|
Conferences in DBLP
(paisi) 2007 (conf/paisi/2007)
- Hsinchun Chen
Exploring Extremism and Terrorism on the Web: The Dark Web Project. [Citation Graph (0, 0)][DBLP] PAISI, 2007, pp:1-20 [Conf]
- Christopher C. Yang, Tobun D. Ng, Jau-Hwang Wang, Chih-Ping Wei, Hsinchun Chen
Analyzing and Visualizing Gray Web Forum Structure. [Citation Graph (0, 0)][DBLP] PAISI, 2007, pp:21-33 [Conf]
- Yungchang Ku, Ying-Chieh Chen, Kuo-Ching Wu, Chaochang Chiu
An Empirical Analysis of Online Gaming Crime Characteristics from 2002 to 2004. [Citation Graph (0, 0)][DBLP] PAISI, 2007, pp:34-45 [Conf]
- Flora S. Tsai, Kap Luk Chan
Detecting Cyber Security Threats in Weblogs Using Probabilistic Models. [Citation Graph (0, 0)][DBLP] PAISI, 2007, pp:46-57 [Conf]
- Ickjai Lee, Reece Pershouse, Peter Phillips, Chris Christensen
What-if Emergency Management System: A Generalized Voronoi Diagram Approach. [Citation Graph (0, 0)][DBLP] PAISI, 2007, pp:58-69 [Conf]
- Yujun Zheng, Jinquan Wang, Jinyun Xue
Agent Based Framework for Emergency Rescue and Assistance Planning. [Citation Graph (0, 0)][DBLP] PAISI, 2007, pp:70-81 [Conf]
- Huimin Qian, Yaobin Mao, Jason Geng, Zhiquan Wang
Object Tracking with Self-updating Tracking Window. [Citation Graph (0, 0)][DBLP] PAISI, 2007, pp:82-93 [Conf]
- Jidi Zhao, Tao Jin, Huizhang Shen
A Case-Based Evolutionary Group Decision Support Method for Emergency Response. [Citation Graph (0, 0)][DBLP] PAISI, 2007, pp:94-104 [Conf]
- Haiguang Chen, Peng Han, Xi Zhou, Chuanshan Gao
Lightweight Anomaly Intrusion Detection in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP] PAISI, 2007, pp:105-116 [Conf]
- Li Jin, Zhengding Lu
ASITL: Adaptive Secure Interoperation Using Trust-Level. [Citation Graph (0, 0)][DBLP] PAISI, 2007, pp:117-128 [Conf]
- Zhensong Liao, Hai Jin
A RT0-Based Compliance Checker Model for Automated Trust Negotiation. [Citation Graph (0, 0)][DBLP] PAISI, 2007, pp:129-140 [Conf]
- Yang Li, Binxing Fang, Li Guo, You Chen
TCM-KNN Algorithm for Supervised Network Intrusion Detection. [Citation Graph (0, 0)][DBLP] PAISI, 2007, pp:141-151 [Conf]
- Quan Qian, Mingjun Xin
Research on Hidden Markov Model for System Call Anomaly Detection. [Citation Graph (0, 0)][DBLP] PAISI, 2007, pp:152-159 [Conf]
- Zhitang Li, Jie Lei, Li Wang, Dong Li, Yang-ming Ma
Towards Identifying True Threat from Network Security Data. [Citation Graph (0, 0)][DBLP] PAISI, 2007, pp:160-171 [Conf]
- Hyungwoo Kang, Dong Hoon Lee
Security Assessment for Application Network Services Using Fault Injection. [Citation Graph (0, 0)][DBLP] PAISI, 2007, pp:172-183 [Conf]
- Shejie Lu, Jun Li, Zhiyuan Liu, Guohua Cui
A Secure Data Transmission Protocol for Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP] PAISI, 2007, pp:184-195 [Conf]
- Xin Xu, Yongqiang Sun, Zunguo Huang
Defending DDoS Attacks Using Hidden Markov Models and Cooperative Reinforcement Learning. [Citation Graph (0, 0)][DBLP] PAISI, 2007, pp:196-207 [Conf]
- Yu Fu, Cong Jin, Chuanxiang Ma
A Novel Relational Database Watermarking Algorithm. [Citation Graph (0, 0)][DBLP] PAISI, 2007, pp:208-219 [Conf]
- Kuiyu Chang, Qi He, Ridzwan Aminuddin, Ridzwan Suri, Ee-Peng Lim
Anticipatory Event Detection for Bursty Events. [Citation Graph (0, 0)][DBLP] PAISI, 2007, pp:220-225 [Conf]
- Rong Qian, Wei Zhang, Bingru Yang
Community Detection in Scale-Free Networks Based on Hypergraph Model. [Citation Graph (0, 0)][DBLP] PAISI, 2007, pp:226-231 [Conf]
- C. X. Wei, X. B. Cao, Yan Wu Xu, Hong Qiao, Fei-Yue Wang
The Treelike Assembly Classifier for Pedestrian Detection. [Citation Graph (0, 0)][DBLP] PAISI, 2007, pp:232-237 [Conf]
- Yungchang Ku, Yuchi Chen, Chaochang Chiu
A Proposed Data Mining Approach for Internet Auction Fraud Detection. [Citation Graph (0, 0)][DBLP] PAISI, 2007, pp:238-243 [Conf]
- Chichao Lu, WenYuan Jen, Weiping Chang
Trends in Computer Crime and Cybercrime Research During the Period 1974-2006: A Bibliometric Approach. [Citation Graph (0, 0)][DBLP] PAISI, 2007, pp:244-250 [Conf]
- Yuan-Fa Chen, Sandy Yu-Lan Yeh, Kuo-Ching Wu
The Study of Government Website Information Disclosure in Taiwan. [Citation Graph (0, 0)][DBLP] PAISI, 2007, pp:251-256 [Conf]
- William Zhu
Informed Recognition in Software Watermarking. [Citation Graph (0, 0)][DBLP] PAISI, 2007, pp:257-261 [Conf]
- Jianjiang Lu, Jinpeng Wang, Yafei Zhang, Bo Zhou, Yanhui Li, Zhuang Miao
An Inference Control Algorithm for RDF(S) Repository. [Citation Graph (0, 0)][DBLP] PAISI, 2007, pp:262-268 [Conf]
- Hyun-A Park, Dong Hoon Lee, Jongin Lim, Sang Hyun Cho
PPIDS: Privacy Preserving Intrusion Detection System. [Citation Graph (0, 0)][DBLP] PAISI, 2007, pp:269-274 [Conf]
- Baowen Zhang, Jing Zhang, Ning Zhou, Mingang Chen
Evaluating the Disaster Defense Ability of Information Systems. [Citation Graph (0, 0)][DBLP] PAISI, 2007, pp:275-281 [Conf]
- Yong Deng, Jia Xiong, Ping Fu
Airline Safety Evaluation Based on Fuzzy TOPSIS. [Citation Graph (0, 0)][DBLP] PAISI, 2007, pp:282-287 [Conf]
- Mi Wen, Ling Dong, Yanfei Zheng, Kefei Chen
A Framework for Proving the Security of Data Transmission Protocols in Sensor Network. [Citation Graph (0, 0)][DBLP] PAISI, 2007, pp:288-294 [Conf]
- Leyi Shi, Chunfu Jia, Shuwang Lü, Zhenhua Liu
Port and Address Hopping for Active Cyber-Defense. [Citation Graph (0, 0)][DBLP] PAISI, 2007, pp:295-300 [Conf]
- Eul-Gyu Im, Jung Sik Kim, In Woo Noh, Hyun Jun Jang
A Hybrid Model for Worm Simulations in a Large Network. [Citation Graph (0, 0)][DBLP] PAISI, 2007, pp:301-306 [Conf]
- Daniel Dajun Zeng, Li Zhang, Donghua Wei, Fei-Yue Wang
A Web Portal for Terrorism Activities in China. [Citation Graph (0, 0)][DBLP] PAISI, 2007, pp:307-308 [Conf]
- Jau-Hwang Wang, Jiing-Long Jow, You-lu Liao, Tyan-muh Tsai, Garfield Hung
An Overview of Telemarketing Fraud Problems and Countermeasures in Taiwan. [Citation Graph (0, 0)][DBLP] PAISI, 2007, pp:309-310 [Conf]
- Qihong Liu, Changjie Tang, Shaojie Qiao, Qiwei Liu, Fenlian Wen
Mining the Core Member of Terrorist Crime Group Based on Social Network Analysis. [Citation Graph (0, 0)][DBLP] PAISI, 2007, pp:311-313 [Conf]
- Qiudan Li, Yaodong Li, Huiguang He, Guanggang Geng, Yuanping Zhu, Chunheng Wang
Providing Personalized Services for HWME System by Item-Based Collaborative Filtering. [Citation Graph (0, 0)][DBLP] PAISI, 2007, pp:314-315 [Conf]
- Yang-ming Ma, Zhitang Li, Jie Lei, Li Wang, Dong Li
An Intelligent Agent-Oriented System for Integrating Network Security Devices and Handling Large Amount of Security Events. [Citation Graph (0, 0)][DBLP] PAISI, 2007, pp:316-317 [Conf]
- Daniel Dajun Zeng, Zan Huang
Link Analysis-Based Detection of Anomalous Communication Patterns. [Citation Graph (0, 0)][DBLP] PAISI, 2007, pp:318-320 [Conf]
- Wenji Mao, Daniel Zeng, Li Zhang, Donghua Wei, Fei-Yue Wang
Social Modeling and Reasoning for Security Informatics. [Citation Graph (0, 0)][DBLP] PAISI, 2007, pp:321-322 [Conf]
- Hao Tu, Zhitang Li, Bin Liu
Detecting Botnets by Analyzing DNS Traffic. [Citation Graph (0, 0)][DBLP] PAISI, 2007, pp:323-324 [Conf]
- Young-Gab Kim, Jongin Lim
HMM-Based Approach for Evaluating Risk Propagation. [Citation Graph (0, 0)][DBLP] PAISI, 2007, pp:325-326 [Conf]
- Ki-Yoon Kim, Hyoung-Kee Choi
A Symptom-Based Taxonomy for an Early Detection of Network Attacks. [Citation Graph (0, 0)][DBLP] PAISI, 2007, pp:327-328 [Conf]
|