| 2015 | 2015 IEEE International Conference on Intelligence and Security Informatics, ISI 2015, Baltimore, MD, USA, May 27-29, 2015 |
| 2015 | A bottom-up method for constructing topic hierarchies. Yuhao Zhang, Wenji Mao, Xiaochen Li |
| 2015 | A comparison of features for automatic deception detection in synchronous computer-mediated communication. Jinie Pak, Lina Zhou |
| 2015 | A new mobile payment protocol (GMPCP) by using a new key agreement protocol (GC). Mohammad Vahidalizadehdizaj, Lixin Tao |
| 2015 | A privacy protection procedure for large scale individual level data. Julius Adebayo, Lalana Kagal |
| 2015 | A statistical study of covert timing channels using network packet frequency. Fangyue Chen, Yunke Wang, Heng Song, Xiangyang Li |
| 2015 | A visual analytics approach to detecting server redirections and data exfiltration. Weijie Wang, Baijian Yang, Yingjie Victor Chen |
| 2015 | An access control resistant to shoulder-surfing. Jae-Jin Jang, Im Young Jung |
| 2015 | An opportunistic encryption extension for the DNS protocol. Theogene Hakiza Bucuti, Ram Dantu |
| 2015 | Analysis of criminal social networks with typed and directed edges. Quan Zheng, David B. Skillicorn |
| 2015 | Analyzing the social media footprint of street gangs. Sanjaya Wijeratne, Derek Doran, Amit P. Sheth, Jack L. Dustin |
| 2015 | Assessment of user home location geoinference methods. Joshua J. Harrison, Eric Bell, Court D. Corley, Chase P. Dowling, Andrew J. Cowell |
| 2015 | Base station anonymity distributed self-assessment in Wireless Sensor Networks. Jon R. Ward, Mohamed F. Younis |
| 2015 | Change detection in evolving computer networks: Changes in densification and diameter over time. Josephine M. Namayanja, Vandana Pursnani Janeja |
| 2015 | Cybersecurity for product lifecycle management a research roadmap. Elisa Bertino, Nathan W. Hartman |
| 2015 | Deception is in the eye of the communicator: Investigating pupil diameter variations in automated deception detection interviews. Jeffrey Gainer Proudfoot, Jeffrey L. Jenkins, Judee K. Burgoon, Jay F. Nunamaker Jr. |
| 2015 | Detection of financial statement fraud: Is accrual really useful as an early warning indicator? Naoto Oshiro |
| 2015 | Developing understanding of hacker language through the use of lexical semantics. Victor A. Benjamin, Hsinchun Chen |
| 2015 | Distributed LSI: Parallel preprocessing and vector sharing. Roger B. Bradford |
| 2015 | Elliptic curve cryptography in Java. Leonidas Deligiannidis |
| 2015 | Emotion extraction and entrainment in social media: The case of U.S. immigration and border security. Wingyan Chung, Saike He, Daniel Dajun Zeng, Victor A. Benjamin |
| 2015 | Empirical assessment of al qaeda, ISIS, and taliban propaganda. David B. Skillicorn |
| 2015 | Exploring hacker assets in underground forums. Sagar Samtani, Ryan Chinn, Hsinchun Chen |
| 2015 | Exploring the effect of permission notice on users' initial trust to an application store: The case of China's Android application market. Jie Gu, Heng Xu, An'an Hu, Lihua Huang |
| 2015 | Exploring threats and vulnerabilities in hacker web: Forums, IRC and carding shops. Victor A. Benjamin, Weifeng Li, Thomas Holt, Hsinchun Chen |
| 2015 | Filtering spam in Weibo using ensemble imbalanced classification and knowledge expansion. Zhipeng Jin, Qiudan Li, Daniel Zeng, Lei Wang |
| 2015 | Honeypot based unauthorized data access detection in MapReduce systems. Huseyin Ulusoy, Murat Kantarcioglu, Bhavani Thuraisingham, Latifur Khan |
| 2015 | Inferring social influence and meme interaction with Hawkes processes. Chuan Luo, Xiaolong Zheng, Daniel Zeng |
| 2015 | LECENing places to hide: Geo-mapping child exploitation material. Bryan Monk, Russell Allsup, Richard Frank |
| 2015 | Learning where to inspect: Location learning for crime prediction. Mohammad A. Tayebi, Uwe Glässer, Patricia L. Brantingham |
| 2015 | Liar, Liar, IM on Fire: Deceptive language-action cues in spontaneous online communication. Shuyuan Mary Ho, Jeffrey T. Hancock, Cheryl Booth, Xiuwen Liu, Shashanka Surya Timmarajus, Mike Burmester |
| 2015 | Linking virtual and real-world identities. Yaqoub Alsarkal, Nan Zhang, Yilu Zhou |
| 2015 | Modeling emotion entrainment of online users in emergency events. Saike He, Xiaolong Zheng, Daniel Zeng, Bo Xu, Changliang Li, Guanhua Tian, Lei Wang, Hongwei Hao |
| 2015 | Multi-granular aggregation of network flows for security analysis. Tao Ding, Ahmed Aleroud, George Karabatis |
| 2015 | Multi-objective evolutionary algorithms and multiagent models for optimizing police dispatch. Ricardo Guedes, Vasco Furtado, Tarcisio H. C. Pequeno |
| 2015 | Multivariate embedding based causaltiy detection with short time series. Chuan Luo, Daniel Zeng |
| 2015 | Nonproliferation informatics: Employing Bayesian analysis, agent based modeling, and information theory for dynamic proliferation pathway studies. Royal A. Elmore, William S. Charlton |
| 2015 | On construction of signcryption scheme for smart card security. Jayaprakash Kar, Daniyal M. Alghazzawi |
| 2015 | Online/off-line ring signature scheme with provable security. Jayaprakash Kar |
| 2015 | Pass-pic: A mobile user authentication. Garima Bajwa, Ram Dantu, Ryan Aldridge |
| 2015 | Persistent threat pattern discovery. Faisal Quader, Vandana Pursnani Janeja, Justin Stauffer |
| 2015 | Personality based public sentiment classification in microblog. Junjie Lin, Wenji Mao |
| 2015 | Positive bystanding behavior in cyberbullying: The impact of empathy on adolescents' cyber bullied support behavior. Samuel Owusu, Lina Zhou |
| 2015 | Power-function-based observation-weighting method for mining actionable behavioral rules. Peng Su, Wenji Mao |
| 2015 | Random anonymization of mobile sensor data: Modified Android framework. Cynthia L. Claiborne, Cathy C. Ncube, Ram Dantu |
| 2015 | Research on construction methods of the Shanghai cooperation organization meta-network model. Kun Wang, Duoyong Sun |
| 2015 | SPINN: Suspicion prediction in nuclear networks. Ian A. Andrews, Srijan Kumar, Francesca Spezzano, V. S. Subrahmanian |
| 2015 | Social sensor analytics: Making sense of network models in social media. Chase P. Dowling, Joshua J. Harrison, Arun V. Sathanur, Landon H. Sego, Courtney D. Corley |
| 2015 | Spectral malware behavior clustering. Chris Giannella, Eric Bloedorn |
| 2015 | The relation between microfinacing and corruption by country: An analysis of an open source dataset. Heather Roy, Sue E. Kase |
| 2015 | Unintentional bugs to vulnerability mapping in Android applications. Garima Bajwa, Mohamed Fazeen, Ram Dantu, Sonal Tanpure |