Abstract is missing.
- Analysis of criminal social networks with typed and directed edgesQuan Zheng 0001, David B. Skillicorn. 1-6 [doi]
- Spectral malware behavior clusteringChris Giannella, Eric Bloedorn. 7-12 [doi]
- A visual analytics approach to detecting server redirections and data exfiltrationWeijie Wang, Baijian Yang, Yingjie Victor Chen. 13-18 [doi]
- SPINN: Suspicion prediction in nuclear networksIan A. Andrews, Srijan Kumar, Francesca Spezzano, V. S. Subrahmanian. 19-24 [doi]
- Learning where to inspect: Location learning for crime predictionMohammad A. Tayebi, Uwe Glässer, Patricia L. Brantingham. 25-30 [doi]
- Exploring hacker assets in underground forumsSagar Samtani, Ryan Chinn, Hsinchun Chen. 31-36 [doi]
- Multi-objective evolutionary algorithms and multiagent models for optimizing police dispatchRicardo Guedes, Vasco Furtado, Tarcisio H. C. Pequeno. 37-42 [doi]
- Nonproliferation informatics: Employing Bayesian analysis, agent based modeling, and information theory for dynamic proliferation pathway studiesRoyal A. Elmore, William S. Charlton. 43-48 [doi]
- Linking virtual and real-world identitiesYaqoub Alsarkal, Nan Zhang, Yilu Zhou. 49-54 [doi]
- Emotion extraction and entrainment in social media: The case of U.S. immigration and border securityWingyan Chung, Saike He, Daniel Dajun Zeng, Victor A. Benjamin. 55-60 [doi]
- Empirical assessment of al qaeda, ISIS, and taliban propagandaDavid B. Skillicorn. 61-66 [doi]
- Exploring the effect of permission notice on users' initial trust to an application store: The case of China's Android application marketJie Gu, Heng Xu, An'an Hu, Lihua Huang. 67-72 [doi]
- LECENing places to hide: Geo-mapping child exploitation materialBryan Monk, Russell Allsup, Richard Frank. 73-78 [doi]
- Developing understanding of hacker language through the use of lexical semanticsVictor A. Benjamin, Hsinchun Chen. 79-84 [doi]
- Exploring threats and vulnerabilities in hacker web: Forums, IRC and carding shopsVictor A. Benjamin, Weifeng Li, Thomas Holt, Hsinchun Chen. 85-90 [doi]
- Analyzing the social media footprint of street gangsSanjaya Wijeratne, Derek Doran, Amit P. Sheth, Jack L. Dustin. 91-96 [doi]
- Deception is in the eye of the communicator: Investigating pupil diameter variations in automated deception detection interviewsJeffrey Gainer Proudfoot, Jeffrey L. Jenkins, Judee K. Burgoon, Jay F. Nunamaker. 97-102 [doi]
- Base station anonymity distributed self-assessment in Wireless Sensor NetworksJon R. Ward, Mohamed F. Younis. 103-108 [doi]
- On construction of signcryption scheme for smart card securityJayaprakash Kar, Daniyal M. Alghazzawi. 109-113 [doi]
- Cybersecurity for product lifecycle management a research roadmapElisa Bertino, Nathan W. Hartman. 114-119 [doi]
- A privacy protection procedure for large scale individual level dataJulius Adebayo, Lalana Kagal. 120-125 [doi]
- Honeypot based unauthorized data access detection in MapReduce systemsHuseyin Ulusoy, Murat Kantarcioglu, Bhavani M. Thuraisingham, Latifur Khan. 126-131 [doi]
- Filtering spam in Weibo using ensemble imbalanced classification and knowledge expansionZhipeng Jin, Qiudan Li, Daniel Zeng, Lei Wang. 132-134 [doi]
- Inferring social influence and meme interaction with Hawkes processesChuan Luo, Xiaolong Zheng, Daniel Zeng. 135-137 [doi]
- Multivariate embedding based causaltiy detection with short time seriesChuan Luo, Daniel Zeng. 138-140 [doi]
- A comparison of features for automatic deception detection in synchronous computer-mediated communicationJinie Pak, Lina Zhou. 141-143 [doi]
- Social sensor analytics: Making sense of network models in social mediaChase P. Dowling, Joshua J. Harrison, Arun V. Sathanur, Landon H. Sego, Courtney D. Corley. 144-147 [doi]
- Assessment of user home location geoinference methodsJoshua J. Harrison, Eric Bell, Courtney Corley, Chase P. Dowling, Andrew J. Cowell. 148-150 [doi]
- Personality based public sentiment classification in microblogJunjie Lin, Wenji Mao. 151-153 [doi]
- The relation between microfinacing and corruption by country: An analysis of an open source datasetHeather Roy, Sue Kase. 154-156 [doi]
- Liar, Liar, IM on Fire: Deceptive language-action cues in spontaneous online communicationShuyuan Mary Ho, Jeffrey T. Hancock, Cheryl Booth, Xiuwen Liu, Shashanka Surya Timmarajus, Mike Burmester. 157-159 [doi]
- Modeling emotion entrainment of online users in emergency eventsSaike He, Xiaolong Zheng, Daniel Zeng, Bo Xu, Changliang Li, Guanhua Tian, Lei Wang, Hongwei Hao. 160-162 [doi]
- Positive bystanding behavior in cyberbullying: The impact of empathy on adolescents' cyber bullied support behaviorSamuel Owusu, Lina Zhou. 163-165 [doi]
- A statistical study of covert timing channels using network packet frequencyFangyue Chen, Yunke Wang, Heng Song, Xiangyang Li. 166-168 [doi]
- A new mobile payment protocol (GMPCP) by using a new key agreement protocol (GC)Mohammad Vahidalizadehdizaj, Lixin Tao. 169-172 [doi]
- Multi-granular aggregation of network flows for security analysisTao Ding, Ahmed AlEroud, George Karabatis. 173-175 [doi]
- Unintentional bugs to vulnerability mapping in Android applicationsGarima Bajwa, Mohamed Fazeen, Ram Dantu, Sonal Tanpure. 176-178 [doi]
- Persistent threat pattern discoveryFaisal Quader, Vandana Pursnani Janeja, Justin Stauffer. 179-181 [doi]
- Random anonymization of mobile sensor data: Modified Android frameworkCynthia L. Claiborne, Cathy Ncube, Ram Dantu. 182-184 [doi]
- Change detection in evolving computer networks: Changes in densification and diameter over timeJosephine M. Namayanja, Vandana Pursnani Janeja. 185-187 [doi]
- Power-function-based observation-weighting method for mining actionable behavioral rulesPeng Su, Wenji Mao. 188 [doi]
- Detection of financial statement fraud: Is accrual really useful as an early warning indicator?Naoto Oshiro. 189 [doi]
- A bottom-up method for constructing topic hierarchiesYuhao Zhang, Wenji Mao, Xiaochen Li. 190 [doi]
- Distributed LSI: Parallel preprocessing and vector sharingRoger B. Bradford. 191 [doi]
- Research on construction methods of the Shanghai cooperation organization meta-network modelKun Wang, Duoyong Sun. 192 [doi]
- Elliptic curve cryptography in JavaLeonidas Deligiannidis. 193 [doi]
- An opportunistic encryption extension for the DNS protocolTheogene Hakiza Bucuti, Ram Dantu. 194 [doi]
- Pass-pic: A mobile user authenticationGarima Bajwa, Ram Dantu, Ryan Aldridge. 195-1995 [doi]
- An access control resistant to shoulder-surfingJae-Jin Jang, Im Y. Jung. 196 [doi]
- Online/off-line ring signature scheme with provable securityJayaprakash Kar. 197 [doi]