Abstract is missing.
- On the mitigation of bioterrorism through game theoryRyan Layfield, Murat Kantarcioglu, Bhavani M. Thuraisingham. 1-6 [doi]
- Stability of individual and group behavior in a blog networkStephen Kelley, Mark K. Goldberg, Malik Magdon-Ismail, Konstantin Mertsalov. 7-12 [doi]
- Observation of network structure in Amazon.comTeruhiko Yoneyama, Mukkai S. Krishnamoorthy. 13-18 [doi]
- Social network classification incorporating link type valuesRaymond Heatherly, Murat Kantarcioglu, Bhavani M. Thuraisingham. 19-24 [doi]
- Mining top-k and bottom-k correlative crime patterns through graph representationsPeter Phillips, Ickjai Lee. 25-30 [doi]
- Factors influencing Bloggers perceived indentifiabilityChyng-Yang Jang, Michael Stefanone. 31-36 [doi]
- Prediction of past unsolved terrorist attacksFatih Ozgul, Zeki Erdem, Chris Bowerman. 37-42 [doi]
- Hardening adversarial prediction with anomaly trackingM. A. J. Bourassa, D. B. Skillicorn. 43-48 [doi]
- Supporting data exploration in databasesAntonio Badia. 49-54 [doi]
- Change point detection based on call detail recordsHuiqi Zhang, Ram Dantu, João W. Cangussu. 55-60 [doi]
- Gender difference analysis of political web forums: An experiment on an international islamic women s forumYulei Zhang, Yan Dang, Hsinchun Chen. 61-64 [doi]
- Web opinions analysis with scalable distance-based clusteringChristopher C. Yang, Tobun Dorbin Ng. 65-70 [doi]
- Dark web forums portal: Searching and analyzing jihadist forumsYulei Zhang, Shuo Zeng, Li Fan, Yan Dang, Catherine A. Larson, Hsinchun Chen. 71-76 [doi]
- The software EBox: Integrated information for situational awarenessNaveen Ashish, Jay Lickfett, Sharad Mehrotra, Nalini Venkatasubramanian. 77-82 [doi]
- A Voronoi-based model for emergency planning using sequential-scan algorithmsChristopher Torpelund-Bruin, Ickjai Lee. 83-88 [doi]
- A game theory approach for the reallocation of security forces against terrorist diversionary attacksYi-Ming Chen, Dachrahn Wu, Cheng-Kuang Wu. 89-94 [doi]
- Supporting emergent knowledge and team communication in police investigationsClaus Atzenbeck, David L. Hicks, Nasrullah Memon. 95-100 [doi]
- Injecting a permission-based delegation model to secure web-based workflow systemsXiaoRan Wang, Coskun Bayrak. 101-106 [doi]
- Developing insider attack detection model: A grounded approachGary Doss, Gurvirender P. Tejay. 107-112 [doi]
- Building a better password: The role of cognitive load in information security trainingAnn-Marie Horcher, Gurvirender P. Tejay. 113-118 [doi]
- Unifying strategies and tactics: A survivability framework for countering cyber attacksYanjun Zuo, Brajendra Panda. 119-124 [doi]
- A Higher Order Collective Classifier for detecting and classifying network eventsVikas Menon, William M. Pottenger. 125-130 [doi]
- Effective whitelisting for filesystem forensicsSudarshan S. Chawathe. 131-136 [doi]
- Intrusion detection based on Hybrid propagation in Bayesian NetworksFarah Jemili, Montaceur Zaghdoud, Mohamed Ben Ahmed. 137-142 [doi]
- Automated casing event detection in persistent video surveillanceDaniel T. Schmitt 0003, Stuart H. Kurkowski, Michael J. Mendenhall. 143-148 [doi]
- A two-level protocol to answer private location-based queriesRoopa Vishwanathan, Yan Huang. 149-154 [doi]
- Identity theft, computers and behavioral biometricsRobert Moskovitch, Clint Feher, Arik Messerman, Niklas Kirschnick, Tarik Mustafic, Ahmet Ahmet Çamtepe, Bernhard Löhlein, Ulrich Heister, Sebastian Möller, Lior Rokach, Yuval Elovici. 155-160 [doi]
- PerpSearch: An integrated crime detection systemLi Ding, Dana Steil, Matthew Hudnall, Brandon Dixon, Randy K. Smith, David Brown, Allen S. Parrish. 161-163 [doi]
- A natural language interface for crime-related spatial queriesChengyang Zhang, Yan Huang, Rada Mihalcea, Hector Cuellar. 164-166 [doi]
- Voronoi representation for areal data processing in data-rich environmentsDavid Breitkreutz, Ickjai Lee. 167-169 [doi]
- graphOnt: An ontology based library for conversion from semantic graphs to JUNGStephen Kelley, Mark K. Goldberg, Malik Magdon-Ismail, Konstantin Mertsalov, William A. Wallace, Mohammed Javeed Zaki. 170-172 [doi]
- IEDs in the dark web: Lexicon expansion and genre classificationHsinchun Chen. 173-175 [doi]
- Automatically Classifying Documents by Ideological and Organizational AffiliationMoshe Koppel, Navot Akiva, Eli Alshech, Kfir Bar. 176-178 [doi]
- Identification of extremist videos in online video sharing sitesTianjun Fu, Chunneng Huang, Hsinchun Chen. 179-181 [doi]
- Tracking terrorism news threads by extracting event signaturesSyed Toufeeq Ahmed, Ruchi Bhindwale, Hasan Davulcu. 182-184 [doi]
- A framework for harnessing public wisdom to ensure food safetyTobun Dorbin Ng, Christopher C. Yang. 185-187 [doi]
- ContentEx: A framework for automatic content extraction programsLinhai Song, Xueqi Cheng, Yan Guo, Yue Liu, Guodong Ding. 188-190 [doi]
- Facilitating wrapper generation with page analysisBo Wu, Xueqi Cheng, Yu Wang 0009, Gang Zhang, Guodong Ding. 191-193 [doi]
- BBN-based privacy management sytem for facebookEnkh-Amgalan Baatarjav, Ram Dantu, Yan Tang, João W. Cangussu. 194-196 [doi]
- Practical privacy-preserving protocols for criminal investigationsFlorian Kerschbaum, Andreas Schaad, Debmalya Biswas. 197-199 [doi]
- Research about extracting and analyzing accounting data of company to detect financial fraudKimin Seo, Jaemin Choi, Yong-Seok Choi, Dong-chan Lee, Sangjin Lee. 200-202 [doi]
- Weaving ontologies to support digital forensic analysisAllyson M. Hoss, Doris L. Carver. 203-205 [doi]
- Applying graph-based anomaly detection approaches to the discovery of insider threatsWilliam Eberle, Lawrence B. Holder. 206-208 [doi]
- Functional requirements of situational awareness in computer network securityCyril Onwubiko. 209-213 [doi]
- Enforcing IRM security policies: Two case studiesMicah Jones, Kevin W. Hamlen. 214-216 [doi]
- Building Social Networks in Persistent Video SurveillanceDaniel T. Schmitt 0003, Stuart H. Kurkowski, Michael J. Mendenhall. 217-219 [doi]
- Recognizing human activities from multi-modal sensorsShu Chen, Yan Huang. 220-222 [doi]
- Assessment of impact of variable message signs on traffic surveillance in Kuala LumpurArash Moradkhani Roshandeh, Othman Che Puan. 223-225 [doi]
- Color image watermarking algorithm in cepstrum domainMin-rui Zhang, Yangmei Zhang. 226-228 [doi]
- A new quantitative approach for information security risk assessmentAbbas Asosheh, Bijan Dehmoubed, Amir Khani. 229 [doi]
- Terrorist and criminal social network data sharing and integrationXuning Tang, Christopher C. Yang. 230 [doi]
- MyMemex: A web service-based personal memex systemYoungkun Min, Bogju Lee, Chansu Yu. 231 [doi]
- Defense against SPIT using community signalsSanti Phithakkitnukoon, Ram Dantu. 232 [doi]
- Implementing PII honeytokens to mitigate against the threat of malicous insidersJonathan White, Brajendra Panda. 233 [doi]
- New approaches for intrusion detection based on logs correlationSayed Omid Azarkasb, Saeed Shiri Ghidary. 234 [doi]
- Design and implementation of a secure social network systemRyan Layfield, Bhavani M. Thuraisingham, Latifur Khan, Murat Kantarcioglu, Jyothsna Rachapalli. 236-247 [doi]
- Performance evaluation of classification methods in cultural modelingXiaochen Li, Wenji Mao, Daniel Dajun Zeng, Peng Su, Fei-Yue Wang. 248-250 [doi]
- Handling Class Imbalance Problem in Cultural ModelingPeng Su, Wenji Mao, Daniel Zeng, Xiaochen Li, Fei-Yue Wang. 251-256 [doi]
- Propagation of online news: Dynamic patternsYouzhong Wang, Daniel Zeng, Xiaolong Zheng, Fei-Yue Wang. 257-259 [doi]
- Socio-contextual model of knowledge sharing among user assisting agentsBalaji Rajendran, K. Iyakutti. 260-265 [doi]
- Finding leaders from opinion networksHengmin Zhou, Daniel Zeng, Changli Zhang. 266-268 [doi]
- Topic-based web page recommendation using tagsJing Peng, Daniel Zeng. 269-271 [doi]
- Traffic and security analysis on Sony Playstation 3Michael Perelman, Ping Ji, Weifeng Chen. 272-275 [doi]
- Identifying Google Talk packetsJessica Ho, Ping Ji, Weifeng Chen, Raymond Hsieh. 285-290 [doi]
- A heuristic approach for detection of obfuscated malwareScott Treadwell, Mian Zhou. 291-299 [doi]
- Experiment setup for temporal distributed intrusion detection system on Amazon s elastic compute cloudNoah Guilbault, Ratan Guha. 300-302 [doi]
- From digital forensic report to Bayesian network representationRobert Lee, Sheau-Dong Lang, Kevin Stenger. 303-306 [doi]
- Assured Information Sharing Life CycleTim Finin, Anupam Joshi, Hillol Kargupta, Yelena Yesha, Joel Sachs, Elisa Bertino, Ninghui Li, Chris Clifton, Gene Spafford, Bhavani M. Thuraisingham, Murat Kantarcioglu, Alain Bensoussan, Nathan Berg, Latifur Khan, Jiawei Han, ChengXiang Zhai, Ravi S. Sandhu, Shouhuai Xu, Jim Massaro, Lada A. Adamic. 307-309 [doi]
- A Characterization of the problem of secure provenance managementShouhuai Xu, Qun Ni, Elisa Bertino, Ravi S. Sandhu. 310-314 [doi]