default search action
1. WISI 2006: Singapore
- Hsinchun Chen, Fei-Yue Wang, Christopher C. Yang, Daniel Dajun Zeng, Michael Chau, Kuiyu Chang:
Intelligence and Security Informatics, International Workshop, WISI 2006, Singapore, April 9, 2006, Proceedings. Lecture Notes in Computer Science 3917, Springer 2006, ISBN 3-540-33361-4
Keynote Speech
- Bhavani M. Thuraisingham:
Data Mining for Security Applications. 1-3
Web and Text Mining for Terrorism Informatics
- Jialun Qin, Yilu Zhou, Edna Reid, Guanpi Lai, Hsinchun Chen:
Unraveling International Terrorist Groups' Exploitation of the Web: Technical Sophistication, Media Richness, and Web Interactivity. 4-15 - Mark Last, Alex Markov, Abraham Kandel:
Multi-lingual Detection of Terrorist Content on the Web. 16-30 - Zhen Sun, Ee-Peng Lim:
INEXT: An Investigative Search Tool for Knowledge Extraction. 31-37
Cybercrime Analysis
- WenYuan Jen, Weiping Chang, Shihchieh Chou:
Cybercrime in Taiwan - An Analysis of Suspect Records. 38-48 - You-Lu Liao, Cynthia Tsai:
Analysis of Computer Crime Characteristics in Taiwan. 49-57 - Tang Jun:
A Cross Datasets Referring Outlier Detection Model Applied to Suspicious Financial Transaction Discrimination. 58-65
Network Security
- Feng Xie, Shuo Bai:
Detecting Novel Network Attacks with a Data Field. 66-72 - Seongseob Hwang, Hyoungjoo Lee, Sungzoon Cho:
Improving Authentication Accuracy of Unfamiliar Passwords with Pauses and Cues for Keystroke Dynamics-Based Authentication. 73-78 - Huizhang Shen, Jidi Zhao, Huanchen Wang:
Illegal Intrusion Detection Based on Hidden Information Database. 79-84 - Tara Whalen, Carrie Gates:
Defender Personality Traits. 85-90
Crime Data Mining
- Patrick S. Chen, K. C. Chang, Tai-Ping Hsing, Shihchieh Chou:
Mining Criminal Databases to Finding Investigation Clues-By Example of Stolen Automobiles Database. 91-102 - Johan Huysmans, David Martens, Bart Baesens, Jan Vanthienen, Tony Van Gestel:
Country Corruption Analysis with Self Organizing Maps and Support Vector Machines. 103-114 - Clifton Phua, Vincent C. S. Lee, Ross W. Gayler, Kate A. Smith:
Temporal Representation in Spike Detection of Sparse Personal Identity Streams. 115-126 - Peter Phillips, Ickjai Lee:
Mining Positive Associations of Urban Criminal Activities Using Hierarchical Crime Hot Spots. 127-132 - Shaojie Qiao, Changjie Tang, Jing Peng, Hongjian Fan, Yong Xiang:
VCCM Mining: Mining Virtual Community Core Members Based on Gene Expression Programming. 133-138
Posters
- SeongKi Kim, WanJin Park, Seok Kyoo Kim, Sunil Ahn, Sangyong Han:
Integration of a Cryptographic File System and Access Control. 139-151 - William Zhu, Clark D. Thomborson, Fei-Yue Wang:
Applications of Homomorphic Functions to Software Obfuscation. 152-153 - Sabah S. Al-Fedaghi:
Security Model for Informational Privacy. 154-155 - Hyun-Ho Kang, Brian M. Kurkoski, Young-Ran Park, Sanguk Shin, Kazuhiko Yamaguchi, Kingo Kobayashi:
A Viable System for Tracing Illegal Users of Video. 156-158 - Ickjai Lee, Hossein Ghodosi:
Privacy and Security Enhanced Offline Oblivious Transfer for Massive Data Distribution. 159-160 - Pilsung Kang, Sunghoon Park, Sungzoon Cho, Seongseob Hwang, Hyoungjoo Lee:
The Effectiveness of Artificial Rhythms and Cues in Keystroke Dynamics Based User Authentication. 161-162 - Taek Lee, Hoh Peter In, Eul-Gyu Im, Heejo Lee:
Cascade Damage Estimation Model for Internet Attacks. 163-164 - Eun-Jun Yoon, Kee-Young Yoo:
A New Secure Key Exchange Protocol Between STB and Smart Card in DTV Broadcasting. 165-166 - Dan Li, Kefei Wang, Jitender S. Deogun:
A Fuzzy Anomaly Detection System. 167-168 - Zhiyong Liu, Hong Qiao:
Hidden Markov Model Based Intrusion Detection. 169-170 - Qing Tao, Gao-wei Wu, Jue Wang:
One-Class Strategies for Security Information Detection. 171-172 - Zeng-Guang Hou, Min Tan:
Design of an Emergency Prediction and Prevention Platform for Societal Security Decision Support Using Neural Networks. 173-174 - Liang Li, Jie Tian, Xin Yang:
A Novel Identity Authentication Technique Without Trustworthy Third-Party Based on Fingerprint Verification. 175-176 - Baihua Xiao, Huiguang He, Yaodong Li, Chunheng Wang:
Cyberspace Community Analysis and Simulation Using Complex Dynamic Social Networks. 177-178 - Dongbin Zhao, Jianqiang Yi:
Analysis of Infectious Disease Data Based on Evolutionary Computation. 179-180 - Jue Wang, Fei-Yue Wang, Daniel Dajun Zeng:
Rule+Exception Learning-Based Class Specification and Labeling in Intelligence and Security Analysis. 181-182 - Fei-Yue Wang:
A Computational Framework for Decision Analysis and Support in ISI: Artificial Societies, Computational Experiments, and Parallel Systems. 183-184
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.