Abstract is missing.
- Exploring Extremism and Terrorism on the Web: The Dark Web ProjectHsinchun Chen. 1-20 [doi]
- Analyzing and Visualizing Gray Web Forum StructureChristopher C. Yang, Tobun D. Ng, Jau-Hwang Wang, Chih-Ping Wei, Hsinchun Chen. 21-33 [doi]
- An Empirical Analysis of Online Gaming Crime Characteristics from 2002 to 2004Yungchang Ku, Ying-Chieh Chen, Kuo-Ching Wu, Chaochang Chiu. 34-45 [doi]
- Detecting Cyber Security Threats in Weblogs Using Probabilistic ModelsFlora S. Tsai, Kap Luk Chan. 46-57 [doi]
- What-if Emergency Management System: A Generalized Voronoi Diagram ApproachIckjai Lee, Reece Pershouse, Peter Phillips, Chris Christensen. 58-69 [doi]
- Agent Based Framework for Emergency Rescue and Assistance PlanningYujun Zheng, Jinquan Wang, Jinyun Xue. 70-81 [doi]
- Object Tracking with Self-updating Tracking WindowHuimin Qian, Yaobin Mao, Jason Geng, Zhiquan Wang. 82-93 [doi]
- A Case-Based Evolutionary Group Decision Support Method for Emergency ResponseJidi Zhao, Tao Jin, Huizhang Shen. 94-104 [doi]
- Lightweight Anomaly Intrusion Detection in Wireless Sensor NetworksHaiguang Chen, Peng Han, Xi Zhou, Chuanshan Gao. 105-116 [doi]
- ASITL: Adaptive Secure Interoperation Using Trust-LevelLi Jin, Zhengding Lu. 117-128 [doi]
- A RT0-Based Compliance Checker Model for Automated Trust NegotiationZhensong Liao, Hai Jin. 129-140 [doi]
- TCM-KNN Algorithm for Supervised Network Intrusion DetectionYang Li, Binxing Fang, Li Guo, You Chen. 141-151 [doi]
- Research on Hidden Markov Model for System Call Anomaly DetectionQuan Qian, Mingjun Xin. 152-159 [doi]
- Towards Identifying True Threat from Network Security DataZhitang Li, Jie Lei, Li Wang, Dong Li, Yang-ming Ma. 160-171 [doi]
- Security Assessment for Application Network Services Using Fault InjectionHyungwoo Kang, Dong-Hoon Lee. 172-183 [doi]
- A Secure Data Transmission Protocol for Mobile Ad Hoc NetworksShejie Lu, Jun Li, Zhiyuan Liu, Guohua Cui. 184-195 [doi]
- Defending DDoS Attacks Using Hidden Markov Models and Cooperative Reinforcement LearningXin Xu, Yongqiang Sun, Zunguo Huang. 196-207 [doi]
- A Novel Relational Database Watermarking AlgorithmYu Fu, Cong Jin, Chuanxiang Ma. 208-219 [doi]
- Anticipatory Event Detection for Bursty EventsKuiyu Chang, Qi He, Ridzwan Aminuddin, Ridzwan Suri, Ee-Peng Lim. 220-225 [doi]
- Community Detection in Scale-Free Networks Based on Hypergraph ModelRong Qian, Wei Zhang, Bingru Yang. 226-231 [doi]
- The Treelike Assembly Classifier for Pedestrian DetectionC. X. Wei, Xianbin Cao, Yan Wu Xu, Hong Qiao, Fei-Yue Wang. 232-237 [doi]
- A Proposed Data Mining Approach for Internet Auction Fraud DetectionYungchang Ku, Yuchi Chen, Chaochang Chiu. 238-243 [doi]
- Trends in Computer Crime and Cybercrime Research During the Period 1974-2006: A Bibliometric ApproachChichao Lu, WenYuan Jen, Weiping Chang. 244-250 [doi]
- The Study of Government Website Information Disclosure in TaiwanYuan-Fa Chen, Sandy Yu-Lan Yeh, Kuo-Ching Wu. 251-256 [doi]
- Informed Recognition in Software WatermarkingWilliam Zhu. 257-261 [doi]
- An Inference Control Algorithm for RDF(S) RepositoryJianjiang Lu, Jinpeng Wang, Yafei Zhang, Bo Zhou, Yanhui Li, Zhuang Miao. 262-268 [doi]
- PPIDS: Privacy Preserving Intrusion Detection SystemHyun-A Park, Dong-Hoon Lee, Jongin Lim, Sang-Hyun Cho. 269-274 [doi]
- Evaluating the Disaster Defense Ability of Information SystemsBaowen Zhang, Jing Zhang, Ning Zhou, Mingang Chen. 275-281 [doi]
- Airline Safety Evaluation Based on Fuzzy TOPSISYong Deng, Jia Xiong, Ping Fu. 282-287 [doi]
- A Framework for Proving the Security of Data Transmission Protocols in Sensor NetworkMi Wen, Ling Dong, Yanfei Zheng, Kefei Chen. 288-294 [doi]
- Port and Address Hopping for Active Cyber-DefenseLeyi Shi, Chunfu Jia, Shuwang Lü, Zhenhua Liu. 295-300 [doi]
- A Hybrid Model for Worm Simulations in a Large NetworkEul-Gyu Im, Jung Sik Kim, In Woo Noh, Hyun Jun Jang. 301-306 [doi]
- A Web Portal for Terrorism Activities in ChinaDaniel Dajun Zeng, Li Zhang, Donghua Wei, Fei-Yue Wang. 307-308 [doi]
- An Overview of Telemarketing Fraud Problems and Countermeasures in TaiwanJau-Hwang Wang, Jiing-Long Jow, You-Lu Liao, Tyan-muh Tsai, Garfield Hung. 309-310 [doi]
- Mining the Core Member of Terrorist Crime Group Based on Social Network AnalysisQihong Liu, Changjie Tang, Shaojie Qiao, Qiwei Liu, Fenlian Wen. 311-313 [doi]
- Providing Personalized Services for HWME System by Item-Based Collaborative FilteringQiudan Li, Yaodong Li, Huiguang He, Guanggang Geng, Yuanping Zhu, Chunheng Wang. 314-315 [doi]
- An Intelligent Agent-Oriented System for Integrating Network Security Devices and Handling Large Amount of Security EventsYang-ming Ma, Zhitang Li, Jie Lei, Li Wang, Dong Li. 316-317 [doi]
- Link Analysis-Based Detection of Anomalous Communication PatternsDaniel Dajun Zeng, Zan Huang. 318-320 [doi]
- Social Modeling and Reasoning for Security InformaticsWenji Mao, Daniel Dajun Zeng, Li Zhang, Donghua Wei, Fei-Yue Wang. 321-322 [doi]
- Detecting Botnets by Analyzing DNS TrafficHao Tu, Zhitang Li, Bin Liu. 323-324 [doi]
- HMM-Based Approach for Evaluating Risk PropagationYoung-Gab Kim, Jongin Lim. 325-326 [doi]
- A Symptom-Based Taxonomy for an Early Detection of Network AttacksKi-Yoon Kim, Hyoung-Kee Choi. 327-328 [doi]