ISI C

51 papers

YearTitle / Authors
20152015 IEEE International Conference on Intelligence and Security Informatics, ISI 2015, Baltimore, MD, USA, May 27-29, 2015
2015A bottom-up method for constructing topic hierarchies.
Yuhao Zhang, Wenji Mao, Xiaochen Li
2015A comparison of features for automatic deception detection in synchronous computer-mediated communication.
Jinie Pak, Lina Zhou
2015A new mobile payment protocol (GMPCP) by using a new key agreement protocol (GC).
Mohammad Vahidalizadehdizaj, Lixin Tao
2015A privacy protection procedure for large scale individual level data.
Julius Adebayo, Lalana Kagal
2015A statistical study of covert timing channels using network packet frequency.
Fangyue Chen, Yunke Wang, Heng Song, Xiangyang Li
2015A visual analytics approach to detecting server redirections and data exfiltration.
Weijie Wang, Baijian Yang, Yingjie Victor Chen
2015An access control resistant to shoulder-surfing.
Jae-Jin Jang, Im Young Jung
2015An opportunistic encryption extension for the DNS protocol.
Theogene Hakiza Bucuti, Ram Dantu
2015Analysis of criminal social networks with typed and directed edges.
Quan Zheng, David B. Skillicorn
2015Analyzing the social media footprint of street gangs.
Sanjaya Wijeratne, Derek Doran, Amit P. Sheth, Jack L. Dustin
2015Assessment of user home location geoinference methods.
Joshua J. Harrison, Eric Bell, Court D. Corley, Chase P. Dowling, Andrew J. Cowell
2015Base station anonymity distributed self-assessment in Wireless Sensor Networks.
Jon R. Ward, Mohamed F. Younis
2015Change detection in evolving computer networks: Changes in densification and diameter over time.
Josephine M. Namayanja, Vandana Pursnani Janeja
2015Cybersecurity for product lifecycle management a research roadmap.
Elisa Bertino, Nathan W. Hartman
2015Deception is in the eye of the communicator: Investigating pupil diameter variations in automated deception detection interviews.
Jeffrey Gainer Proudfoot, Jeffrey L. Jenkins, Judee K. Burgoon, Jay F. Nunamaker Jr.
2015Detection of financial statement fraud: Is accrual really useful as an early warning indicator?
Naoto Oshiro
2015Developing understanding of hacker language through the use of lexical semantics.
Victor A. Benjamin, Hsinchun Chen
2015Distributed LSI: Parallel preprocessing and vector sharing.
Roger B. Bradford
2015Elliptic curve cryptography in Java.
Leonidas Deligiannidis
2015Emotion extraction and entrainment in social media: The case of U.S. immigration and border security.
Wingyan Chung, Saike He, Daniel Dajun Zeng, Victor A. Benjamin
2015Empirical assessment of al qaeda, ISIS, and taliban propaganda.
David B. Skillicorn
2015Exploring hacker assets in underground forums.
Sagar Samtani, Ryan Chinn, Hsinchun Chen
2015Exploring the effect of permission notice on users' initial trust to an application store: The case of China's Android application market.
Jie Gu, Heng Xu, An'an Hu, Lihua Huang
2015Exploring threats and vulnerabilities in hacker web: Forums, IRC and carding shops.
Victor A. Benjamin, Weifeng Li, Thomas Holt, Hsinchun Chen
2015Filtering spam in Weibo using ensemble imbalanced classification and knowledge expansion.
Zhipeng Jin, Qiudan Li, Daniel Zeng, Lei Wang
2015Honeypot based unauthorized data access detection in MapReduce systems.
Huseyin Ulusoy, Murat Kantarcioglu, Bhavani Thuraisingham, Latifur Khan
2015Inferring social influence and meme interaction with Hawkes processes.
Chuan Luo, Xiaolong Zheng, Daniel Zeng
2015LECENing places to hide: Geo-mapping child exploitation material.
Bryan Monk, Russell Allsup, Richard Frank
2015Learning where to inspect: Location learning for crime prediction.
Mohammad A. Tayebi, Uwe Glässer, Patricia L. Brantingham
2015Liar, Liar, IM on Fire: Deceptive language-action cues in spontaneous online communication.
Shuyuan Mary Ho, Jeffrey T. Hancock, Cheryl Booth, Xiuwen Liu, Shashanka Surya Timmarajus, Mike Burmester
2015Linking virtual and real-world identities.
Yaqoub Alsarkal, Nan Zhang, Yilu Zhou
2015Modeling emotion entrainment of online users in emergency events.
Saike He, Xiaolong Zheng, Daniel Zeng, Bo Xu, Changliang Li, Guanhua Tian, Lei Wang, Hongwei Hao
2015Multi-granular aggregation of network flows for security analysis.
Tao Ding, Ahmed Aleroud, George Karabatis
2015Multi-objective evolutionary algorithms and multiagent models for optimizing police dispatch.
Ricardo Guedes, Vasco Furtado, Tarcisio H. C. Pequeno
2015Multivariate embedding based causaltiy detection with short time series.
Chuan Luo, Daniel Zeng
2015Nonproliferation informatics: Employing Bayesian analysis, agent based modeling, and information theory for dynamic proliferation pathway studies.
Royal A. Elmore, William S. Charlton
2015On construction of signcryption scheme for smart card security.
Jayaprakash Kar, Daniyal M. Alghazzawi
2015Online/off-line ring signature scheme with provable security.
Jayaprakash Kar
2015Pass-pic: A mobile user authentication.
Garima Bajwa, Ram Dantu, Ryan Aldridge
2015Persistent threat pattern discovery.
Faisal Quader, Vandana Pursnani Janeja, Justin Stauffer
2015Personality based public sentiment classification in microblog.
Junjie Lin, Wenji Mao
2015Positive bystanding behavior in cyberbullying: The impact of empathy on adolescents' cyber bullied support behavior.
Samuel Owusu, Lina Zhou
2015Power-function-based observation-weighting method for mining actionable behavioral rules.
Peng Su, Wenji Mao
2015Random anonymization of mobile sensor data: Modified Android framework.
Cynthia L. Claiborne, Cathy C. Ncube, Ram Dantu
2015Research on construction methods of the Shanghai cooperation organization meta-network model.
Kun Wang, Duoyong Sun
2015SPINN: Suspicion prediction in nuclear networks.
Ian A. Andrews, Srijan Kumar, Francesca Spezzano, V. S. Subrahmanian
2015Social sensor analytics: Making sense of network models in social media.
Chase P. Dowling, Joshua J. Harrison, Arun V. Sathanur, Landon H. Sego, Courtney D. Corley
2015Spectral malware behavior clustering.
Chris Giannella, Eric Bloedorn
2015The relation between microfinacing and corruption by country: An analysis of an open source dataset.
Heather Roy, Sue E. Kase
2015Unintentional bugs to vulnerability mapping in Android applications.
Garima Bajwa, Mohamed Fazeen, Ram Dantu, Sonal Tanpure