The SCEAS System
Navigation Menu

Conferences in DBLP

(paisi)
2007 (conf/paisi/2007)

  1. Hsinchun Chen
    Exploring Extremism and Terrorism on the Web: The Dark Web Project. [Citation Graph (0, 0)][DBLP]
    PAISI, 2007, pp:1-20 [Conf]
  2. Christopher C. Yang, Tobun D. Ng, Jau-Hwang Wang, Chih-Ping Wei, Hsinchun Chen
    Analyzing and Visualizing Gray Web Forum Structure. [Citation Graph (0, 0)][DBLP]
    PAISI, 2007, pp:21-33 [Conf]
  3. Yungchang Ku, Ying-Chieh Chen, Kuo-Ching Wu, Chaochang Chiu
    An Empirical Analysis of Online Gaming Crime Characteristics from 2002 to 2004. [Citation Graph (0, 0)][DBLP]
    PAISI, 2007, pp:34-45 [Conf]
  4. Flora S. Tsai, Kap Luk Chan
    Detecting Cyber Security Threats in Weblogs Using Probabilistic Models. [Citation Graph (0, 0)][DBLP]
    PAISI, 2007, pp:46-57 [Conf]
  5. Ickjai Lee, Reece Pershouse, Peter Phillips, Chris Christensen
    What-if Emergency Management System: A Generalized Voronoi Diagram Approach. [Citation Graph (0, 0)][DBLP]
    PAISI, 2007, pp:58-69 [Conf]
  6. Yujun Zheng, Jinquan Wang, Jinyun Xue
    Agent Based Framework for Emergency Rescue and Assistance Planning. [Citation Graph (0, 0)][DBLP]
    PAISI, 2007, pp:70-81 [Conf]
  7. Huimin Qian, Yaobin Mao, Jason Geng, Zhiquan Wang
    Object Tracking with Self-updating Tracking Window. [Citation Graph (0, 0)][DBLP]
    PAISI, 2007, pp:82-93 [Conf]
  8. Jidi Zhao, Tao Jin, Huizhang Shen
    A Case-Based Evolutionary Group Decision Support Method for Emergency Response. [Citation Graph (0, 0)][DBLP]
    PAISI, 2007, pp:94-104 [Conf]
  9. Haiguang Chen, Peng Han, Xi Zhou, Chuanshan Gao
    Lightweight Anomaly Intrusion Detection in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    PAISI, 2007, pp:105-116 [Conf]
  10. Li Jin, Zhengding Lu
    ASITL: Adaptive Secure Interoperation Using Trust-Level. [Citation Graph (0, 0)][DBLP]
    PAISI, 2007, pp:117-128 [Conf]
  11. Zhensong Liao, Hai Jin
    A RT0-Based Compliance Checker Model for Automated Trust Negotiation. [Citation Graph (0, 0)][DBLP]
    PAISI, 2007, pp:129-140 [Conf]
  12. Yang Li, Binxing Fang, Li Guo, You Chen
    TCM-KNN Algorithm for Supervised Network Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    PAISI, 2007, pp:141-151 [Conf]
  13. Quan Qian, Mingjun Xin
    Research on Hidden Markov Model for System Call Anomaly Detection. [Citation Graph (0, 0)][DBLP]
    PAISI, 2007, pp:152-159 [Conf]
  14. Zhitang Li, Jie Lei, Li Wang, Dong Li, Yang-ming Ma
    Towards Identifying True Threat from Network Security Data. [Citation Graph (0, 0)][DBLP]
    PAISI, 2007, pp:160-171 [Conf]
  15. Hyungwoo Kang, Dong Hoon Lee
    Security Assessment for Application Network Services Using Fault Injection. [Citation Graph (0, 0)][DBLP]
    PAISI, 2007, pp:172-183 [Conf]
  16. Shejie Lu, Jun Li, Zhiyuan Liu, Guohua Cui
    A Secure Data Transmission Protocol for Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    PAISI, 2007, pp:184-195 [Conf]
  17. Xin Xu, Yongqiang Sun, Zunguo Huang
    Defending DDoS Attacks Using Hidden Markov Models and Cooperative Reinforcement Learning. [Citation Graph (0, 0)][DBLP]
    PAISI, 2007, pp:196-207 [Conf]
  18. Yu Fu, Cong Jin, Chuanxiang Ma
    A Novel Relational Database Watermarking Algorithm. [Citation Graph (0, 0)][DBLP]
    PAISI, 2007, pp:208-219 [Conf]
  19. Kuiyu Chang, Qi He, Ridzwan Aminuddin, Ridzwan Suri, Ee-Peng Lim
    Anticipatory Event Detection for Bursty Events. [Citation Graph (0, 0)][DBLP]
    PAISI, 2007, pp:220-225 [Conf]
  20. Rong Qian, Wei Zhang, Bingru Yang
    Community Detection in Scale-Free Networks Based on Hypergraph Model. [Citation Graph (0, 0)][DBLP]
    PAISI, 2007, pp:226-231 [Conf]
  21. C. X. Wei, X. B. Cao, Yan Wu Xu, Hong Qiao, Fei-Yue Wang
    The Treelike Assembly Classifier for Pedestrian Detection. [Citation Graph (0, 0)][DBLP]
    PAISI, 2007, pp:232-237 [Conf]
  22. Yungchang Ku, Yuchi Chen, Chaochang Chiu
    A Proposed Data Mining Approach for Internet Auction Fraud Detection. [Citation Graph (0, 0)][DBLP]
    PAISI, 2007, pp:238-243 [Conf]
  23. Chichao Lu, WenYuan Jen, Weiping Chang
    Trends in Computer Crime and Cybercrime Research During the Period 1974-2006: A Bibliometric Approach. [Citation Graph (0, 0)][DBLP]
    PAISI, 2007, pp:244-250 [Conf]
  24. Yuan-Fa Chen, Sandy Yu-Lan Yeh, Kuo-Ching Wu
    The Study of Government Website Information Disclosure in Taiwan. [Citation Graph (0, 0)][DBLP]
    PAISI, 2007, pp:251-256 [Conf]
  25. William Zhu
    Informed Recognition in Software Watermarking. [Citation Graph (0, 0)][DBLP]
    PAISI, 2007, pp:257-261 [Conf]
  26. Jianjiang Lu, Jinpeng Wang, Yafei Zhang, Bo Zhou, Yanhui Li, Zhuang Miao
    An Inference Control Algorithm for RDF(S) Repository. [Citation Graph (0, 0)][DBLP]
    PAISI, 2007, pp:262-268 [Conf]
  27. Hyun-A Park, Dong Hoon Lee, Jongin Lim, Sang Hyun Cho
    PPIDS: Privacy Preserving Intrusion Detection System. [Citation Graph (0, 0)][DBLP]
    PAISI, 2007, pp:269-274 [Conf]
  28. Baowen Zhang, Jing Zhang, Ning Zhou, Mingang Chen
    Evaluating the Disaster Defense Ability of Information Systems. [Citation Graph (0, 0)][DBLP]
    PAISI, 2007, pp:275-281 [Conf]
  29. Yong Deng, Jia Xiong, Ping Fu
    Airline Safety Evaluation Based on Fuzzy TOPSIS. [Citation Graph (0, 0)][DBLP]
    PAISI, 2007, pp:282-287 [Conf]
  30. Mi Wen, Ling Dong, Yanfei Zheng, Kefei Chen
    A Framework for Proving the Security of Data Transmission Protocols in Sensor Network. [Citation Graph (0, 0)][DBLP]
    PAISI, 2007, pp:288-294 [Conf]
  31. Leyi Shi, Chunfu Jia, Shuwang Lü, Zhenhua Liu
    Port and Address Hopping for Active Cyber-Defense. [Citation Graph (0, 0)][DBLP]
    PAISI, 2007, pp:295-300 [Conf]
  32. Eul-Gyu Im, Jung Sik Kim, In Woo Noh, Hyun Jun Jang
    A Hybrid Model for Worm Simulations in a Large Network. [Citation Graph (0, 0)][DBLP]
    PAISI, 2007, pp:301-306 [Conf]
  33. Daniel Dajun Zeng, Li Zhang, Donghua Wei, Fei-Yue Wang
    A Web Portal for Terrorism Activities in China. [Citation Graph (0, 0)][DBLP]
    PAISI, 2007, pp:307-308 [Conf]
  34. Jau-Hwang Wang, Jiing-Long Jow, You-lu Liao, Tyan-muh Tsai, Garfield Hung
    An Overview of Telemarketing Fraud Problems and Countermeasures in Taiwan. [Citation Graph (0, 0)][DBLP]
    PAISI, 2007, pp:309-310 [Conf]
  35. Qihong Liu, Changjie Tang, Shaojie Qiao, Qiwei Liu, Fenlian Wen
    Mining the Core Member of Terrorist Crime Group Based on Social Network Analysis. [Citation Graph (0, 0)][DBLP]
    PAISI, 2007, pp:311-313 [Conf]
  36. Qiudan Li, Yaodong Li, Huiguang He, Guanggang Geng, Yuanping Zhu, Chunheng Wang
    Providing Personalized Services for HWME System by Item-Based Collaborative Filtering. [Citation Graph (0, 0)][DBLP]
    PAISI, 2007, pp:314-315 [Conf]
  37. Yang-ming Ma, Zhitang Li, Jie Lei, Li Wang, Dong Li
    An Intelligent Agent-Oriented System for Integrating Network Security Devices and Handling Large Amount of Security Events. [Citation Graph (0, 0)][DBLP]
    PAISI, 2007, pp:316-317 [Conf]
  38. Daniel Dajun Zeng, Zan Huang
    Link Analysis-Based Detection of Anomalous Communication Patterns. [Citation Graph (0, 0)][DBLP]
    PAISI, 2007, pp:318-320 [Conf]
  39. Wenji Mao, Daniel Zeng, Li Zhang, Donghua Wei, Fei-Yue Wang
    Social Modeling and Reasoning for Security Informatics. [Citation Graph (0, 0)][DBLP]
    PAISI, 2007, pp:321-322 [Conf]
  40. Hao Tu, Zhitang Li, Bin Liu
    Detecting Botnets by Analyzing DNS Traffic. [Citation Graph (0, 0)][DBLP]
    PAISI, 2007, pp:323-324 [Conf]
  41. Young-Gab Kim, Jongin Lim
    HMM-Based Approach for Evaluating Risk Propagation. [Citation Graph (0, 0)][DBLP]
    PAISI, 2007, pp:325-326 [Conf]
  42. Ki-Yoon Kim, Hyoung-Kee Choi
    A Symptom-Based Taxonomy for an Early Detection of Network Attacks. [Citation Graph (0, 0)][DBLP]
    PAISI, 2007, pp:327-328 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002