Conferences in DBLP
Aixin Sun , Myo-Myo Naing , Ee-Peng Lim , Wai Lam Using Support Vector Machines for Terrorism Information Extraction. [Citation Graph (0, 0)][DBLP ] ISI, 2003, pp:1-12 [Conf ] Song Lin , Donald E. Brown Criminal Incident Data Association Using the OLAP Technology. [Citation Graph (0, 0)][DBLP ] ISI, 2003, pp:13-26 [Conf ] Frankie Patman , Paul Thompson Names: A New Frontier in Text Mining. [Citation Graph (0, 0)][DBLP ] ISI, 2003, pp:27-38 [Conf ] Alexander Dolotov , Mary Strickler Web-Based Intelligence Reports System. [Citation Graph (0, 0)][DBLP ] ISI, 2003, pp:39-58 [Conf ] Rong Zheng , Yi Qin , Zan Huang , Hsinchun Chen Authorship Analysis in Cybercrime Investigation. [Citation Graph (0, 0)][DBLP ] ISI, 2003, pp:59-73 [Conf ] Salvatore J. Stolfo , Shlomo Hershkop , Ke Wang , Olivier Nimeskern , Chia-Wei Hu Behavior Profiling of Email. [Citation Graph (0, 0)][DBLP ] ISI, 2003, pp:74-90 [Conf ] Judee K. Burgoon , J. P. Blair , Tiantian Qin , Jay F. Nunamaker Detecting Deception through Linguistic Analysis. [Citation Graph (0, 0)][DBLP ] ISI, 2003, pp:91-101 [Conf ] Lina Zhou , Judee K. Burgoon , Douglas P. Twitchell A Longitudinal Analysis of Language Behavior of Deception in E-mail. [Citation Graph (0, 0)][DBLP ] ISI, 2003, pp:102-110 [Conf ] Qingsong Lu , Yan Huang , Shashi Shekhar Evacuation Planning: A Capacity Constrained Routing Approach. [Citation Graph (0, 0)][DBLP ] ISI, 2003, pp:111-125 [Conf ] Malik Magdon-Ismail , Mark K. Goldberg , William A. Wallace , David Siebecker Locating Hidden Groups in Communication Networks Using Hidden Markov Models. [Citation Graph (0, 0)][DBLP ] ISI, 2003, pp:126-137 [Conf ] Kar Wing Li , Christopher C. Yang Automatic Construction of Cross-Lingual Networks of Concepts from the Hong Kong SAR Police Department. [Citation Graph (0, 0)][DBLP ] ISI, 2003, pp:138-152 [Conf ] Yifei Xue , Donald E. Brown Decision Based Spatial Analysis of Crime. [Citation Graph (0, 0)][DBLP ] ISI, 2003, pp:153-167 [Conf ] Jennifer Schroeder , Jennifer Jie Xu , Hsinchun Chen CrimeLink Explorer: Using Domain Knowledge to Facilitate Automated Crime Association Analysis. [Citation Graph (0, 0)][DBLP ] ISI, 2003, pp:168-180 [Conf ] Ty Buetow , Luis G. Chaboya , Christopher D. O'Toole , Tom Cushna , Damien Daspit , Tim Petersen , Homa Atabakhsh , Hsinchun Chen A Spatio Temporal Visualizer for Law Enforcement. [Citation Graph (0, 0)][DBLP ] ISI, 2003, pp:181-194 [Conf ] Sudarshan S. Chawathe Tracking Hidden Groups Using Communications. [Citation Graph (0, 0)][DBLP ] ISI, 2003, pp:195-208 [Conf ] Paul Jen-Hwa Hu , Chienting Lin , Hsinchun Chen Examining Technology Acceptance by Individual Law Enforcement Officers: An Exploratory Study. [Citation Graph (0, 0)][DBLP ] ISI, 2003, pp:209-222 [Conf ] Chris C. Demchak "Atrium" - A Knowledge Model for Modern Security Forces in the Information and Terrorism Age. [Citation Graph (0, 0)][DBLP ] ISI, 2003, pp:223-231 [Conf ] Jennifer Jie Xu , Hsinchun Chen Untangling Criminal Networks: A Case Study. [Citation Graph (0, 0)][DBLP ] ISI, 2003, pp:232-248 [Conf ] T. S. Raghu , Ram Ramesh , Andrew B. Whinston Addressing the Homeland Security Problem: A Collaborative Decision-Making Framework. [Citation Graph (0, 0)][DBLP ] ISI, 2003, pp:249-265 [Conf ] J. Leon Zhao , Henry H. Bi , Hsinchun Chen Collaborative Workflow Management for Interagency Crime Analysis. [Citation Graph (0, 0)][DBLP ] ISI, 2003, pp:266-280 [Conf ] Daniel Dajun Zeng , Hsinchun Chen , Damien Daspit , Fu Shan , Suresh Nandiraju , Michael Chau , Chienting Lin COPLINK Agent: An Architecture for Information Monitoring and Sharing in Law Enforcement. [Citation Graph (0, 0)][DBLP ] ISI, 2003, pp:281-295 [Conf ] Antonio Badia Active Database Systems for Monitoring and Surveillance. [Citation Graph (0, 0)][DBLP ] ISI, 2003, pp:296-307 [Conf ] William T. Scherer , Leah L. Spradley , Marc H. Evans Integrated "Mixed" Networks Security Monitoring - A Proposed Framework. [Citation Graph (0, 0)][DBLP ] ISI, 2003, pp:308-321 [Conf ] Donald J. Berndt , Alan R. Hevner , James Studnicki Bioterrorism Surveillance with Real-Time Data Warehousing. [Citation Graph (0, 0)][DBLP ] ISI, 2003, pp:322-335 [Conf ] Hillol Kargupta , Kun Liu , Jessica Ryan Privacy Sensitive Distributed Data Mining from Multi-party Data. [Citation Graph (0, 0)][DBLP ] ISI, 2003, pp:336-342 [Conf ] Pablo Ariel Duboué , Kathleen McKeown , Vasileios Hatzivassiloglou PROGENIE: Biographical Descriptions for Intelligence Analysis. [Citation Graph (0, 0)][DBLP ] ISI, 2003, pp:343-345 [Conf ] Joachim Hammer , William J. O'Brien , Mark S. Schmalz Scalable Knowledge Extraction from Legacy Sources with SEEK. [Citation Graph (0, 0)][DBLP ] ISI, 2003, pp:346-349 [Conf ] Sachin S. Kajarekar , M. Kemal Sönmez , Luciana Ferrer , Venkata Gadde , Anand Venkataraman , Elizabeth Shriberg , Andreas Stolcke , Harry Bratt "TalkPrinting": Improving Speaker Recognition by Modeling Stylistic Features. [Citation Graph (0, 0)][DBLP ] ISI, 2003, pp:350-354 [Conf ] D. V. Sreenath , William I. Grosky , Farshad Fotouhi Emergent Semantics from Users' Browsing Paths. [Citation Graph (0, 0)][DBLP ] ISI, 2003, pp:355-357 [Conf ] Jinwei Cao , Janna M. Crews , Ming Lin , Judee K. Burgoon , Jay F. Nunamaker Designing Agent99 Trainer: A Learner-Centered, Web-Based Training System for Deception Detection. [Citation Graph (0, 0)][DBLP ] ISI, 2003, pp:358-365 [Conf ] Joey F. George , David P. Biros , Judee K. Burgoon , Jay F. Nunamaker Training Professionals to Detect Deception. [Citation Graph (0, 0)][DBLP ] ISI, 2003, pp:366-370 [Conf ] Bogju Lee , Youna Park An E-mail Monitoring System for Detecting Outflow of Confidential Documents. [Citation Graph (0, 0)][DBLP ] ISI, 2003, pp:371-374 [Conf ] Lihui Lin , Xianjun Geng , Andrew B. Whinston Intelligence and Security Informatics: An Information Economics Perspective. [Citation Graph (0, 0)][DBLP ] ISI, 2003, pp:375-378 [Conf ] Weiping Chang , Wingyan Chung , Hsinchun Chen , Shihchieh Chou An International Perspective on Fighting Cybercrime. [Citation Graph (0, 0)][DBLP ] ISI, 2003, pp:379-384 [Conf ] Ping Lin , K. Selçuk Candan Hiding Traversal of Tree Structured Data from Untrusted Data Stores. [Citation Graph (0, 0)][DBLP ] ISI, 2003, pp:385- [Conf ] Jau-Hwang Wang , Bill T. Lin , Ching-Chin Shieh , Peter S. Deng Criminal Record Matching Based on the Vector Space Model. [Citation Graph (0, 0)][DBLP ] ISI, 2003, pp:386- [Conf ] M. N. Smith , Peter J. H. King Database Support for Exploring Criminal Networks. [Citation Graph (0, 0)][DBLP ] ISI, 2003, pp:387- [Conf ] Ping Lin , K. Selçuk Candan , Rida A. Bazzi , Zhichao Liu Hiding Data and Code Security for Application Hosting Infrastructure. [Citation Graph (0, 0)][DBLP ] ISI, 2003, pp:388- [Conf ] Gregory B. Newby , Kevin Gamiel Secure Information Sharing and Information Retrieval Infrastructure with GridIR. [Citation Graph (0, 0)][DBLP ] ISI, 2003, pp:389- [Conf ] Paul Thompson Semantic Hacking and Intelligence and Security Informatics (Extended Abstract). [Citation Graph (0, 0)][DBLP ] ISI, 2003, pp:390- [Conf ]