Abstract is missing.
- Combined Detection Model for Criminal Network DetectionFatih Ozgul, Zeki Erdem, Chris Bowerman, Julian Bondy. 1-14 [doi]
- An Association Model for Implicit Crime Link AnalysisJau-Hwang Wang, Chien-Lung Lin. 15-21 [doi]
- Design and Deployment of a National Detecting Stolen Vehicles Network SystemWeiping Chang, Chingwei Su. 22-27 [doi]
- Fighting Cybercrime: A KM PerspectiveWeiping Chang. 28-30 [doi]
- Trajectory Similarity of Network Constrained Moving Objects and Applications to Traffic SecuritySajimon Abraham, Paulose Sojan Lal. 31-43 [doi]
- An Emergent Traffic Messaging Service Using Wireless TechnologyPatrick S. Chen, Yong-Kuei Liu, Chia-Shih Hsu. 44-51 [doi]
- A Model for Detecting Global Footprint Anomalies in a Grid EnvironmentPramod S. Pawar, Srinath Srinivasa. 52-64 [doi]
- Secure Anonymous Routing for MANETs Using Distributed Dynamic Random Path SelectionVakul Mohanty, Dhaval Moliya, Chittaranjan Hota, Muttukrishnan Rajarajan. 65-72 [doi]
- MAD-IDS: Novel Intrusion Detection System Using Mobile Agents and Data Mining ApproachesImen Brahmi, Sadok Ben Yahia, Pascal Poncelet. 73-76 [doi]
- Fuzzy Biometric Signcryption Scheme with Bilinear Pairings in the Standard ModelMingwu Zhang, Bo Yang, Tsuyoshi Takagi, Yanping Shen, Wenzheng Zhang. 77-87 [doi]
- Key Independent Decryption of Graphically Encrypted ImagesRam Ratan. 88-97 [doi]
- Towards Confidentiality of ID-Based Signcryption Schemes under without Random Oracle ModelMingwu Zhang, Pengcheng Li, Bo Yang, Hao Wang, Tsuyoshi Takagi. 98-104 [doi]
- JPEG Steganalysis Using HBCL Statistics and FR IndexVeena H. Bhat, Krishna S., P. Deepa Shenoy, K. R. Venugopal, Lalit M. Patnaik. 105-112 [doi]
- Text Mining Technique for Chinese Written Judgment of Criminal CaseShihchieh Chou, Tai-Ping Hsing. 113-125 [doi]
- Exploration of Document Relation Quality with Consideration of Term Representation Basis, Term Weighting and Association MeasureNichnan Kittiphattanabawon, Thanaruk Theeramunkong, Ekawit Nantajeewarawat. 126-139 [doi]
- Identifying Controversial Issues and Their Sub-topics in News ArticlesYoonjung Choi, Yuchul Jung, Sung-Hyon Myaeng. 140-153 [doi]
- Efficient Privacy Preserving K-Means ClusteringManeesh Upmanyu, Anoop M. Namboodiri, Kannan Srinathan, C. V. Jawahar. 154-166 [doi]
- A Fuzzy Threshold Based Modified Clustering Algorithm for Natural Data ExplorationBinu Thomas, G. Raju. 167-172 [doi]