Abstract is missing.
- Collusion Set Detection Through Outlier DiscoveryVandana Pursnani Janeja, Vijayalakshmi Atluri, Jaideep Vaidya, Nabil R. Adam. 1-13 [doi]
- Digging in the Details: A Case Study in Network Data MiningJohn Galloway, Simeon J. Simoff. 14-26 [doi]
- Efficient Identification of Overlapping CommunitiesJeffrey Baumes, Mark K. Goldberg, Malik Magdon-Ismail. 27-36 [doi]
- Event-Driven Document Selection for Terrorism Information ExtractionZhen Sun, Ee-Peng Lim, Kuiyu Chang, Teng-Kwee Ong, Rohan Kumar Gunaratna. 37-48 [doi]
- Link Analysis Tools for Intelligence and CounterterrorismAntonio Badia, Mehmed M. Kantardzic. 49-59 [doi]
- Mining Candidate Viruses as Potential Bio-terrorism Weapons from Biomedical LiteratureXiaohua Hu, Illhoi Yoo, Peter Rumm, Michael Atwood. 60-71 [doi]
- Private Mining of Association RulesJustin Z. Zhan, Stan Matwin, LiWu Chang. 72-80 [doi]
- Design Principles of Coordinated Multi-incident Emergency Response SystemsRui Chen, Raj Sharman, H. Raghav Rao, Shambhu J. Upadhyaya. 81-98 [doi]
- Multi-modal Biometrics with PKI Technologies for Border Control ApplicationsTaekyoung Kwon, Hyeonjoon Moon. 99-114 [doi]
- Risk Management Using Behavior Based Bayesian NetworksRam Dantu, Prakash Kolan. 115-126 [doi]
- Sensitivity Analysis of an Attack Containment ModelRam Dantu, João W. Cangussu, Janos Turi. 127-138 [doi]
- Toward a Target-Specific Method of Threat AssessmentYael Shahar. 139-152 [doi]
- Incident and Casualty Databases as a Tool for Understanding Low-Intensity ConflictsDon Radlauer. 153-170 [doi]
- Integrating Private Databases for Data AnalysisKe Wang, Benjamin C. M. Fung, Guozhu Dong. 171-182 [doi]
- Applying Authorship Analysis to Arabic Web ContentAhmed Abbasi, Hsinchun Chen. 183-197 [doi]
- Automatic Extraction of Deceptive Behavioral Cues from VideoThomas O. Meservy, Matthew L. Jensen, John Kruse, Judee K. Burgoon, Jay F. Nunamaker. 198-208 [doi]
- Automatically Determining an Anonymous Author s Native LanguageMoshe Koppel, Jonathan Schler, Kfir Zigdon. 209-217 [doi]
- A Cognitive Model for Alert Correlation in a Distributed EnvironmentAmbareen Siraj, Rayford B. Vaughn. 218-230 [doi]
- Beyond Keyword Filtering for Message and Conversation DetectionDavid B. Skillicorn. 231-243 [doi]
- Content-Based Detection of Terrorists Browsing the Web Using an Advanced Terror Detection System (ATDS)Yuval Elovici, Bracha Shapira, Mark Last, Omer Zaafrany, Menahem Friedman, Moti Schneider, Abraham Kandel. 244-255 [doi]
- Modeling and Multiway Analysis of Chatroom TensorsEvrim Acar, Seyit Ahmet Çamtepe, Mukkai S. Krishnamoorthy, Bülent Yener. 256-268 [doi]
- Selective Fusion for Speaker Verification in SurveillanceYosef A. Solewicz, Moshe Koppel. 269-279 [doi]
- A New Conceptual Framework to Resolve Terrorism s Root CausesJoshua Sinai. 280-286 [doi]
- Analyzing Terrorist Networks: A Case Study of the Global Salafi Jihad NetworkJialun Qin, Jennifer Jie Xu, Daning Hu, Marc Sageman, Hsinchun Chen. 287-304 [doi]
- A Conceptual Model of Counterterrorist OperationsDavid Davis, Allison Frendak-Blume, Jennifer Wheeler, Alexander E. R. Woodcock, Clarence Worrell III. 305-315 [doi]
- Measuring Success in Countering Terrorism: Problems and PitfallsPeter S. Probst. 316-321 [doi]
- Mapping the Contemporary Terrorism Research Domain: Researchers, Publications, and Institutions AnalysisEdna Reid, Hsinchun Chen. 322-339 [doi]
- Testing a Rational Choice Model of Airline HijackingsLaura Dugan, Gary LaFree, Alex R. Piquero. 340-361 [doi]
- Analysis of Three Intrusion Detection System Benchmark Datasets Using Machine Learning AlgorithmsHilmi Günes Kayacik, A. Nur Zincir-Heywood. 362-367 [doi]
- Discovering Identity Problems: A Case StudyAlan Gang Wang, Homa Atabakhsh, Tim Petersen, Hsinchun Chen. 368-373 [doi]
- Efficient Discovery of New Information in Large Text DatabasesR. B. Bradford. 374-380 [doi]
- Leveraging One-Class SVM and Semantic Analysis to Detect Anomalous ContentOzgur Yilmazel, Svetlana Symonenko, Niranjan Balasubramanian, Elizabeth D. Liddy. 381-388 [doi]
- LSI-Based Taxonomy Generation: The Taxonomist SystemJanusz Wnek. 389-394 [doi]
- Some Marginal Learning Algorithms for Unsupervised ProblemsQing Tao, Gao-wei Wu, Fei-Yue Wang, Jue Wang. 395-401 [doi]
- Collecting and Analyzing the Presence of Terrorists on the Web: A Case Study of Jihad WebsitesEdna Reid, Jialun Qin, Yilu Zhou, Guanpi Lai, Marc Sageman, Gabriel Weimann, Hsinchun Chen. 402-411 [doi]
- Evaluating an Infectious Disease Information Sharing and Analysis SystemPaul Jen-Hwa Hu, Daniel Dajun Zeng, Hsinchun Chen, Catherine A. Larson, Wei Chang, Chunju Tseng. 412-417 [doi]
- How Question Answering Technology Helps to Locate Malevolent Online ContentDmitri Roussinov, Jose Antonio Robles-Flores. 418-421 [doi]
- Information Supply Chain: A Unified Framework for Information-SharingShuang Sun, John Yen. 422-428 [doi]
- Map-Mediated GeoCollaborative Crisis ManagementGuoray Cai, Alan M. MacEachren, Isaac Brewer, Michael D. McNeese, Rajeev Sharma, Sven Fuhrmann. 429-435 [doi]
- Thematic Indicators Derived from World News ReportsClive Best, Erik Van der Goot, Monica de Paola. 436-447 [doi]
- A Novel Watermarking Algorithm Based on SVD and Zernike MomentsHaifeng Li, Shuxun Wang, Weiwei Song, Quan Wen. 448-453 [doi]
- A Survey of Software WatermarkingWilliam Zhu, Clark D. Thomborson, Fei-Yue Wang. 454-458 [doi]
- Data Distortion for Privacy Protection in a Terrorist Analysis SystemShuting Xu, Jun Zhang, Dianwei Han, Jie Wang. 459-464 [doi]
- Deception Across Cultures: Bottom-Up and Top-Down ApproachesLina Zhou, Simon Lutterbie. 465-470 [doi]
- Detecting Deception in Synchronous Computer-Mediated Communication Using Speech Act ProfilingDouglas P. Twitchell, Nicole Forsgren, Karl Wiers, Judee K. Burgoon, Jay F. Nunamaker. 471-478 [doi]
- Active Automation of the DITSCAPSeok-Won Lee, Robin A. Gandhi, Gail-Joon Ahn, Deepak S. Yavagal. 479-485 [doi]
- An Ontological Approach to the Document Access Problem of Insider ThreatBoanerges Aleman-Meza, Phillip Burns, Matthew Eavenson, Devanand Palaniswami, Amit P. Sheth. 486-491 [doi]
- Filtering, Fusion and Dynamic Information Presentation: Towards a General Information FirewallGregory J. Conti, Mustaque Ahamad, Robert Norback. 492-497 [doi]
- Intrusion Detection System Using Sequence and Set Preserving MetricPradeep Kumar, M. Venkateswara Rao, P. Radha Krishna, Raju S. Bapi, Arijit Laha. 498-504 [doi]
- The Multi-fractal Nature of Worm and Normal Traffic at Individual Source LevelYufeng Chen, Yabo Dong, Dongming Lu, Yunhe Pan. 505-510 [doi]
- Learning Classifiers for Misuse Detection Using a Bag of System Calls RepresentationDae-Ki Kang, Doug Fuller, Vasant Honavar. 511-516 [doi]
- A Jackson Network-Based Model for Quantitative Analysis of Network SecurityZhengtao Xiang, Yufeng Chen, Wei Jian, Fei Yan. 517-522 [doi]
- Biomonitoring, Phylogenetics and Anomaly Aggregation SystemsDavid R. B. Stockwell, Jason T. L. Wang. 523-529 [doi]
- CODESSEAL: Compiler/FPGA Approach to Secure ApplicationsOlga Gelbart, Paul Ott, Bhagirath Narahari, Rahul Simha, Alok N. Choudhary, Joseph Zambreno. 530-535 [doi]
- Computational Tool in Infrastructure Emergency Total Evacuation AnalysisKelvin H. L. Wong, Mingchun Luo. 536-542 [doi]
- Performance Study of a Compiler/Hardware Approach to Embedded Systems SecurityKripashankar Mohan, Bhagirath Narahari, Rahul Simha, Paul Ott, Alok N. Choudhary, Joseph Zambreno. 543-548 [doi]
- A Secured Mobile Phone Based on Embedded Fingerprint Recognition SystemsXinjian Chen, Jie Tian, Qi Su, Xin Yang, Fei-Yue Wang. 549-553 [doi]
- Connections in the World of International TerrorismYael Shahar. 554-560 [doi]
- Forecasting Terrorism: Indicators and Proven Analytic TechniquesSundri K. Khalsa. 561-566 [doi]
- Forecasting Terrorist Groups Warfare: Conventional to CBRNJoshua Sinai. 567-570 [doi]
- The Qualitative Challenge of Insurgency InformaticsScott Tousley. 571-578 [doi]
- The Application of PROACT® RCA to Terrorism/Counter Terrorism Related EventsRobert J. Latino. 579-589 [doi]
- A Group Decision-Support Method for Search and Rescue Based on Markov ChainHuizhang Shen, Jidi Zhao, Ying Peng. 590-592 [doi]
- A New Relationship Form in Data MiningSuwimon Kooptiwoot, Muhammad Abdus Salam. 593-594 [doi]
- A Study of Root Causes of Conflict Using Latent Semantic AnalysisMihaela Bobeica, Jean-Paul Jéral, Teofilo Garcia, Clive Best. 595-596 [doi]
- An Empirical Study on Dynamic Effects on Deception DetectionTiantian Qin, Judee K. Burgoon. 597-599 [doi]
- Anti Money Laundering Reporting and Investigation - Sorting the Wheat from the ChaffAna Isabel Canhoto, James Backhouse. 600-601 [doi]
- Application of Latent Semantic Indexing to Processing of Noisy TextRobert J. Price, Anthony E. Zukas. 602-603 [doi]
- Detecting Misuse of Information Retrieval Systems Using Data Mining TechniquesNazli Goharian, Ling Ma, Chris Meyers. 604-605 [doi]
- Mining Schemas in Semistructured Data Using Fuzzy Decision TreesWei Sun, Da-xin Liu. 606-607 [doi]
- More Than a Summary: Stance-Shift AnalysisBoyd Davis, Vivian Lord, Peyton Mason. 608-609 [doi]
- Principal Component Analysis (PCA) for Data Fusion and Navigation of Mobile RobotsZeng-Guang Hou. 610-611 [doi]
- BioPortal: Sharing and Analyzing Infectious Disease InformationDaniel Dajun Zeng, Hsinchun Chen, Chunju Tseng, Catherine A. Larson, Wei Chang, Millicent Eidson, Ivan Gotham, Cecil Lynch, Michael Ascher. 612-613 [doi]
- DIANE: Revolutionizing the Way We Collect, Analyze, and Share InformationJin Zhu. 614-616 [doi]
- Processing High-Speed Intelligence Feeds in Real-TimeAlan J. Demers, Johannes Gehrke, Mingsheng Hong, Mirek Riedewald. 617-618 [doi]
- Question Answer TARA: A Terrorism Activity Resource ApplicationRobert P. Schumaker, Hsinchun Chen. 619-620 [doi]
- Template Based Semantic Similarity for Security ApplicationsBoanerges Aleman-Meza, Christian Halaschek-Wiener, Satya Sanket Sahoo, Amit P. Sheth, Ismailcem Budak Arpinar. 621-622 [doi]
- The Dark Web Portal Project: Collecting and Analyzing the Presence of Terrorist Groups on the WebJialun Qin, Yilu Zhou, Guanpi Lai, Edna Reid, Marc Sageman, Hsinchun Chen. 623-624 [doi]
- Toward an ITS Specific Knowledge EngineGuanpi Lai, Fei-Yue Wang. 625-626 [doi]
- A Blind Image Watermarking Using for Copyright Protection and TracingHaifeng Li, Shuxun Wang, Weiwei Song, Quan Wen. 627-628 [doi]
- Towards an Effective Wireless Security Policy for Sensitive OrganizationsMichael Manley, Cheri McEntee, Anthony Molet, Joon S. Park. 629-630 [doi]
- A Taxonomy of Cyber Attacks on 3G NetworksKameswari Kotapati, Peng Liu, Yan Sun, Thomas F. La Porta. 631-633 [doi]
- An Adaptive Approach to Handle DoS Attack for Web ServicesEul-Gyu Im, Yong Ho Song. 634-635 [doi]
- An Architecture for Network Security Using Feedback ControlRam Dantu, João W. Cangussu. 636-637 [doi]
- Defending a Web Browser Against Spying with Browser Helper ObjectsBeomsoo Park, Sungjin Hong, Jaewook Oh, Heejo Lee. 638-639 [doi]
- Dynamic Security Service Negotiation to Ensure Security for Information Sharing on the InternetZhengYou Xia, Yichuan Jiang, Jian Wang. 640-641 [doi]
- Enhancing Spatial Database Access Control by Eliminating the Covert Topology ChannelYoung-Hwan Oh, Hae-Young Bae. 642-643 [doi]
- Gathering Digital Evidence in Response to Information Security IncidentsShiuh-Jeng Wang, Cheng-Hsing Yang. 644-645 [doi]
- On the QP Algorithm in Software WatermarkingWilliam Zhu, Clark D. Thomborson. 646-647 [doi]
- On the Use of Opaque Predicates in Mobile Agent Code ObfuscationAnirban Majumdar, Clark D. Thomborson. 648-649 [doi]
- Secure Contents Distribution Using Flash Memory TechnologyYong Ho Song, Eul-Gyu Im. 650-651 [doi]
- Background Use of Sensitive Information to Aid in Analysis of Non-sensitive Data on Threats and VulnerabilitiesRichard A. Smith. 652-653 [doi]
- Securing Grid-Based Critical InfrastructuresSyed Naqvi, Michel Riguidel. 654-655 [doi]
- The Safety Alliance of Cushing - A Model Example of Cooperation as an Effective Counterterrorism ToolDavid Zimmermann. 656-657 [doi]
- A Framework for Global Monitoring and Security Assistance Based on IPv6 and Multimedia Data Mining TechniquesXiaoyan Gong, Haijun Gao. 658-659 [doi]
- An Agent-Based Framework for a Traffic Security Management SystemShuming Tang, Haijun Gao. 660-661 [doi]
- Application of a Decomposed Support Vector Machine Algorithm in Pedestrian Detection from a Moving VehicleHong Qiao, Fei-Yue Wang, Xianbin Cao. 662-663 [doi]
- Application of Cooperative Co-evolution in Pedestrian Detection SystemsXianbin Cao, Hong Qiao, Fei-Yue Wang, Xinzheng Zhang. 664-665 [doi]
- Biometric Fingerprints Based Radio Frequency IdentificationSundaram Jayakumar, Chandramohan Senthilkumar. 666-668 [doi]
- BorderSafe: Cross-Jurisdictional Information Sharing, Analysis, and VisualizationSiddharth Kaza, Byron Marshall, Jennifer Jie Xu, Alan Gang Wang, Hemanth Gowda, Homa Atabakhsh, Tim Petersen, Chuck Violette, Hsinchun Chen. 669-670 [doi]