Abstract is missing.
- Sequential Decision Making Algorithms for Port of Entry Inspection: Overcoming Computational ChallengesDavid Madigan, Sushil Mittal, Fred Roberts. 1-7 [doi]
- Using Digital Chains of Custody on Constrained Devices to Verify EvidencePhillip G. Bradford, Daniel A. Ray. 8-15 [doi]
- Approach for Discovering and Handling Crisis in a Service-Oriented EnvironmentNabil R. Adam, Vandana Pursnani Janeja, Aabhas V. Paliwal, Basit Shafiq, Cedric Ulmer, Volker Gersabeck, Anne Hardy, Christof Bornhövd, Joachim Schaper. 16-24 [doi]
- A Quick Group Decision-making Planning Method for Emergency ResponseHuizhang Shen, Jidi Zhao. 25-31 [doi]
- Architecture for an Automatic Customized Warning SystemMirko Montanari, Sharad Mehrotra, Nalini Venkatasubramanian. 32-39 [doi]
- Dynamic Social Network Analysis of a Dark Network: Identifying Significant FacilitatorsSiddharth Kaza, Daning Hu, Hsinchun Chen. 40-46 [doi]
- A Dynamic Social Network Software Platform for Counter-Terrorism Decision SupportRichard M. Adler. 47-54 [doi]
- Terrorism and Crime Related Weblog Social Network: Link, Content Analysis and Information VisualizationChristopher C. Yang, Tobun D. Ng. 55-58 [doi]
- Deployment of DNIDS in Social NetworksMeytal Tubi, Rami Puzis, Yuval Elovici. 59-65 [doi]
- A Framework for an Adaptive Intrusion Detection System using Bayesian NetworkFarah Jemili, Montaceur Zaghdoud, Mohamed Ben Ahmed. 66-70 [doi]
- Classification of Attributes and Behavior in Risk Management Using Bayesian NetworksRam Dantu, Prakash Kolan, Robert Akl, Kall Loper. 71-74 [doi]
- Fine-Grained Reputation-based Routing in Wireless Ad Hoc NetworksLi Yang, Joseph M. Kizza, Alma Cemerlic, Feiqiong Liu. 75-78 [doi]
- Organizing Hot-Spot Police Patrol RoutesSudarshan S. Chawathe. 79-86 [doi]
- A Host Architecture for Automobile License Plate RecognitionMaury Mitchell, Matthew Hudnall, David Brown, David Cordes, Randy K. Smith, Allen S. Parrish. 87-94 [doi]
- A Layered Dempster-Shafer Approach to Scenario Construction and AnalysisAntonio Sanfilippo, Bob Baddeley, Christian Posse, Paul Whitney. 95-102 [doi]
- Forecasting Terrorist Groups Warfare: Conventional to CBRNJoshua Sinai. 103-106 [doi]
- Host Based Intrusion Detection using Machine LearningRobert Moskovitch, Shay Pluderman, Ido Gus, Dima Stopel, Clint Feher, Yisrael Parmet, Yuval Shahar, Yuval Elovici. 107-114 [doi]
- MCA2CM: Multimedia Context-Aware Access Control ModelBechara al Bouna, Richard Chbeir, Johel Miteran. 115-123 [doi]
- Surface Transportation and Cyber-Infrastructure: An Exploratory StudySangmi Chai, Raj Sharman, Smitha Patil, Shruta Satam, H. Raghav Rao, Shambhu J. Upadhyaya. 124-128 [doi]
- A Networking Identity Authentication Scheme Combining Fingerprint Coding and Identity Based EncryptionLiang Li, Wei-Qiang Jiang, Jie Tian, Yi Xian Yang, Cai-Ping Jiang, Zhe Wu, Xin Yang. 129-132 [doi]
- On-Demand Information Portals for Disaster SituationsYiming Ma, Dmitri V. Kalashnikov, Ramaswamy Hariharan, Sharad Mehrotra, Nalini Venkatasubramanian, Naveen Ashish, Jay Lickfett. 133-136 [doi]
- Design and Implementation of a Middleware for Sentient SpacesBijit Hore, Hojjat Jafarpour, Ramesh Jain, Shengyue Ji, Daniel Massaguer, Sharad Mehrotra, Nalini Venkatasubramanian, Utz Westermann. 137-144 [doi]
- DOTS: Detection of Off-Topic Search via Result ClusteringNazli Goharian, Alana Platt. 145-151 [doi]
- An Investigation of Heuristics of Human Judgment in Detecting Deception and Potential Implications in Countering Social EngineeringTiantian Qin, Judee K. Burgoon. 152-159 [doi]
- Categorization of Blogs through Similarity AnalysisHwan-Joon Choi, Mukkai S. Krishnamoorthy. 160-165 [doi]
- Security Event Management System based on Mobile Agent TechnologyWang Jingxin, Zhiying Wang, Kui Dai. 166-171 [doi]
- A SOC Framework for ISP Federation and Attack Forecast by Learning Propagation PatternsKeisuke Takemori, Yutaka Miyake, Chie Ishida, Iwao Sasase. 172-179 [doi]
- Detection of Port and Network Scan Using Time Independent Feature SetHabib Ullah Baig, Farrukh Kamran. 180-184 [doi]
- Optimizing Sensor Placement for Intruder Detection with Genetic AlgorithmsSamuel R. Barrett. 185-188 [doi]
- Social Behavior in a Team of Autonomous SensorsYasuaki Sakamoto, Jeffrey V. Nickerson. 189-192 [doi]
- SIGHTS: A Software System for Finding Coalitions and Leaders in a Social NetworkJeffrey Baumes, Mark K. Goldberg, Mykola Hayvanovych, Stephen Kelley, Malik Magdon-Ismail, Konstantin Mertsalov, William A. Wallace. 193-199 [doi]
- An LDA-based Community Structure Discovery Approach for Large-Scale Social NetworksHaizheng Zhang, Baojun Qiu, C. Lee Giles, Henry C. Foley, John Yen. 200-207 [doi]
- Privacy Preserving Collaborative Data MiningJustin Z. Zhan. 208 [doi]
- Detecting Anomalies in GraphsDavid B. Skillicorn. 209-216 [doi]
- Addressing Accuracy Issues in Privacy Preserving Data Mining through Matrix FactorizationJie Wang, Jun Zhang. 217-220 [doi]
- Fast Fourier Transform Based Data Perturbation Method for Privacy ProtectionShuting Xu, Shuhua Lai. 221-224 [doi]
- Inferring Meaning and Intent of Discovered Data SourcesWayne L. Bethea, R. Scott Cost, Paul A. Frank, Frank B. Weiskopf. 225-228 [doi]
- The Arizona IDMatcher: A Probabilistic Identity Matching SystemG. Alan Wang, Siddharth Kaza, Shailesh Joshi, Kris Chang, Homa Atabakhsh, Hsinchun Chen. 229-235 [doi]
- Mining Higher-Order Association Rules from Distributed Named Entity DatabasesShenzhi Li, Christopher D. Janneck, Aditya P. Belapurkar, Murat Can Ganiz, Xiaoning Yang, Mark Dilsizian, Tianhao Wu, John M. Bright, William M. Pottenger. 236-243 [doi]
- Managing Security Threats and Vulnerabilities for Small to Medium EnterprisesCyril Onwubiko, Andrew P. Lenaghan. 244-249 [doi]
- A Secure Email System Based on Fingerprint Authentication SchemeZhe Wu, Jie Tian, Liang Li, Cai-Ping Jiang, Xin Yang. 250-253 [doi]
- Geospatial Data Mining for National Security: Land Cover Classification and Semantic GroupingChuanjun Li, Latifur Khan, Bhavani M. Thuraisingham, M. Husain, Shaofei Chen, Fang Qiu. 254-261 [doi]
- Recursive Algorithm of River and Basin Data Model based on Composite Design PatternHyung Moo Kim, Jae Soo Yoo. 262-265 [doi]
- Visualization of Events in a Spatially and Multimedia Enriched Virtual EnvironmentLeonidas Deligiannidis, Farshad Hakimpour, Amit P. Sheth. 266-269 [doi]
- Making Sense of VAST DataSummer Adams, Ashok K. Goel. 270-273 [doi]
- Knowledge Reachback for WMD EventsSteven R. Haynes, Jonathan A. Singel. 274-281 [doi]
- Affect Intensity Analysis of Dark Web ForumsAhmed Abbasi, Hsinchun Chen. 282-288 [doi]
- On the Communication Complexity of Privacy-Preserving Information Sharing ProtocolsNan Zhang. 289-295 [doi]
- Semantically Ranked Graph Pattern Queries for Link AnalysisDawit Yimam Seid, Sharad Mehrotra. 296-299 [doi]
- An Efficient Algorithm for Content Security Filtering Based on Double-ByteYanping Zhao, Wei Lu. 300-307 [doi]
- FACT: Fast Algorithm for Categorizing TextSaket S. R. Mengle, Nazli Goharian, Alana Platt. 308-315 [doi]
- Association Rule Mining for Suspicious Email Detection: A Data Mining ApproachSubramanian Appavu, Ramasamy Rajaram. 316-323 [doi]
- Fast Private Association Rule Mining by A Protocol for Securely Sharing Distributed DataVladimir Estivill-Castro, Ahmed HajYasien. 324-330 [doi]
- Using Homomorphic Encryption and Digital Envelope Techniques for Privacy Preserving Collaborative Sequential Pattern MiningJustin Z. Zhan. 331-334 [doi]
- Connecting the Dots: Revealing the Invisible Hand for Sharing InformationDavid D. Sulek, McClain L. Howarth, Virginia A. Ruebensaal. 335-341 [doi]
- Interaction Coherence Analysis for Dark Web ForumsTianjun Fu, Ahmed Abbasi, Hsinchun Chen. 342-349 [doi]
- A Bayesian, Nonlinear Particle Filtering Approach for Tracking the State of Terrorist OperationsGregory A. Godfrey, John Cunningham, Tuan Tran. 350-355 [doi]
- A Combinatorial Approach to Measuring AnonymityMatthew Edman, Fikret Sivrikaya, Bülent Yener. 356-363 [doi]
- An Adaptive Modeling for Security Infrastructure Fault ResponseZhongjie Cui, Shuping Yao. 364 [doi]
- Countering Insider Threats in Personal DevicesLuk Boral, Maria Disla, Shivraj Patil, Jari Williams, Joon S. Park. 365 [doi]
- Dependence Centrality: Identifying Dependence of Nodes in Terrorist NetworksNasrullah Memon, David L. Hicks, Henrik Legind Larsen. 366 [doi]
- Distributed Web Police: A Peer-to-Peer Approach to Collaborative Copy DetectionJenq-Haur Wang, Hung-Chi Chang. 367 [doi]
- Emergency Management in Australia, New Zealand and Europe - The 2006 EMANZE SurveyAndreas Meissner. 368 [doi]
- Environmental Impact on Underwater Surveillance Systems in Estuary AreasHongyuan Shi, Dov Kruger, Jeffrey V. Nickerson. 369 [doi]
- Importance of Information Collection and Dissemination for Evacuation Modeling and ManagementM. Anil Yazici, Kaan Ozbay. 370 [doi]
- Malicious Code Detection and Acquisition Using Active LearningRobert Moskovitch, Nir Nissim, Yuval Elovici. 371 [doi]
- Medical Ontology-Enhanced Text Processing for Infectious Disease InformaticsHsin-Min Lu, Daniel Dajun Zeng, Hsinchun Chen. 372 [doi]
- Ontology Based Analysis of Violent EventsPinar Oezden Wennerberg, Hristo Tanev, Jakub Piskorski, Clive Best. 373 [doi]
- Optimization of Multi-Attribute Tasks for Underwater Motion of Robotic Sensor AgentsIrina Goldman, Samuel Barrett, Jeffrey V. Nickerson. 374 [doi]
- Periodicity and Application for a kind of n-dimensional Arnold-type TransformationJi-Zhi Wang, Ying-Long Wang, Mei-Qin Wang. 375 [doi]
- Profiling and Visualizing Cyber-criminal Activities: A General FrameworkWingyan Chung, G. Alan Wang. 376 [doi]
- Protecting Location Privacy with Dynamic Mac Address Exchanging in Wireless NetworksMing Lei, Zijie Qi, Xiaoyan Hong, Susan V. Vrbsky. 377 [doi]
- Relationally Mapping XML Queries For Scalable XML SearchRebecca Cathey, Steven M. Beitzel, Eric C. Jensen, David A. Grossman, Ophir Frieder. 378 [doi]
- Short Query Sequences in Misuse DetectionAlana Platt, Nazli Goharian. 379 [doi]
- Simulating Threats Propagation within the NSP InfrastructureRami Puzis, Meytal Tubi, Gil Tahan, Yuval Elovici. 380 [doi]
- Text Extraction of Spatial and Temporal InformationAntonio Badia, Jothi Ravishankar, Tulay Muezzinoglu. 381 [doi]