Abstract is missing.
- Data mining for security applications: Mining concept-drifting data streams to detect peer to peer botnet trafficBhavani M. Thuraisingham. [doi]
- Cyber crime and challenges for crime investigation in the information eraH. C. Lee. [doi]
- Social Computing: Fundamentals and applicationsFei-Yue Wang. [doi]
- Data mining for social network analysisJ. Srivastava. [doi]
- Intelligent pattern recognition and biometricsP. Wang. [doi]
- Countering terrorismJarret Brachman. [doi]
- Probabilistic frameworks for privacy-aware data miningJoydeep Ghosh. [doi]
- Homeland security data mining using social network analysisHsinchun Chen. [doi]
- Real time intrusion prediction, detection and prevention programsA. Abraham. [doi]
- Analysis of cyberactivism: A case study of online free Tibet activitiesTianjun Fu, Hsinchun Chen. 1-6 [doi]
- Developing ideological networks using social network analysis and writeprints: A case study of the international Falun Gong movementYi-Da Chen, Ahmed Abbasi, Hsinchun Chen. 7-12 [doi]
- Detecting deception in testimonyA. Little, David B. Skillicorn. 13-18 [doi]
- Subverting prediction in adversarial settingsJ. G. Dutrisac, David B. Skillicorn. 19-24 [doi]
- Analyzing content development and visualizing social interactions in Web forumChristopher C. Yang, Tobun Dorbin Ng. 25-30 [doi]
- Link analysis based on webpage co-occurrence mining - a case study on a notorious gang leader in TaiwanYiting Peng, Jau-Hwang Wang. 31-34 [doi]
- A study on early decision making in objectionable web content classificationLung-Hao Lee, Cheng-Jye Luh, Chih-Jie Yang. 35-39 [doi]
- Information sharing and privacy protection of terrorist or criminal social networksC.-C. Yang. 40-45 [doi]
- A framework for privacy-preserving cluster analysisBenjamin C. M. Fung, Ke Wang, Lingyu Wang, Mourad Debbabi. 46-51 [doi]
- WikiNetViz: Visualizing friends and adversaries in implicit social networksMinh-Tam Le, Hoang-Vu Dang, Ee-Peng Lim, Anwitaman Datta. 52-57 [doi]
- Constrained k-closest pairs query processing based on growing window in crime databasesShaojie Qiao, Changjie Tang, Huidong Jin, Shucheng Dai, Xingshu Chen. 58-63 [doi]
- Distributed processing of event data and multi-faceted knowledge in a collaboration federationStanley Y. W. Su, Howard W. Beck, Seema Degwekar, Jeff DePree, Xuelian Xiao, Chen Zhou, Minsoo Lee. 64-69 [doi]
- A latent semantic indexing and WordNet based information retrieval model for digital forensicsLan Du, Huidong Jin, Olivier Y. de Vel, Nianjun Liu. 70-75 [doi]
- Bioterrorism event detection based on the Markov switching model: A simulated anthrax outbreak studyHsin-Min Lu, Daniel Zeng, Hsinchun Chen. 76-81 [doi]
- Simulating bioterrorism through epidemiology approximationRyan Layfield, Murat Kantarcioglu, Bhavani M. Thuraisingham. 82-87 [doi]
- Discovery of improvised explosive device content in the Dark WebHsinchun Chen. 88-93 [doi]
- IEDs in the Dark Web: Genre classification of improvised explosive device web pagesHsinchun Chen. 94-97 [doi]
- Cyber extremism in Web 2.0: An exploratory study of international Jihadist groupsHsinchun Chen, S. Thoms, Tianjun Fu. 98-103 [doi]
- Sentiment and affect analysis of Dark Web forums: Measuring radicalization on the internetHsinchun Chen. 104-109 [doi]
- RiskPatrol: A risk management system considering the integration risk management with business continuity processesShi-Cho Cha, Pei-Wen Juo, Li-Ting Liu, Wei-Ning Chen. 110-115 [doi]
- A game theory approach for an emergency management security advisory systemYi-Ming Chen, Dachrahn Wu, Cheng-Kuang Wu. 116-121 [doi]
- Efficient and complete remote authentication scheme with smart cardsWen-Gong Shieh, Wen-Bing Horng. 122-127 [doi]
- Reading order independent grouping proof for RFID tagsYuanhung Lien, Xuefei Leng, K. Mayes, Jung-Hui Chiu. 128-136 [doi]
- Identity management architectureUwe Glässer, Mona Vajihollahi. 137-144 [doi]
- Signtiming scheme based on aggregate signatureDuc-Phong Le, Alexis Bonnecaze, Alban Gabillon. 145-149 [doi]
- PRM-based identity matching using social contextJiexun Li, G. Alan Wang, Hsinchun Chen. 150-155 [doi]
- Unknown malcode detection via text categorization and the imbalance problemRobert Moskovitch, Dima Stopel, Clint Feher, Nir Nissim, Yuval Elovici. 156-161 [doi]
- Automated network feature weighting-based anomaly detectionDat Tran, Wanli Ma, Dharmendra Sharma. 162-166 [doi]
- Intrusion activity projection for cyber situational awarenessS.-J. Yang, S. Byers, J. Holsopple, B. Argauer, D. Fava. 167-172 [doi]
- Advanced sensor fusion technique for enhanced Intrusion DetectionC. Thomas, N. Balakrishnan. 173-178 [doi]
- A real-time network intrusion detection system based on incremental mining approachMing-Yang Su, Kai-Chi Chang, Hua-Fu Wei, Chun-Yuen Lin. 179-184 [doi]
- Hiding clusters in adversarial settingsJ. G. Dutrisac, David B. Skillicorn. 185-187 [doi]
- Models and methods for prediction problem of evolving graphsA. Chapanond, M. S. Krishnamoorthy. 188-190 [doi]
- A locality model of the evolution of blog networksMark K. Goldberg, Malik Magdon-Ismail, Stephen Kelley, Konstantin Mertsalov. 191-193 [doi]
- Novel position-coded methods for mining web access patternsWenjia Wang, Phuong Thanh Cao-Thai. 194-196 [doi]
- A template alignment algorithm for question classificationCheng-Lung Sung, Min-Yuh Day, Hsu-Chun Yen, Wen-Lian Hsu. 197-199 [doi]
- Swarm intelligence based rough set reduction scheme for support vector machinesAjith Abraham, Hongbo Liu. 200-202 [doi]
- A study of anti-robot agent mechanisms and process on online gamesN. W. Lo, Shiou-Hung Chen. 203-205 [doi]
- Botnets, and the cybercriminal undergroundC. J. Mielke, Hsinchun Chen. 206-211 [doi]
- An integrated approach to mapping worldwide bioterrorism research capabilitiesYan Dang, Yulei Zhang, N. Suakkaphong, Cathy Larson, Hsinchun Chen. 212-214 [doi]
- Anonymous attribute authentication scheme using self-blindable certificatesShinsaku Kiyomoto, Toshiaki Tanaka. 215-217 [doi]
- Keying material based key pre-distribution schemeZhihong Liu, Jianfeng Ma, Qiping Huang, Sang-Jae Moon. 218-221 [doi]
- Secure remote control model for information appliancesWen-Gong Shieh, Jian-Min Wang, Wen-Bing Horng. 222-224 [doi]
- Efficient keyword index search over encrypted documents of groupsHyun-A Park, Dong-Hoon Lee, Justin Zhan, Gary Blosser. 225-229 [doi]
- Data hiding using VQ index fileYu-Jie Chang, Ja-Chen Lin. 230-232 [doi]
- A new on-line signature verification by Spatio-Temporal neural networkM. M. Fard, N. Mozayani. 233-235 [doi]
- Multiplicatively-weighted order-k Minkowski-metric Voronoi models for disaster decision support systemsIckjai Lee, Christopher Torpelund-Bruin. 236-238 [doi]
- Restoration of linear motion and out-of-focus blurred images in surveillance systemsChung-Hao Chen, TeYu Chien, Wen-Chao Yang, Che-Yen Wen. 239-241 [doi]
- A novel risk assessment system for port state control inspectionZhong Gao, Guanming Lu, Mengjue Liu, Meng Cui. 242-244 [doi]
- A study on the feature selection of network traffic for intrusion detection purposeWanli Ma, Dat Tran, Dharmendra Sharma. 245-247 [doi]
- Depth evaluation intrusion detection using Coloured Stochastic Petri NetsChien-Chuan Lin, Ming-Shi Wang. 248-250 [doi]
- Anomaly detection in high-dimensional network data streams: A case studyJi Zhang, Qigang Gao, Hai Wang. 251-253 [doi]
- A fast algorithm for data erasureGuomeng Wang, Yanping Zhao. 254-256 [doi]
- KARIS: A multiple-scheme framework for encryption based on an annotation model for enhanced information securityR. Charles. 257-258 [doi]
- The performance analysis of anti- terrorism intelligence from Taiwan s Investigation Bureau of the Ministry of JusticeYu-Ping Fan, Cheng-Wei Chen. 259-260 [doi]
- An effective surveillance video retrieval method based upon motion detectionShih-Hsuan Chiu, Che-Yen Wen, Wei-Chieh Kao. 261-262 [doi]
- A study of the identification of authorship for Chinese textsZhang Jian, Yao Tianfang. 263-264 [doi]
- Design and implementation of honeypot systems based on open-source softwareChao-Hsi Yeh, Chung-Huang Yang. 265-266 [doi]
- Unknown malcode detection - A chronological evaluationRobert Moskovitch, Clint Feher, Yuval Elovici. 267-268 [doi]
- A study on critical infrastructure information technology Malfunction controls-- illustration of TaiwanKwo-Jean Farn, Shu-Kuo Lin, Kuo-Sui Lin, Chung-Huang Yang. 269-270 [doi]
- Visual Cryptography (VC) with non-expanded shadow images: Hilbert-curve approachSen-Jen Lin, Ja-Chen Lin, Wen-Pinn Fang. 271-272 [doi]
- A new classifier for numerical incomplete dataJun Wu, Dong-Hun Seo, Chi-Hwa Song, Won Don Lee. 273-274 [doi]
- Transport security using mobile technologyP. Panjiyar, P. Mourya, N. Bansal, P. Srivastava, A. Mukherjee. 275-276 [doi]
- Sem@ntica: A system for semantic extraction and logical querying of text corporaD. W. McMichael, R. Fu, S. Williams, G. A. Jarrad. 277-278 [doi]
- Evaluating AVDL descriptions for web application vulnerability analysisHa-Thanh Le, Peter Kok Keong Loh. 279-281 [doi]
- Preparedness for post-disaster internet traffic managementJan-Mou Li, Chung-Hao Chen, Shang-Hsing Hsieh, Wen-Chao Yang, Che-Yen Wen. 282-283 [doi]
- An efficient Montgomery exponentiation algorithm for public-key cryptosystemsChia-Long Wu, Der-Chyuan Lou, Te-Jen Chang. 284-285 [doi]
- User-centered evaluation of question answering systemsChorng-Shyong Ong, Min-Yuh Day, Kuo-Tay Chen, Wen-Lian Hsu. 286-287 [doi]
- A new online auction with convertible authenticated encryption and authenticationGuo-Lun Luo, H. Ker-Chang Chang. 288-289 [doi]
- A study of integrated criminal justice data base systemWeiping Chang, Chichao Lu, WenYuan Jen. 290-291 [doi]
- An novel two layer user identification methodWen-Pinn Fang, Hong-Ru Lee, Fang-Pan Line. 292-293 [doi]
- An extended security framework for e-governmentW. Al-Ahmad, R. Al-Kaabi. 294-295 [doi]