Abstract is missing.
- Assured Information Sharing: Technologies, Challenges and DirectionsBhavani M. Thuraisingham. 1-15 [doi]
- Automating Event Extraction for the Security DomainClive Best, Jakub Piskorski, Bruno Pouliquen, Ralf Steinberger, Hristo Tanev. 17-43 [doi]
- Knowledge Discovery and Information Visualization for Terrorist Social NetworksChristopher C. Yang. 45-64 [doi]
- Understanding the Nexus of Terrorist Web SitesJennifer Jie Xu, Hsinchun Chen. 65-78 [doi]
- Multi-lingual Detection of Web Terrorist ContentMark Last, Alex Markov, Abraham Kandel. 79-96 [doi]
- Modeling Anticipatory Event TransitionsQi He, Kuiyu Chang, Ee-Peng Lim. 97-119 [doi]
- Exploring Gray Web Forums: Analysis and Investigation of Forum-Based Communities in TaiwanJau-Hwang Wang, Tianjun Fu, Hong-Ming Lin, Hsinchun Chen. 121-134 [doi]
- Identifying Interesting Networks of Criminal ActivityByron Marshall. 135-150 [doi]
- Name Matching in Law Enforcement DatabaseOlcay Kursun, Michael Georgiopoulos, Kenneth M. Reynolds. 151-172 [doi]
- Discovering Investigation Clues through Mining Criminal DatabasesPatrick S. Chen. 173-198 [doi]
- Automated Filtering on Data Streaming for Intelligence AnalysisYiming Ma, Dawit Yimam Seid, Sharad Mehrotra. 199-213 [doi]
- Personal Information Management for Intelligence TasksAntonio Badia. 215-226 [doi]
- A Data Miner s Approach to Country Corruption AnalysisJohan Huysmans, Bart Baesens, Jan Vanthienen. 227-247 [doi]
- Protecting Private Information in Online Social NetworksJianming He, Wesley W. Chu. 249-273 [doi]
- Protection of Database Security Via Collaborative Inference DetectionYu Chen, Wesley W. Chu. 275-303 [doi]
- Suspect Vehicle Identification for Border SafetySiddharth Kaza, Hsinchun Chen. 305-318 [doi]
- Optimization Problems for Port-of-Entry Detection SystemsEndre Boros, Elsayed A. Elsayed, Paul B. Kantor, Fred Roberts, Minge Xie. 319-335 [doi]
- Modeling and Validation of Aviation SecurityUwe Glässer, Sarah Rastkar, Mona Vajihollahi. 337-355 [doi]
- Anomaly Detection in Moving ObjectXiaolei Li, Jiawei Han, Sangkyum Kim, Hector Gonzalez. 357-381 [doi]
- Intelligent Face RecognitionAdnan Khashman. 383-406 [doi]
- Video Analysis of Vehicles and Persons for SurveillanceSangho Park, Mohan M. Trivedi. 407-424 [doi]
- Video-Based Deception DetectionMatthew L. Jensen, Thomas O. Meservy, Judee K. Burgoon, Jay F. Nunamaker. 425-441 [doi]