Conferences in DBLP
Vandana Pursnani Janeja , Vijayalakshmi Atluri , Jaideep Vaidya , Nabil R. Adam Collusion Set Detection Through Outlier Discovery. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:1-13 [Conf ] John Galloway , Simeon J. Simoff Digging in the Details: A Case Study in Network Data Mining. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:14-26 [Conf ] Jeffrey Baumes , Mark K. Goldberg , Malik Magdon-Ismail Efficient Identification of Overlapping Communities. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:27-36 [Conf ] Zhen Sun , Ee-Peng Lim , Kuiyu Chang , Teng-Kwee Ong , Rohan Kumar Gunaratna Event-Driven Document Selection for Terrorism Information Extraction. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:37-48 [Conf ] Antonio Badia , Mehmed M. Kantardzic Link Analysis Tools for Intelligence and Counterterrorism. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:49-59 [Conf ] Xiaohua Hu , Illhoi Yoo , Peter Rumm , Michael Atwood Mining Candidate Viruses as Potential Bio-terrorism Weapons from Biomedical Literature. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:60-71 [Conf ] Justin Z. Zhan , Stan Matwin , LiWu Chang Private Mining of Association Rules. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:72-80 [Conf ] Rui Chen , Raj Sharman , H. Raghav Rao , Shambhu J. Upadhyaya Design Principles of Coordinated Multi-incident Emergency Response Systems. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:81-98 [Conf ] Taekyoung Kwon , Hyeonjoon Moon Multi-modal Biometrics with PKI Technologies for Border Control Applications. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:99-114 [Conf ] Ram Dantu , Prakash Kolan Risk Management Using Behavior Based Bayesian Networks. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:115-126 [Conf ] Ram Dantu , João W. Cangussu , Janos Turi Sensitivity Analysis of an Attack Containment Model. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:127-138 [Conf ] Yael Shahar Toward a Target-Specific Method of Threat Assessment. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:139-152 [Conf ] Don Radlauer Incident and Casualty Databases as a Tool for Understanding Low-Intensity Conflicts. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:153-170 [Conf ] Ke Wang , Benjamin C. M. Fung , Guozhu Dong Integrating Private Databases for Data Analysis. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:171-182 [Conf ] Ahmed Abbasi , Hsinchun Chen Applying Authorship Analysis to Arabic Web Content. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:183-197 [Conf ] Thomas O. Meservy , Matthew L. Jensen , John Kruse , Judee K. Burgoon , Jay F. Nunamaker Automatic Extraction of Deceptive Behavioral Cues from Video. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:198-208 [Conf ] Moshe Koppel , Jonathan Schler , Kfir Zigdon Automatically Determining an Anonymous Author's Native Language. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:209-217 [Conf ] Ambareen Siraj , Rayford B. Vaughn A Cognitive Model for Alert Correlation in a Distributed Environment. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:218-230 [Conf ] David B. Skillicorn Beyond Keyword Filtering for Message and Conversation Detection. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:231-243 [Conf ] Yuval Elovici , Bracha Shapira , Mark Last , Omer Zaafrany , Menahem Friedman , Moti Schneider , Abraham Kandel Content-Based Detection of Terrorists Browsing the Web Using an Advanced Terror Detection System (ATDS). [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:244-255 [Conf ] Evrim Acar , Seyit Ahmet Çamtepe , Mukkai S. Krishnamoorthy , Bülent Yener Modeling and Multiway Analysis of Chatroom Tensors. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:256-268 [Conf ] Yosef A. Solewicz , Moshe Koppel Selective Fusion for Speaker Verification in Surveillance. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:269-279 [Conf ] Joshua Sinai A New Conceptual Framework to Resolve Terrorism's Root Causes. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:280-286 [Conf ] Jialun Qin , Jennifer Jie Xu , Daning Hu , Marc Sageman , Hsinchun Chen Analyzing Terrorist Networks: A Case Study of the Global Salafi Jihad Network. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:287-304 [Conf ] David Davis , Allison Frendak-Blume , Jennifer Wheeler , Alexander E. R. Woodcock , Clarence Worrell III A Conceptual Model of Counterterrorist Operations. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:305-315 [Conf ] Peter S. Probst Measuring Success in Countering Terrorism: Problems and Pitfalls. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:316-321 [Conf ] Edna Reid , Hsinchun Chen Mapping the Contemporary Terrorism Research Domain: Researchers, Publications, and Institutions Analysis. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:322-339 [Conf ] Laura Dugan , Gary LaFree , Alex R. Piquero Testing a Rational Choice Model of Airline Hijackings. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:340-361 [Conf ] Hilmi Günes Kayacik , A. Nur Zincir-Heywood Analysis of Three Intrusion Detection System Benchmark Datasets Using Machine Learning Algorithms. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:362-367 [Conf ] Alan Gang Wang , Homa Atabakhsh , Tim Petersen , Hsinchun Chen Discovering Identity Problems: A Case Study. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:368-373 [Conf ] R. B. Bradford Efficient Discovery of New Information in Large Text Databases. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:374-380 [Conf ] Ozgur Yilmazel , Svetlana Symonenko , Niranjan Balasubramanian , Elizabeth D. Liddy Leveraging One-Class SVM and Semantic Analysis to Detect Anomalous Content. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:381-388 [Conf ] Janusz Wnek LSI-Based Taxonomy Generation: The Taxonomist System. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:389-394 [Conf ] Qing Tao , Gao-wei Wu , Fei-Yue Wang , Jue Wang Some Marginal Learning Algorithms for Unsupervised Problems. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:395-401 [Conf ] Edna Reid , Jialun Qin , Yilu Zhou , Guanpi Lai , Marc Sageman , Gabriel Weimann , Hsinchun Chen Collecting and Analyzing the Presence of Terrorists on the Web: A Case Study of Jihad Websites. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:402-411 [Conf ] Paul Jen-Hwa Hu , Daniel Dajun Zeng , Hsinchun Chen , Catherine A. Larson , Wei Chang , Chunju Tseng Evaluating an Infectious Disease Information Sharing and Analysis System. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:412-417 [Conf ] Dmitri Roussinov , Jose Antonio Robles-Flores How Question Answering Technology Helps to Locate Malevolent Online Content. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:418-421 [Conf ] Shuang Sun , John Yen Information Supply Chain: A Unified Framework for Information-Sharing. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:422-428 [Conf ] Guoray Cai , Alan M. MacEachren , Isaac Brewer , Michael D. McNeese , Rajeev Sharma , Sven Fuhrmann Map-Mediated GeoCollaborative Crisis Management. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:429-435 [Conf ] Clive Best , Erik Van der Goot , Monica de Paola Thematic Indicators Derived from World News Reports. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:436-447 [Conf ] Haifeng Li , Shuxun Wang , Weiwei Song , Quan Wen A Novel Watermarking Algorithm Based on SVD and Zernike Moments. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:448-453 [Conf ] William Zhu , Clark D. Thomborson , Fei-Yue Wang A Survey of Software Watermarking. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:454-458 [Conf ] Shuting Xu , Jun Zhang , Dianwei Han , Jie Wang Data Distortion for Privacy Protection in a Terrorist Analysis System. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:459-464 [Conf ] Lina Zhou , Simon Lutterbie Deception Across Cultures: Bottom-Up and Top-Down Approaches. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:465-470 [Conf ] Douglas P. Twitchell , Nicole Forsgren , Karl Wiers , Judee K. Burgoon , Jay F. Nunamaker Detecting Deception in Synchronous Computer-Mediated Communication Using Speech Act Profiling. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:471-478 [Conf ] Seok Won Lee , Robin A. Gandhi , Gail-Joon Ahn , Deepak S. Yavagal Active Automation of the DITSCAP. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:479-485 [Conf ] Boanerges Aleman-Meza , Phillip Burns , Matthew Eavenson , Devanand Palaniswami , Amit P. Sheth An Ontological Approach to the Document Access Problem of Insider Threat. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:486-491 [Conf ] Gregory J. Conti , Mustaque Ahamad , Robert Norback Filtering, Fusion and Dynamic Information Presentation: Towards a General Information Firewall. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:492-497 [Conf ] Pradeep Kumar , M. Venkateswara Rao , P. Radha Krishna , Raju S. Bapi , Arijit Laha Intrusion Detection System Using Sequence and Set Preserving Metric. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:498-504 [Conf ] Yufeng Chen , Yabo Dong , Dongming Lu , Yunhe Pan The Multi-fractal Nature of Worm and Normal Traffic at Individual Source Level. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:505-510 [Conf ] Dae-Ki Kang , Doug Fuller , Vasant Honavar Learning Classifiers for Misuse Detection Using a Bag of System Calls Representation. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:511-516 [Conf ] Zhengtao Xiang , Yufeng Chen , Wei Jian , Fei Yan A Jackson Network-Based Model for Quantitative Analysis of Network Security. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:517-522 [Conf ] David R. B. Stockwell , Jason T. L. Wang Biomonitoring, Phylogenetics and Anomaly Aggregation Systems. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:523-529 [Conf ] Olga Gelbart , Paul Ott , Bhagirath Narahari , Rahul Simha , Alok N. Choudhary , Joseph Zambreno CODESSEAL: Compiler/FPGA Approach to Secure Applications. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:530-535 [Conf ] Kelvin H. L. Wong , Mingchun Luo Computational Tool in Infrastructure Emergency Total Evacuation Analysis. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:536-542 [Conf ] Kripashankar Mohan , Bhagirath Narahari , Rahul Simha , Paul Ott , Alok N. Choudhary , Joseph Zambreno Performance Study of a Compiler/Hardware Approach to Embedded Systems Security. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:543-548 [Conf ] Xinjian Chen , Jie Tian , Qi Su , Xin Yang , Fei-Yue Wang A Secured Mobile Phone Based on Embedded Fingerprint Recognition Systems. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:549-553 [Conf ] Yael Shahar Connections in the World of International Terrorism. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:554-560 [Conf ] Sundri K. Khalsa Forecasting Terrorism: Indicators and Proven Analytic Techniques. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:561-566 [Conf ] Joshua Sinai Forecasting Terrorist Groups' Warfare: 'Conventional' to CBRN. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:567-570 [Conf ] Scott Tousley The Qualitative Challenge of Insurgency Informatics. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:571-578 [Conf ] Robert J. Latino The Application of PROACT® RCA to Terrorism/Counter Terrorism Related Events. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:579-589 [Conf ] Huizhang Shen , Jidi Zhao , Ying Peng A Group Decision-Support Method for Search and Rescue Based on Markov Chain. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:590-592 [Conf ] Suwimon Kooptiwoot , Muhammad Abdus Salam A New Relationship Form in Data Mining. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:593-594 [Conf ] Mihaela Bobeica , Jean-Paul Jéral , Teofilo Garcia , Clive Best A Study of "Root Causes of Conflict" Using Latent Semantic Analysis. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:595-596 [Conf ] Tiantian Qin , Judee K. Burgoon An Empirical Study on Dynamic Effects on Deception Detection. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:597-599 [Conf ] Ana Isabel Canhoto , James Backhouse Anti Money Laundering Reporting and Investigation - Sorting the Wheat from the Chaff. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:600-601 [Conf ] Robert J. Price , Anthony E. Zukas Application of Latent Semantic Indexing to Processing of Noisy Text. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:602-603 [Conf ] Nazli Goharian , Ling Ma , Chris Meyers Detecting Misuse of Information Retrieval Systems Using Data Mining Techniques. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:604-605 [Conf ] Wei Sun , Da-xin Liu Mining Schemas in Semistructured Data Using Fuzzy Decision Trees. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:606-607 [Conf ] Boyd Davis , Vivian Lord , Peyton Mason More Than a Summary: Stance-Shift Analysis. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:608-609 [Conf ] Zeng-Guang Hou Principal Component Analysis (PCA) for Data Fusion and Navigation of Mobile Robots. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:610-611 [Conf ] Daniel Dajun Zeng , Hsinchun Chen , Chunju Tseng , Catherine A. Larson , Wei Chang , Millicent Eidson , Ivan Gotham , Cecil Lynch , Michael Ascher BioPortal: Sharing and Analyzing Infectious Disease Information. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:612-613 [Conf ] Jin Zhu DIANE: Revolutionizing the Way We Collect, Analyze, and Share Information. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:614-616 [Conf ] Alan J. Demers , Johannes Gehrke , Mingsheng Hong , Mirek Riedewald Processing High-Speed Intelligence Feeds in Real-Time. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:617-618 [Conf ] Robert P. Schumaker , Hsinchun Chen Question Answer TARA: A Terrorism Activity Resource Application. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:619-620 [Conf ] Boanerges Aleman-Meza , Christian Halaschek-Wiener , Satya Sanket Sahoo , Amit P. Sheth , Ismailcem Budak Arpinar Template Based Semantic Similarity for Security Applications. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:621-622 [Conf ] Jialun Qin , Yilu Zhou , Guanpi Lai , Edna Reid , Marc Sageman , Hsinchun Chen The Dark Web Portal Project: Collecting and Analyzing the Presence of Terrorist Groups on the Web. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:623-624 [Conf ] Guanpi Lai , Fei-Yue Wang Toward an ITS Specific Knowledge Engine. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:625-626 [Conf ] Haifeng Li , Shuxun Wang , Weiwei Song , Quan Wen A Blind Image Watermarking Using for Copyright Protection and Tracing. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:627-628 [Conf ] Michael Manley , Cheri McEntee , Anthony Molet , Joon S. Park Towards an Effective Wireless Security Policy for Sensitive Organizations. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:629-630 [Conf ] Kameswari Kotapati , Peng Liu , Yan Sun , Thomas F. LaPorta A Taxonomy of Cyber Attacks on 3G Networks. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:631-633 [Conf ] Eul-Gyu Im , Yong Ho Song An Adaptive Approach to Handle DoS Attack for Web Services. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:634-635 [Conf ] Ram Dantu , João W. Cangussu An Architecture for Network Security Using Feedback Control. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:636-637 [Conf ] Beomsoo Park , Sungjin Hong , Jaewook Oh , Heejo Lee Defending a Web Browser Against Spying with Browser Helper Objects. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:638-639 [Conf ] Zhengyou Xia , Yichuan Jiang , Jian Wang Dynamic Security Service Negotiation to Ensure Security for Information Sharing on the Internet. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:640-641 [Conf ] Young-Hwan Oh , Hae-Young Bae Enhancing Spatial Database Access Control by Eliminating the Covert Topology Channel. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:642-643 [Conf ] Shiuh-Jeng Wang , Cheng-Hsing Yang Gathering Digital Evidence in Response to Information Security Incidents. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:644-645 [Conf ] William Zhu , Clark D. Thomborson On the QP Algorithm in Software Watermarking. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:646-647 [Conf ] Anirban Majumdar , Clark D. Thomborson On the Use of Opaque Predicates in Mobile Agent Code Obfuscation. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:648-649 [Conf ] Yong Ho Song , Eul-Gyu Im Secure Contents Distribution Using Flash Memory Technology. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:650-651 [Conf ] Richard A. Smith Background Use of Sensitive Information to Aid in Analysis of Non-sensitive Data on Threats and Vulnerabilities. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:652-653 [Conf ] Syed Naqvi , Michel Riguidel Securing Grid-Based Critical Infrastructures. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:654-655 [Conf ] David Zimmermann The Safety Alliance of Cushing - A Model Example of Cooperation as an Effective Counterterrorism Tool. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:656-657 [Conf ] Xiaoyan Gong , Haijun Gao A Framework for Global Monitoring and Security Assistance Based on IPv6 and Multimedia Data Mining Techniques. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:658-659 [Conf ] Shuming Tang , Haijun Gao An Agent-Based Framework for a Traffic Security Management System. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:660-661 [Conf ] Hong Qiao , Fei-Yue Wang , Xianbin Cao Application of a Decomposed Support Vector Machine Algorithm in Pedestrian Detection from a Moving Vehicle. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:662-663 [Conf ] Xianbin Cao , Hong Qiao , Fei-Yue Wang , Xinzheng Zhang Application of Cooperative Co-evolution in Pedestrian Detection Systems. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:664-665 [Conf ] Sundaram Jayakumar , Chandramohan Senthilkumar Biometric Fingerprints Based Radio Frequency Identification. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:666-668 [Conf ] Siddharth Kaza , Byron Marshall , Jennifer Jie Xu , Alan Gang Wang , Hemanth Gowda , Homa Atabakhsh , Tim Petersen , Chuck Violette , Hsinchun Chen BorderSafe: Cross-Jurisdictional Information Sharing, Analysis, and Visualization. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:669-670 [Conf ]