venzin, Mark E. Oxley, Nathaniel Beagley |
| 2013 | Analyzing security threats as reported by the United States Computer Emergency Readiness Team (US-CERT). Yolanda S. Baker, Rajeev Agrawal, Sambit Bhattacharya |
| 2013 | Analyzing users' web surfing patterns to trace terrorists and criminals. Gabi Kedma, Mordechai Guri, Tom Sela, Yuval Elovici |
| 2013 | Anomalies in network traffic. Alan S. Ratner, Phillip Kelly |
| 2013 | Armored ads. Wesley Brandi, Brendan Kitts, Raj Mahato, Jing Ying Zhang |
| 2013 | Assessing the quality of bioforensic signatures. Landon H. Sego, Aimee E. Holmes, Luke J. Gosink, Bobbie-Jo M. Webb-Robertson, Helen W. Kreuzer, Richard M. Anderson, Alan J. Brothers, Courtney D. Corley, Mark R. Tardiff |
| 2013 | Assessment of malicious applications using permissions and enhanced user interfaces on Android. Sangho Lee, Da Young Ju |
| 2013 | Auto-Highlighter: Identifying Salient Sentences in Text. Jessica Zeitz Self, Rebecca Zeitz, Chris North, Alan L. Breitler |
| 2013 | Behavioral targeting with social regularization. Yanmin Shang, Peng Zhang, Yanan Cao, Li Guo |
| 2013 | Building a better intelligence machine: A new approach to capability review and development. Duncan Hodges, Sadie Creese |
| 2013 | Capturing human cognition in cyber-security simulations with NETS. Nicklaus A. Giacobe, Michael D. McNeese, Vincent F. Mancuso, Dev Minotra |
| 2013 | Capturing signatures of anomalous behavior in online social networks. Arun V. Sathanur, Vikram Jandhyala, Chuanjia Xing |
| 2013 | Christopher Alexander's fifteen properties: Toward developing evaluation metrics for security visualizations. Ziyad Alshaikh, Abdulrahman Alarifi, Mansour Alsaleh |
| 2013 | Click Fraud Detection with Bot Signatures. Brendan Kitts, Jing Ying Zhang, Albert Roux, Ron Mills |
| 2013 | Click fraud botnet detection by calculating mix adjusted traffic value: A method for de-cloaking click fraud attacks that is resistant to spoofing. Brendan Kitts, Jing Ying Zhang, Gang Wu, Raj Mahato |
| 2013 | Conceptual framework to enable early warning of relevant phenomena "Emerging phenomena and big data". Bob G. Schlicher, Robert K. Abercrombie, Lee M. Hively |
| 2013 | Context matters: Improving the uses of big data for forecasting civil unrest: Emerging phenomena and big data. Pedro D. Manrique, Hong Qi, Ana Morgenstern, Nicolas Velasquez, Tsai-Ching Lu, Neil F. Johnson |
| 2013 | Crime linkage: A fuzzy MCDM approach. Fabrizio Albertetti, Paul Cotofrei, Lionel Grossrieder, Olivier Ribaux, Kilian Stoffel |
| 2013 | Crowdsourcing and gamification techniques in Inspire (AQAP online magazine). Edna F. Reid |
| 2013 | Cyber friendly fire: Research challenges for security informatics. Frank L. Greitzer, Thomas E. Carroll, Adam D. Roberts |
| 2013 | Detecting collaboration from behavior. Travis L. Bauer, Daniel Garcia, Richard Colbaugh, Kristin Glass |
| 2013 | Detecting deception in interrogation settings. C. E. Lamb, David B. Skillicorn |
| 2013 | Detecting future social unrest in unprocessed Twitter data: "Emerging phenomena and big data". Ryan Compton, Craig Lee, Tsai-Ching Lu, Lalindra De Silva, Michael Macy |
| 2013 | Detecting unfolding crises with Visual Analytics and Conceptual Maps Emerging phenomena and big data. Simon F. Pratt, Philippe J. Giabbanelli, Jean-Sebastien Mercier |
| 2013 | Differences between individuals with and without experience with assault in identifying facial signs of imminent aggression. David Matsumoto, Hyisung C. Hwang |
| 2013 | Discovering seasonal patterns of smoking behavior using online search information. Zhu Zhang, Xiaolong Zheng, Daniel Dajun Zeng, Kainan Cui, Chuan Luo, Saike He, Scott Leischow |
| 2013 | Discovering the rating pattern of online reviewers through data coclustering. Jie Wang, Xuwei Liang |
| 2013 | Discovering thematic structure in political datasets. Minh Tam Le, John Sweeney, Matthew Lawlor, Steven W. Zucker |
| 2013 | Discovery of persistent threat structures through temporal and geo-spatial characterization in evolving networks. Josephine M. Namayanja, Vandana Pursnani Janeja |
| 2013 | Dynamic information-theoretic measures for security informatics. Richard Colbaugh, Kristin Glass, Travis L. Bauer |
| 2013 | Effects of Fear appeals and point of reference on the persuasiveness of IT security communications. Honglu Du, Heng Xu, Mary Beth Rosson, John M. Carroll |
| 2013 | Efficient anomaly detection in dynamic, attributed graphs: Emerging phenomena and big data. Benjamin A. Miller, Nicholas Arcolano, Nadya T. Bliss |
| 2013 | Ensemble classification over stock market time series and economy news. Sadi Evren Seker, Cihan Mert, Khaled Al-Naami, Ugur Ayan, Nuri Ozalp |
| 2013 | Evaluating text visualization: An experiment in authorship analysis. Victor A. Benjamin, Wingyan Chung, Ahmed Abbasi, Joshua Chuang, Catherine A. Larson, Hsinchun Chen |
| 2013 | Exploring the structural characteristics of social networks in a large criminal court database. Andrew A. Reid, Mohammad A. Tayebi, Richard Frank |
| 2013 | Exploring trajectory behavior model for anomaly detection in maritime moving objects. Po-Ruey Lei |
| 2013 | Flexible creation of indicators of scientific and technological emergence: Emerging phenomena and big data. Olga Babko-Malaya, Daniel Hunter, Andy Seidel, Fotios Barlos |
| 2013 | From when and what to where: Linking spatio-temporal visualizations in visual analytics. Yingjie Victor Chen, Zhenyu Cheryl Qian |
| 2013 | Gamification of emergency response training: A public health example. Irfan E. Kanat, Sathananda Siloju, T. S. Raghu, Ajay S. Vinze |
| 2013 | Graph analytics for signature discovery. Emilie Hogan, John R. Johnson, Mahantesh Halappanavar, Chaomei Lo |
| 2013 | How analysts cognitively "connect the dots". Lauren Bradel, Jessica Zeitz Self, Alex Endert, Mahmud Shahriar Hossain, Chris North, Naren Ramakrishnan |
| 2013 | How to use experience in cyber analysis: An analytical reasoning support system. Chen Zhong, Deepak S. Kirubakaran, John Yen, Peng Liu, Steve E. Hutchinson, Hasan Cam |
| 2013 | Identifying groups of interest through temporal analysis and event response monitoring. Jonathan Mugan, Eric McDermid, Abbey McGrew, Laura Hitt |
| 2013 | Identifying threatening networks from transactional data. Laura Hitt, Matt McClain |
| 2013 | Implementation of framework to identify potential phishing websites. Doowon Kim, Chaitanya Achan, Jinsuk Baek, Paul S. Fisher |
| 2013 | Improving expert judgment by coherence weighting. Kenneth C. Olson, Christopher W. Karvetski |
| 2013 | Improving supply chain security using big data. David Zage, Kristin Glass, Richard Colbaugh |
| 2013 | Information graphs of event threads: Identifying and building forward and backward event threads for societal events. James R. Johnson |
| 2013 | Information visualization metrics and methods for cyber security evaluation. John T. Langton, Alex Baker |
| 2013 | Investigating the efficacy of network visualizations for intelligence tasks. Christopher W. Berardi, Erin Treacy Solovey, Mary L. Cummings |
| 2013 | Jargon and graph modularity on twitter. Chase P. Dowling, Courtney D. Corley, Robert M. Farber, William N. Reynolds |
| 2013 | Lame' curve-based signature discovery learning technique for network traffic classification. Shan Suthaharan, Laxmi Sunkara, Sweta Keshapagu |
| 2013 | Language use in Inspire magazine. David B. Skillicorn, Edna F. Reid |
| 2013 | Layered behavioral trace modeling for threat detection. Rudolph Louis Mappus IV, Erica Briscoe |
| 2013 | Learning to classify emotional content in crisis-related tweets. Joel Brynielsson, Fredrik Johansson, Anders Westling |
| 2013 | Machine learning for attack vector identification in malicious source code. Victor A. Benjamin, Hsinchun Chen |
| 2013 | Maritime situation analysis. Hamed Yaghoubi Shahir, Uwe Glässer, Narek Nalbandyan, Hans Wehn |
| 2013 | Measuring expertise and bias in cyber security using cognitive and neuroscience approaches. Daniel C. Krawczyk, James Bartlett, Murat Kantarcioglu, Kevin W. Hamlen, Bhavani Thuraisingham |
| 2013 | Modeling and detecting anomalous topic access. Siddharth Gupta, Casey Hanson, Carl A. Gunter, Mario Frank, David M. Liebovitz, Bradley A. Malin |
| 2013 | Moving target defense for adaptive adversaries. Richard Colbaugh, Kristin Glass |
| 2013 | OCC model-based emotion extraction from online reviews. Luwen Huangfu, Wenji Mao, Daniel Zeng, Lei Wang |
| 2013 | Occupational fraud detection through visualization. Evmorfia N. Argyriou, Aikaterini A. Sotiraki, Antonios Symvonis |
| 2013 | PHYSENSE: Scalable sociological interaction models for influence estimation on online social networks. Arun V. Sathanur, Vikram Jandhyala, Chuanjia Xing |
| 2013 | Phishing detection using traffic behavior, spectral clustering, and random forests. Dave DeBarr, Venkatesh Ramanathan, Harry Wechsler |
| 2013 | Predicting user participation in social networking sites. Qingchao Kong, Wenji Mao, Daniel Zeng |
| 2013 | Reflecting on visualization for cyber security. Carrie Gates, Sophie Engle |
| 2013 | Research towards a systematic signature discovery process. Nathan A. Baker, Jonathan L. Barr, George T. Bonheyo, Cliff A. Joslyn, Kannan Krishnaswami, Mark E. Oxley, Rich Quadrel, Landon H. Sego, Mark F. Tardiff, Adam S. Wynne |
| 2013 | Saudi Arabia's response to cyber conflict: A case study of the Shamoon malware incident. Zakariya Dehlawi, Norah Abokhodair |
| 2013 | Side-view face authentication based on wavelet and random forest with subsets. Sihao Ding, Qiang Zhai, Yuan F. Zheng, Dong Xuan |
| 2013 | Signature discovery for personalized medicine. Ka Yee Yeung |
| 2013 | SociAL Sensor Analytics: Measuring phenomenology at scale. Courtney D. Corley, Chase P. Dowling, Stuart J. Rose, Taylor McKenzie |
| 2013 | Sociolect-based community detection. William N. Reynolds, William J. Salter, Robert M. Farber, Courtney D. Corley, Chase P. Dowling, William O. Beeman, Lynn Smith-Lovin, Joon Nak Choi |
| 2013 | Stealthy software: Next-generation cyber-attacks and defenses. Kevin W. Hamlen |
| 2013 | Stochastic game model for information dissemination of emergency events in social network. Li Liu, Yuanzhuo Wang, Jing Ding |
| 2013 | TALISON - Tensor analysis of social media data. Anne Kao, William Ferng, Stephen R. Poteet, Lesley Quach, Rodney Tjoelker |
| 2013 | The CommonGround visual paradigm for biosurveillance. Yarden Livnat, Elizabeth Jurrus, Adi V. Gundlapalli, Per Gestland |
| 2013 | The edge effect: Exploring high crime zones near residential neighborhoods. Justin Song, Valerie Spicer, Patricia L. Brantingham |
| 2013 | The lifecycle of Bayesian network models developed for Multi-Source Signature assessment of Nuclear Programs. Zoe N. Gastelum, Amanda M. White, Paul D. Whitney, Luke J. Gosink, Landon H. Sego |
| 2013 | Towards a network-of-networks framework for cyber security. Mahantesh Halappanavar, Sutanay Choudhury, Emilie Hogan, Peter Hui, John R. Johnson, Indrajit Ray, Lawrence B. Holder |
| 2013 | Towards task-centered network models through semantic workflows. Yolanda Gil |
| 2013 | Unsupervised ranking and characterization of differentiated clusters. Luca Cazzanti, Courosh Mehanian, Julie Penzotti, Doug Scott, Oliver Downs |
| 2013 | Use of latent semantic indexing to identify name variants in large data collections. Roger B. Bradford |
| 2013 | Visualization techniques for efficient malware detection. John Donahue, Anand Paturi, Srinivas Mukkamala |
| 2013 | Welcome message from conference co-chairs. |