Abstract is missing.
- Using Support Vector Machines for Terrorism Information ExtractionAixin Sun, Myo-Myo Naing, Ee-Peng Lim, Wai Lam. 1-12 [doi]
- Criminal Incident Data Association Using the OLAP TechnologySong Lin, Donald E. Brown. 13-26 [doi]
- Names: A New Frontier in Text MiningFrankie Patman, Paul Thompson. 27-38 [doi]
- Web-Based Intelligence Reports SystemAlexander Dolotov, Mary Strickler. 39-58 [doi]
- Authorship Analysis in Cybercrime InvestigationRong Zheng, Yi Qin, Zan Huang, Hsinchun Chen. 59-73 [doi]
- Behavior Profiling of EmailSalvatore J. Stolfo, Shlomo Hershkop, Ke Wang, Olivier Nimeskern, Chia-Wei Hu. 74-90 [doi]
- Detecting Deception through Linguistic AnalysisJudee K. Burgoon, J. P. Blair, Tiantian Qin, Jay F. Nunamaker. 91-101 [doi]
- A Longitudinal Analysis of Language Behavior of Deception in E-mailLina Zhou, Judee K. Burgoon, Douglas P. Twitchell. 102-110 [doi]
- Evacuation Planning: A Capacity Constrained Routing ApproachQingsong Lu, Yan Huang, Shashi Shekhar. 111-125 [doi]
- Locating Hidden Groups in Communication Networks Using Hidden Markov ModelsMalik Magdon-Ismail, Mark K. Goldberg, William A. Wallace, David Siebecker. 126-137 [doi]
- Automatic Construction of Cross-Lingual Networks of Concepts from the Hong Kong SAR Police DepartmentKar Wing Li, Christopher C. Yang. 138-152 [doi]
- Decision Based Spatial Analysis of CrimeYifei Xue, Donald E. Brown. 153-167 [doi]
- CrimeLink Explorer: Using Domain Knowledge to Facilitate Automated Crime Association AnalysisJennifer Schroeder, Jennifer Jie Xu, Hsinchun Chen. 168-180 [doi]
- A Spatio Temporal Visualizer for Law EnforcementTy Buetow, Luis G. Chaboya, Christopher D. O Toole, Tom Cushna, Damien Daspit, Tim Petersen, Homa Atabakhsh, Hsinchun Chen. 181-194 [doi]
- Tracking Hidden Groups Using CommunicationsSudarshan S. Chawathe. 195-208 [doi]
- Examining Technology Acceptance by Individual Law Enforcement Officers: An Exploratory StudyPaul Jen-Hwa Hu, Chienting Lin, Hsinchun Chen. 209-222 [doi]
- Atrium - A Knowledge Model for Modern Security Forces in the Information and Terrorism AgeChris C. Demchak. 223-231 [doi]
- Untangling Criminal Networks: A Case StudyJennifer Jie Xu, Hsinchun Chen. 232-248 [doi]
- Addressing the Homeland Security Problem: A Collaborative Decision-Making FrameworkT. S. Raghu, Ram Ramesh, Andrew B. Whinston. 249-265 [doi]
- Collaborative Workflow Management for Interagency Crime AnalysisJ. Leon Zhao, Henry H. Bi, Hsinchun Chen. 266-280 [doi]
- COPLINK Agent: An Architecture for Information Monitoring and Sharing in Law EnforcementDaniel Dajun Zeng, Hsinchun Chen, Damien Daspit, Fu Shan, Suresh Nandiraju, Michael Chau, Chienting Lin. 281-295 [doi]
- Active Database Systems for Monitoring and SurveillanceAntonio Badia. 296-307 [doi]
- Integrated Mixed Networks Security Monitoring - A Proposed FrameworkWilliam T. Scherer, Leah L. Spradley, Marc H. Evans. 308-321 [doi]
- Bioterrorism Surveillance with Real-Time Data WarehousingDonald J. Berndt, Alan R. Hevner, James Studnicki. 322-335 [doi]
- Privacy Sensitive Distributed Data Mining from Multi-party DataHillol Kargupta, Kun Liu, Jessica Ryan. 336-342 [doi]
- PROGENIE: Biographical Descriptions for Intelligence AnalysisPablo Ariel Duboué, Kathleen McKeown, Vasileios Hatzivassiloglou. 343-345 [doi]
- Scalable Knowledge Extraction from Legacy Sources with SEEKJoachim Hammer, William J. O Brien, Mark S. Schmalz. 346-349 [doi]
- TalkPrinting : Improving Speaker Recognition by Modeling Stylistic FeaturesSachin S. Kajarekar, M. Kemal Sönmez, Luciana Ferrer, Venkata Gadde, Anand Venkataraman, Elizabeth Shriberg, Andreas Stolcke, Harry Bratt. 350-354 [doi]
- Emergent Semantics from Users Browsing PathsD. V. Sreenath, William I. Grosky, Farshad Fotouhi. 355-357 [doi]
- Designing Agent99 Trainer: A Learner-Centered, Web-Based Training System for Deception DetectionJinwei Cao, Janna M. Crews, Ming Lin, Judee K. Burgoon, Jay F. Nunamaker. 358-365 [doi]
- Training Professionals to Detect DeceptionJoey F. George, David P. Biros, Judee K. Burgoon, Jay F. Nunamaker. 366-370 [doi]
- An E-mail Monitoring System for Detecting Outflow of Confidential DocumentsBogju Lee, Youna Park. 371-374 [doi]
- Intelligence and Security Informatics: An Information Economics PerspectiveLihui Lin, Xianjun Geng, Andrew B. Whinston. 375-378 [doi]
- An International Perspective on Fighting CybercrimeWeiping Chang, Wingyan Chung, Hsinchun Chen, Shihchieh Chou. 379-384 [doi]
- Hiding Traversal of Tree Structured Data from Untrusted Data StoresPing Lin, K. Selçuk Candan. 385 [doi]
- Criminal Record Matching Based on the Vector Space ModelJau-Hwang Wang, Bill T. Lin, Ching-Chin Shieh, Peter S. Deng. 386 [doi]
- Database Support for Exploring Criminal NetworksM. N. Smith, Peter J. H. King. 387 [doi]
- Hiding Data and Code Security for Application Hosting InfrastructurePing Lin, K. Selçuk Candan, Rida A. Bazzi, Zhichao Liu. 388 [doi]
- Secure Information Sharing and Information Retrieval Infrastructure with GridIRGregory B. Newby, Kevin Gamiel. 389 [doi]
- Semantic Hacking and Intelligence and Security Informatics (Extended Abstract)Paul Thompson. 390 [doi]