The SCEAS System
Navigation Menu

Conferences in DBLP

Intelligence and Security Informatics (isi)
2005 (conf/isi/2005)

  1. Vandana Pursnani Janeja, Vijayalakshmi Atluri, Jaideep Vaidya, Nabil R. Adam
    Collusion Set Detection Through Outlier Discovery. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:1-13 [Conf]
  2. John Galloway, Simeon J. Simoff
    Digging in the Details: A Case Study in Network Data Mining. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:14-26 [Conf]
  3. Jeffrey Baumes, Mark K. Goldberg, Malik Magdon-Ismail
    Efficient Identification of Overlapping Communities. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:27-36 [Conf]
  4. Zhen Sun, Ee-Peng Lim, Kuiyu Chang, Teng-Kwee Ong, Rohan Kumar Gunaratna
    Event-Driven Document Selection for Terrorism Information Extraction. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:37-48 [Conf]
  5. Antonio Badia, Mehmed M. Kantardzic
    Link Analysis Tools for Intelligence and Counterterrorism. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:49-59 [Conf]
  6. Xiaohua Hu, Illhoi Yoo, Peter Rumm, Michael Atwood
    Mining Candidate Viruses as Potential Bio-terrorism Weapons from Biomedical Literature. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:60-71 [Conf]
  7. Justin Z. Zhan, Stan Matwin, LiWu Chang
    Private Mining of Association Rules. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:72-80 [Conf]
  8. Rui Chen, Raj Sharman, H. Raghav Rao, Shambhu J. Upadhyaya
    Design Principles of Coordinated Multi-incident Emergency Response Systems. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:81-98 [Conf]
  9. Taekyoung Kwon, Hyeonjoon Moon
    Multi-modal Biometrics with PKI Technologies for Border Control Applications. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:99-114 [Conf]
  10. Ram Dantu, Prakash Kolan
    Risk Management Using Behavior Based Bayesian Networks. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:115-126 [Conf]
  11. Ram Dantu, João W. Cangussu, Janos Turi
    Sensitivity Analysis of an Attack Containment Model. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:127-138 [Conf]
  12. Yael Shahar
    Toward a Target-Specific Method of Threat Assessment. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:139-152 [Conf]
  13. Don Radlauer
    Incident and Casualty Databases as a Tool for Understanding Low-Intensity Conflicts. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:153-170 [Conf]
  14. Ke Wang, Benjamin C. M. Fung, Guozhu Dong
    Integrating Private Databases for Data Analysis. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:171-182 [Conf]
  15. Ahmed Abbasi, Hsinchun Chen
    Applying Authorship Analysis to Arabic Web Content. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:183-197 [Conf]
  16. Thomas O. Meservy, Matthew L. Jensen, John Kruse, Judee K. Burgoon, Jay F. Nunamaker
    Automatic Extraction of Deceptive Behavioral Cues from Video. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:198-208 [Conf]
  17. Moshe Koppel, Jonathan Schler, Kfir Zigdon
    Automatically Determining an Anonymous Author's Native Language. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:209-217 [Conf]
  18. Ambareen Siraj, Rayford B. Vaughn
    A Cognitive Model for Alert Correlation in a Distributed Environment. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:218-230 [Conf]
  19. David B. Skillicorn
    Beyond Keyword Filtering for Message and Conversation Detection. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:231-243 [Conf]
  20. Yuval Elovici, Bracha Shapira, Mark Last, Omer Zaafrany, Menahem Friedman, Moti Schneider, Abraham Kandel
    Content-Based Detection of Terrorists Browsing the Web Using an Advanced Terror Detection System (ATDS). [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:244-255 [Conf]
  21. Evrim Acar, Seyit Ahmet Çamtepe, Mukkai S. Krishnamoorthy, Bülent Yener
    Modeling and Multiway Analysis of Chatroom Tensors. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:256-268 [Conf]
  22. Yosef A. Solewicz, Moshe Koppel
    Selective Fusion for Speaker Verification in Surveillance. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:269-279 [Conf]
  23. Joshua Sinai
    A New Conceptual Framework to Resolve Terrorism's Root Causes. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:280-286 [Conf]
  24. Jialun Qin, Jennifer Jie Xu, Daning Hu, Marc Sageman, Hsinchun Chen
    Analyzing Terrorist Networks: A Case Study of the Global Salafi Jihad Network. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:287-304 [Conf]
  25. David Davis, Allison Frendak-Blume, Jennifer Wheeler, Alexander E. R. Woodcock, Clarence Worrell III
    A Conceptual Model of Counterterrorist Operations. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:305-315 [Conf]
  26. Peter S. Probst
    Measuring Success in Countering Terrorism: Problems and Pitfalls. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:316-321 [Conf]
  27. Edna Reid, Hsinchun Chen
    Mapping the Contemporary Terrorism Research Domain: Researchers, Publications, and Institutions Analysis. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:322-339 [Conf]
  28. Laura Dugan, Gary LaFree, Alex R. Piquero
    Testing a Rational Choice Model of Airline Hijackings. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:340-361 [Conf]
  29. Hilmi Günes Kayacik, A. Nur Zincir-Heywood
    Analysis of Three Intrusion Detection System Benchmark Datasets Using Machine Learning Algorithms. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:362-367 [Conf]
  30. Alan Gang Wang, Homa Atabakhsh, Tim Petersen, Hsinchun Chen
    Discovering Identity Problems: A Case Study. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:368-373 [Conf]
  31. R. B. Bradford
    Efficient Discovery of New Information in Large Text Databases. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:374-380 [Conf]
  32. Ozgur Yilmazel, Svetlana Symonenko, Niranjan Balasubramanian, Elizabeth D. Liddy
    Leveraging One-Class SVM and Semantic Analysis to Detect Anomalous Content. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:381-388 [Conf]
  33. Janusz Wnek
    LSI-Based Taxonomy Generation: The Taxonomist System. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:389-394 [Conf]
  34. Qing Tao, Gao-wei Wu, Fei-Yue Wang, Jue Wang
    Some Marginal Learning Algorithms for Unsupervised Problems. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:395-401 [Conf]
  35. Edna Reid, Jialun Qin, Yilu Zhou, Guanpi Lai, Marc Sageman, Gabriel Weimann, Hsinchun Chen
    Collecting and Analyzing the Presence of Terrorists on the Web: A Case Study of Jihad Websites. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:402-411 [Conf]
  36. Paul Jen-Hwa Hu, Daniel Dajun Zeng, Hsinchun Chen, Catherine A. Larson, Wei Chang, Chunju Tseng
    Evaluating an Infectious Disease Information Sharing and Analysis System. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:412-417 [Conf]
  37. Dmitri Roussinov, Jose Antonio Robles-Flores
    How Question Answering Technology Helps to Locate Malevolent Online Content. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:418-421 [Conf]
  38. Shuang Sun, John Yen
    Information Supply Chain: A Unified Framework for Information-Sharing. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:422-428 [Conf]
  39. Guoray Cai, Alan M. MacEachren, Isaac Brewer, Michael D. McNeese, Rajeev Sharma, Sven Fuhrmann
    Map-Mediated GeoCollaborative Crisis Management. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:429-435 [Conf]
  40. Clive Best, Erik Van der Goot, Monica de Paola
    Thematic Indicators Derived from World News Reports. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:436-447 [Conf]
  41. Haifeng Li, Shuxun Wang, Weiwei Song, Quan Wen
    A Novel Watermarking Algorithm Based on SVD and Zernike Moments. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:448-453 [Conf]
  42. William Zhu, Clark D. Thomborson, Fei-Yue Wang
    A Survey of Software Watermarking. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:454-458 [Conf]
  43. Shuting Xu, Jun Zhang, Dianwei Han, Jie Wang
    Data Distortion for Privacy Protection in a Terrorist Analysis System. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:459-464 [Conf]
  44. Lina Zhou, Simon Lutterbie
    Deception Across Cultures: Bottom-Up and Top-Down Approaches. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:465-470 [Conf]
  45. Douglas P. Twitchell, Nicole Forsgren, Karl Wiers, Judee K. Burgoon, Jay F. Nunamaker
    Detecting Deception in Synchronous Computer-Mediated Communication Using Speech Act Profiling. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:471-478 [Conf]
  46. Seok Won Lee, Robin A. Gandhi, Gail-Joon Ahn, Deepak S. Yavagal
    Active Automation of the DITSCAP. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:479-485 [Conf]
  47. Boanerges Aleman-Meza, Phillip Burns, Matthew Eavenson, Devanand Palaniswami, Amit P. Sheth
    An Ontological Approach to the Document Access Problem of Insider Threat. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:486-491 [Conf]
  48. Gregory J. Conti, Mustaque Ahamad, Robert Norback
    Filtering, Fusion and Dynamic Information Presentation: Towards a General Information Firewall. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:492-497 [Conf]
  49. Pradeep Kumar, M. Venkateswara Rao, P. Radha Krishna, Raju S. Bapi, Arijit Laha
    Intrusion Detection System Using Sequence and Set Preserving Metric. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:498-504 [Conf]
  50. Yufeng Chen, Yabo Dong, Dongming Lu, Yunhe Pan
    The Multi-fractal Nature of Worm and Normal Traffic at Individual Source Level. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:505-510 [Conf]
  51. Dae-Ki Kang, Doug Fuller, Vasant Honavar
    Learning Classifiers for Misuse Detection Using a Bag of System Calls Representation. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:511-516 [Conf]
  52. Zhengtao Xiang, Yufeng Chen, Wei Jian, Fei Yan
    A Jackson Network-Based Model for Quantitative Analysis of Network Security. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:517-522 [Conf]
  53. David R. B. Stockwell, Jason T. L. Wang
    Biomonitoring, Phylogenetics and Anomaly Aggregation Systems. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:523-529 [Conf]
  54. Olga Gelbart, Paul Ott, Bhagirath Narahari, Rahul Simha, Alok N. Choudhary, Joseph Zambreno
    CODESSEAL: Compiler/FPGA Approach to Secure Applications. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:530-535 [Conf]
  55. Kelvin H. L. Wong, Mingchun Luo
    Computational Tool in Infrastructure Emergency Total Evacuation Analysis. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:536-542 [Conf]
  56. Kripashankar Mohan, Bhagirath Narahari, Rahul Simha, Paul Ott, Alok N. Choudhary, Joseph Zambreno
    Performance Study of a Compiler/Hardware Approach to Embedded Systems Security. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:543-548 [Conf]
  57. Xinjian Chen, Jie Tian, Qi Su, Xin Yang, Fei-Yue Wang
    A Secured Mobile Phone Based on Embedded Fingerprint Recognition Systems. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:549-553 [Conf]
  58. Yael Shahar
    Connections in the World of International Terrorism. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:554-560 [Conf]
  59. Sundri K. Khalsa
    Forecasting Terrorism: Indicators and Proven Analytic Techniques. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:561-566 [Conf]
  60. Joshua Sinai
    Forecasting Terrorist Groups' Warfare: 'Conventional' to CBRN. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:567-570 [Conf]
  61. Scott Tousley
    The Qualitative Challenge of Insurgency Informatics. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:571-578 [Conf]
  62. Robert J. Latino
    The Application of PROACT® RCA to Terrorism/Counter Terrorism Related Events. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:579-589 [Conf]
  63. Huizhang Shen, Jidi Zhao, Ying Peng
    A Group Decision-Support Method for Search and Rescue Based on Markov Chain. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:590-592 [Conf]
  64. Suwimon Kooptiwoot, Muhammad Abdus Salam
    A New Relationship Form in Data Mining. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:593-594 [Conf]
  65. Mihaela Bobeica, Jean-Paul Jéral, Teofilo Garcia, Clive Best
    A Study of "Root Causes of Conflict" Using Latent Semantic Analysis. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:595-596 [Conf]
  66. Tiantian Qin, Judee K. Burgoon
    An Empirical Study on Dynamic Effects on Deception Detection. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:597-599 [Conf]
  67. Ana Isabel Canhoto, James Backhouse
    Anti Money Laundering Reporting and Investigation - Sorting the Wheat from the Chaff. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:600-601 [Conf]
  68. Robert J. Price, Anthony E. Zukas
    Application of Latent Semantic Indexing to Processing of Noisy Text. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:602-603 [Conf]
  69. Nazli Goharian, Ling Ma, Chris Meyers
    Detecting Misuse of Information Retrieval Systems Using Data Mining Techniques. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:604-605 [Conf]
  70. Wei Sun, Da-xin Liu
    Mining Schemas in Semistructured Data Using Fuzzy Decision Trees. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:606-607 [Conf]
  71. Boyd Davis, Vivian Lord, Peyton Mason
    More Than a Summary: Stance-Shift Analysis. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:608-609 [Conf]
  72. Zeng-Guang Hou
    Principal Component Analysis (PCA) for Data Fusion and Navigation of Mobile Robots. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:610-611 [Conf]
  73. Daniel Dajun Zeng, Hsinchun Chen, Chunju Tseng, Catherine A. Larson, Wei Chang, Millicent Eidson, Ivan Gotham, Cecil Lynch, Michael Ascher
    BioPortal: Sharing and Analyzing Infectious Disease Information. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:612-613 [Conf]
  74. Jin Zhu
    DIANE: Revolutionizing the Way We Collect, Analyze, and Share Information. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:614-616 [Conf]
  75. Alan J. Demers, Johannes Gehrke, Mingsheng Hong, Mirek Riedewald
    Processing High-Speed Intelligence Feeds in Real-Time. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:617-618 [Conf]
  76. Robert P. Schumaker, Hsinchun Chen
    Question Answer TARA: A Terrorism Activity Resource Application. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:619-620 [Conf]
  77. Boanerges Aleman-Meza, Christian Halaschek-Wiener, Satya Sanket Sahoo, Amit P. Sheth, Ismailcem Budak Arpinar
    Template Based Semantic Similarity for Security Applications. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:621-622 [Conf]
  78. Jialun Qin, Yilu Zhou, Guanpi Lai, Edna Reid, Marc Sageman, Hsinchun Chen
    The Dark Web Portal Project: Collecting and Analyzing the Presence of Terrorist Groups on the Web. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:623-624 [Conf]
  79. Guanpi Lai, Fei-Yue Wang
    Toward an ITS Specific Knowledge Engine. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:625-626 [Conf]
  80. Haifeng Li, Shuxun Wang, Weiwei Song, Quan Wen
    A Blind Image Watermarking Using for Copyright Protection and Tracing. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:627-628 [Conf]
  81. Michael Manley, Cheri McEntee, Anthony Molet, Joon S. Park
    Towards an Effective Wireless Security Policy for Sensitive Organizations. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:629-630 [Conf]
  82. Kameswari Kotapati, Peng Liu, Yan Sun, Thomas F. LaPorta
    A Taxonomy of Cyber Attacks on 3G Networks. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:631-633 [Conf]
  83. Eul-Gyu Im, Yong Ho Song
    An Adaptive Approach to Handle DoS Attack for Web Services. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:634-635 [Conf]
  84. Ram Dantu, João W. Cangussu
    An Architecture for Network Security Using Feedback Control. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:636-637 [Conf]
  85. Beomsoo Park, Sungjin Hong, Jaewook Oh, Heejo Lee
    Defending a Web Browser Against Spying with Browser Helper Objects. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:638-639 [Conf]
  86. Zhengyou Xia, Yichuan Jiang, Jian Wang
    Dynamic Security Service Negotiation to Ensure Security for Information Sharing on the Internet. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:640-641 [Conf]
  87. Young-Hwan Oh, Hae-Young Bae
    Enhancing Spatial Database Access Control by Eliminating the Covert Topology Channel. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:642-643 [Conf]
  88. Shiuh-Jeng Wang, Cheng-Hsing Yang
    Gathering Digital Evidence in Response to Information Security Incidents. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:644-645 [Conf]
  89. William Zhu, Clark D. Thomborson
    On the QP Algorithm in Software Watermarking. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:646-647 [Conf]
  90. Anirban Majumdar, Clark D. Thomborson
    On the Use of Opaque Predicates in Mobile Agent Code Obfuscation. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:648-649 [Conf]
  91. Yong Ho Song, Eul-Gyu Im
    Secure Contents Distribution Using Flash Memory Technology. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:650-651 [Conf]
  92. Richard A. Smith
    Background Use of Sensitive Information to Aid in Analysis of Non-sensitive Data on Threats and Vulnerabilities. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:652-653 [Conf]
  93. Syed Naqvi, Michel Riguidel
    Securing Grid-Based Critical Infrastructures. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:654-655 [Conf]
  94. David Zimmermann
    The Safety Alliance of Cushing - A Model Example of Cooperation as an Effective Counterterrorism Tool. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:656-657 [Conf]
  95. Xiaoyan Gong, Haijun Gao
    A Framework for Global Monitoring and Security Assistance Based on IPv6 and Multimedia Data Mining Techniques. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:658-659 [Conf]
  96. Shuming Tang, Haijun Gao
    An Agent-Based Framework for a Traffic Security Management System. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:660-661 [Conf]
  97. Hong Qiao, Fei-Yue Wang, Xianbin Cao
    Application of a Decomposed Support Vector Machine Algorithm in Pedestrian Detection from a Moving Vehicle. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:662-663 [Conf]
  98. Xianbin Cao, Hong Qiao, Fei-Yue Wang, Xinzheng Zhang
    Application of Cooperative Co-evolution in Pedestrian Detection Systems. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:664-665 [Conf]
  99. Sundaram Jayakumar, Chandramohan Senthilkumar
    Biometric Fingerprints Based Radio Frequency Identification. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:666-668 [Conf]
  100. Siddharth Kaza, Byron Marshall, Jennifer Jie Xu, Alan Gang Wang, Hemanth Gowda, Homa Atabakhsh, Tim Petersen, Chuck Violette, Hsinchun Chen
    BorderSafe: Cross-Jurisdictional Information Sharing, Analysis, and Visualization. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:669-670 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002