default search action
Search dblp for Publications
export results for "stream:conf/wisi:"
@inproceedings{DBLP:conf/wisi/Al-Fedaghi06, author = {Sabah S. Al{-}Fedaghi}, editor = {Hsinchun Chen and Fei{-}Yue Wang and Christopher C. Yang and Daniel Dajun Zeng and Michael Chau and Kuiyu Chang}, title = {Security Model for Informational Privacy}, booktitle = {Intelligence and Security Informatics, International Workshop, {WISI} 2006, Singapore, April 9, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3917}, pages = {154--155}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11734628\_19}, doi = {10.1007/11734628\_19}, timestamp = {Fri, 18 Oct 2019 12:58:35 +0200}, biburl = {https://dblp.org/rec/conf/wisi/Al-Fedaghi06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisi/ChenCHC06, author = {Patrick S. Chen and K. C. Chang and Tai{-}Ping Hsing and Shihchieh Chou}, editor = {Hsinchun Chen and Fei{-}Yue Wang and Christopher C. Yang and Daniel Dajun Zeng and Michael Chau and Kuiyu Chang}, title = {Mining Criminal Databases to Finding Investigation Clues-By Example of Stolen Automobiles Database}, booktitle = {Intelligence and Security Informatics, International Workshop, {WISI} 2006, Singapore, April 9, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3917}, pages = {91--102}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11734628\_12}, doi = {10.1007/11734628\_12}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisi/ChenCHC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisi/HouT06, author = {Zeng{-}Guang Hou and Min Tan}, editor = {Hsinchun Chen and Fei{-}Yue Wang and Christopher C. Yang and Daniel Dajun Zeng and Michael Chau and Kuiyu Chang}, title = {Design of an Emergency Prediction and Prevention Platform for Societal Security Decision Support Using Neural Networks}, booktitle = {Intelligence and Security Informatics, International Workshop, {WISI} 2006, Singapore, April 9, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3917}, pages = {173--174}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11734628\_28}, doi = {10.1007/11734628\_28}, timestamp = {Wed, 28 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisi/HouT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisi/HuysmansMBVG06, author = {Johan Huysmans and David Martens and Bart Baesens and Jan Vanthienen and Tony Van Gestel}, editor = {Hsinchun Chen and Fei{-}Yue Wang and Christopher C. Yang and Daniel Dajun Zeng and Michael Chau and Kuiyu Chang}, title = {Country Corruption Analysis with Self Organizing Maps and Support Vector Machines}, booktitle = {Intelligence and Security Informatics, International Workshop, {WISI} 2006, Singapore, April 9, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3917}, pages = {103--114}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11734628\_13}, doi = {10.1007/11734628\_13}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisi/HuysmansMBVG06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisi/HwangLC06, author = {Seongseob Hwang and Hyoungjoo Lee and Sungzoon Cho}, editor = {Hsinchun Chen and Fei{-}Yue Wang and Christopher C. Yang and Daniel Dajun Zeng and Michael Chau and Kuiyu Chang}, title = {Improving Authentication Accuracy of Unfamiliar Passwords with Pauses and Cues for Keystroke Dynamics-Based Authentication}, booktitle = {Intelligence and Security Informatics, International Workshop, {WISI} 2006, Singapore, April 9, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3917}, pages = {73--78}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11734628\_9}, doi = {10.1007/11734628\_9}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisi/HwangLC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisi/JenCC06, author = {WenYuan Jen and Weiping Chang and Shihchieh Chou}, editor = {Hsinchun Chen and Fei{-}Yue Wang and Christopher C. Yang and Daniel Dajun Zeng and Michael Chau and Kuiyu Chang}, title = {Cybercrime in Taiwan - An Analysis of Suspect Records}, booktitle = {Intelligence and Security Informatics, International Workshop, {WISI} 2006, Singapore, April 9, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3917}, pages = {38--48}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11734628\_5}, doi = {10.1007/11734628\_5}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisi/JenCC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisi/Jun06, author = {Tang Jun}, editor = {Hsinchun Chen and Fei{-}Yue Wang and Christopher C. Yang and Daniel Dajun Zeng and Michael Chau and Kuiyu Chang}, title = {A Cross Datasets Referring Outlier Detection Model Applied to Suspicious Financial Transaction Discrimination}, booktitle = {Intelligence and Security Informatics, International Workshop, {WISI} 2006, Singapore, April 9, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3917}, pages = {58--65}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11734628\_7}, doi = {10.1007/11734628\_7}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisi/Jun06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisi/KangKPSYK06, author = {Hyun{-}Ho Kang and Brian M. Kurkoski and Young{-}Ran Park and Sanguk Shin and Kazuhiko Yamaguchi and Kingo Kobayashi}, editor = {Hsinchun Chen and Fei{-}Yue Wang and Christopher C. Yang and Daniel Dajun Zeng and Michael Chau and Kuiyu Chang}, title = {A Viable System for Tracing Illegal Users of Video}, booktitle = {Intelligence and Security Informatics, International Workshop, {WISI} 2006, Singapore, April 9, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3917}, pages = {156--158}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11734628\_20}, doi = {10.1007/11734628\_20}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisi/KangKPSYK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisi/KangPCHL06, author = {Pilsung Kang and Sunghoon Park and Sungzoon Cho and Seongseob Hwang and Hyoungjoo Lee}, editor = {Hsinchun Chen and Fei{-}Yue Wang and Christopher C. Yang and Daniel Dajun Zeng and Michael Chau and Kuiyu Chang}, title = {The Effectiveness of Artificial Rhythms and Cues in Keystroke Dynamics Based User Authentication}, booktitle = {Intelligence and Security Informatics, International Workshop, {WISI} 2006, Singapore, April 9, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3917}, pages = {161--162}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11734628\_22}, doi = {10.1007/11734628\_22}, timestamp = {Mon, 26 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisi/KangPCHL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisi/KimPKAH06, author = {SeongKi Kim and WanJin Park and Seok Kyoo Kim and Sunil Ahn and Sangyong Han}, editor = {Hsinchun Chen and Fei{-}Yue Wang and Christopher C. Yang and Daniel Dajun Zeng and Michael Chau and Kuiyu Chang}, title = {Integration of a Cryptographic File System and Access Control}, booktitle = {Intelligence and Security Informatics, International Workshop, {WISI} 2006, Singapore, April 9, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3917}, pages = {139--151}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11734628\_17}, doi = {10.1007/11734628\_17}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisi/KimPKAH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisi/LastMK06, author = {Mark Last and Alex Markov and Abraham Kandel}, editor = {Hsinchun Chen and Fei{-}Yue Wang and Christopher C. Yang and Daniel Dajun Zeng and Michael Chau and Kuiyu Chang}, title = {Multi-lingual Detection of Terrorist Content on the Web}, booktitle = {Intelligence and Security Informatics, International Workshop, {WISI} 2006, Singapore, April 9, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3917}, pages = {16--30}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11734628\_3}, doi = {10.1007/11734628\_3}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisi/LastMK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisi/LeeG06, author = {Ickjai Lee and Hossein Ghodosi}, editor = {Hsinchun Chen and Fei{-}Yue Wang and Christopher C. Yang and Daniel Dajun Zeng and Michael Chau and Kuiyu Chang}, title = {Privacy and Security Enhanced Offline Oblivious Transfer for Massive Data Distribution}, booktitle = {Intelligence and Security Informatics, International Workshop, {WISI} 2006, Singapore, April 9, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3917}, pages = {159--160}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11734628\_21}, doi = {10.1007/11734628\_21}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisi/LeeG06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisi/LeeIIL06, author = {Taek Lee and Hoh Peter In and Eul{-}Gyu Im and Heejo Lee}, editor = {Hsinchun Chen and Fei{-}Yue Wang and Christopher C. Yang and Daniel Dajun Zeng and Michael Chau and Kuiyu Chang}, title = {Cascade Damage Estimation Model for Internet Attacks}, booktitle = {Intelligence and Security Informatics, International Workshop, {WISI} 2006, Singapore, April 9, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3917}, pages = {163--164}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11734628\_23}, doi = {10.1007/11734628\_23}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisi/LeeIIL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisi/LiTY06, author = {Liang Li and Jie Tian and Xin Yang}, editor = {Hsinchun Chen and Fei{-}Yue Wang and Christopher C. Yang and Daniel Dajun Zeng and Michael Chau and Kuiyu Chang}, title = {A Novel Identity Authentication Technique Without Trustworthy Third-Party Based on Fingerprint Verification}, booktitle = {Intelligence and Security Informatics, International Workshop, {WISI} 2006, Singapore, April 9, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3917}, pages = {175--176}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11734628\_29}, doi = {10.1007/11734628\_29}, timestamp = {Wed, 31 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisi/LiTY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisi/LiWD06, author = {Dan Li and Kefei Wang and Jitender S. Deogun}, editor = {Hsinchun Chen and Fei{-}Yue Wang and Christopher C. Yang and Daniel Dajun Zeng and Michael Chau and Kuiyu Chang}, title = {A Fuzzy Anomaly Detection System}, booktitle = {Intelligence and Security Informatics, International Workshop, {WISI} 2006, Singapore, April 9, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3917}, pages = {167--168}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11734628\_25}, doi = {10.1007/11734628\_25}, timestamp = {Thu, 28 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisi/LiWD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisi/LiaoT06, author = {You{-}Lu Liao and Cynthia Tsai}, editor = {Hsinchun Chen and Fei{-}Yue Wang and Christopher C. Yang and Daniel Dajun Zeng and Michael Chau and Kuiyu Chang}, title = {Analysis of Computer Crime Characteristics in Taiwan}, booktitle = {Intelligence and Security Informatics, International Workshop, {WISI} 2006, Singapore, April 9, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3917}, pages = {49--57}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11734628\_6}, doi = {10.1007/11734628\_6}, timestamp = {Mon, 05 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisi/LiaoT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisi/LiuQ06, author = {Zhiyong Liu and Hong Qiao}, editor = {Hsinchun Chen and Fei{-}Yue Wang and Christopher C. Yang and Daniel Dajun Zeng and Michael Chau and Kuiyu Chang}, title = {Hidden Markov Model Based Intrusion Detection}, booktitle = {Intelligence and Security Informatics, International Workshop, {WISI} 2006, Singapore, April 9, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3917}, pages = {169--170}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11734628\_26}, doi = {10.1007/11734628\_26}, timestamp = {Sat, 29 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisi/LiuQ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisi/PhillipsL06, author = {Peter Phillips and Ickjai Lee}, editor = {Hsinchun Chen and Fei{-}Yue Wang and Christopher C. Yang and Daniel Dajun Zeng and Michael Chau and Kuiyu Chang}, title = {Mining Positive Associations of Urban Criminal Activities Using Hierarchical Crime Hot Spots}, booktitle = {Intelligence and Security Informatics, International Workshop, {WISI} 2006, Singapore, April 9, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3917}, pages = {127--132}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11734628\_15}, doi = {10.1007/11734628\_15}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisi/PhillipsL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisi/PhuaLGS06, author = {Clifton Phua and Vincent C. S. Lee and Ross W. Gayler and Kate A. Smith}, editor = {Hsinchun Chen and Fei{-}Yue Wang and Christopher C. Yang and Daniel Dajun Zeng and Michael Chau and Kuiyu Chang}, title = {Temporal Representation in Spike Detection of Sparse Personal Identity Streams}, booktitle = {Intelligence and Security Informatics, International Workshop, {WISI} 2006, Singapore, April 9, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3917}, pages = {115--126}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11734628\_14}, doi = {10.1007/11734628\_14}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisi/PhuaLGS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisi/QiaoTPFX06, author = {Shaojie Qiao and Changjie Tang and Jing Peng and Hongjian Fan and Yong Xiang}, editor = {Hsinchun Chen and Fei{-}Yue Wang and Christopher C. Yang and Daniel Dajun Zeng and Michael Chau and Kuiyu Chang}, title = {{VCCM} Mining: Mining Virtual Community Core Members Based on Gene Expression Programming}, booktitle = {Intelligence and Security Informatics, International Workshop, {WISI} 2006, Singapore, April 9, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3917}, pages = {133--138}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11734628\_16}, doi = {10.1007/11734628\_16}, timestamp = {Tue, 06 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisi/QiaoTPFX06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisi/QinZRLC06, author = {Jialun Qin and Yilu Zhou and Edna Reid and Guanpi Lai and Hsinchun Chen}, editor = {Hsinchun Chen and Fei{-}Yue Wang and Christopher C. Yang and Daniel Dajun Zeng and Michael Chau and Kuiyu Chang}, title = {Unraveling International Terrorist Groups' Exploitation of the Web: Technical Sophistication, Media Richness, and Web Interactivity}, booktitle = {Intelligence and Security Informatics, International Workshop, {WISI} 2006, Singapore, April 9, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3917}, pages = {4--15}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11734628\_2}, doi = {10.1007/11734628\_2}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisi/QinZRLC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisi/ShenZW06, author = {Huizhang Shen and Jidi Zhao and Huanchen Wang}, editor = {Hsinchun Chen and Fei{-}Yue Wang and Christopher C. Yang and Daniel Dajun Zeng and Michael Chau and Kuiyu Chang}, title = {Illegal Intrusion Detection Based on Hidden Information Database}, booktitle = {Intelligence and Security Informatics, International Workshop, {WISI} 2006, Singapore, April 9, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3917}, pages = {79--84}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11734628\_10}, doi = {10.1007/11734628\_10}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisi/ShenZW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisi/SunL06, author = {Zhen Sun and Ee{-}Peng Lim}, editor = {Hsinchun Chen and Fei{-}Yue Wang and Christopher C. Yang and Daniel Dajun Zeng and Michael Chau and Kuiyu Chang}, title = {{INEXT:} An Investigative Search Tool for Knowledge Extraction}, booktitle = {Intelligence and Security Informatics, International Workshop, {WISI} 2006, Singapore, April 9, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3917}, pages = {31--37}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11734628\_4}, doi = {10.1007/11734628\_4}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisi/SunL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisi/TaoWW06, author = {Qing Tao and Gao{-}wei Wu and Jue Wang}, editor = {Hsinchun Chen and Fei{-}Yue Wang and Christopher C. Yang and Daniel Dajun Zeng and Michael Chau and Kuiyu Chang}, title = {One-Class Strategies for Security Information Detection}, booktitle = {Intelligence and Security Informatics, International Workshop, {WISI} 2006, Singapore, April 9, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3917}, pages = {171--172}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11734628\_27}, doi = {10.1007/11734628\_27}, timestamp = {Tue, 11 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisi/TaoWW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisi/Thuraisingham06, author = {Bhavani M. Thuraisingham}, editor = {Hsinchun Chen and Fei{-}Yue Wang and Christopher C. Yang and Daniel Dajun Zeng and Michael Chau and Kuiyu Chang}, title = {Data Mining for Security Applications}, booktitle = {Intelligence and Security Informatics, International Workshop, {WISI} 2006, Singapore, April 9, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3917}, pages = {1--3}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11734628\_1}, doi = {10.1007/11734628\_1}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisi/Thuraisingham06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisi/Wang06, author = {Fei{-}Yue Wang}, editor = {Hsinchun Chen and Fei{-}Yue Wang and Christopher C. Yang and Daniel Dajun Zeng and Michael Chau and Kuiyu Chang}, title = {A Computational Framework for Decision Analysis and Support in {ISI:} Artificial Societies, Computational Experiments, and Parallel Systems}, booktitle = {Intelligence and Security Informatics, International Workshop, {WISI} 2006, Singapore, April 9, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3917}, pages = {183--184}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11734628\_33}, doi = {10.1007/11734628\_33}, timestamp = {Fri, 18 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisi/Wang06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisi/WangWZ06, author = {Jue Wang and Fei{-}Yue Wang and Daniel Dajun Zeng}, editor = {Hsinchun Chen and Fei{-}Yue Wang and Christopher C. Yang and Daniel Dajun Zeng and Michael Chau and Kuiyu Chang}, title = {Rule+Exception Learning-Based Class Specification and Labeling in Intelligence and Security Analysis}, booktitle = {Intelligence and Security Informatics, International Workshop, {WISI} 2006, Singapore, April 9, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3917}, pages = {181--182}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11734628\_32}, doi = {10.1007/11734628\_32}, timestamp = {Fri, 18 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisi/WangWZ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisi/WhalenG06, author = {Tara Whalen and Carrie Gates}, editor = {Hsinchun Chen and Fei{-}Yue Wang and Christopher C. Yang and Daniel Dajun Zeng and Michael Chau and Kuiyu Chang}, title = {Defender Personality Traits}, booktitle = {Intelligence and Security Informatics, International Workshop, {WISI} 2006, Singapore, April 9, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3917}, pages = {85--90}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11734628\_11}, doi = {10.1007/11734628\_11}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisi/WhalenG06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisi/XiaoHLW06, author = {Baihua Xiao and Huiguang He and Yaodong Li and Chunheng Wang}, editor = {Hsinchun Chen and Fei{-}Yue Wang and Christopher C. Yang and Daniel Dajun Zeng and Michael Chau and Kuiyu Chang}, title = {Cyberspace Community Analysis and Simulation Using Complex Dynamic Social Networks}, booktitle = {Intelligence and Security Informatics, International Workshop, {WISI} 2006, Singapore, April 9, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3917}, pages = {177--178}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11734628\_30}, doi = {10.1007/11734628\_30}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisi/XiaoHLW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisi/XieB06, author = {Feng Xie and Shuo Bai}, editor = {Hsinchun Chen and Fei{-}Yue Wang and Christopher C. Yang and Daniel Dajun Zeng and Michael Chau and Kuiyu Chang}, title = {Detecting Novel Network Attacks with a Data Field}, booktitle = {Intelligence and Security Informatics, International Workshop, {WISI} 2006, Singapore, April 9, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3917}, pages = {66--72}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11734628\_8}, doi = {10.1007/11734628\_8}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisi/XieB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisi/YoonY06, author = {Eun{-}Jun Yoon and Kee{-}Young Yoo}, editor = {Hsinchun Chen and Fei{-}Yue Wang and Christopher C. Yang and Daniel Dajun Zeng and Michael Chau and Kuiyu Chang}, title = {A New Secure Key Exchange Protocol Between {STB} and Smart Card in {DTV} Broadcasting}, booktitle = {Intelligence and Security Informatics, International Workshop, {WISI} 2006, Singapore, April 9, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3917}, pages = {165--166}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11734628\_24}, doi = {10.1007/11734628\_24}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisi/YoonY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisi/ZhaoY06, author = {Dongbin Zhao and Jianqiang Yi}, editor = {Hsinchun Chen and Fei{-}Yue Wang and Christopher C. Yang and Daniel Dajun Zeng and Michael Chau and Kuiyu Chang}, title = {Analysis of Infectious Disease Data Based on Evolutionary Computation}, booktitle = {Intelligence and Security Informatics, International Workshop, {WISI} 2006, Singapore, April 9, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3917}, pages = {179--180}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11734628\_31}, doi = {10.1007/11734628\_31}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisi/ZhaoY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisi/ZhuTW06, author = {William Zhu and Clark D. Thomborson and Fei{-}Yue Wang}, editor = {Hsinchun Chen and Fei{-}Yue Wang and Christopher C. Yang and Daniel Dajun Zeng and Michael Chau and Kuiyu Chang}, title = {Applications of Homomorphic Functions to Software Obfuscation}, booktitle = {Intelligence and Security Informatics, International Workshop, {WISI} 2006, Singapore, April 9, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3917}, pages = {152--153}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11734628\_18}, doi = {10.1007/11734628\_18}, timestamp = {Thu, 13 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisi/ZhuTW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wisi/2006, editor = {Hsinchun Chen and Fei{-}Yue Wang and Christopher C. Yang and Daniel Dajun Zeng and Michael Chau and Kuiyu Chang}, title = {Intelligence and Security Informatics, International Workshop, {WISI} 2006, Singapore, April 9, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3917}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11734628}, doi = {10.1007/11734628}, isbn = {3-540-33361-4}, timestamp = {Fri, 18 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisi/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.