Abstract is missing.
- Cloud-enabled data sharing modelNguyen Thanh Hung, Do Hoang Giang, Wee Keong Ng, Huafei Zhu. 1-6 [doi]
- A game theory approach to deception strategy in computer mediated communicationHsien-Ming Chou, Lina Zhou. 7-11 [doi]
- Impact of anti-phishing tool performance on attack success ratesAhmed Abbasi, Fatemeh Zahedi, Yan Chen. 12-17 [doi]
- Predictive defense against evolving adversariesRichard Colbaugh, Kristin Glass. 18-23 [doi]
- Securing cyberspace: Identifying key actors in hacker communitiesVictor A. Benjamin, Hsinchun Chen. 24-29 [doi]
- An efficient secure comparison protocolZhenmin Lin, Jerzy W. Jaromczyk. 30-35 [doi]
- Spatio-temporal modeling of criminal incidents using geographic, demographic, and twitter-derived informationXiaofeng Wang, Donald E. Brown, Matthew S. Gerber. 36-41 [doi]
- Outlier detection using semantic sensorsDavid B. Skillicorn. 42-47 [doi]
- An active binocular integrated system for intelligent robot visionYang Song, Xiaolin Zhang. 48-53 [doi]
- Police patrol district design using agent-based simulation and GISYue Zhang, Donald E. Brown. 54-59 [doi]
- Structural analysis of online criminal social networksMichael Yip 0001, Nigel Shadbolt, Craig Webber. 60-65 [doi]
- Leveraging sociological models for prediction I: Inferring adversarial relationshipsRichard Colbaugh, Kristin Glass. 66-71 [doi]
- Leveraging sociological models for prediction II: Early warning for complex contagionsRichard Colbaugh, Kristin Glass. 72-77 [doi]
- Scalable sentiment classification across multiple Dark Web ForumsDavid Zimbra, Hsinchun Chen. 78-83 [doi]
- Machine learning for the automatic identification of terrorist incidents in worldwide news mediaRichard Mason, Brian McInnis, Siddhartha R. Dalal. 84-89 [doi]
- Rebel with many causes: A computational model of insurgencySimon F. Pratt, Philippe J. Giabbanelli, Piper Jackson, Vijay Kumar Mago. 90-95 [doi]
- Partially supervised learning for radical opinion identification in hate group web forumsMing Yang, Hsinchun Chen. 96-101 [doi]
- Phishing website detection using Latent Dirichlet Allocation and AdaBoostVenkatesh Ramanathan, Harry Wechsler. 102-107 [doi]
- An event-driven SIR model for topic diffusion in web forumsJiyoung Woo, Hsinchun Chen. 108-113 [doi]
- Acquiring netizen group's opinions for modeling food safety eventsZhangwen Tan, Wenji Mao, Daniel Zeng, Xiaochen Li, Xiuguo Bao. 114-119 [doi]
- Agile detection of framing rhetoric in social mediaKristin Glass, Richard Colbaugh. 120-122 [doi]
- Click frauds and price determination modelsXiarong Li, Daniel Zeng, Lei Wang. 123-125 [doi]
- Exploratory experiments to identify fake websites by using features from the network stackJason Koepke, Siddharth Kaza, Ahmed Abbasi. 126-128 [doi]
- Evaluating source trustability with data provenance: A research noteAntonio Badia. 129-131 [doi]
- Towards cyber operations - The new role of academic cyber security research and educationJan Kallberg, Bhavani M. Thuraisingham. 132-134 [doi]
- Preserving privacy for moving objects data miningShen-Shyang Ho. 135-137 [doi]
- Structural inference in political science datasetsMinh-Tam Le, John Sweeney, Bruce M. Russett, Steven W. Zucker. 138-140 [doi]
- Unsupervised incremental sequence learning for insider threat detectionPallabi Parveen, Bhavani M. Thuraisingham. 141-143 [doi]
- Efficient mining structural motifs for biosequences with intra- and inter-block gap constraintsVance Chiang-Chi Liao, Ming-Syan Chen. 144-146 [doi]
- Anomaly detection in spatiotemporal data in the maritime domainVladimir Avram, Uwe Glässer, Hamed Yaghoubi Shahir. 147-149 [doi]
- A unit-circle classification algorithm to characterize back attack and normal traffic for intrusion detectionShan Suthaharan. 150-152 [doi]
- Graph search beyond text: Relational searches in semantic hyperlinked dataMark K. Goldberg, J. Greenman, Bridget Gutting, Malik Magdon-Ismail, John Schwartz, William A. Wallace. 153-155 [doi]
- Detecting criminal networks: SNA models are compared to proprietary modelsFatih Ozgul, Murat Gok, Zeki Erdem, Yakup Ozal. 156-158 [doi]
- Categorizing temporal events: A case study of domestic terrorismWingyan Chung. 159-161 [doi]
- Vectors of extremism across the Canada-US borderChristian Leuprecht, Todd Hataley, David B. Skillicorn. 162-164 [doi]
- Research note: Concept to develop a software-based counter-terrorism campaign decision support toolJoshua Sinai. 165-167 [doi]
- Evaluating an integrated forum portal for terrorist surveillance and analysisPaul Jen-Hwa Hu, Xing Wan, Yan Dang, Catherine A. Larson, Hsinchun Chen. 168-170 [doi]
- Identifying cliques in dark web forums - An agglomerative clustering approachTarique Anwar, Muhammad Abulaish. 171-173 [doi]
- Extracting action knowledge in security informaticsAnsheng Ge, Wenji Mao, Daniel Zeng, Qingchao Kong, Huachi Zhu. 174-176 [doi]
- Extracting semantic information structures from free text law enforcement dataJames R. (Bob) Johnson, Anita Miller, Latifur Khan, Bhavani M. Thuraisingham. 177-179 [doi]
- Ranking documents by internal variabilityDavid B. Skillicorn, P. K. Chandrasekaran. 180-182 [doi]
- A generic cyber attack response resource risk assessment modelKelly Hughes, Yanzhen Qu. 183 [doi]
- Using semantic networks to counter cyber threatsPeng He, George Karabatis. 184 [doi]
- Communication patterns based detection of anomalous network trafficDo Quoc Le, Taeyoel Jeong, H. Eduardo Roman, James Won-Ki Hong. 185 [doi]
- Emergency decision support using an agent-based modeling approachNeal Wagner, Vikas Agrawal. 186 [doi]
- Data exploitation using visual analyticsMohammad S. Habibi. 187-192 [doi]
- Evaluation method for node importance based on node condensation in terrorism networksBen-xian Li, Meng-jun Li, Duo-Yong Sun, Jiang Li, Wen-ju Li. 193 [doi]
- A robust evaluation of terrorist network based on node-lap degree of triadsWenju Li, Duoyong Sun, Benxian Li, Shuquan Guo, Ning Gu. 194 [doi]
- Building a web collection for online surveillance of U.S. domestic terrorismWingyan Chung, Wen Tang. 195 [doi]
- Multi-spectral face recognition: Identification of people in difficult environmentsThirimachos Bourlai, Bojan Cukic. 196-201 [doi]
- Establishing a foundation for automated human credibility screeningJay F. Nunamaker, Judee K. Burgoon, Nathan W. Twyman, Jeffrey Gainer Proudfoot, Ryan M. Schuetzler, Justin Scott Giboney. 202-211 [doi]
- Using burst detection techniques to identify suspicious vehicular traffic at border crossingsSiddharth Kaza, Hsin-Min Lu, Daniel Zeng, Hsinchun Chen. 212-214 [doi]
- Design and implementation of SNODSOC: Novel class detection for social network analysisSatyen Abrol, Latifur Khan, Vaibhav Khadilkar, Bhavani M. Thuraisingham, Tyrone Cadenhead. 215-220 [doi]
- Extracting opinion explanations from Chinese online reviewsYuequn Li, Wenji Mao, Daniel Zeng, Luwen Huangfu, Chunyang Liu. 221-223 [doi]
- AdaBoost-based sensor fusion for credibility assessmentHamid R. Alipour, Daniel Zeng, Douglas C. Derrick. 224-226 [doi]
- Payment card fraud: Challenges and solutionsIrina Sakharova. 227-234 [doi]
- Deciphering wisdom of crowds from their influenced binary decisionsWeiyun Chen, Xin Li. 235-240 [doi]