


default search action
11. PAISI 2016: Auckland, New Zealand
- Michael Chau, G. Alan Wang, Hsinchun Chen:
Intelligence and Security Informatics - 11th Pacific Asia Workshop, PAISI 2016, Auckland, New Zealand, April 19, 2016, Proceedings. Lecture Notes in Computer Science 9650, Springer 2016, ISBN 978-3-319-31862-2
Network-Based Data Analytics
- David Robinson:
The Use of Reference Graphs in the Entity Resolution of Criminal Networks. 3-18 - Xianchao Zhang, Haixin Li, Wenxin Liang, Linlin Zong, Xinyue Liu:
Heterogeneous Information Networks Bi-clustering with Similarity Regularization. 19-30
Data and Text Mining
- Jianbin Ma
, Bing Xue, Mengjie Zhang:
A Profile-Based Authorship Attribution Approach to Forensic Identification in Chinese Online Messages. 33-52 - Jungang Xu, Hong Chen, Shilong Zhou, Ben He:
Multilevel Syntactic Parsing Based on Recursive Restricted Boltzmann Machines and Learning to Rank. 53-62 - He Zhao, Xiaojun Chen, Thanh-Tung Nguyen, Joshua Zhexue Huang, Graham J. Williams
, Hui Chen:
Stratified Over-Sampling Bagging Method for Random Forests on Imbalanced Data. 63-72 - Sunil Aryal
, Kai Ming Ting, Gholamreza Haffari:
Revisiting Attribute Independence Assumption in Probabilistic Unsupervised Anomaly Detection. 73-86 - Duc H. Tran, Wee Keong Ng
, Y. D. Wong, Vinh V. Thai
:
Incremental Privacy-Preserving Association Rule Mining Using Negative Border. 87-100 - Sunil Kumar Gupta, Santu Rana
, Svetha Venkatesh
:
Differentially Private Multi-task Learning. 101-113 - Bashir M. Sabquat Bahar Talukder, Brinta Chowdhury, Tamanna Howlader, S. M. Mahbubur Rahman:
Intelligent Recognition of Spontaneous Expression Using Motion Magnification of Spatio-temporal Data. 114-128
Cybersecurity and Infrastructure Protection
- Jakub Lokoc
, Jan Kohout, Premysl Cech
, Tomás Skopal
, Tomás Pevný
:
k-NN Classification of Malware in HTTPS Traffic Using the Metric Space Approach. 131-145 - Vijay Naidu
, Ajit Narayanan:
A Syntactic Approach for Detecting Viral Polymorphic Malware Variants. 146-165 - Daniel Hughes, Andrew M. Colarik:
Small State Acquisition of Offensive Cyberwarfare Capabilities: Towards Building an Analytical Framework. 166-179 - Adnan Anwar
, Abdun Naser Mahmood
, Mark Pickering:
Data-Driven Stealthy Injection Attacks on Smart Grid with Incomplete Measurements. 180-192 - Shahab Bayati, Marzieh Heidary:
Information Security in Software Engineering, Analysis of Developers Communications About Security in Social Q&A Website. 193-202

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.