Abstract is missing.
- Dynamic user-level affect analysis in social media: Modeling violence in the Dark WebShuo Zeng, Mingfeng Lin, Hsinchun Chen. 1-6 [doi]
- The Dark Web Forum Portal: From multi-lingual to videoHsinchun Chen, Dorothy Denning, Nancy Roberts, Catherine A. Larson, Ximing Yu, Chunneng Huang. 7-14 [doi]
- An SIR model for violent topic diffusion in social mediaJiyoung Woo, Jaebong Son, Hsinchun Chen. 15-19 [doi]
- Al Qaeda terrorist financing and technologies to track the finance networkIrina Sakharova. 20-25 [doi]
- Study on covert networks of terrorists based on interactive relationship hypothesisDuo-Yong Sun, Shu-Quan Guo, Ben-xian Li, Xiao-Peng Liu. 26-30 [doi]
- Automatic behavior model selection by iterative learning and abnormality recognitionHeping Li, Jie Liu, Shuwu Zhang. 31-36 [doi]
- Analyzing group communication for preventing data leakage via emailPolina Zilberman, Shlomi Dolev, Gilad Katz, Yuval Elovici, Asaf Shabtai. 37-41 [doi]
- The spatio-temporal generalized additive model for criminal incidentsXiaofeng Wang, Donald E. Brown. 42-47 [doi]
- Test-case generation for marine safety and security scenariosHamed Yaghoubi Shahir, Uwe Glässer, Piper J. Jackson, Hans Wehn. 48-53 [doi]
- An extensible decision engine for Marine Safety and SecurityPiper J. Jackson, Uwe Glässer, Hamed Yaghoubi Shahir, Hans Wehn. 54-59 [doi]
- The Geopolitical Web: Assessing societal risk in an uncertain worldHsinchun Chen, Catherine A. Larson, Theodore Elhourani, David Zimbra, David Ware. 60-64 [doi]
- Estimating the sentiment of social media content for security informatics applicationsKristin Glass, Richard Colbaugh. 65-70 [doi]
- Analyzing social media in escalating crisis situationsIl-Chul Moon, Alice H. Oh, Kathleen M. Carley. 71-76 [doi]
- Extending the classification of nodes in social networksRaymond Heatherly, Murat Kantarcioglu. 77-82 [doi]
- Topic discovery based on dual EM mergingJianping Zeng, Jiangjiao Duan, Chengrong Wu. 83-88 [doi]
- Supervised term weighting for sentiment analysisTam T. Nguyen, Kuiyu Chang, Siu Cheung Hui. 89-94 [doi]
- LanguageNet: A novel framework for processing unstructured text informationPir Abdul Rasool Qureshi, Nasrullah Memon, Uffe Kock Wiil. 95-100 [doi]
- Identification of related information of interest across free text documentsJames R. (Bob) Johnson, Anita Miller, Latifur Khan, Bhavani M. Thuraisingham, Murat Kantarcioglu. 101-106 [doi]
- Extraction of expanded entity phrasesJames R. (Bob) Johnson, Anita Miller, Latifur Khan, Bhavani M. Thuraisingham, Murat Kantarcioglu. 107-112 [doi]
- The distribution of event complexity in the British Columbia court systemPatricia L. Brantingham, Paul J. Brantingham, Amir H. Ghaseminejad. 113-118 [doi]
- Leveraging social networks to detect anomalous insider actions in collaborative environmentsYou Chen, Steve Nyemba, Wen Zhang, Bradley Malin. 119-124 [doi]
- Proactive defense for evolving cyber threatsRichard Colbaugh, Kristin Glass. 125-130 [doi]
- HoneyGen: An automated honeytokens generatorMaya Bercovitch, Meir Renford, Lior Hasson, Asaf Shabtai, Lior Rokach, Yuval Elovici. 131-136 [doi]
- Managing changes with legacy security engineering processesEdith Felix, Olivier Delande, Fabio Massacci, Federica Paci. 137-142 [doi]
- Anomaly detection using weak estimatorsJustin Zhan, B. John Oommen, Johanna Crisostomo. 143-149 [doi]
- A digraph model for risk identification and mangement in SCADA systemsJian Guan, James H. Graham, Jeffrey L. Hieb. 150-155 [doi]
- A tamper-proof software watermark using code encryptionZhanyong Tang, Dingyi Fang. 156-160 [doi]
- Enhancing unlinkability in Vehicular Ad Hoc NetworksHesiri Weerasinghe, Huirong Fu, Supeng Leng, Ye Zhu. 161-166 [doi]
- Identifying Dark Web clusters with temporal coherence analysisChristopher C. Yang, Xuning Tang, Xiajing Gong. 167-172 [doi]
- Criminal identity resolution using social behavior and relationship attributesJiexun Li, G. Alan Wang. 173-175 [doi]
- Incorporating data sources and methodologies for crime data miningFatih Ozgul, Claus Atzenbeck, Ahmet Çelik, Zeki Erdem. 176-180 [doi]
- Mining actionable behavioral rules from group dataPeng Su, Wenji Mao, Daniel Zeng, Huimin Zhao. 181-183 [doi]
- Forecasting group behavior via multiple plan recognitionXiaochen Li, Wenji Mao, Daniel Zeng, Huachi Zhu. 184-186 [doi]
- Privacy preserving two-party k-means clustering over vertically partitioned datasetZhenmin Lin, Jerzy W. Jaromczyk. 187-191 [doi]
- Detecting emerging topics and trends via predictive analysis of 'meme' dynamicsRichard Colbaugh, Kristin Glass. 192-194 [doi]
- Web content mining for alias identification: A first step towards suspect trackingTarique Anwar, Muhammad Abulaish, Khaled Alghathbar. 195-197 [doi]
- Preserving privacy in social network integration with τ-toleranceChristopher C. Yang. 198-200 [doi]
- Dynamic Sensitivity-Based Access ControlAmir Harel, Asaf Shabtai, Lior Rokach, Yuval Elovici. 201-203 [doi]
- Session-wise private data exchange in eHealth peer-to-peer database management systemsSk. Md. Mizanur Rahman, Md. Mehedi Masud, Carlisle Adams, Hussein T. Mouftah, Atsuo Inomata. 204-206 [doi]
- Publisher click fraud in the pay-per-click advertising market: Incentives and consequencesXiarong Li, Yong Liu, Daniel Zeng. 207-209 [doi]
- Decision modeling for resilient infrastructuresJing Gong, William A. Wallace, John E. Mitchell. 210-212 [doi]
- Trojan characteristics analysis based on Stochastic Petri NetsHe Gao, Yuanzhuo Wang, Li Wang, Li Liu, Jinming Li, Xueqi Cheng. 213-215 [doi]
- Extended approximate string matching algorithms to detect name aliasesMuniba Shaikh, Nasrullah Memon, Uffe Kock Wiil. 216-219 [doi]
- The construction of accounting information system under the environment of the networkXiaoting Li, Jingfu Yang, Zishan Wang. 220 [doi]
- Game analysis in international anti-terrorism strikeBen-xian Li, Meng-jun Li. 221 [doi]
- Research on government on-line information management and serviceYin-zhi Lei, Xiao-yin Zhou, Xi-peng Wei. 222-225 [doi]
- The analysis of military intelligence early warning based on open source intelligenceJiwei Song. 226 [doi]
- Improving the security of the distributed enterprise data warehouse systemYanzhen Qu, Weiwen Yang. 227 [doi]
- Enabling dynamic linkage of linguistic census data at Statistics Canada (extended abstract)Arnaud Casteigts, Marie-Hélène Chomienne, Louise Bouchard, Guy-Vincent Jourdan. 228 [doi]
- Utilizing infrared technology to prevent terrorist attacksTimmy Nguyen, Leonidas Deligiannidis. 229 [doi]
- Organization of social network messages to improve understanding of an evolving crisisAlana Platt, Cynthia Hood, Levi Citrin. 230 [doi]
- heteroHarvest: Harvesting information from heterogeneous sourcesPir Abdul Rasool Qureshi, Nasrullah Memon, Uffe Kock Wiil, Panagiotis Karampelas, Jose Ignacio Nieto Sancheze. 231 [doi]
- Citizen-generated spatial data and information: Risks and opportunitiesPeter Mooney, Huabo Sun, Padraig Corcoran, Lei Yan. 232 [doi]
- A theoretical model to minimize the operational cost for canary-equipped electronic system's health managementWenbin Wang, Yifang Liu, Michael G. Pecht. 233-238 [doi]
- The polynomial representation of Gray map on Zp2Liu Lan-Lan, Zhou Meng. 239-241 [doi]
- Prognostics and health monitoring for lithium-ion batteryYinjiao Xing, Qiang Miao, Kwok-Leung Tsui, Michael G. Pecht. 242-247 [doi]
- Lessons from method: A successful Electronic Medical Record (EMR) system implementationYun Wan, William Perry. 248-251 [doi]
- Bayesian reliability modeling of multi-level system with interdependent subsystems and componentsJian Liu, Jing Li, Byoung uk Kim. 252-257 [doi]
- A decomposition approach to imbalanced classificationAbhishek K. Shrivastava, Junjie Cao. 258-260 [doi]
- A nonparametric fault isolation approach through hybrid novelty scoreGulanbaier Tuerhong, Seoung Bum Kim. 261-266 [doi]
- Quantitative risk analysis model of integrating fuzzy fault tree with Bayesian NetworkYan Fu Wang, Min Xie 0001, Kien Ming Ng, Yi Fei Meng. 267-271 [doi]
- Clustering algorithm-based control chartsJi-Hoon Kang, Seoung Bum Kim. 272-277 [doi]
- Daily, seasonal, and spatial patterns of PM10 in Seoul, KoreaKyu Jong Lee, Seoung Bum Kim, Sun-Kyoung Park. 278-283 [doi]
- Design of logic processes for prognostics and health management in an avionics systemDefeng Shen, Shunong Zhang. 284-288 [doi]
- Research on numerical analysis for color matching in textile dyeing based on least square FittingBingsen Zhang, Yongchang Zhang, HouJun Yang, XiaoJie Liu, Anling Zhang, Zhongwen Zhang. 289-292 [doi]
- Research on application of the minimum error average fitting method in computer color matchingBingsen Zhang, Yaping Shi, HouJun Yang, XiaoJie Liu, Anling Zhang. 293-296 [doi]
- A cost-based FMEA decision tool for product quality design and managementMichael H. Wang. 297-302 [doi]
- Solving incidents in telecommunications using a multi-agent systemLilyam Paolino, Horacio Paggi, Fernando Alonso, Genoveva López. 303-308 [doi]
- Empirical analysis on causal relationship between institution and economic development based on VAR methodJinyu Yuan, Zhixing He. 309-312 [doi]
- Situational awareness on disruption management: A system information propagation approachHaidong Xiao, Ning Chen, Yan Hu. 313-315 [doi]
- Analysis of cyberspace security situational awareness based on fuzz reasonHaidong Xiao, Ning Chen. 316-319 [doi]
- Analysis of accelerated degradation test under constant stress with errors for longitudinal dataSai-Yin Zhang, Zhong-Zhan Zhang. 320-324 [doi]
- Multivariate process monitoring and fault identification model using decision tree learning techniquesShuguang He, Chenghang Xiao. 325-330 [doi]
- Study on distributions of fatigue crack-nucleating particle sizes and cracks formation in aluminum alloyYueliang Chen, Guixue Bian, Lin Yi, Jianjun Hu. 331-334 [doi]
- Studying on influencing factors of Fretting fatigue life of aluminum alloyMaosheng Yang, Yuquan Bi, Yueliang Chen, Li Xu. 335-338 [doi]
- A reliability integrated acceptance test plan for series systems whose components following exponential distributionsXue-jing Li, Dan Yu. 339-344 [doi]
- An optimal control algorithm based on Kalman filter for ARMA disturbancesFangyi He. 345-348 [doi]
- Logistic regression analysis for Predicting Methicillin-resistant Staphylococcus Aureus (MRSA) in-hospital mortalityYizhen Hai, Vincent C. Cheng, Shui Yee Wong, Kwok-Leung Tsui, Kwok-yung Yuen. 349-353 [doi]
- Compiling the marine environment spectrum based on inversion satellite remote sensing dataTai Feng Zhang, Wei Yi Zhao, Xiao-Hua Yang, Zeng Jie Cai. 354-357 [doi]
- Distribution rule of corrosion damage morphology parameters for aluminum alloyDanfeng Zhang, Xiaoming Tan, Yueliang Chen. 358-361 [doi]
- An new approach for newsboy problem with fuzzy demandJinsong Hu, Ling Cui, Zengqiang Li, Xiaogen Hu, Haixiang Wu. 362-366 [doi]
- On the analysis of the applications and social influence of mobile phone reading in the medium and small cities in China: Take the first pilot city Baoding for an exampleRan Zhao, Guochun Fu, Jianhui Cheng. 367-372 [doi]
- Study on covert networks of terroristic organizations based on text analysisDuo-Yong Sun, Shu-Quan Guo, Hai Zhang, Ben-xian Li. 373-378 [doi]
- Lifespan and popularity measurement of online content on social networksBeiming Sun, Vincent T. Y. Ng. 379-383 [doi]
- Integrating online social networks for enhancing reputation systems of e-commerceXing Fang, Justin Zhan, Nicholas Koceja, Kenneth Williams, Justin Brewton. 384-389 [doi]
- A geographic analysis of P2P-TV viewershipZhihong Jiang, Hui Wang, Yubao Zhang, Pei Li. 390-395 [doi]
- Measurement and analysis of topology and information propagation on Sina-MicroblogPengyi Fan, Pei Li, Zhihong Jiang, Wei Li, Hui Wang. 396-401 [doi]
- On image similarity in the context of multimedia social computingChao Gao, Xin Zhang, Liang Zheng, Hui Wang. 402-406 [doi]
- Boosting rank with predictable training errorYongqing Wang, Wenji Mao, Daniel Zeng, Ning Bao. 407-409 [doi]