Abstract is missing.
- Computer-Mediated Collaborative Reasoning and Intelligence AnalysisDouglas Yeung, John D. Lowrance. 1-13 [doi]
- Using Importance Flooding to Identify Interesting Networks of Criminal ActivityByron Marshall, Hsinchun Chen. 14-25 [doi]
- Towards Automatic Event TrackingClive Best, Bruno Pouliquen, Ralf Steinberger, Erik Van der Goot, Ken Blackler, Flavio Fuart, Tamara Oellinger, Camelia Ignat. 26-34 [doi]
- Interactive Refinement of Filtering Queries on Streaming Intelligence DataYiming Ma, Dawit Yimam Seid. 35-47 [doi]
- Semantic Analytics VisualizationLeonidas Deligiannidis, Amit P. Sheth, Boanerges Aleman-Meza. 48-59 [doi]
- Visualizing Authorship for IdentificationAhmed Abbasi, Hsinchun Chen. 60-71 [doi]
- A Dictionary-Based Approach to Fast and Accurate Name Matching in Large Law Enforcement DatabasesOlcay Kursun, Anna Koufakou, Bing Chen, Michael Georgiopoulos, Kenneth M. Reynolds, Ronald Eaglin. 72-82 [doi]
- Iterative Relational Classification Through Three-State Epidemic DynamicsAram Galstyan, Paul R. Cohen. 83-92 [doi]
- Analyzing Entities and Topics in News Articles Using Statistical Topic ModelsDavid Newman, Chaitanya Chemudugunta, Padhraic Smyth, Mark Steyvers. 93-104 [doi]
- The Hats Simulator and Colab: An Integrated Information Fusion Challenge Problem and Collaborative Analysis EnvironmentClayton T. Morrison, Paul R. Cohen. 105-116 [doi]
- Cost-Sensitive Access Control for Illegitimate Confidential Access by InsidersYoung-Woo Seo, Katia P. Sycara. 117-128 [doi]
- Design and Implementation of a Policy-Based Privacy Authorization SystemHyang-Chang Choi, Seungyong Lee, HyungHyo Lee. 129-140 [doi]
- Privacy Preserving ::::DBSCAN:::: for Vertically Partitioned DataArtak Amirbekyan, Vladimir Estivill-Castro. 141-153 [doi]
- Inferring Privacy Information from Social NetworksJianming He, Wesley W. Chu, Zhenyu Liu. 154-165 [doi]
- Motion-Alert: Automatic Anomaly Detection in Massive Moving ObjectsXiaolei Li, Jiawei Han, Sangkyum Kim. 166-177 [doi]
- Adaptive Method for Monitoring Network and Early Detection of Internet WormsChen Bo, Binxing Fang, Xiao-chun Yun. 178-189 [doi]
- Measures to Detect Word Substitution in Intercepted CommunicationSzeWang Fong, David B. Skillicorn, Dmitri Roussinov. 190-200 [doi]
- Finding Hidden Group Structure in a Stream of CommunicationsJeffrey Baumes, Mark K. Goldberg, Mykola Hayvanovych, Malik Magdon-Ismail, William A. Wallace, Mohammed Javeed Zaki. 201-212 [doi]
- Collective Sampling and Analysis of High Order Tensors for Chatroom CommunicationsEvrim Acar, Seyit Ahmet Çamtepe, Bülent Yener. 213-224 [doi]
- Naturally Occurring Incidents as Facsimiles for Biochemical Terrorist AttacksJamie L. Griffiths, Donald J. Berndt, Alan R. Hevner. 225-236 [doi]
- DrillSim: A Simulation Framework for Emergency Response DrillsVidhya Balasubramanian, Daniel Massaguer, Sharad Mehrotra, Nalini Venkatasubramanian. 237-248 [doi]
- A Review of Public Health Syndromic Surveillance SystemsPing Yan, Daniel Dajun Zeng, Hsinchun Chen. 249-260 [doi]
- A Novel Mechanism to Defend Against Low-Rate Denial-of-Service AttacksWei Wei, Yabo Dong, Dongming Lu, Guang Jin, Honglan Lao. 261-271 [doi]
- Integrating IDS Alert Correlation and OS-Level Dependency TrackingYan Zhai, Peng Ning, Jun Xu. 272-284 [doi]
- Attacking Confidentiality: An Agent Based ApproachKapil Kumar Gupta, Baikunth Nath, Kotagiri Ramamohanarao, Ashraf U. Kazi. 285-296 [doi]
- Viability of Critical Mission of Grid ComputingFangfang Liu, Yan Chi, Yuliang Shi. 297-307 [doi]
- Suspect Vehicle Identification for Border Safety with Modified Mutual InformationSiddharth Kaza, Yuan Wang, Hsinchun Chen. 308-318 [doi]
- Experimental Analysis of Sequential Decision Making Algorithms for Port of Entry Inspection ProceduresSaket Anand, David Madigan, Richard J. Mammone, Saumitr Pathak, Fred Roberts. 319-330 [doi]
- Analyzing the Terrorist Social Networks with Visualization ToolsChristopher C. Yang, Nan Liu, Marc Sageman. 331-342 [doi]
- Tracing the Event Evolution of Terror Attacks from On-Line NewsChristopher C. Yang, Xiaodong Shi, Chih-Ping Wei. 343-354 [doi]
- Measuring Effectiveness of Anti-terrorism Programs Using Performance Logic ModelsRobert G. Ross. 355-366 [doi]
- On the Topology of the Dark Web of Terrorist GroupsJennifer Jie Xu, Hsinchun Chen, Yilu Zhou, Jialun Qin. 367-376 [doi]
- Indicators of Threat: Reflecting New TrendsYael Shahar. 377-388 [doi]
- Practical Algorithms for Destabilizing Terrorist NetworksNasrullah Memon, Henrik Legind Larsen. 389-400 [doi]
- Combating Terrorism Insurgency Resolution Software: A Research NoteJoshua Sinai. 401-406 [doi]
- A First Look at Domestic and International Global Terrorism Events, 1970-1997Laura Dugan, Gary LaFree, Heather Fogg. 407-419 [doi]
- Computational Modeling and Experimental Validation of Aviation Security ProceduresUwe Glässer, Sarah Rastkar, Mona Vajihollahi. 420-431 [doi]
- Intelligent Face Recognition Using Feature AveragingAdnan Khashman, Akram A. Garad. 432-439 [doi]
- Multi-perspective Video Analysis of Persons and Vehicles for Enhanced Situational AwarenessSangho Park, Mohan M. Trivedi. 440-451 [doi]
- Database Security Protection Via Inference DetectionYu Chen, Wesley W. Chu. 452-458 [doi]
- An Embedded Bayesian Network Hidden Markov Model for Digital ForensicsOlivier Y. de Vel, Nianjun Liu, Terry Caelli, Tibério S. Caetano. 459-465 [doi]
- Entity Workspace: An Evidence File That Aids Memory, Inference, and ReadingEric A. Bier, Edward W. Ishak, Ed Chi. 466-472 [doi]
- Strategic Intelligence Analysis: From Information Processing to Meaning-MakingYair Neuman, Liran Elihay, Meni Adler, Yoav Goldberg, Amir Viner. 473-478 [doi]
- A Multi-layer Naïve Bayes Model for Approximate Identity MatchingG. Alan Wang, Hsinchun Chen, Homa Atabakhsh. 479-484 [doi]
- Towards Optimal Police Patrol Routes with Genetic AlgorithmsDanilo Reis, Adriano Melo, André L. V. Coelho, Vasco Furtado. 485-491 [doi]
- SemanticSpy: Suspect Tracking Using Semantic Data in a Multimedia EnvironmentAmit Mathew, Amit P. Sheth, Leonidas Deligiannidis. 492-497 [doi]
- A Framework for Exploring Gray Web Forums: Analysis of Forum-Based Communities in TaiwanJau-Hwang Wang, Tianjun Fu, Hong-Ming Lin, Hsinchun Chen. 498-503 [doi]
- Detecting Deception in Person-of-Interest StatementsChristie M. Fuller, David P. Biros, Mark Adkins, Judee K. Burgoon, Jay F. Nunamaker, Steven Coulon. 504-509 [doi]
- Personal Information Management (PIM) for Intelligence AnalysisAntonio Badia. 510-515 [doi]
- Synergy: A Policy-Driven, Trust-Aware Information Dissemination FrameworkRagib Hasan, Marianne Winslett. 516-521 [doi]
- Sanitization of Databases for Refined Privacy Trade-OffsAhmed HajYasien, Vladimir Estivill-Castro, Rodney W. Topor. 522-528 [doi]
- Access Control Requirements for Preventing Insider ThreatsJoon S. Park, Joseph Giordano. 529-534 [doi]
- Venn Diagram Construction of Internet Chatroom ConversationsJames F. McCarthy, Mukkai S. Krishnamoorthy. 535-541 [doi]
- Spatial-Temporal Cross-Correlation Analysis: A New Measure and a Case Study in Infectious Disease InformaticsJian Ma, Daniel Dajun Zeng, Hsinchun Chen. 542-547 [doi]
- Integration of Instance-Based Learning and Text Mining for Identification of Potential Virus/Bacterium as Bio-terrorism WeaponsXiaohua Hu, Xiaodan Zhang, Daniel Duanqing Wu, Xiaohua Zhou, Peter Rumm. 548-553 [doi]
- An Info-Gap Approach to Policy Selection for Bio-terror ResponseAnna Yoffe, Yakov Ben-Haim. 554-559 [doi]
- Fighting Fear of a Bioterrorism Event with Information Technology: Real-World Examples and OpportunitiesDavid A. Bray, Benn R. Konsynski. 560-565 [doi]
- Covering Based Granular Computing for Conflict AnalysisWilliam Zhu, Fei-Yue Wang. 566-571 [doi]
- Hybrid Modeling for Large-Scale Worm Propagation SimulationsEul-Gyu Im, Jung-Taek Seo, Dong-Soo Kim, Yong Ho Song, Yongsu Park. 572-577 [doi]
- Worm Traffic Modeling for Network Performance AnalysisYufeng Chen, Yabo Dong, Dongming Lu, Yunhe Pan, Honglan Lao. 578-583 [doi]
- Analysis of Abnormalities of Worm Traffic for Obtaining Worm Detection VectorsZhengtao Xiang, Yufeng Chen, Yabo Dong, Honglan Lao. 584-589 [doi]
- A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks - A Friend ApproachShukor A. Razak, Steven Furnell, Nathan L. Clarke, Phillip J. Brooke. 590-595 [doi]
- Distributing the Cost of Securing a Transportation InfrastructureSudarshan S. Chawathe. 596-601 [doi]
- Multi-document Summarization for Terrorism Information ExtractionFu Lee Wang, Christopher C. Yang, Xiaodong Shi. 602-608 [doi]
- Rational Choice Deterrence and Israeli Counter-TerrorismDon Radlauer. 609-614 [doi]
- Content Analysis of Jihadi Extremist Groups VideosArab Salem, Edna Reid, Hsinchun Chen. 615-620 [doi]
- Exploring the Dark Side of the Web: Collection and Analysis of U.S. Extremist Online ForumsYilu Zhou, Jialun Qin, Guanpi Lai, Edna Reid, Hsinchun Chen. 621-626 [doi]
- Fast Pedestrian Detection Using Color InformationYan Wu Xu, Xianbin Cao, Hong Qiao, Fei-Yue Wang. 627-632 [doi]
- SG-Robot: CDMA Network-Operated Mobile Robot for Security Guard at HomeJe-Goon Ryu, Se-Kee Kil, Hyeon-Min Shim, Sang Moo Lee, Eung Hyuk Lee, Seung-Hong Hong. 633-638 [doi]
- Design of Syntactical Morphological and Semantical Analyzer (SMSA) for Processing Arabic TextsSamar Mouti, Fadel Sukkar. 639-641 [doi]
- Using Author Topic to Detect Insider Threats from Email TrafficJames S. Okolica, Gilbert L. Peterson, Robert F. Mills. 642-643 [doi]
- Digitized Forensic Investigation at P2P Copyright Controversy, InfringementDa-Yu Kao, Shiuh-Jeng Wang, Frank Fu-Yuan Huang. 644-646 [doi]
- On Off-Topic Web BrowsingNazli Goharian, Alana Platt, Ophir Frieder. 647-649 [doi]
- Mining Weighted Sequential Patterns Based on Length-Decreasing Support ConstraintsUnil Yun, John J. Leggett, TeongJoo Ong. 650-651 [doi]
- Intelligence Analysis Using High Resolution DisplaysTimothy Buennemeyer, John Booker, Andrew J. Sabri, Chris North. 652-653 [doi]
- Privacy Preserving Mining of Global Association Rules on Distributed DatasetHuizhang Shen, Jidi Zhao, Ruipu Yao. 654-656 [doi]
- CC-GiST: Cache Conscious-Generalized Search Tree for Supporting Various Fast Intelligent ApplicationsWon-Sik Kim, Woong-Kee Loh, Wook-Shin Han. 657-658 [doi]
- KD:::3::: Scheme for Privacy Preserving Data MiningPeng Zhang, Yunhai Tong, Shiwei Tang, Dongqing Yang. 659-661 [doi]
- Using Logic Programming to Detect Deception on the Basis of ActionsJames D. Jones. 662-663 [doi]
- Intelligent Information Retrieval Tools for PoliceNishant Kumar, Jan De Beer, Jan Vanthienen, Marie-Francine Moens. 664-665 [doi]
- Evaluation of Information Retrieval and Text Mining Tools on Automatic Named Entity ExtractionNishant Kumar, Jan De Beer, Jan Vanthienen, Marie-Francine Moens. 666-667 [doi]
- A Child s Story to Illustrate Automated Reasoning Systems Using Opportunity and HistoryJames D. Jones, Hemant Joshi, Umit Topaloglu, Eric Nelson. 668-670 [doi]
- Detection Using Clustering Query ResultsNazli Goharian, Alana Platt. 671-673 [doi]
- Application of Latent Semantic Indexing in Generating Graphs of Terrorist NetworksR. B. Bradford. 674-675 [doi]
- Mining the Acceleration-Like Association RulesDechang Pi, Xiaolin Qin, Wangfeng Gu. 676-677 [doi]
- Analyzing Social Networks in E-Mail with Rich Syntactic FeaturesPaul Thompson, Wei Zhang. 678-679 [doi]
- E-mail Traffic Analysis Using Visualisation and Decision TreesMark Jyn-Huey Lim, Michael Negnevitsky, Jacky Hartnett. 680-681 [doi]
- Advanced Patterns and Matches in Link AnalysisMichael Wolverton, Ian W. Harrison, John D. Lowrance, Andrés Rodríguez, Jérôme Thoméré. 682-683 [doi]
- A Flexible Context-Aware Authorization Framework for Mediation SystemsLi Yang, Joseph M. Kizza, Raimund K. Ege. 684-685 [doi]
- Continuous Authentication by Keystroke Dynamics Using Committee MachinesSergio Roberto de Lima e Silva Filho, Mauro Roisenberg. 686-687 [doi]
- A Flexible and Scalable Access Control for Ubiquitous Computing EnvironmentsHung Le Xuan, Nguyen Ngoc Diep, Yonil Zhung, Sungyoung Lee, Young-Koo Lee. 688-689 [doi]
- A Parallel System Strategy of Evaluation and Forecasting for Security Information with Artificial SocietyDalei Guo, Shuming Tang. 690-691 [doi]
- Identifying Information Provenance in Support of Intelligence Analysis, Sharing, and ProtectionTerrance Goan, Emi Fujioka, Ryan Kaneshiro, Lynn Gasch. 692-693 [doi]
- Intelligence Use of Unstructured Data in a Data Warehouse EnvironmentJim Wakefield. 694-695 [doi]
- An Evolutionary Approach in Threats Detection for Distributed Security Defence SystemsCyril Onwubiko, Andrew P. Lenaghan. 696-698 [doi]
- Classification of Threats Via a Multi-sensor Security PortalAmar Singh, Lawrence B. Holder. 699-700 [doi]
- Exploring the Detection Process: Integrating Judgment and Outcome DecompositionIgnacio J. Martinez-Moyano, Eliot H. Rich, Stephen H. Conrad. 701-703 [doi]
- Issues in Merging Internet Autonomous Systems for Emergency CommunicationsSelwyn Russell. 704-705 [doi]
- CWME: A Framework of Group Support System for Emergency ResponsesYaodong Li, Huiguang He, Baihua Xiao, Chunheng Wang, Feiyue Wang. 706-707 [doi]
- Abnormal Detection Algorithm Based on Match Range ModelJungan Chen. 708-710 [doi]
- Experimental Validation and Analysis of an Intelligent Detection and Response Strategy to False Positives and Network AttacksEmmanuel Hooper. 711-714 [doi]
- A PCA-LVQ Model for Intrusion Alert AnalysisJing-Xin Wang, Zhiying Wang, Kui Dai. 715-716 [doi]
- A Formalized Taxonomy of DDoS Attacks Based on SimilarityJian Kang, Yuan Zhang, Jiu-bin Ju. 717-719 [doi]
- Practical Intrusion Detection Using Genetic-ClusteringChien-Chuan Lin, Ming-Shi Wang. 720-721 [doi]
- An Ontology-Based Network Intrusion Detection System: A User-Oriented ApproachShao-Shin Hung, Damon Shing-Min Liu. 722-723 [doi]
- Design and Implementation of FPGA Based High-Performance Intrusion Detection SystemByoung-Koo Kim, Young-Jun Heo, Jin-Tae Oh. 724-725 [doi]
- Anomaly Detection of Excessive Network Traffic Based on Ratio and Volume AnalysisHyun Joo Kim, Jung-Chan Na, Jong S. Jang. 726-727 [doi]
- Detecting Anomalies in Cargo Using Graph PropertiesWilliam Eberle, Lawrence B. Holder. 728-730 [doi]
- Design of a Reliable Hardware Stack to Defend Against Frame Pointer Overwrite AttacksYongsu Park, Yong Ho Song, Eul-Gyu Im. 731-732 [doi]
- Email Worm Detection Using Naïve Bayes and Support Vector MachineMohammad M. Masud, Latifur Khan, Ehab Al-Shaer. 733-734 [doi]
- An Anomaly Detection Algorithm for Detecting Attacks in Wireless Sensor NetworksTran Van Phuong, Hung Le Xuan, Seong Jin Cho, Young-Koo Lee, Sungyoung Lee. 735-736 [doi]
- A New Methodology of Analyzing Security Vulnerability for Network ServicesYong Ho Song, Jung Min Park, Yongsu Park, Eul-Gyu Im. 737-738 [doi]
- Using One-Time Password Based Authentication for Wireless IP NetworkBinod Vaidya, SangDuck Lee, Eung Kon Kim, Seung Jo Han. 739-740 [doi]
- Experimental Study on Wireless Sensor Network SecurityTaekyoung Kwon, Sang Ho Park. 741-743 [doi]
- Terrorist Database: A Bangladesh StudyAbu Md. Zafor Alam, Sajjad Waheed. 744-745 [doi]
- Terrorist Organizations and Effects of Terrorism in BangladeshAbu Md. Zafor Alam, Abu Md. Siddique Alam, Mahjabeen Khan. 746-747 [doi]
- Decider.Track, a Revolutionary Cyber-Tracker for Antiterrorist FightMartine Naillon, Jean-François di Chiara, Bruno Eude, Christian Amathieux. 748-749 [doi]
- The Role of Information Superiority in the Global War on TerrorismAnnette Sobel. 750-752 [doi]
- A Trust-Based Security Architecture for Ubiquitous Computing SystemsHung Le Xuan, Pho Duc Giang, Yonil Zhung, Tran Van Phuong, Sungyoung Lee, Young-Koo Lee. 753-754 [doi]
- A Trust Model for Uncertain Interactions in Ubiquitous EnvironmentsHung Le Xuan, Hassan Jameel, Seong Jin Cho, Weiwei Yuan, Young-Koo Lee, Sungyoung Lee. 755-757 [doi]
- A Multiclass Classifier to Detect Pedestrians and Acquire Their Moving StylesD. Chen, Xianbin Cao, Hong Qiao, Fei-Yue Wang. 758-759 [doi]
- A Home Firewall Solution for Securing Smart SpacesPho Duc Giang, Hung Le Xuan, Yonil Zhung, Sungyoung Lee, Young-Koo Lee. 760-761 [doi]
- The Security Performance Evaluation of Digital WatermarkingXinhong Zhang, Shejiao Li, Fan Zhang. 762-763 [doi]
- A Novel Key Release Scheme from BiometricsOng Song, Andrew Teoh Beng Jin, David Ngo Chek Ling. 764-765 [doi]
- Matching Images of Never-Before-Seen Individuals in Large Law Enforcement DatabasesOlcay Kursun, Kenneth M. Reynolds, Oleg V. Favorov. 766-767 [doi]