Abstract is missing.
- Chinese Word Segmentation for Terrorism-Related ContentsDaniel Zeng, Donghua Wei, Michael Chau, Fei-Yue Wang. 1-13 [doi]
- A Term Association Inference Model for Single Documents: A Stepping Stone for Investigation through Information ExtractionSukanya Manna, Tom Gedeon. 14-20 [doi]
- Method for Evaluating the Security Risk of a Website Against Phishing AttacksYoung-Gab Kim, Sanghyun Cho, Jun-Sub Lee, Min-Soo Lee, In-Ho Kim, Sung Hoon Kim. 21-31 [doi]
- CyberIR - A Technological Approach to Fight CybercrimeShihchieh Chou, Weiping Chang. 32-43 [doi]
- The Banknote Anti-forgery System Based on Digital Signature AlgorithmsShenghui Su, Yongquan Cai, ChangXiang Shen. 44-49 [doi]
- Sequence Matching for Suspicious Activity Detection in Anti-Money LaunderingXuan Liu, Pengzhu Zhang, Dajun Zeng. 50-61 [doi]
- Data Protection in Memory Using Byte ReorderingHyun Jun Jang, Dae Won Hwang, Eul-Gyu Im. 62-68 [doi]
- Highly Efficient Password-Based Three-Party Key Exchange in Random Oracle ModelHung-Yu Chien, Tzong-Chen Wu. 69-76 [doi]
- A Pairwise Key Pre-distribution Scheme for Wireless Sensor NetworkHui-Feng Huang. 77-82 [doi]
- Attacks on SVD-Based Watermarking SchemesHuo-Chong Ling, Raphael C.-W. Phan, Swee-Huay Heng. 83-91 [doi]
- Trigger Based Security Alarming Scheme for Moving Objects on Road NetworksSajimon Abraham, P. Sojan Lal. 92-101 [doi]
- Reducing False Alarm of Video-Based Smoke Detection by Support Vector MachineChan-Yun Yang, Wei-Wen Tseng, Jr-Syu Yang. 102-113 [doi]
- Privacy-Preserving Collaborative Social NetworksJustin Zhan, Gary Blosser, Christopher C. Yang, Lisa Singh. 114-125 [doi]
- Efficient Secret Authenticatable Anonymous Signcryption Scheme with Identity PrivacyMingwu Zhang, Bo Yang, Shenglin Zhu, Wenzheng Zhang. 126-137 [doi]
- How to Publicly Verifiably Expand a Member without Changing Old Shares in a Secret Sharing SchemeJia Yu, Fanyu Kong, Rong Hao, Xuliang Li. 138-148 [doi]
- Comparing Two Models for Terrorist Group Detection: GDM or OGDM?Fatih Ozgul, Zeki Erdem, Hakan Aksoy. 149-160 [doi]
- Applying Case-Based Reasoning and Expert Systems to Coastal Patrol Crime Investigation in TaiwanChung-C. Chang, Kuo H. Hua. 161-170 [doi]
- Integrating Data Sources and Network Analysis Tools to Support the Fight Against Organized CrimeLuigi Ferrara, Christian Mårtenson, Pontus Svenson, Per Svensson, Justo Hidalgo, Anastasio Molano, Anders L. Madsen. 171-182 [doi]
- Visual Analytics for Supporting Entity Relationship Discovery on Text DataHanbo Dai, Ee-Peng Lim, Hady Wirawan Lauw, HweeHwa Pang. 183-194 [doi]
- Feature Weighting and Selection for a Real-Time Network Intrusion Detection System Based on GA with KNNMing-Yang Su, Kai-Chi Chang, Hua-Fu Wei, Chun-Yuen Lin. 195-204 [doi]
- Locality-Based Server Profiling for Intrusion DetectionRobert Lee, Sheau-Dong Lang. 205-216 [doi]
- A Simple WordNet-Ontology Based Email Retrieval System for Digital ForensicsPhan Thien Son, Lan Du, Huidong Jin, Olivier Y. de Vel, Nianjun Liu, Terry Caelli. 217-228 [doi]
- Preservation of Evidence in Case of Online Gaming CrimePatrick S. Chen, Cheng-Yu Hung, Chiao-Hsin Ko, Ying-Chieh Chen. 229-244 [doi]
- Dataset Analysis of Proxy Logs Detecting to Curb Propagations in Network AttacksDa-Yu Kao, Shiuh-Jeng Wang, Frank Fu-Yuan Huang, Sajal Bhatia, Saurabh Gupta. 245-250 [doi]
- Identifying Chinese E-Mail Documents Authorship for the Purpose of Computer ForensicJianbin Ma, Ying Li, Guifa Teng. 251-259 [doi]
- A Collaborative Forensics Framework for VoIP Services in Multi-network EnvironmentsHsien-Ming Hsu, Yeali S. Sun, Meng Chang Chen. 260-271 [doi]
- Wireless Forensic: A New Radio Frequency Based Locating SystemEmmanuel Velasco, Weifeng Chen, Ping Ji, Raymond Hsieh. 272-277 [doi]
- Applying Public-Key Watermarking Techniques in Forensic Imaging to Preserve the Authenticity of the EvidenceWen-Chao Yang, Che-Yen Wen, Chung-Hao Chen. 278-287 [doi]
- Computer Forensics and CultureYi-Chi Lin, Jill Slay, I.-Long Lin. 288-297 [doi]
- E-Commerce Security: The Categorical Role of Computers in Forensic Online CrimeFahim Akhter. 298-303 [doi]
- Forensic Artifacts of Microsoft Windows Vista SystemDaniel M. Purcell, Sheau-Dong Lang. 304-319 [doi]
- How Useful Are Tags? - An Empirical Analysis of Collaborative Tagging for Web Page RecommendationDaniel Zeng, Huiqian Li. 320-330 [doi]
- A Generative Model for Statistical Determination of Information Content from Conversation ThreadsYingjie Zhou, Malik Magdon-Ismail, William A. Wallace, Mark K. Goldberg. 331-342 [doi]
- Using Cited by Information to Find the Context of Research PapersChun-Hung Lu, Chih-Chien Wang, Min-Yuh Day, Chorng-Shyong Ong, Wen-Lian Hsu. 343-354 [doi]
- Online Communities: A Social Computing PerspectiveXiarong Li, Daniel Zeng, Wenji Mao, Fei-Yue Wang. 355-365 [doi]
- User-Centered Interface Design of Social WebsitesYang-Cheng Lin, Chung-Hsing Yeh. 366-376 [doi]
- Discovering Trends in Collaborative Tagging SystemsAaron Sun, Daniel Zeng, Huiqian Li, Xiaolong Zheng. 377-383 [doi]
- Socio-contextual Filters for Discovering Similar Knowledge-Gathering Tasks in Generic Information SystemsBalaji Rajendran. 384-389 [doi]
- Exploring Social Dynamics in Online Bookmarking SystemsXiaolong Zheng, Huiqian Li, Aaron Sun. 390-391 [doi]
- Dispositional Factors in the Use of Social Networking Sites: Findings and Implications for Social Computing ResearchPeter A. Bibby. 392-400 [doi]
- Agent-Based Social Simulation and Modeling in Social ComputingXiaochen Li, Wenji Mao, Daniel Zeng, Fei-Yue Wang. 401-412 [doi]
- Transforming Raw-Email Data into Social-Network InformationTerrill L. Frantz, Kathleen M. Carley. 413-420 [doi]
- Using Social Networks to Organize Researcher CommunityXian-Ming Xu, Justin Zhan, Hai-tao Zhu. 421-427 [doi]
- Online Gaming Perpetrators ModelYungchang Ku, Saurabh Gupta. 428-433 [doi]
- Proposal for a Multiagent Architecture for Self-Organizing Systems (MA-SOS)Niriaska Perozo, Jose Aguilar, Oswaldo Terán. 434-439 [doi]
- Applying Text Mining to Assist People Who Inquire HIV/AIDS Information from InternetYungchang Ku, Chaochang Chiu, Bo-Hong Liou, Jyun-Hong Liou, Jheng-Ying Wu. 440-448 [doi]
- Polarity Classification of Public Health Opinions in ChineseChangli Zhang, Daniel Zeng, Qingyang Xu, Xueling Xin, Wenji Mao, Fei-Yue Wang. 449-454 [doi]
- Parallel Crawling and Capturing for On-Line AuctionCheng-Hsien Yu, Shi-Jen Lin. 455-466 [doi]
- A New Credit Card Payment Scheme Using Mobile Phones Based on Visual CryptographyChao-Wen Chan, Chih-Hao Lin. 467-476 [doi]
- Detecting Hidden Hierarchy in Terrorist Networks: Some Case StudiesNasrullah Memon, Henrik Legind Larsen, David L. Hicks, Nicholas Harkiolakis. 477-489 [doi]
- Keyphrase Extraction from Chinese News Web Pages Based on Semantic RelationsFei Xie, Xindong Wu, Xuegang Hu, Fei-Yue Wang. 490-495 [doi]
- Automatic Recognition of News Web PagesZhu Zhu, Gong-Qing Wu, Xindong Wu, Xuegang Hu, Fei-Yue Wang. 496-501 [doi]
- Understanding Users Attitudes Towards Using a VoIP SurveyHsiu-Mei Huang, Chun-Hung Hsieh, Pei-I Yang, Chung-Min Lai, Wei-Hong Lin. 502-507 [doi]
- Privacy-Preserving Collaborative E-VotingGary Blosser, Justin Zhan. 508-513 [doi]
- Privacy-Aware Access Control through Negotiation in Daily Life ServiceHyun-A Park, Justin Zhan, Dong-Hoon Lee. 514-519 [doi]