The SCEAS System
Navigation Menu

Conferences in DBLP

Intelligence and Security Informatics (isi)
2006 (conf/isi/2006)

  1. Douglas Yeung, John D. Lowrance
    Computer-Mediated Collaborative Reasoning and Intelligence Analysis. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:1-13 [Conf]
  2. Byron Marshall, Hsinchun Chen
    Using Importance Flooding to Identify Interesting Networks of Criminal Activity. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:14-25 [Conf]
  3. Clive Best, Bruno Pouliquen, Ralf Steinberger, Erik Van der Goot, Ken Blackler, Flavio Fuart, Tamara Oellinger, Camelia Ignat
    Towards Automatic Event Tracking. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:26-34 [Conf]
  4. Yiming Ma, Dawit Yimam Seid
    Interactive Refinement of Filtering Queries on Streaming Intelligence Data. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:35-47 [Conf]
  5. Leonidas Deligiannidis, Amit P. Sheth, Boanerges Aleman-Meza
    Semantic Analytics Visualization. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:48-59 [Conf]
  6. Ahmed Abbasi, Hsinchun Chen
    Visualizing Authorship for Identification. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:60-71 [Conf]
  7. Olcay Kursun, Anna Koufakou, Bing Chen, Michael Georgiopoulos, Kenneth M. Reynolds, Ronald Eaglin
    A Dictionary-Based Approach to Fast and Accurate Name Matching in Large Law Enforcement Databases. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:72-82 [Conf]
  8. Aram Galstyan, Paul R. Cohen
    Iterative Relational Classification Through Three-State Epidemic Dynamics. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:83-92 [Conf]
  9. David Newman, Chaitanya Chemudugunta, Padhraic Smyth, Mark Steyvers
    Analyzing Entities and Topics in News Articles Using Statistical Topic Models. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:93-104 [Conf]
  10. Clayton T. Morrison, Paul R. Cohen
    The Hats Simulator and Colab: An Integrated Information Fusion Challenge Problem and Collaborative Analysis Environment. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:105-116 [Conf]
  11. Young-Woo Seo, Katia P. Sycara
    Cost-Sensitive Access Control for Illegitimate Confidential Access by Insiders. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:117-128 [Conf]
  12. Hyang-Chang Choi, Seungyong Lee, HyungHyo Lee
    Design and Implementation of a Policy-Based Privacy Authorization System. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:129-140 [Conf]
  13. Artak Amirbekyan, Vladimir Estivill-Castro
    Privacy Preserving DBSCAN for Vertically Partitioned Data. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:141-153 [Conf]
  14. Jianming He, Wesley W. Chu, Zhenyu Liu
    Inferring Privacy Information from Social Networks. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:154-165 [Conf]
  15. Xiaolei Li, Jiawei Han, Sangkyum Kim
    Motion-Alert: Automatic Anomaly Detection in Massive Moving Objects. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:166-177 [Conf]
  16. Chen Bo, Binxing Fang, Xiao-chun Yun
    Adaptive Method for Monitoring Network and Early Detection of Internet Worms. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:178-189 [Conf]
  17. SzeWang Fong, David B. Skillicorn, Dmitri Roussinov
    Measures to Detect Word Substitution in Intercepted Communication. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:190-200 [Conf]
  18. Jeffrey Baumes, Mark K. Goldberg, Mykola Hayvanovych, Malik Magdon-Ismail, William A. Wallace, Mohammed Javeed Zaki
    Finding Hidden Group Structure in a Stream of Communications. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:201-212 [Conf]
  19. Evrim Acar, Seyit Ahmet Çamtepe, Bülent Yener
    Collective Sampling and Analysis of High Order Tensors for Chatroom Communications. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:213-224 [Conf]
  20. Jamie L. Griffiths, Donald J. Berndt, Alan R. Hevner
    Naturally Occurring Incidents as Facsimiles for Biochemical Terrorist Attacks. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:225-236 [Conf]
  21. Vidhya Balasubramanian, Daniel Massaguer, Sharad Mehrotra, Nalini Venkatasubramanian
    DrillSim: A Simulation Framework for Emergency Response Drills. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:237-248 [Conf]
  22. Ping Yan, Daniel Dajun Zeng, Hsinchun Chen
    A Review of Public Health Syndromic Surveillance Systems. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:249-260 [Conf]
  23. Wei Wei, Yabo Dong, Dongming Lu, Guang Jin, Honglan Lao
    A Novel Mechanism to Defend Against Low-Rate Denial-of-Service Attacks. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:261-271 [Conf]
  24. Yan Zhai, Peng Ning, Jun Xu
    Integrating IDS Alert Correlation and OS-Level Dependency Tracking. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:272-284 [Conf]
  25. Kapil Kumar Gupta, Baikunth Nath, Kotagiri Ramamohanarao, Ashraf U. Kazi
    Attacking Confidentiality: An Agent Based Approach. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:285-296 [Conf]
  26. Fangfang Liu, Yan Chi, Yuliang Shi
    Viability of Critical Mission of Grid Computing. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:297-307 [Conf]
  27. Siddharth Kaza, Yuan Wang, Hsinchun Chen
    Suspect Vehicle Identification for Border Safety with Modified Mutual Information. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:308-318 [Conf]
  28. Saket Anand, David Madigan, Richard J. Mammone, Saumitr Pathak, Fred Roberts
    Experimental Analysis of Sequential Decision Making Algorithms for Port of Entry Inspection Procedures. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:319-330 [Conf]
  29. Christopher C. Yang, Nan Liu, Marc Sageman
    Analyzing the Terrorist Social Networks with Visualization Tools. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:331-342 [Conf]
  30. Christopher C. Yang, Xiaodong Shi, Chih-Ping Wei
    Tracing the Event Evolution of Terror Attacks from On-Line News. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:343-354 [Conf]
  31. Robert G. Ross
    Measuring Effectiveness of Anti-terrorism Programs Using Performance Logic Models. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:355-366 [Conf]
  32. Jennifer Jie Xu, Hsinchun Chen, Yilu Zhou, Jialun Qin
    On the Topology of the Dark Web of Terrorist Groups. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:367-376 [Conf]
  33. Yael Shahar
    Indicators of Threat: Reflecting New Trends. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:377-388 [Conf]
  34. Nasrullah Memon, Henrik Legind Larsen
    Practical Algorithms for Destabilizing Terrorist Networks. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:389-400 [Conf]
  35. Joshua Sinai
    Combating Terrorism Insurgency Resolution Software: A Research Note. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:401-406 [Conf]
  36. Laura Dugan, Gary LaFree, Heather Fogg
    A First Look at Domestic and International Global Terrorism Events, 1970-1997. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:407-419 [Conf]
  37. Uwe Glässer, Sarah Rastkar, Mona Vajihollahi
    Computational Modeling and Experimental Validation of Aviation Security Procedures. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:420-431 [Conf]
  38. Adnan Khashman, Akram A. Garad
    Intelligent Face Recognition Using Feature Averaging. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:432-439 [Conf]
  39. Sangho Park, Mohan M. Trivedi
    Multi-perspective Video Analysis of Persons and Vehicles for Enhanced Situational Awareness. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:440-451 [Conf]
  40. Yu Chen, Wesley W. Chu
    Database Security Protection Via Inference Detection. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:452-458 [Conf]
  41. Olivier Y. de Vel, Nianjun Liu, Terry Caelli, Tibério S. Caetano
    An Embedded Bayesian Network Hidden Markov Model for Digital Forensics. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:459-465 [Conf]
  42. Eric A. Bier, Edward W. Ishak, Ed Chi
    Entity Workspace: An Evidence File That Aids Memory, Inference, and Reading. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:466-472 [Conf]
  43. Yair Neuman, Liran Elihay, Meni Adler, Yoav Goldberg, Amir Viner
    Strategic Intelligence Analysis: From Information Processing to Meaning-Making. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:473-478 [Conf]
  44. G. Alan Wang, Hsinchun Chen, Homa Atabakhsh
    A Multi-layer Naïve Bayes Model for Approximate Identity Matching. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:479-484 [Conf]
  45. Danilo Reis, Adriano Melo, André L. V. Coelho, Vasco Furtado
    Towards Optimal Police Patrol Routes with Genetic Algorithms. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:485-491 [Conf]
  46. Amit Mathew, Amit P. Sheth, Leonidas Deligiannidis
    SemanticSpy: Suspect Tracking Using Semantic Data in a Multimedia Environment. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:492-497 [Conf]
  47. Jau-Hwang Wang, Tianjun Fu, Hong-Ming Lin, Hsinchun Chen
    A Framework for Exploring Gray Web Forums: Analysis of Forum-Based Communities in Taiwan. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:498-503 [Conf]
  48. Christie Fuller, David P. Biros, Mark Adkins, Judee K. Burgoon, Jay F. Nunamaker, Steven Coulon
    Detecting Deception in Person-of-Interest Statements. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:504-509 [Conf]
  49. Antonio Badia
    Personal Information Management (PIM) for Intelligence Analysis. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:510-515 [Conf]
  50. Ragib Hasan, Marianne Winslett
    Synergy: A Policy-Driven, Trust-Aware Information Dissemination Framework. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:516-521 [Conf]
  51. Ahmed HajYasien, Vladimir Estivill-Castro, Rodney W. Topor
    Sanitization of Databases for Refined Privacy Trade-Offs. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:522-528 [Conf]
  52. Joon S. Park, Joseph Giordano
    Access Control Requirements for Preventing Insider Threats. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:529-534 [Conf]
  53. James F. McCarthy, Mukkai S. Krishnamoorthy
    Venn Diagram Construction of Internet Chatroom Conversations. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:535-541 [Conf]
  54. Jian Ma, Daniel Dajun Zeng, Hsinchun Chen
    Spatial-Temporal Cross-Correlation Analysis: A New Measure and a Case Study in Infectious Disease Informatics. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:542-547 [Conf]
  55. Xiaohua Hu, Xiaodan Zhang, Daniel Duanqing Wu, Xiaohua Zhou, Peter Rumm
    Integration of Instance-Based Learning and Text Mining for Identification of Potential Virus/Bacterium as Bio-terrorism Weapons. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:548-553 [Conf]
  56. Anna Yoffe, Yakov Ben-Haim
    An Info-Gap Approach to Policy Selection for Bio-terror Response. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:554-559 [Conf]
  57. David A. Bray, Benn R. Konsynski
    Fighting Fear of a Bioterrorism Event with Information Technology: Real-World Examples and Opportunities. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:560-565 [Conf]
  58. William Zhu, Fei-Yue Wang
    Covering Based Granular Computing for Conflict Analysis. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:566-571 [Conf]
  59. Eul-Gyu Im, Jung-Taek Seo, Dong-Soo Kim, Yong Ho Song, Yongsu Park
    Hybrid Modeling for Large-Scale Worm Propagation Simulations. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:572-577 [Conf]
  60. Yufeng Chen, Yabo Dong, Dongming Lu, Yunhe Pan, Honglan Lao
    Worm Traffic Modeling for Network Performance Analysis. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:578-583 [Conf]
  61. Zhengtao Xiang, Yufeng Chen, Yabo Dong, Honglan Lao
    Analysis of Abnormalities of Worm Traffic for Obtaining Worm Detection Vectors. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:584-589 [Conf]
  62. Shukor A. Razak, Steven Furnell, Nathan L. Clarke, Phillip J. Brooke
    A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks - A Friend Approach. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:590-595 [Conf]
  63. Sudarshan S. Chawathe
    Distributing the Cost of Securing a Transportation Infrastructure. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:596-601 [Conf]
  64. Fu Lee Wang, Christopher C. Yang, Xiaodong Shi
    Multi-document Summarization for Terrorism Information Extraction. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:602-608 [Conf]
  65. Don Radlauer
    Rational Choice Deterrence and Israeli Counter-Terrorism. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:609-614 [Conf]
  66. Arab Salem, Edna Reid, Hsinchun Chen
    Content Analysis of Jihadi Extremist Groups' Videos. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:615-620 [Conf]
  67. Yilu Zhou, Jialun Qin, Guanpi Lai, Edna Reid, Hsinchun Chen
    Exploring the Dark Side of the Web: Collection and Analysis of U.S. Extremist Online Forums. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:621-626 [Conf]
  68. Yan Wu Xu, Xianbin Cao, Hong Qiao, Fei-Yue Wang
    Fast Pedestrian Detection Using Color Information. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:627-632 [Conf]
  69. Je-Goon Ryu, Se-Kee Kil, Hyeon-Min Shim, Sang-Moo Lee, Eung-Hyuk Lee, Seung-Hong Hong
    SG-Robot: CDMA Network-Operated Mobile Robot for Security Guard at Home. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:633-638 [Conf]
  70. Samar Mouti, Fadel Sukkar
    Design of Syntactical Morphological and Semantical Analyzer (SMSA) for Processing Arabic Texts. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:639-641 [Conf]
  71. James S. Okolica, Gilbert L. Peterson, Robert F. Mills
    Using Author Topic to Detect Insider Threats from Email Traffic. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:642-643 [Conf]
  72. Da-Yu Kao, Shiuh-Jeng Wang, Frank Fu-Yuan Huang
    Digitized Forensic Investigation at P2P Copyright Controversy, Infringement. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:644-646 [Conf]
  73. Nazli Goharian, Alana Platt, Ophir Frieder
    On Off-Topic Web Browsing. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:647-649 [Conf]
  74. Unil Yun, John J. Leggett, TeongJoo Ong
    Mining Weighted Sequential Patterns Based on Length-Decreasing Support Constraints. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:650-651 [Conf]
  75. Timothy Buennemeyer, John Booker, Andrew J. Sabri, Chris North
    Intelligence Analysis Using High Resolution Displays. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:652-653 [Conf]
  76. Huizhang Shen, Jidi Zhao, Ruipu Yao
    Privacy Preserving Mining of Global Association Rules on Distributed Dataset. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:654-656 [Conf]
  77. Won-Sik Kim, Woong-Kee Loh, Wook-Shin Han
    CC-GiST: Cache Conscious-Generalized Search Tree for Supporting Various Fast Intelligent Applications. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:657-658 [Conf]
  78. Peng Zhang, Yunhai Tong, Shiwei Tang, Dongqing Yang
    KD3 Scheme for Privacy Preserving Data Mining. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:659-661 [Conf]
  79. James D. Jones
    Using Logic Programming to Detect Deception on the Basis of Actions. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:662-663 [Conf]
  80. Nishant Kumar, Jan De Beer, Jan Vanthienen, Marie-Francine Moens
    Intelligent Information Retrieval Tools for Police. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:664-665 [Conf]
  81. Nishant Kumar, Jan De Beer, Jan Vanthienen, Marie-Francine Moens
    Evaluation of Information Retrieval and Text Mining Tools on Automatic Named Entity Extraction. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:666-667 [Conf]
  82. James D. Jones, Hemant Joshi, Umit Topaloglu, Eric Nelson
    A Child's Story to Illustrate Automated Reasoning Systems Using Opportunity and History. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:668-670 [Conf]
  83. Nazli Goharian, Alana Platt
    Detection Using Clustering Query Results. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:671-673 [Conf]
  84. R. B. Bradford
    Application of Latent Semantic Indexing in Generating Graphs of Terrorist Networks. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:674-675 [Conf]
  85. Dechang Pi, Xiaolin Qin, Wangfeng Gu
    Mining the Acceleration-Like Association Rules. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:676-677 [Conf]
  86. Paul Thompson, Wei Zhang
    Analyzing Social Networks in E-Mail with Rich Syntactic Features. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:678-679 [Conf]
  87. Mark Jyn-Huey Lim, Michael Negnevitsky, Jacky Hartnett
    E-mail Traffic Analysis Using Visualisation and Decision Trees. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:680-681 [Conf]
  88. Michael Wolverton, Ian W. Harrison, John D. Lowrance, Andrés Rodríguez, Jérôme Thoméré
    Advanced Patterns and Matches in Link Analysis. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:682-683 [Conf]
  89. Li Yang, Joseph M. Kizza, Raimund K. Ege
    A Flexible Context-Aware Authorization Framework for Mediation Systems. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:684-685 [Conf]
  90. Sergio Roberto de Lima e Silva Filho, Mauro Roisenberg
    Continuous Authentication by Keystroke Dynamics Using Committee Machines. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:686-687 [Conf]
  91. Hung Le Xuan, Nguyen Ngoc Diep, Yonil Zhung, Sungyoung Lee, Young-Koo Lee
    A Flexible and Scalable Access Control for Ubiquitous Computing Environments. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:688-689 [Conf]
  92. Dalei Guo, Shuming Tang
    A Parallel System Strategy of Evaluation and Forecasting for Security Information with Artificial Society. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:690-691 [Conf]
  93. Terrance Goan, Emi Fujioka, Ryan Kaneshiro, Lynn Gasch
    Identifying Information Provenance in Support of Intelligence Analysis, Sharing, and Protection. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:692-693 [Conf]
  94. Jim Wakefield
    Intelligence Use of Unstructured Data in a Data Warehouse Environment. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:694-695 [Conf]
  95. Cyril Onwubiko, Andrew P. Lenaghan
    An Evolutionary Approach in Threats Detection for Distributed Security Defence Systems. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:696-698 [Conf]
  96. Amar Singh, Lawrence B. Holder
    Classification of Threats Via a Multi-sensor Security Portal. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:699-700 [Conf]
  97. Ignacio J. Martinez-Moyano, Eliot H. Rich, Stephen H. Conrad
    Exploring the Detection Process: Integrating Judgment and Outcome Decomposition. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:701-703 [Conf]
  98. Selwyn Russell
    Issues in Merging Internet Autonomous Systems for Emergency Communications. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:704-705 [Conf]
  99. Yaodong Li, Huiguang He, Baihua Xiao, Chunheng Wang, Feiyue Wang
    CWME: A Framework of Group Support System for Emergency Responses. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:706-707 [Conf]
  100. Jungan Chen
    Abnormal Detection Algorithm Based on Match Range Model. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:708-710 [Conf]
  101. Emmanuel Hooper
    Experimental Validation and Analysis of an Intelligent Detection and Response Strategy to False Positives and Network Attacks. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:711-714 [Conf]
  102. Jing-Xin Wang, Zhiying Wang, Kui Dai
    A PCA-LVQ Model for Intrusion Alert Analysis. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:715-716 [Conf]
  103. Jian Kang, Yuan Zhang, Jiu-bin Ju
    A Formalized Taxonomy of DDoS Attacks Based on Similarity. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:717-719 [Conf]
  104. Chien-Chuan Lin, Ming-Shi Wang
    Practical Intrusion Detection Using Genetic-Clustering. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:720-721 [Conf]
  105. Shao-Shin Hung, Damon Shing-Min Liu
    An Ontology-Based Network Intrusion Detection System: A User-Oriented Approach. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:722-723 [Conf]
  106. Byoung-Koo Kim, Young-Jun Heo, Jin-Tae Oh
    Design and Implementation of FPGA Based High-Performance Intrusion Detection System. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:724-725 [Conf]
  107. Hyun Joo Kim, Jung-Chan Na, Jong S. Jang
    Anomaly Detection of Excessive Network Traffic Based on Ratio and Volume Analysis. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:726-727 [Conf]
  108. William Eberle, Lawrence B. Holder
    Detecting Anomalies in Cargo Using Graph Properties. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:728-730 [Conf]
  109. Yongsu Park, Yong Ho Song, Eul-Gyu Im
    Design of a Reliable Hardware Stack to Defend Against Frame Pointer Overwrite Attacks. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:731-732 [Conf]
  110. Mohammad M. Masud, Latifur Khan, Ehab Al-Shaer
    Email Worm Detection Using Naïve Bayes and Support Vector Machine. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:733-734 [Conf]
  111. Tran Van Phuong, Hung Le Xuan, Seong Jin Cho, Young-Koo Lee, Sungyoung Lee
    An Anomaly Detection Algorithm for Detecting Attacks in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:735-736 [Conf]
  112. Yong Ho Song, Jung Min Park, Yongsu Park, Eul-Gyu Im
    A New Methodology of Analyzing Security Vulnerability for Network Services. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:737-738 [Conf]
  113. Binod Vaidya, SangDuck Lee, Eung-Kon Kim, Seung Jo Han
    Using One-Time Password Based Authentication for Wireless IP Network. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:739-740 [Conf]
  114. Taekyoung Kwon, Sang-ho Park
    Experimental Study on Wireless Sensor Network Security. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:741-743 [Conf]
  115. Abu Md. Zafor Alam, Sajjad Waheed
    Terrorist Database: A Bangladesh Study. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:744-745 [Conf]
  116. Abu Md. Zafor Alam, Abu Md. Siddique Alam, Mahjabeen Khan
    Terrorist Organizations and Effects of Terrorism in Bangladesh. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:746-747 [Conf]
  117. Martine Naillon, Jean-François di Chiara, Bruno Eude, Christian Amathieux
    Decider.Track, a Revolutionary Cyber-Tracker for Antiterrorist Fight. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:748-749 [Conf]
  118. Annette Sobel
    The Role of Information Superiority in the Global War on Terrorism. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:750-752 [Conf]
  119. Hung Le Xuan, Pho Duc Giang, Yonil Zhung, Tran Van Phuong, Sungyoung Lee, Young-Koo Lee
    A Trust-Based Security Architecture for Ubiquitous Computing Systems. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:753-754 [Conf]
  120. Hung Le Xuan, Hassan Jameel, Seong Jin Cho, Weiwei Yuan, Young-Koo Lee, Sungyoung Lee
    A Trust Model for Uncertain Interactions in Ubiquitous Environments. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:755-757 [Conf]
  121. D. Chen, Xianbin Cao, Hong Qiao, Fei-Yue Wang
    A Multiclass Classifier to Detect Pedestrians and Acquire Their Moving Styles. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:758-759 [Conf]
  122. Pho Duc Giang, Hung Le Xuan, Yonil Zhung, Sungyoung Lee, Young-Koo Lee
    A Home Firewall Solution for Securing Smart Spaces. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:760-761 [Conf]
  123. Xinhong Zhang, Shejiao Li, Fan Zhang
    The Security Performance Evaluation of Digital Watermarking. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:762-763 [Conf]
  124. Ong Song, Andrew Teoh Beng Jin, David Ngo Chek Ling
    A Novel Key Release Scheme from Biometrics. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:764-765 [Conf]
  125. Olcay Kursun, Kenneth M. Reynolds, Oleg V. Favorov
    Matching Images of Never-Before-Seen Individuals in Large Law Enforcement Databases. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:766-767 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002