The SCEAS System
Navigation Menu

Conferences in DBLP

Intelligence and Security Informatics (isi)
2003 (conf/isi/2003)

  1. Aixin Sun, Myo-Myo Naing, Ee-Peng Lim, Wai Lam
    Using Support Vector Machines for Terrorism Information Extraction. [Citation Graph (0, 0)][DBLP]
    ISI, 2003, pp:1-12 [Conf]
  2. Song Lin, Donald E. Brown
    Criminal Incident Data Association Using the OLAP Technology. [Citation Graph (0, 0)][DBLP]
    ISI, 2003, pp:13-26 [Conf]
  3. Frankie Patman, Paul Thompson
    Names: A New Frontier in Text Mining. [Citation Graph (0, 0)][DBLP]
    ISI, 2003, pp:27-38 [Conf]
  4. Alexander Dolotov, Mary Strickler
    Web-Based Intelligence Reports System. [Citation Graph (0, 0)][DBLP]
    ISI, 2003, pp:39-58 [Conf]
  5. Rong Zheng, Yi Qin, Zan Huang, Hsinchun Chen
    Authorship Analysis in Cybercrime Investigation. [Citation Graph (0, 0)][DBLP]
    ISI, 2003, pp:59-73 [Conf]
  6. Salvatore J. Stolfo, Shlomo Hershkop, Ke Wang, Olivier Nimeskern, Chia-Wei Hu
    Behavior Profiling of Email. [Citation Graph (0, 0)][DBLP]
    ISI, 2003, pp:74-90 [Conf]
  7. Judee K. Burgoon, J. P. Blair, Tiantian Qin, Jay F. Nunamaker
    Detecting Deception through Linguistic Analysis. [Citation Graph (0, 0)][DBLP]
    ISI, 2003, pp:91-101 [Conf]
  8. Lina Zhou, Judee K. Burgoon, Douglas P. Twitchell
    A Longitudinal Analysis of Language Behavior of Deception in E-mail. [Citation Graph (0, 0)][DBLP]
    ISI, 2003, pp:102-110 [Conf]
  9. Qingsong Lu, Yan Huang, Shashi Shekhar
    Evacuation Planning: A Capacity Constrained Routing Approach. [Citation Graph (0, 0)][DBLP]
    ISI, 2003, pp:111-125 [Conf]
  10. Malik Magdon-Ismail, Mark K. Goldberg, William A. Wallace, David Siebecker
    Locating Hidden Groups in Communication Networks Using Hidden Markov Models. [Citation Graph (0, 0)][DBLP]
    ISI, 2003, pp:126-137 [Conf]
  11. Kar Wing Li, Christopher C. Yang
    Automatic Construction of Cross-Lingual Networks of Concepts from the Hong Kong SAR Police Department. [Citation Graph (0, 0)][DBLP]
    ISI, 2003, pp:138-152 [Conf]
  12. Yifei Xue, Donald E. Brown
    Decision Based Spatial Analysis of Crime. [Citation Graph (0, 0)][DBLP]
    ISI, 2003, pp:153-167 [Conf]
  13. Jennifer Schroeder, Jennifer Jie Xu, Hsinchun Chen
    CrimeLink Explorer: Using Domain Knowledge to Facilitate Automated Crime Association Analysis. [Citation Graph (0, 0)][DBLP]
    ISI, 2003, pp:168-180 [Conf]
  14. Ty Buetow, Luis G. Chaboya, Christopher D. O'Toole, Tom Cushna, Damien Daspit, Tim Petersen, Homa Atabakhsh, Hsinchun Chen
    A Spatio Temporal Visualizer for Law Enforcement. [Citation Graph (0, 0)][DBLP]
    ISI, 2003, pp:181-194 [Conf]
  15. Sudarshan S. Chawathe
    Tracking Hidden Groups Using Communications. [Citation Graph (0, 0)][DBLP]
    ISI, 2003, pp:195-208 [Conf]
  16. Paul Jen-Hwa Hu, Chienting Lin, Hsinchun Chen
    Examining Technology Acceptance by Individual Law Enforcement Officers: An Exploratory Study. [Citation Graph (0, 0)][DBLP]
    ISI, 2003, pp:209-222 [Conf]
  17. Chris C. Demchak
    "Atrium" - A Knowledge Model for Modern Security Forces in the Information and Terrorism Age. [Citation Graph (0, 0)][DBLP]
    ISI, 2003, pp:223-231 [Conf]
  18. Jennifer Jie Xu, Hsinchun Chen
    Untangling Criminal Networks: A Case Study. [Citation Graph (0, 0)][DBLP]
    ISI, 2003, pp:232-248 [Conf]
  19. T. S. Raghu, Ram Ramesh, Andrew B. Whinston
    Addressing the Homeland Security Problem: A Collaborative Decision-Making Framework. [Citation Graph (0, 0)][DBLP]
    ISI, 2003, pp:249-265 [Conf]
  20. J. Leon Zhao, Henry H. Bi, Hsinchun Chen
    Collaborative Workflow Management for Interagency Crime Analysis. [Citation Graph (0, 0)][DBLP]
    ISI, 2003, pp:266-280 [Conf]
  21. Daniel Dajun Zeng, Hsinchun Chen, Damien Daspit, Fu Shan, Suresh Nandiraju, Michael Chau, Chienting Lin
    COPLINK Agent: An Architecture for Information Monitoring and Sharing in Law Enforcement. [Citation Graph (0, 0)][DBLP]
    ISI, 2003, pp:281-295 [Conf]
  22. Antonio Badia
    Active Database Systems for Monitoring and Surveillance. [Citation Graph (0, 0)][DBLP]
    ISI, 2003, pp:296-307 [Conf]
  23. William T. Scherer, Leah L. Spradley, Marc H. Evans
    Integrated "Mixed" Networks Security Monitoring - A Proposed Framework. [Citation Graph (0, 0)][DBLP]
    ISI, 2003, pp:308-321 [Conf]
  24. Donald J. Berndt, Alan R. Hevner, James Studnicki
    Bioterrorism Surveillance with Real-Time Data Warehousing. [Citation Graph (0, 0)][DBLP]
    ISI, 2003, pp:322-335 [Conf]
  25. Hillol Kargupta, Kun Liu, Jessica Ryan
    Privacy Sensitive Distributed Data Mining from Multi-party Data. [Citation Graph (0, 0)][DBLP]
    ISI, 2003, pp:336-342 [Conf]
  26. Pablo Ariel Duboué, Kathleen McKeown, Vasileios Hatzivassiloglou
    PROGENIE: Biographical Descriptions for Intelligence Analysis. [Citation Graph (0, 0)][DBLP]
    ISI, 2003, pp:343-345 [Conf]
  27. Joachim Hammer, William J. O'Brien, Mark S. Schmalz
    Scalable Knowledge Extraction from Legacy Sources with SEEK. [Citation Graph (0, 0)][DBLP]
    ISI, 2003, pp:346-349 [Conf]
  28. Sachin S. Kajarekar, M. Kemal Sönmez, Luciana Ferrer, Venkata Gadde, Anand Venkataraman, Elizabeth Shriberg, Andreas Stolcke, Harry Bratt
    "TalkPrinting": Improving Speaker Recognition by Modeling Stylistic Features. [Citation Graph (0, 0)][DBLP]
    ISI, 2003, pp:350-354 [Conf]
  29. D. V. Sreenath, William I. Grosky, Farshad Fotouhi
    Emergent Semantics from Users' Browsing Paths. [Citation Graph (0, 0)][DBLP]
    ISI, 2003, pp:355-357 [Conf]
  30. Jinwei Cao, Janna M. Crews, Ming Lin, Judee K. Burgoon, Jay F. Nunamaker
    Designing Agent99 Trainer: A Learner-Centered, Web-Based Training System for Deception Detection. [Citation Graph (0, 0)][DBLP]
    ISI, 2003, pp:358-365 [Conf]
  31. Joey F. George, David P. Biros, Judee K. Burgoon, Jay F. Nunamaker
    Training Professionals to Detect Deception. [Citation Graph (0, 0)][DBLP]
    ISI, 2003, pp:366-370 [Conf]
  32. Bogju Lee, Youna Park
    An E-mail Monitoring System for Detecting Outflow of Confidential Documents. [Citation Graph (0, 0)][DBLP]
    ISI, 2003, pp:371-374 [Conf]
  33. Lihui Lin, Xianjun Geng, Andrew B. Whinston
    Intelligence and Security Informatics: An Information Economics Perspective. [Citation Graph (0, 0)][DBLP]
    ISI, 2003, pp:375-378 [Conf]
  34. Weiping Chang, Wingyan Chung, Hsinchun Chen, Shihchieh Chou
    An International Perspective on Fighting Cybercrime. [Citation Graph (0, 0)][DBLP]
    ISI, 2003, pp:379-384 [Conf]
  35. Ping Lin, K. Selçuk Candan
    Hiding Traversal of Tree Structured Data from Untrusted Data Stores. [Citation Graph (0, 0)][DBLP]
    ISI, 2003, pp:385- [Conf]
  36. Jau-Hwang Wang, Bill T. Lin, Ching-Chin Shieh, Peter S. Deng
    Criminal Record Matching Based on the Vector Space Model. [Citation Graph (0, 0)][DBLP]
    ISI, 2003, pp:386- [Conf]
  37. M. N. Smith, Peter J. H. King
    Database Support for Exploring Criminal Networks. [Citation Graph (0, 0)][DBLP]
    ISI, 2003, pp:387- [Conf]
  38. Ping Lin, K. Selçuk Candan, Rida A. Bazzi, Zhichao Liu
    Hiding Data and Code Security for Application Hosting Infrastructure. [Citation Graph (0, 0)][DBLP]
    ISI, 2003, pp:388- [Conf]
  39. Gregory B. Newby, Kevin Gamiel
    Secure Information Sharing and Information Retrieval Infrastructure with GridIR. [Citation Graph (0, 0)][DBLP]
    ISI, 2003, pp:389- [Conf]
  40. Paul Thompson
    Semantic Hacking and Intelligence and Security Informatics (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    ISI, 2003, pp:390- [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002