The SCEAS System
Navigation Menu

Conferences in DBLP

Intelligence and Security Informatics (isi)
2007 (conf/isi/2007)

  1. David Madigan, Sushil Mittal, Fred Roberts
    Sequential Decision Making Algorithms for Port of Entry Inspection: Overcoming Computational Challenges. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:1-7 [Conf]
  2. Phillip G. Bradford, Daniel A. Ray
    Using Digital Chains of Custody on Constrained Devices to Verify Evidence. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:8-15 [Conf]
  3. Nabil R. Adam, Vandana Pursnani Janeja, Aabhas V. Paliwal, Basit Shafiq, Cedric Ulmer, Volker Gersabeck, Anne Hardy, Christof Bornhövd, Joachim Schaper
    Approach for Discovering and Handling Crisis in a Service-Oriented Environment. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:16-24 [Conf]
  4. Huizhang Shen, Jidi Zhao
    A Quick Group Decision-making Planning Method for Emergency Response. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:25-31 [Conf]
  5. Mirko Montanari, Sharad Mehrotra, Nalini Venkatasubramanian
    Architecture for an Automatic Customized Warning System. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:32-39 [Conf]
  6. Siddharth Kaza, Daning Hu, Hsinchun Chen
    Dynamic Social Network Analysis of a Dark Network: Identifying Significant Facilitators. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:40-46 [Conf]
  7. Richard M. Adler
    A Dynamic Social Network Software Platform for Counter-Terrorism Decision Support. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:47-54 [Conf]
  8. Christopher C. Yang, Tobun D. Ng
    Terrorism and Crime Related Weblog Social Network: Link, Content Analysis and Information Visualization. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:55-58 [Conf]
  9. Meytal Tubi, Rami Puzis, Yuval Elovici
    Deployment of DNIDS in Social Networks. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:59-65 [Conf]
  10. Farah Jemili, Montaceur Zaghdoud, Mohamed Ben Ahmed
    A Framework for an Adaptive Intrusion Detection System using Bayesian Network. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:66-70 [Conf]
  11. Ram Dantu, Prakash Kolan, Robert Akl, Kall Loper
    Classification of Attributes and Behavior in Risk Management Using Bayesian Networks. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:71-74 [Conf]
  12. Li Yang, Joseph M. Kizza, Alma Cemerlic, Feiqiong Liu
    Fine-Grained Reputation-based Routing in Wireless Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:75-78 [Conf]
  13. Sudarshan S. Chawathe
    Organizing Hot-Spot Police Patrol Routes. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:79-86 [Conf]
  14. Maury Mitchell, Matthew Hudnall, David Brown, David Cordes, Randy K. Smith, Allen S. Parrish
    A Host Architecture for Automobile License Plate Recognition. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:87-94 [Conf]
  15. Antonio Sanfilippo, Bob Baddeley, Christian Posse, Paul Whitney
    A Layered Dempster-Shafer Approach to Scenario Construction and Analysis. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:95-102 [Conf]
  16. Joshua Sinai
    Forecasting Terrorist Groups' Warfare: Conventional to CBRN. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:103-106 [Conf]
  17. Robert Moskovitch, Shay Pluderman, Ido Gus, Dima Stopel, Clint Feher, Yisrael Parmet, Yuval Shahar, Yuval Elovici
    Host Based Intrusion Detection using Machine Learning. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:107-114 [Conf]
  18. Bechara al Bouna, Richard Chbeir, Johel Miteran
    MCA2CM: Multimedia Context-Aware Access Control Model. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:115-123 [Conf]
  19. Sangmi Chai, Raj Sharman, Smitha Patil, Shruta Satam, H. Raghav Rao, Shambhu J. Upadhyaya
    Surface Transportation and Cyber-Infrastructure: An Exploratory Study. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:124-128 [Conf]
  20. Liang Li, Wei-Qiang Jiang, Jie Tian, Yi-Xian Yang, Cai-Ping Jiang, Zhe Wu, Xin Yang
    A Networking Identity Authentication Scheme Combining Fingerprint Coding and Identity Based Encryption. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:129-132 [Conf]
  21. Yiming Ma, Dmitri V. Kalashnikov, Ramaswamy Hariharan, Sharad Mehrotra, Nalini Venkatasubramanian, Naveen Ashish, Jay Lickfett
    On-Demand Information Portals for Disaster Situations. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:133-136 [Conf]
  22. Bijit Hore, Hojjat Jafarpour, Ramesh Jain, Shengyue Ji, Daniel Massaguer, Sharad Mehrotra, Nalini Venkatasubramanian, Utz Westermann
    Design and Implementation of a Middleware for Sentient Spaces. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:137-144 [Conf]
  23. Nazli Goharian, Alana Platt
    DOTS: Detection of Off-Topic Search via Result Clustering. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:145-151 [Conf]
  24. Tiantian Qin, Judee K. Burgoon
    An Investigation of Heuristics of Human Judgment in Detecting Deception and Potential Implications in Countering Social Engineering. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:152-159 [Conf]
  25. Hwan-Joon Choi, Mukkai S. Krishnamoorthy
    Categorization of Blogs through Similarity Analysis. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:160-165 [Conf]
  26. Wang Jingxin, Wang Zhiying, Dai Kui
    Security Event Management System based on Mobile Agent Technology. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:166-171 [Conf]
  27. Keisuke Takemori, Yutaka Miyake, Chie Ishida, Iwao Sasase
    A SOC Framework for ISP Federation and Attack Forecast by Learning Propagation Patterns. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:172-179 [Conf]
  28. Habib Ullah Baig, Farrukh Kamran
    Detection of Port and Network Scan Using Time Independent Feature Set. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:180-184 [Conf]
  29. Samuel R. Barrett
    Optimizing Sensor Placement for Intruder Detection with Genetic Algorithms. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:185-188 [Conf]
  30. Yasuaki Sakamoto, Jeffrey V. Nickerson
    Social Behavior in a Team of Autonomous Sensors. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:189-192 [Conf]
  31. Jeffrey Baumes, Mark K. Goldberg, Mykola Hayvanovych, Stephen Kelley, Malik Magdon-Ismail, Konstantin Mertsalov, William A. Wallace
    SIGHTS: A Software System for Finding Coalitions and Leaders in a Social Network. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:193-199 [Conf]
  32. Haizheng Zhang, Baojun Qiu, C. Lee Giles, Henry C. Foley, John Yen
    An LDA-based Community Structure Discovery Approach for Large-Scale Social Networks. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:200-207 [Conf]
  33. Justin Zhan
    Privacy Preserving Collaborative Data Mining. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:208- [Conf]
  34. D. B. Skillicorn
    Detecting Anomalies in Graphs. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:209-216 [Conf]
  35. Jie Wang, Jun Zhang
    Addressing Accuracy Issues in Privacy Preserving Data Mining through Matrix Factorization. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:217-220 [Conf]
  36. Shuting Xu, Shuhua Lai
    Fast Fourier Transform Based Data Perturbation Method for Privacy Protection. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:221-224 [Conf]
  37. Wayne L. Bethea, R. Scott Cost, Paul A. Frank, Frank B. Weiskopf
    Inferring Meaning and Intent of Discovered Data Sources. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:225-228 [Conf]
  38. G. Alan Wang, Siddharth Kaza, Shailesh Joshi, Kris Chang, Homa Atabakhsh, Hsinchun Chen
    The Arizona IDMatcher: A Probabilistic Identity Matching System. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:229-235 [Conf]
  39. Shenzhi Li, Christopher D. Janneck, Aditya P. Belapurkar, Murat Can Ganiz, Xiaoning Yang, Mark Dilsizian, Tianhao Wu, John M. Bright, William M. Pottenger
    Mining Higher-Order Association Rules from Distributed Named Entity Databases. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:236-243 [Conf]
  40. Cyril Onwubiko, Andrew P. Lenaghan
    Managing Security Threats and Vulnerabilities for Small to Medium Enterprises. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:244-249 [Conf]
  41. Zhe Wu, Jie Tian, Liang Li, Cai-Ping Jiang, Xin Yang
    A Secure Email System Based on Fingerprint Authentication Scheme. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:250-253 [Conf]
  42. Chuanjun Li, Latifur Khan, Bhavani M. Thuraisingham, M. Husain, Shaofei Chen, Fang Qiu
    Geospatial Data Mining for National Security: Land Cover Classification and Semantic Grouping. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:254-261 [Conf]
  43. Hyung Moo Kim, Jae Soo Yoo
    Recursive Algorithm of River and Basin Data Model based on Composite Design Pattern. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:262-265 [Conf]
  44. Leonidas Deligiannidis, Farshad Hakimpour, Amit P. Sheth
    Visualization of Events in a Spatially and Multimedia Enriched Virtual Environment. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:266-269 [Conf]
  45. Summer Adams, Ashok K. Goel
    Making Sense of VAST Data. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:270-273 [Conf]
  46. Steven R. Haynes, Jonathan A. Singel
    Knowledge Reachback for WMD Events. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:274-281 [Conf]
  47. Ahmed Abbasi, Hsinchun Chen
    Affect Intensity Analysis of Dark Web Forums. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:282-288 [Conf]
  48. Nan Zhang
    On the Communication Complexity of Privacy-Preserving Information Sharing Protocols. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:289-295 [Conf]
  49. Dawit Yimam Seid, Sharad Mehrotra
    Semantically Ranked Graph Pattern Queries for Link Analysis. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:296-299 [Conf]
  50. Yanping Zhao, Wei Lu
    An Efficient Algorithm for Content Security Filtering Based on Double-Byte. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:300-307 [Conf]
  51. Saket S. R. Mengle, Nazli Goharian, Alana Platt
    FACT: Fast Algorithm for Categorizing Text. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:308-315 [Conf]
  52. S. Appavu, R. Rajaram
    Association Rule Mining for Suspicious Email Detection: A Data Mining Approach. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:316-323 [Conf]
  53. Vladimir Estivill-Castro, Ahmed HajYasien
    Fast Private Association Rule Mining by A Protocol for Securely Sharing Distributed Data. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:324-330 [Conf]
  54. Justin Zhan
    Using Homomorphic Encryption and Digital Envelope Techniques for Privacy Preserving Collaborative Sequential Pattern Mining. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:331-334 [Conf]
  55. David D. Sulek, McClain L. Howarth, Virginia A. Ruebensaal
    Connecting the Dots: Revealing the Invisible Hand for Sharing Information. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:335-341 [Conf]
  56. Tianjun Fu, Ahmed Abbasi, Hsinchun Chen
    Interaction Coherence Analysis for Dark Web Forums. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:342-349 [Conf]
  57. Gregory A. Godfrey, John Cunningham, Tuan Tran
    A Bayesian, Nonlinear Particle Filtering Approach for Tracking the State of Terrorist Operations. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:350-355 [Conf]
  58. Matthew Edman, Fikret Sivrikaya, Bülent Yener
    A Combinatorial Approach to Measuring Anonymity. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:356-363 [Conf]
  59. Zhongjie Cui, Shuping Yao
    An Adaptive Modeling for Security Infrastructure Fault Response. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:364- [Conf]
  60. Luk Boral, Maria Disla, Shivraj Patil, Jari Williams, Joon S. Park
    Countering Insider Threats in Personal Devices. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:365- [Conf]
  61. Nasrullah Memon, David L. Hicks, Henrik Legind Larsen
    Dependence Centrality: Identifying Dependence of Nodes in Terrorist Networks. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:366- [Conf]
  62. Jenq-Haur Wang, Hung-Chi Chang
    Distributed Web Police: A Peer-to-Peer Approach to Collaborative Copy Detection. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:367- [Conf]
  63. Andreas Meissner
    Emergency Management in Australia, New Zealand and Europe - The 2006 EMANZE Survey. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:368- [Conf]
  64. Hongyuan Shi, Dov Kruger, Jeffrey V. Nickerson
    Environmental Impact on Underwater Surveillance Systems in Estuary Areas. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:369- [Conf]
  65. M. Anil Yazici, Kaan Ozbay
    Importance of Information Collection and Dissemination for Evacuation Modeling and Management. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:370- [Conf]
  66. Robert Moskovitch, Nir Nissim, Yuval Elovici
    Malicious Code Detection and Acquisition Using Active Learning. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:371- [Conf]
  67. Hsin-Min Lu, Daniel Dajun Zeng, Hsinchun Chen
    Medical Ontology-Enhanced Text Processing for Infectious Disease Informatics. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:372- [Conf]
  68. Pinar Oezden Wennerberg, Hristo Tanev, Jakub Piskorski, C. Best
    Ontology Based Analysis of Violent Events. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:373- [Conf]
  69. Irina Goldman, Samuel Barrett, Jeffrey V. Nickerson
    Optimization of Multi-Attribute Tasks for Underwater Motion of Robotic Sensor Agents. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:374- [Conf]
  70. Ji-Zhi Wang, Ying-Long Wang, Mei-Qin Wang
    Periodicity and Application for a kind of n-dimensional Arnold-type Transformation. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:375- [Conf]
  71. Wingyan Chung, G. Alan Wang
    Profiling and Visualizing Cyber-criminal Activities: A General Framework. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:376- [Conf]
  72. Ming Lei, Zijie Qi, Xiaoyan Hong, Susan V. Vrbsky
    Protecting Location Privacy with Dynamic Mac Address Exchanging in Wireless Networks. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:377- [Conf]
  73. Rebecca Cathey, Steven M. Beitzel, Eric C. Jensen, David Grossman, Ophir Frieder
    Relationally Mapping XML Queries For Scalable XML Search. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:378- [Conf]
  74. Alana Platt, Nazli Goharian
    Short Query Sequences in Misuse Detection. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:379- [Conf]
  75. Rami Puzis, Meytal Tubi, Gil Tahan, Yuval Elovici
    Simulating Threats Propagation within the NSP Infrastructure. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:380- [Conf]
  76. Antonio Badia, Jothi Ravishankar, Tulay Muezzinoglu
    Text Extraction of Spatial and Temporal Information. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:381- [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002