Abstract is missing.
- Data Mining for Security ApplicationsBhavani M. Thuraisingham. 1-3 [doi]
- Unraveling International Terrorist Groups Exploitation of the Web: Technical Sophistication, Media Richness, and Web InteractivityJialun Qin, Yilu Zhou, Edna Reid, Guanpi Lai, Hsinchun Chen. 4-15 [doi]
- Multi-lingual Detection of Terrorist Content on the WebMark Last, Alex Markov, Abraham Kandel. 16-30 [doi]
- INEXT: An Investigative Search Tool for Knowledge ExtractionZhen Sun, Ee-Peng Lim. 31-37 [doi]
- Cybercrime in Taiwan - An Analysis of Suspect RecordsWenYuan Jen, Weiping Chang, Shihchieh Chou. 38-48 [doi]
- Analysis of Computer Crime Characteristics in TaiwanYou-Lu Liao, Cynthia Tsai. 49-57 [doi]
- A Cross Datasets Referring Outlier Detection Model Applied to Suspicious Financial Transaction DiscriminationTang Jun. 58-65 [doi]
- Detecting Novel Network Attacks with a Data FieldFeng Xie, Shuo Bai. 66-72 [doi]
- Improving Authentication Accuracy of Unfamiliar Passwords with Pauses and Cues for Keystroke Dynamics-Based AuthenticationSeongseob Hwang, Hyoungjoo Lee, Sungzoon Cho. 73-78 [doi]
- Illegal Intrusion Detection Based on Hidden Information DatabaseHuizhang Shen, Jidi Zhao, Huanchen Wang. 79-84 [doi]
- Defender Personality TraitsTara Whalen, Carrie Gates. 85-90 [doi]
- Mining Criminal Databases to Finding Investigation Clues-By Example of Stolen Automobiles DatabasePatrick S. Chen, K. C. Chang, Tai-Ping Hsing, Shihchieh Chou. 91-102 [doi]
- Country Corruption Analysis with Self Organizing Maps and Support Vector MachinesJohan Huysmans, David Martens, Bart Baesens, Jan Vanthienen, Tony Van Gestel. 103-114 [doi]
- Temporal Representation in Spike Detection of Sparse Personal Identity StreamsClifton Phua, Vincent Lee, Ross Gayler, Kate A. Smith. 115-126 [doi]
- Mining Positive Associations of Urban Criminal Activities Using Hierarchical Crime Hot SpotsPeter Phillips, Ickjai Lee. 127-132 [doi]
- VCCM Mining: Mining Virtual Community Core Members Based on Gene Expression ProgrammingShaojie Qiao, Changjie Tang, Jing Peng, Hongjian Fan, Yong Xiang. 133-138 [doi]
- Integration of a Cryptographic File System and Access ControlSeongKi Kim, WanJin Park, SeokKyoo Kim, Sunil Ahn, Sangyong Han. 139-151 [doi]
- Applications of Homomorphic Functions to Software ObfuscationWilliam Zhu, Clark D. Thomborson, Fei-Yue Wang. 152-153 [doi]
- Security Model for Informational PrivacySabah S. Al-Fedaghi. 154-155 [doi]
- A Viable System for Tracing Illegal Users of VideoHyun-Ho Kang, Brian M. Kurkoski, Young-Ran Park, Sanguk Shin, Kazuhiko Yamaguchi, Kingo Kobayashi. 156-158 [doi]
- Privacy and Security Enhanced Offline Oblivious Transfer for Massive Data DistributionIckjai Lee, Hossein Ghodosi. 159-160 [doi]
- The Effectiveness of Artificial Rhythms and Cues in Keystroke Dynamics Based User AuthenticationPilsung Kang, Sunghoon Park, Sungzoon Cho, Seongseob Hwang, Hyoungjoo Lee. 161-162 [doi]
- Cascade Damage Estimation Model for Internet AttacksTaek Lee, Hoh Peter In, Eul-Gyu Im, Heejo Lee. 163-164 [doi]
- A New Secure Key Exchange Protocol Between STB and Smart Card in DTV BroadcastingEun-Jun Yoon, Kee-Young Yoo. 165-166 [doi]
- A Fuzzy Anomaly Detection SystemDan Li, Kefei Wang, Jitender S. Deogun. 167-168 [doi]
- Hidden Markov Model Based Intrusion DetectionZhiyong Liu, Hong Qiao. 169-170 [doi]
- One-Class Strategies for Security Information DetectionQing Tao, Gao-wei Wu, Jue Wang. 171-172 [doi]
- Design of an Emergency Prediction and Prevention Platform for Societal Security Decision Support Using Neural NetworksZeng-Guang Hou, Min Tan. 173-174 [doi]
- A Novel Identity Authentication Technique Without Trustworthy Third-Party Based on Fingerprint VerificationLiang Li, Jie Tian, Xin Yang. 175-176 [doi]
- Cyberspace Community Analysis and Simulation Using Complex Dynamic Social NetworksBaihua Xiao, Huiguang He, Yaodong Li, Chunheng Wang. 177-178 [doi]
- Analysis of Infectious Disease Data Based on Evolutionary ComputationDongbin Zhao, Jianqiang Yi. 179-180 [doi]
- Rule+Exception Learning-Based Class Specification and Labeling in Intelligence and Security AnalysisJue Wang, Fei-Yue Wang, Daniel Dajun Zeng. 181-182 [doi]
- A Computational Framework for Decision Analysis and Support in ISI: Artificial Societies, Computational Experiments, and Parallel SystemsFei-Yue Wang. 183-184 [doi]