Conferences in DBLP
Douglas Yeung , John D. Lowrance Computer-Mediated Collaborative Reasoning and Intelligence Analysis. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:1-13 [Conf ] Byron Marshall , Hsinchun Chen Using Importance Flooding to Identify Interesting Networks of Criminal Activity. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:14-25 [Conf ] Clive Best , Bruno Pouliquen , Ralf Steinberger , Erik Van der Goot , Ken Blackler , Flavio Fuart , Tamara Oellinger , Camelia Ignat Towards Automatic Event Tracking. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:26-34 [Conf ] Yiming Ma , Dawit Yimam Seid Interactive Refinement of Filtering Queries on Streaming Intelligence Data. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:35-47 [Conf ] Leonidas Deligiannidis , Amit P. Sheth , Boanerges Aleman-Meza Semantic Analytics Visualization. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:48-59 [Conf ] Ahmed Abbasi , Hsinchun Chen Visualizing Authorship for Identification. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:60-71 [Conf ] Olcay Kursun , Anna Koufakou , Bing Chen , Michael Georgiopoulos , Kenneth M. Reynolds , Ronald Eaglin A Dictionary-Based Approach to Fast and Accurate Name Matching in Large Law Enforcement Databases. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:72-82 [Conf ] Aram Galstyan , Paul R. Cohen Iterative Relational Classification Through Three-State Epidemic Dynamics. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:83-92 [Conf ] David Newman , Chaitanya Chemudugunta , Padhraic Smyth , Mark Steyvers Analyzing Entities and Topics in News Articles Using Statistical Topic Models. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:93-104 [Conf ] Clayton T. Morrison , Paul R. Cohen The Hats Simulator and Colab: An Integrated Information Fusion Challenge Problem and Collaborative Analysis Environment. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:105-116 [Conf ] Young-Woo Seo , Katia P. Sycara Cost-Sensitive Access Control for Illegitimate Confidential Access by Insiders. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:117-128 [Conf ] Hyang-Chang Choi , Seungyong Lee , HyungHyo Lee Design and Implementation of a Policy-Based Privacy Authorization System. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:129-140 [Conf ] Artak Amirbekyan , Vladimir Estivill-Castro Privacy Preserving DBSCAN for Vertically Partitioned Data. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:141-153 [Conf ] Jianming He , Wesley W. Chu , Zhenyu Liu Inferring Privacy Information from Social Networks. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:154-165 [Conf ] Xiaolei Li , Jiawei Han , Sangkyum Kim Motion-Alert: Automatic Anomaly Detection in Massive Moving Objects. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:166-177 [Conf ] Chen Bo , Binxing Fang , Xiao-chun Yun Adaptive Method for Monitoring Network and Early Detection of Internet Worms. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:178-189 [Conf ] SzeWang Fong , David B. Skillicorn , Dmitri Roussinov Measures to Detect Word Substitution in Intercepted Communication. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:190-200 [Conf ] Jeffrey Baumes , Mark K. Goldberg , Mykola Hayvanovych , Malik Magdon-Ismail , William A. Wallace , Mohammed Javeed Zaki Finding Hidden Group Structure in a Stream of Communications. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:201-212 [Conf ] Evrim Acar , Seyit Ahmet Çamtepe , Bülent Yener Collective Sampling and Analysis of High Order Tensors for Chatroom Communications. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:213-224 [Conf ] Jamie L. Griffiths , Donald J. Berndt , Alan R. Hevner Naturally Occurring Incidents as Facsimiles for Biochemical Terrorist Attacks. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:225-236 [Conf ] Vidhya Balasubramanian , Daniel Massaguer , Sharad Mehrotra , Nalini Venkatasubramanian DrillSim: A Simulation Framework for Emergency Response Drills. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:237-248 [Conf ] Ping Yan , Daniel Dajun Zeng , Hsinchun Chen A Review of Public Health Syndromic Surveillance Systems. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:249-260 [Conf ] Wei Wei , Yabo Dong , Dongming Lu , Guang Jin , Honglan Lao A Novel Mechanism to Defend Against Low-Rate Denial-of-Service Attacks. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:261-271 [Conf ] Yan Zhai , Peng Ning , Jun Xu Integrating IDS Alert Correlation and OS-Level Dependency Tracking. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:272-284 [Conf ] Kapil Kumar Gupta , Baikunth Nath , Kotagiri Ramamohanarao , Ashraf U. Kazi Attacking Confidentiality: An Agent Based Approach. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:285-296 [Conf ] Fangfang Liu , Yan Chi , Yuliang Shi Viability of Critical Mission of Grid Computing. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:297-307 [Conf ] Siddharth Kaza , Yuan Wang , Hsinchun Chen Suspect Vehicle Identification for Border Safety with Modified Mutual Information. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:308-318 [Conf ] Saket Anand , David Madigan , Richard J. Mammone , Saumitr Pathak , Fred Roberts Experimental Analysis of Sequential Decision Making Algorithms for Port of Entry Inspection Procedures. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:319-330 [Conf ] Christopher C. Yang , Nan Liu , Marc Sageman Analyzing the Terrorist Social Networks with Visualization Tools. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:331-342 [Conf ] Christopher C. Yang , Xiaodong Shi , Chih-Ping Wei Tracing the Event Evolution of Terror Attacks from On-Line News. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:343-354 [Conf ] Robert G. Ross Measuring Effectiveness of Anti-terrorism Programs Using Performance Logic Models. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:355-366 [Conf ] Jennifer Jie Xu , Hsinchun Chen , Yilu Zhou , Jialun Qin On the Topology of the Dark Web of Terrorist Groups. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:367-376 [Conf ] Yael Shahar Indicators of Threat: Reflecting New Trends. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:377-388 [Conf ] Nasrullah Memon , Henrik Legind Larsen Practical Algorithms for Destabilizing Terrorist Networks. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:389-400 [Conf ] Joshua Sinai Combating Terrorism Insurgency Resolution Software: A Research Note. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:401-406 [Conf ] Laura Dugan , Gary LaFree , Heather Fogg A First Look at Domestic and International Global Terrorism Events, 1970-1997. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:407-419 [Conf ] Uwe Glässer , Sarah Rastkar , Mona Vajihollahi Computational Modeling and Experimental Validation of Aviation Security Procedures. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:420-431 [Conf ] Adnan Khashman , Akram A. Garad Intelligent Face Recognition Using Feature Averaging. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:432-439 [Conf ] Sangho Park , Mohan M. Trivedi Multi-perspective Video Analysis of Persons and Vehicles for Enhanced Situational Awareness. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:440-451 [Conf ] Yu Chen , Wesley W. Chu Database Security Protection Via Inference Detection. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:452-458 [Conf ] Olivier Y. de Vel , Nianjun Liu , Terry Caelli , Tibério S. Caetano An Embedded Bayesian Network Hidden Markov Model for Digital Forensics. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:459-465 [Conf ] Eric A. Bier , Edward W. Ishak , Ed Chi Entity Workspace: An Evidence File That Aids Memory, Inference, and Reading. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:466-472 [Conf ] Yair Neuman , Liran Elihay , Meni Adler , Yoav Goldberg , Amir Viner Strategic Intelligence Analysis: From Information Processing to Meaning-Making. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:473-478 [Conf ] G. Alan Wang , Hsinchun Chen , Homa Atabakhsh A Multi-layer Naïve Bayes Model for Approximate Identity Matching. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:479-484 [Conf ] Danilo Reis , Adriano Melo , André L. V. Coelho , Vasco Furtado Towards Optimal Police Patrol Routes with Genetic Algorithms. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:485-491 [Conf ] Amit Mathew , Amit P. Sheth , Leonidas Deligiannidis SemanticSpy: Suspect Tracking Using Semantic Data in a Multimedia Environment. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:492-497 [Conf ] Jau-Hwang Wang , Tianjun Fu , Hong-Ming Lin , Hsinchun Chen A Framework for Exploring Gray Web Forums: Analysis of Forum-Based Communities in Taiwan. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:498-503 [Conf ] Christie Fuller , David P. Biros , Mark Adkins , Judee K. Burgoon , Jay F. Nunamaker , Steven Coulon Detecting Deception in Person-of-Interest Statements. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:504-509 [Conf ] Antonio Badia Personal Information Management (PIM) for Intelligence Analysis. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:510-515 [Conf ] Ragib Hasan , Marianne Winslett Synergy: A Policy-Driven, Trust-Aware Information Dissemination Framework. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:516-521 [Conf ] Ahmed HajYasien , Vladimir Estivill-Castro , Rodney W. Topor Sanitization of Databases for Refined Privacy Trade-Offs. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:522-528 [Conf ] Joon S. Park , Joseph Giordano Access Control Requirements for Preventing Insider Threats. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:529-534 [Conf ] James F. McCarthy , Mukkai S. Krishnamoorthy Venn Diagram Construction of Internet Chatroom Conversations. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:535-541 [Conf ] Jian Ma , Daniel Dajun Zeng , Hsinchun Chen Spatial-Temporal Cross-Correlation Analysis: A New Measure and a Case Study in Infectious Disease Informatics. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:542-547 [Conf ] Xiaohua Hu , Xiaodan Zhang , Daniel Duanqing Wu , Xiaohua Zhou , Peter Rumm Integration of Instance-Based Learning and Text Mining for Identification of Potential Virus/Bacterium as Bio-terrorism Weapons. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:548-553 [Conf ] Anna Yoffe , Yakov Ben-Haim An Info-Gap Approach to Policy Selection for Bio-terror Response. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:554-559 [Conf ] David A. Bray , Benn R. Konsynski Fighting Fear of a Bioterrorism Event with Information Technology: Real-World Examples and Opportunities. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:560-565 [Conf ] William Zhu , Fei-Yue Wang Covering Based Granular Computing for Conflict Analysis. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:566-571 [Conf ] Eul-Gyu Im , Jung-Taek Seo , Dong-Soo Kim , Yong Ho Song , Yongsu Park Hybrid Modeling for Large-Scale Worm Propagation Simulations. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:572-577 [Conf ] Yufeng Chen , Yabo Dong , Dongming Lu , Yunhe Pan , Honglan Lao Worm Traffic Modeling for Network Performance Analysis. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:578-583 [Conf ] Zhengtao Xiang , Yufeng Chen , Yabo Dong , Honglan Lao Analysis of Abnormalities of Worm Traffic for Obtaining Worm Detection Vectors. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:584-589 [Conf ] Shukor A. Razak , Steven Furnell , Nathan L. Clarke , Phillip J. Brooke A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks - A Friend Approach. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:590-595 [Conf ] Sudarshan S. Chawathe Distributing the Cost of Securing a Transportation Infrastructure. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:596-601 [Conf ] Fu Lee Wang , Christopher C. Yang , Xiaodong Shi Multi-document Summarization for Terrorism Information Extraction. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:602-608 [Conf ] Don Radlauer Rational Choice Deterrence and Israeli Counter-Terrorism. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:609-614 [Conf ] Arab Salem , Edna Reid , Hsinchun Chen Content Analysis of Jihadi Extremist Groups' Videos. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:615-620 [Conf ] Yilu Zhou , Jialun Qin , Guanpi Lai , Edna Reid , Hsinchun Chen Exploring the Dark Side of the Web: Collection and Analysis of U.S. Extremist Online Forums. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:621-626 [Conf ] Yan Wu Xu , Xianbin Cao , Hong Qiao , Fei-Yue Wang Fast Pedestrian Detection Using Color Information. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:627-632 [Conf ] Je-Goon Ryu , Se-Kee Kil , Hyeon-Min Shim , Sang-Moo Lee , Eung-Hyuk Lee , Seung-Hong Hong SG-Robot: CDMA Network-Operated Mobile Robot for Security Guard at Home. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:633-638 [Conf ] Samar Mouti , Fadel Sukkar Design of Syntactical Morphological and Semantical Analyzer (SMSA) for Processing Arabic Texts. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:639-641 [Conf ] James S. Okolica , Gilbert L. Peterson , Robert F. Mills Using Author Topic to Detect Insider Threats from Email Traffic. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:642-643 [Conf ] Da-Yu Kao , Shiuh-Jeng Wang , Frank Fu-Yuan Huang Digitized Forensic Investigation at P2P Copyright Controversy, Infringement. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:644-646 [Conf ] Nazli Goharian , Alana Platt , Ophir Frieder On Off-Topic Web Browsing. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:647-649 [Conf ] Unil Yun , John J. Leggett , TeongJoo Ong Mining Weighted Sequential Patterns Based on Length-Decreasing Support Constraints. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:650-651 [Conf ] Timothy Buennemeyer , John Booker , Andrew J. Sabri , Chris North Intelligence Analysis Using High Resolution Displays. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:652-653 [Conf ] Huizhang Shen , Jidi Zhao , Ruipu Yao Privacy Preserving Mining of Global Association Rules on Distributed Dataset. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:654-656 [Conf ] Won-Sik Kim , Woong-Kee Loh , Wook-Shin Han CC-GiST: Cache Conscious-Generalized Search Tree for Supporting Various Fast Intelligent Applications. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:657-658 [Conf ] Peng Zhang , Yunhai Tong , Shiwei Tang , Dongqing Yang KD3 Scheme for Privacy Preserving Data Mining. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:659-661 [Conf ] James D. Jones Using Logic Programming to Detect Deception on the Basis of Actions. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:662-663 [Conf ] Nishant Kumar , Jan De Beer , Jan Vanthienen , Marie-Francine Moens Intelligent Information Retrieval Tools for Police. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:664-665 [Conf ] Nishant Kumar , Jan De Beer , Jan Vanthienen , Marie-Francine Moens Evaluation of Information Retrieval and Text Mining Tools on Automatic Named Entity Extraction. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:666-667 [Conf ] James D. Jones , Hemant Joshi , Umit Topaloglu , Eric Nelson A Child's Story to Illustrate Automated Reasoning Systems Using Opportunity and History. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:668-670 [Conf ] Nazli Goharian , Alana Platt Detection Using Clustering Query Results. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:671-673 [Conf ] R. B. Bradford Application of Latent Semantic Indexing in Generating Graphs of Terrorist Networks. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:674-675 [Conf ] Dechang Pi , Xiaolin Qin , Wangfeng Gu Mining the Acceleration-Like Association Rules. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:676-677 [Conf ] Paul Thompson , Wei Zhang Analyzing Social Networks in E-Mail with Rich Syntactic Features. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:678-679 [Conf ] Mark Jyn-Huey Lim , Michael Negnevitsky , Jacky Hartnett E-mail Traffic Analysis Using Visualisation and Decision Trees. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:680-681 [Conf ] Michael Wolverton , Ian W. Harrison , John D. Lowrance , Andrés Rodríguez , Jérôme Thoméré Advanced Patterns and Matches in Link Analysis. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:682-683 [Conf ] Li Yang , Joseph M. Kizza , Raimund K. Ege A Flexible Context-Aware Authorization Framework for Mediation Systems. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:684-685 [Conf ] Sergio Roberto de Lima e Silva Filho , Mauro Roisenberg Continuous Authentication by Keystroke Dynamics Using Committee Machines. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:686-687 [Conf ] Hung Le Xuan , Nguyen Ngoc Diep , Yonil Zhung , Sungyoung Lee , Young-Koo Lee A Flexible and Scalable Access Control for Ubiquitous Computing Environments. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:688-689 [Conf ] Dalei Guo , Shuming Tang A Parallel System Strategy of Evaluation and Forecasting for Security Information with Artificial Society. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:690-691 [Conf ] Terrance Goan , Emi Fujioka , Ryan Kaneshiro , Lynn Gasch Identifying Information Provenance in Support of Intelligence Analysis, Sharing, and Protection. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:692-693 [Conf ] Jim Wakefield Intelligence Use of Unstructured Data in a Data Warehouse Environment. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:694-695 [Conf ] Cyril Onwubiko , Andrew P. Lenaghan An Evolutionary Approach in Threats Detection for Distributed Security Defence Systems. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:696-698 [Conf ] Amar Singh , Lawrence B. Holder Classification of Threats Via a Multi-sensor Security Portal. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:699-700 [Conf ] Ignacio J. Martinez-Moyano , Eliot H. Rich , Stephen H. Conrad Exploring the Detection Process: Integrating Judgment and Outcome Decomposition. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:701-703 [Conf ] Selwyn Russell Issues in Merging Internet Autonomous Systems for Emergency Communications. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:704-705 [Conf ] Yaodong Li , Huiguang He , Baihua Xiao , Chunheng Wang , Feiyue Wang CWME: A Framework of Group Support System for Emergency Responses. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:706-707 [Conf ] Jungan Chen Abnormal Detection Algorithm Based on Match Range Model. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:708-710 [Conf ] Emmanuel Hooper Experimental Validation and Analysis of an Intelligent Detection and Response Strategy to False Positives and Network Attacks. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:711-714 [Conf ] Jing-Xin Wang , Zhiying Wang , Kui Dai A PCA-LVQ Model for Intrusion Alert Analysis. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:715-716 [Conf ] Jian Kang , Yuan Zhang , Jiu-bin Ju A Formalized Taxonomy of DDoS Attacks Based on Similarity. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:717-719 [Conf ] Chien-Chuan Lin , Ming-Shi Wang Practical Intrusion Detection Using Genetic-Clustering. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:720-721 [Conf ] Shao-Shin Hung , Damon Shing-Min Liu An Ontology-Based Network Intrusion Detection System: A User-Oriented Approach. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:722-723 [Conf ] Byoung-Koo Kim , Young-Jun Heo , Jin-Tae Oh Design and Implementation of FPGA Based High-Performance Intrusion Detection System. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:724-725 [Conf ] Hyun Joo Kim , Jung-Chan Na , Jong S. Jang Anomaly Detection of Excessive Network Traffic Based on Ratio and Volume Analysis. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:726-727 [Conf ] William Eberle , Lawrence B. Holder Detecting Anomalies in Cargo Using Graph Properties. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:728-730 [Conf ] Yongsu Park , Yong Ho Song , Eul-Gyu Im Design of a Reliable Hardware Stack to Defend Against Frame Pointer Overwrite Attacks. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:731-732 [Conf ] Mohammad M. Masud , Latifur Khan , Ehab Al-Shaer Email Worm Detection Using Naïve Bayes and Support Vector Machine. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:733-734 [Conf ] Tran Van Phuong , Hung Le Xuan , Seong Jin Cho , Young-Koo Lee , Sungyoung Lee An Anomaly Detection Algorithm for Detecting Attacks in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:735-736 [Conf ] Yong Ho Song , Jung Min Park , Yongsu Park , Eul-Gyu Im A New Methodology of Analyzing Security Vulnerability for Network Services. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:737-738 [Conf ] Binod Vaidya , SangDuck Lee , Eung-Kon Kim , Seung Jo Han Using One-Time Password Based Authentication for Wireless IP Network. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:739-740 [Conf ] Taekyoung Kwon , Sang-ho Park Experimental Study on Wireless Sensor Network Security. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:741-743 [Conf ] Abu Md. Zafor Alam , Sajjad Waheed Terrorist Database: A Bangladesh Study. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:744-745 [Conf ] Abu Md. Zafor Alam , Abu Md. Siddique Alam , Mahjabeen Khan Terrorist Organizations and Effects of Terrorism in Bangladesh. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:746-747 [Conf ] Martine Naillon , Jean-François di Chiara , Bruno Eude , Christian Amathieux Decider.Track, a Revolutionary Cyber-Tracker for Antiterrorist Fight. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:748-749 [Conf ] Annette Sobel The Role of Information Superiority in the Global War on Terrorism. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:750-752 [Conf ] Hung Le Xuan , Pho Duc Giang , Yonil Zhung , Tran Van Phuong , Sungyoung Lee , Young-Koo Lee A Trust-Based Security Architecture for Ubiquitous Computing Systems. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:753-754 [Conf ] Hung Le Xuan , Hassan Jameel , Seong Jin Cho , Weiwei Yuan , Young-Koo Lee , Sungyoung Lee A Trust Model for Uncertain Interactions in Ubiquitous Environments. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:755-757 [Conf ] D. Chen , Xianbin Cao , Hong Qiao , Fei-Yue Wang A Multiclass Classifier to Detect Pedestrians and Acquire Their Moving Styles. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:758-759 [Conf ] Pho Duc Giang , Hung Le Xuan , Yonil Zhung , Sungyoung Lee , Young-Koo Lee A Home Firewall Solution for Securing Smart Spaces. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:760-761 [Conf ] Xinhong Zhang , Shejiao Li , Fan Zhang The Security Performance Evaluation of Digital Watermarking. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:762-763 [Conf ] Ong Song , Andrew Teoh Beng Jin , David Ngo Chek Ling A Novel Key Release Scheme from Biometrics. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:764-765 [Conf ] Olcay Kursun , Kenneth M. Reynolds , Oleg V. Favorov Matching Images of Never-Before-Seen Individuals in Large Law Enforcement Databases. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:766-767 [Conf ]