default search action
8th ISI 2010: Vancouver, BC, Canada
- Christopher C. Yang, Daniel Zeng, Ke Wang, Antonio Sanfilippo, Herbert H. Tsang, Min-Yuh Day, Uwe Glässer, Patricia L. Brantingham, Hsinchun Chen:
IEEE International Conference on Intelligence and Security Informatics, ISI 2010, Vancouver, BC, Canada, May 23-26, 2010, Proceedings. IEEE 2010, ISBN 978-1-4244-6460-9 - Amir H. Ghaseminejad, Paul J. Brantingham:
An executive decision support system for longitudinal statistical analysis of crime and law enforcement performance crime analysis system pacific region (CASPR). 1-6 - Andrew J. Park, Valerie Spicer, Monique Guterres, Patricia L. Brantingham, Greg Jenion:
Testing perception of crime in a virtual environment. 7-12 - Richard Frank, Andrew J. Park, Patricia L. Brantingham, Joseph Clare, Kathryn Wuschke, Mona Vajihollahi:
Identifying high risk crime areas using topology. 13-18 - Vládia Pinheiro, Vasco Furtado, Tarcisio H. C. Pequeno, Douglas Nogueira:
Natural Language Processing based on Semantic inferentialism for extracting crime information from text. 19-24 - Huiqi Zhang, Ram Dantu:
Predicting social ties in mobile phone networks. 25-30 - Michael D. Porter, Ryan Smith:
Network neighborhood analysis. 31-36 - Richard Colbaugh, Kristin Glass:
Early warning analysis for social diffusion events. 37-42 - Xuning Tang, Christopher C. Yang:
Identifing influential users in an online healthcare social network. 43-48 - Xuning Tang, Christopher C. Yang:
Generalizing terrorist social networks with K-nearest neighbor and edge betweeness for social network integration and privacy preservation. 49-54 - Michael Gallagher:
The U.S. and the EU differences in anti-terrorism efforts. 55-58 - Yulei Zhang, Shuo Zeng, Chunneng Huang, Li Fan, Ximing Yu, Yan Dang, Catherine A. Larson, Dorothy E. Denning, Nancy Roberts, Hsinchun Chen:
Developing a Dark Web collection and infrastructure for computational and social sciences. 59-64 - Xiaochen Li, Wenji Mao, Daniel Zeng, Fei-Yue Wang:
Automatic construction of domain theory for attack planning. 65-70 - Herbert H. Tsang, Andrew J. Park, Mengting Sun, Uwe Glässer:
GENIUS: A computational modeling framework for counter-terrorism planning and response. 71-76 - Paul Elzinga, Jonas Poelmans, Stijn Viaene, Guido Dedene, Shanti Morsing:
Terrorist threat assessment with formal concept analysis. 77-82 - Antonio Badia:
Balancing security and information sharing in intelligence databases. 83-88 - Ayman E. Taha, Ismail Abdel Ghaffar, Ayman M. Bahaa Eldin, Hani M. K. Mahdi:
Agent based correlation model for intrusion detection alerts. 89-94 - Shun-Wen Hsiao, Yeali S. Sun, Meng Chang Chen, Hui Zhang:
Cross-level behavioral analysis for robust early intrusion detection. 95-100 - Uwe Glässer, Piper J. Jackson, Ali Khalili Araghi, Hamed Yaghoubi Shahir:
Intelligent decision support for Marine safety and Security Operations. 101-107 - Kristin Glass, Richard Colbaugh, Max Planck:
Automatically identifying the sources of large Internet events. 108-113 - Xu Chen, Tak-Shing Peter Yum:
Cross Entropy approach for patrol route planning in dynamic environments. 114-119 - Svitlana Volkova, William H. Hsu:
Computational knowledge and information management in veterinary epidemiology. 120-125 - Roger B. Bradford:
Entity refinement using latent semantic indexing. 126-128 - Gaston L'Huillier, Alejandro Hevia, Richard Weber, Sebastián A. Ríos:
Latent semantic analysis and keyword extraction for phishing classification. 129-131 - Jenq-Haur Wang:
Unsupervised multilingual concept discovery from daily online news extracts. 132-134 - Richard Colbaugh, Kristin Glass:
Estimating sentiment orientation in social media for intelligence monitoring and analysis. 135-137 - Jonathan Brett Crawley, Gerhard Wagner:
Desktop text mining for law enforcement. 138-140 - Qing Chen, Timothy Shipper, Latifur Khan:
Tweets mining using WIKIPEDIA and impurity cluster measurement. 141-143 - David Zimbra, Hsinchun Chen:
Comparing the virtual linkage intensity and real world proximity of social movements. 144-146 - Baojun Qiu, Kristinka Ivanova, John Yen, Peng Liu:
Study of effect of node seniority in social networks. 147-149 - Sibel Adali, Robert Escriva, Mark K. Goldberg, Mykola Hayvanovych, Malik Magdon-Ismail, Boleslaw K. Szymanski, William A. Wallace, Gregory Todd Williams:
Measuring behavioral trust in social networks. 150-152 - Lei Wang, Tianbing Xia, Jennifer Seberry:
Inter-Domain Routing Validator Based Spoofing Defence System. 153-155 - Wei-Bin Lee, Hsing-Bai Chen, Ching-Chih Cheng:
Secure communication between set-top box and smart card for fair use in DTV broadcasting. 156-158 - John Warden:
BI -Intelligence for the business of crime fighting. 159-161 - Yan Gao, Xiaolin Zhang:
Real time tracking of a remote moving object by active zoom cameras. 162-164 - Arvind K. Verma, Ramyaa Ramyaa, Suresh Marru, Ye Fan, Raminder Singh:
Rationalizing police patrol beats using Voronoi Tessellations. 165-167 - Xiangtao Liu, Xueqi Cheng, Jingyuan Li, Haijun Zhai, Shuo Bai:
Identifying vulgar content in eMule network through text classification. 168 - Zahri Yunos, Syahrul Hafidz Suid:
Protection of Critical National Information Infrastructure (CNII) against cyber terrorism: Development of strategy and policy framework. 169 - Yungchang Ku, Chaochang Chiu, Yulei Zhang, Li Fan, Hsinchun Chen:
Global disease surveillance using social media: HIV/AIDS content intervention in web forums. 170 - Adriana Esmeraldo de Oliveira, Gustavo Henrique Matos Bezerra Motta, Leonardo Vidal Batista:
A multibiometric access control architecture for continuous authentication. 171 - Wen-Chung Kuo, Jiin-Chiou Cheng, Yen-Hung Lin, Lih-Chyau Wuu:
Digitally signed document flexible sanitizing scheme based on bilinear maps. 172 - Martin Atkinson, Jenya Belayeva, Vanni Zavarella, Jakub Piskorski, Silja Huttunen, Arto Vihavainen, Roman Yangarber:
News mining for border security Intelligence. 173 - Yan Tang, Kendra M. L. Cooper, João W. Cangussu, Kun Tian, Yin Wu:
Towards effective improvement of the Bayesian Belief Network Structure learning. 174 - Syed Toufeeq Ahmed, Sukru Tikves, Hasan Davulcu:
Clustering and mapping related news about violence events on their time-lines. 175 - Boris Y. L. Chan, Vincent Ng:
HPC - privacy model for collaborative skyline processing. 176 - Antonio Sanfilippo:
Workshop on current issues in predictive approaches to intelligence and security analytics. 177-178 - Lucas A. Overbey, Gregory McKoy, Jesse Gordon, Shannon McKitrick:
Automated sensing and social network analysis in virtual worlds. 179-184 - Alexander H. Levis, Lee W. Wagenhals, Abbas K. Zaidi:
Multi-modeling of adversary behaviors. 185-189 - William N. Reynolds:
Breadth-depth triangulation for validation of modeling and simulation of complex systems. 190-195 - Zahra Mohaghegh:
Combining System Dynamics and Bayesian Belief Networks for Socio-Technical Risk Analysis. 196-201 - Erwin Chan, Jason Ginsburg, Brian Ten Eyck, Jerzy W. Rozenblit, Mike Dameron:
Text analysis and entity extraction in asymmetric threat response and prediction. 202-207 - Thomas F. Sanquist, Bin Shui, Heather Orr:
Integrated assessment modeling of energy consumption behavior and carbon emissions. 208-211 - Faisal Mansoor, Abbas K. Zaidi, Alexander H. Levis:
Meta-model driven construction of Timed Influence Nets. 212-217 - Minh Tam Le, John Sweeney, Edo Liberty, Steven W. Zucker:
Similarity kernels via bi-clustering for conventional intergovernmental organizations. 218-220 - William N. Reynolds, Marta S. Weber, Robert M. Farber, Courtney D. Corley, Andrew J. Cowell, Michelle L. Gregory:
Social media and social reality. 221-226 - Stephen Walsh, Angela Dalton, Paul Whitney, Amanda M. White:
Parameterizing bayesian network representations of social-behavioral models by expert elicitation. 227-232 - Andrew J. Cowell, Russell S. Jensen, Michelle L. Gregory, Peter C. Ellis, Keith Fligg, Liam McGrath, Kelly O'Hara, Eric Belanga Bell:
Collaborative knowledge discovery & marshalling for intelligence & security applications. 233-238
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.