Abstract is missing.
- Welcome message from conference co-chairs [doi]
- Crime linkage: A fuzzy MCDM approachFabrizio Albertetti, Paul Cotofrei, Lionel Grossrieder, Olivier Ribaux, Kilian Stoffel. 1-3 [doi]
- Occupational fraud detection through visualizationEvmorfia N. Argyriou, Aikaterini A. Sotiraki, Antonios Symvonis. 4-6 [doi]
- Flexible creation of indicators of scientific and technological emergence: Emerging phenomena and big dataOlga Babko-Malaya, Daniel Hunter, Andy Seidel, Fotios Barlos. 7-9 [doi]
- Analyzing security threats as reported by the United States Computer Emergency Readiness Team (US-CERT)Yolanda S. Baker, Rajeev Agrawal, Sambit Bhattacharya. 10-12 [doi]
- Detecting collaboration from behaviorTravis Bauer, Daniel Garcia, Richard Colbaugh, Kristin Glass. 13-15 [doi]
- Evaluating text visualization: An experiment in authorship analysisVictor A. Benjamin, Wingyan Chung, Ahmed Abbasi, Joshua Chuang, Catherine A. Larson, Hsinchun Chen. 16-20 [doi]
- Machine learning for attack vector identification in malicious source codeVictor A. Benjamin, Hsinchun Chen. 21-23 [doi]
- How analysts cognitively "connect the dots"Lauren Bradel, Jessica Zeitz Self, Alex Endert, M. Shahriar Hossain, Chris North, Naren Ramakrishnan. 24-26 [doi]
- Use of latent semantic indexing to identify name variants in large data collectionsRoger B. Bradford. 27-32 [doi]
- Learning to classify emotional content in crisis-related tweetsJoel Brynielsson, Fredrik Johansson, Anders Westling. 33-38 [doi]
- From when and what to where: Linking spatio-temporal visualizations in visual analyticsYingjie Victor Chen, Zhenyu Cheryl Qian. 39-44 [doi]
- Dynamic information-theoretic measures for security informaticsRichard Colbaugh, Kristin Glass, Travis Bauer. 45-49 [doi]
- Moving target defense for adaptive adversariesRichard Colbaugh, Kristin Glass. 50-55 [doi]
- Detecting future social unrest in unprocessed Twitter data: "Emerging phenomena and big data"Ryan Compton, Craig Lee, Tsai-Ching Lu, Lalindra De Silva, Michael Macy. 56-60 [doi]
- SociAL Sensor Analytics: Measuring phenomenology at scaleCourtney D. Corley, Chase P. Dowling, Stuart J. Rose, Taylor McKenzie. 61-66 [doi]
- Phishing detection using traffic behavior, spectral clustering, and random forestsDave DeBarr, Venkatesh Ramanathan, Harry Wechsler. 67-72 [doi]
- Saudi Arabia's response to cyber conflict: A case study of the Shamoon malware incidentZakariya Dehlawi, Norah Abokhodair. 73-75 [doi]
- Side-view face authentication based on wavelet and random forest with subsetsSihao Ding, Qiang Zhai, Yuan F. Zheng, Dong Xuan. 76-81 [doi]
- Effects of Fear appeals and point of reference on the persuasiveness of IT security communicationsHonglu Du, Heng Xu, Mary Beth Rosson, John M. Carroll. 82-84 [doi]
- A multi-modality attributes representation scheme for Group Activity characterization and data fusionVinayak Elangovan, Amjad Alkilani, Amir Shirkhodaie. 85-90 [doi]
- Towards task-centered network models through semantic workflowsYolanda Gil. 91-93 [doi]
- Cyber friendly fire: Research challenges for security informaticsFrank L. Greitzer, Thomas E. Carroll, Adam D. Roberts. 94-99 [doi]
- Modeling and detecting anomalous topic accessSiddharth Gupta, Casey Hanson, Carl A. Gunter, Mario Frank, David M. Liebovitz, Bradley Malin. 100-105 [doi]
- Towards a network-of-networks framework for cyber securityMahantesh Halappanavar, Sutanay Choudhury, Emilie Hogan, Peter Hui, John R. Johnson, Indrajit Ray, Lawrence B. Holder. 106-108 [doi]
- Stealthy software: Next-generation cyber-attacks and defensesKevin W. Hamlen. 109-112 [doi]
- Building a better intelligence machine: A new approach to capability review and developmentDuncan Hodges, Sadie Creese. 113-115 [doi]
- OCC model-based emotion extraction from online reviewsLuwen Huangfu, Wenji Mao, Daniel Zeng, Lei Wang. 116-121 [doi]
- Information graphs of event threads: Identifying and building forward and backward event threads for societal eventsJames R. Johnson. 122-128 [doi]
- A graph analytic metric for mitigating advanced persistent threatJohn R. Johnson, Emilie Hogan. 129-133 [doi]
- Gamification of emergency response training: A public health exampleIrfan E. Kanat, Sathananda Siloju, T. S. Raghu, Ajay S. Vinze. 134-136 [doi]
- TALISON - Tensor analysis of social media dataAnne Kao, William Ferng, Stephen R. Poteet, Lesley Quach, Rodney Tjoelker. 137-142 [doi]
- Analyzing users' web surfing patterns to trace terrorists and criminalsGabi Kedma, Mordehai Guri, Tom Sela, Yuval Elovici. 143-145 [doi]
- Click Fraud Detection with Bot SignaturesBrendan Kitts, Jing Ying Zhang, Albert Roux, Ron Mills. 146-150 [doi]
- Click fraud botnet detection by calculating mix adjusted traffic value: A method for de-cloaking click fraud attacks that is resistant to spoofingBrendan Kitts, Jing Ying Zhang, Gang Wu, Raj Mahato. 151-153 [doi]
- Predicting user participation in social networking sitesQingchao Kong, Wenji Mao, Daniel Zeng. 154-156 [doi]
- An interdisciplinary approach to studying and improving terrorism analysisDonald R. Kretz, Charles W. Granderson. 157-159 [doi]
- Detecting deception in interrogation settingsC. E. Lamb, David B. Skillicorn. 160-162 [doi]
- Discovering thematic structure in political datasetsMinh-Tam Le, John Sweeney, Matthew Lawlor, Steven W. Zucker. 163-165 [doi]
- Stochastic game model for information dissemination of emergency events in social networkLi Liu, Yuanzhuo Wang, Jing Ding. 166-168 [doi]
- Context matters: Improving the uses of big data for forecasting civil unrest: Emerging phenomena and big dataPedro Manrique, Hong Qi, Ana Morgenstern, Nicolas Velasquez, Tsai-Ching Lu, Neil Johnson. 169-172 [doi]
- Layered behavioral trace modeling for threat detectionRudolph Louis Mappus IV, Erica Briscoe. 173-175 [doi]
- Differences between individuals with and without experience with assault in identifying facial signs of imminent aggressionDavid Matsumoto, Hyisung C. Hwang. 176-178 [doi]
- Efficient anomaly detection in dynamic, attributed graphs: Emerging phenomena and big dataBenjamin A. Miller, Nicholas Arcolano, Nadya T. Bliss. 179-184 [doi]
- Identifying groups of interest through temporal analysis and event response monitoringJonathan Mugan, Eric McDermid, Abbey McGrew, Laura Hitt. 185-190 [doi]
- Discovery of persistent threat structures through temporal and geo-spatial characterization in evolving networksJosephine M. Namayanja, Vandana Pursnani Janeja. 191-196 [doi]
- Improving expert judgment by coherence weightingKenneth C. Olson, Christopher W. Karvetski. 197-199 [doi]
- Detecting unfolding crises with Visual Analytics and Conceptual Maps Emerging phenomena and big dataSimon F. Pratt, Philippe J. Giabbanelli, Jean-Sebastien Mercier. 200-205 [doi]
- Anomalies in network trafficAlan S. Ratner, Phillip Kelly. 206-208 [doi]
- Exploring the structural characteristics of social networks in a large criminal court databaseAndrew Reid, Mohammad A. Tayebi, Richard Frank. 209-214 [doi]
- Crowdsourcing and gamification techniques in Inspire (AQAP online magazine)Edna F. Reid. 215-220 [doi]
- Sociolect-based community detectionWilliam N. Reynolds, William J. Salter, Robert M. Farber, Courtney Corley, Chase P. Dowling, William O. Beeman, Lynn Smith-Lovin, Joon Nak Choi. 221-226 [doi]
- Conceptual framework to enable early warning of relevant phenomena "Emerging phenomena and big data"Bob G. Schlicher, Robert K. Abercrombie, Lee M. Hively. 227-229 [doi]
- Maritime situation analysisHamed Yaghoubi Shahir, Uwe Glässer, Narek Nalbandyan, Hans Wehn. 230-232 [doi]
- Behavioral targeting with social regularizationYanmin Shang, Peng Zhang, Yanan Cao, Li Guo. 233-238 [doi]
- Language use in Inspire magazineDavid B. Skillicorn, E. F. Reid. 239-244 [doi]
- The edge effect: Exploring high crime zones near residential neighborhoodsJustin Song, Valerie Spicer, Patricia L. Brantingham. 245-250 [doi]
- A model docking system for understanding radicalizationLora Weiss, Erica Briscoe, Walter Wright, Sim Harbert, Keith Kline, John Horgan, Lily Cushenbery, Casey Hilland. 251-253 [doi]
- Improving supply chain security using big dataDavid Zage, Kristin Glass, Richard Colbaugh. 254-259 [doi]
- Auto-Highlighter: Identifying Salient Sentences in TextJessica Zeitz Self, Rebecca Zeitz, Chris North, Alan L. Breitler. 260-262 [doi]
- How to use experience in cyber analysis: An analytical reasoning support systemChen Zhong, Deepak S. Kirubakaran, John Yen, Peng Liu 0005, Steve Hutchinson, Hasan Cam. 263-265 [doi]
- Unsupervised ranking and characterization of differentiated clustersLuca Cazzanti, Courosh Mehanian, Julie Penzotti, Doug Scott, Oliver Downs. 266 [doi]
- Identifying threatening networks from transactional dataLaura Hitt, Matt McClain. 267 [doi]
- Implementation of framework to identify potential phishing websitesDoowon Kim, Chaitanya Achan, Jinsuk Baek, Paul S. Fisher. 268 [doi]
- Armored adsWesley Brandi, Brendan Kitts, Raj Mahato, Jing Ying Zhang. 269 [doi]
- Assessment of malicious applications using permissions and enhanced user interfaces on AndroidSangho Lee, Da Young Ju. 270 [doi]
- Exploring trajectory behavior model for anomaly detection in maritime moving objectsPo-Ruey Lei. 271 [doi]
- Ensemble classification over stock market time series and economy newsSadi Evren Seker, Cihan Mert, Khaled Al-Naami, Ugur Ayan, Nuri Ozalp. 272-273 [doi]
- A new pruning method for resolving conflicts in actionable behavioral rulesPeng Su, Dan Zhu, Daniel Dajun Zeng. 274 [doi]
- Reflecting on visualization for cyber securityCarrie Gates, Sophie Engle. 275-277 [doi]
- Investigating the efficacy of network visualizations for intelligence tasksChristopher W. Berardi, Erin Treacy Solovey, Mary L. Cummings. 278-283 [doi]
- Capturing human cognition in cyber-security simulations with NETSNicklaus A. Giacobe, Michael D. McNeese, Vincent F. Mancuso, Dev Minotra. 284-288 [doi]
- Visualization techniques for efficient malware detectionJohn Donahue, Anand Paturi, Srinivas Mukkamala. 289-291 [doi]
- Information visualization metrics and methods for cyber security evaluationJohn T. Langton, Alex Baker. 292-294 [doi]
- Christopher Alexander's fifteen properties: Toward developing evaluation metrics for security visualizationsZiyad Alshaikh, Abdulrahman Alarifi, Mansour Alsaleh. 295-300 [doi]
- Research towards a systematic signature discovery processNathan A. Baker, Jonathan L. Barr, George T. Bonheyo, Cliff A. Joslyn, Kannan Krishnaswami, Mark E. Oxley, Rich Quadrel, Landon H. Sego, Mark F. Tardiff, Adam S. Wynne. 301-308 [doi]
- An investigation into label fusion on sparse dataAlexander M. Venzin, Mark E. Oxley, Nathaniel Beagley. 309-314 [doi]
- Graph analytics for signature discoveryEmilie Hogan, John R. Johnson, Mahantesh Halappanavar, Chaomei Lo. 315-320 [doi]
- Lame' curve-based signature discovery learning technique for network traffic classificationShan Suthaharan, Laxmi Sunkara, Sweta Keshapagu. 321-326 [doi]
- Capturing signatures of anomalous behavior in online social networksArun V. Sathanur, Vikram Jandhyala, Chuanjia Xing. 327-329 [doi]
- A generalized bio-inspired method for discovering sequence-based signaturesElena S. Peterson, Darren Curtis, Aaron Phillips, Jeremy Teuton, Christopher S. Oehmen. 330-332 [doi]
- Signature discovery for personalized medicineKa Yee Yeung. 333-338 [doi]
- The lifecycle of Bayesian network models developed for Multi-Source Signature assessment of Nuclear ProgramsZoe N. Gastelum, Amanda M. White, Paul D. Whitney, Luke J. Gosink, Landon H. Sego. 339-345 [doi]
- Assessing the quality of bioforensic signaturesLandon H. Sego, Aimee E. Holmes, Luke J. Gosink, Bobbie-Jo M. Webb-Robertson, Helen W. Kreuzer, Richard M. Anderson, Alan J. Brothers, Courtney D. Corley, Mark R. Tardiff. 346-351 [doi]
- The CommonGround visual paradigm for biosurveillanceYarden Livnat, Elizabeth Jurrus, Adi V. Gundlapalli, Per Gestland. 352-357 [doi]
- PHYSENSE: Scalable sociological interaction models for influence estimation on online social networksArun V. Sathanur, Vikram Jandhyala, Chuanjia Xing. 358-363 [doi]
- Measuring expertise and bias in cyber security using cognitive and neuroscience approachesDaniel C. Krawczyk, James Bartlett, Murat Kantarcioglu, Kevin W. Hamlen, Bhavani M. Thuraisingham. 364-367 [doi]
- Action knowledge extraction from Web textAnsheng Ge, Wenji Mao, Daniel Zeng, Lei Wang. 368-370 [doi]
- Discovering seasonal patterns of smoking behavior using online search informationZhu Zhang, Xiaolong Zheng, Daniel Dajun Zeng, Kainan Cui, Chuan Luo, Saike He, Scott Leischow. 371-373 [doi]
- Discovering the rating pattern of online reviewers through data coclusteringJie Wang, Xuwei Liang. 374-376 [doi]
- Jargon and graph modularity on twitterChase P. Dowling, Courtney D. Corley, Robert M. Farber, William N. Reynolds. 381-383 [doi]