Abstract is missing.
- The Use of Reference Graphs in the Entity Resolution of Criminal NetworksDavid Robinson. 3-18 [doi]
- Heterogeneous Information Networks Bi-clustering with Similarity RegularizationXianchao Zhang, Haixin Li, Wenxin Liang, Linlin Zong, Xinyue Liu. 19-30 [doi]
- A Profile-Based Authorship Attribution Approach to Forensic Identification in Chinese Online MessagesJianbin Ma, Bing Xue, Mengjie Zhang. 33-52 [doi]
- Multilevel Syntactic Parsing Based on Recursive Restricted Boltzmann Machines and Learning to RankJungang Xu, Hong Chen, Shilong Zhou, Ben He. 53-62 [doi]
- Stratified Over-Sampling Bagging Method for Random Forests on Imbalanced DataHe Zhao, Xiaojun Chen 0004, Thanh Tung Nguyen, Joshua Zhexue Huang, Graham J. Williams, Hui Chen. 63-72 [doi]
- Revisiting Attribute Independence Assumption in Probabilistic Unsupervised Anomaly DetectionSunil Aryal, Kai Ming Ting, Gholamreza Haffari. 73-86 [doi]
- Incremental Privacy-Preserving Association Rule Mining Using Negative BorderDuc H. Tran, Wee Keong Ng, Y. D. Wong, Vinh V. Thai. 87-100 [doi]
- Differentially Private Multi-task LearningSunil Kumar Gupta, Santu Rana, Svetha Venkatesh. 101-113 [doi]
- Intelligent Recognition of Spontaneous Expression Using Motion Magnification of Spatio-temporal DataB. M. S. Bahar Talukder, Brinta Chowdhury, Tamanna Howlader, S. M. Mahbubur Rahman. 114-128 [doi]
- k-NN Classification of Malware in HTTPS Traffic Using the Metric Space ApproachJakub Lokoc, Jan Kohout, Premysl Cech, Tomás Skopal, Tomás Pevný. 131-145 [doi]
- A Syntactic Approach for Detecting Viral Polymorphic Malware VariantsVijay Naidu, Ajit Narayanan. 146-165 [doi]
- Small State Acquisition of Offensive Cyberwarfare Capabilities: Towards Building an Analytical FrameworkDaniel Hughes 0002, Andrew M. Colarik. 166-179 [doi]
- Data-Driven Stealthy Injection Attacks on Smart Grid with Incomplete MeasurementsAdnan Anwar, Abdun Naser Mahmood, Mark Pickering. 180-192 [doi]
- Information Security in Software Engineering, Analysis of Developers Communications About Security in Social Q&A WebsiteShahab Bayati, Marzieh Heidary. 193-202 [doi]