Search dblp for Publications

export results for "toc:db/conf/wisi/wisi2006.bht:"

 download as .bib file

@inproceedings{DBLP:conf/wisi/Al-Fedaghi06,
  author       = {Sabah S. Al{-}Fedaghi},
  editor       = {Hsinchun Chen and
                  Fei{-}Yue Wang and
                  Christopher C. Yang and
                  Daniel Dajun Zeng and
                  Michael Chau and
                  Kuiyu Chang},
  title        = {Security Model for Informational Privacy},
  booktitle    = {Intelligence and Security Informatics, International Workshop, {WISI}
                  2006, Singapore, April 9, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3917},
  pages        = {154--155},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11734628\_19},
  doi          = {10.1007/11734628\_19},
  timestamp    = {Fri, 18 Oct 2019 12:58:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisi/Al-Fedaghi06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisi/ChenCHC06,
  author       = {Patrick S. Chen and
                  K. C. Chang and
                  Tai{-}Ping Hsing and
                  Shihchieh Chou},
  editor       = {Hsinchun Chen and
                  Fei{-}Yue Wang and
                  Christopher C. Yang and
                  Daniel Dajun Zeng and
                  Michael Chau and
                  Kuiyu Chang},
  title        = {Mining Criminal Databases to Finding Investigation Clues-By Example
                  of Stolen Automobiles Database},
  booktitle    = {Intelligence and Security Informatics, International Workshop, {WISI}
                  2006, Singapore, April 9, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3917},
  pages        = {91--102},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11734628\_12},
  doi          = {10.1007/11734628\_12},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisi/ChenCHC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisi/HouT06,
  author       = {Zeng{-}Guang Hou and
                  Min Tan},
  editor       = {Hsinchun Chen and
                  Fei{-}Yue Wang and
                  Christopher C. Yang and
                  Daniel Dajun Zeng and
                  Michael Chau and
                  Kuiyu Chang},
  title        = {Design of an Emergency Prediction and Prevention Platform for Societal
                  Security Decision Support Using Neural Networks},
  booktitle    = {Intelligence and Security Informatics, International Workshop, {WISI}
                  2006, Singapore, April 9, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3917},
  pages        = {173--174},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11734628\_28},
  doi          = {10.1007/11734628\_28},
  timestamp    = {Wed, 28 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisi/HouT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisi/HuysmansMBVG06,
  author       = {Johan Huysmans and
                  David Martens and
                  Bart Baesens and
                  Jan Vanthienen and
                  Tony Van Gestel},
  editor       = {Hsinchun Chen and
                  Fei{-}Yue Wang and
                  Christopher C. Yang and
                  Daniel Dajun Zeng and
                  Michael Chau and
                  Kuiyu Chang},
  title        = {Country Corruption Analysis with Self Organizing Maps and Support
                  Vector Machines},
  booktitle    = {Intelligence and Security Informatics, International Workshop, {WISI}
                  2006, Singapore, April 9, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3917},
  pages        = {103--114},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11734628\_13},
  doi          = {10.1007/11734628\_13},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisi/HuysmansMBVG06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisi/HwangLC06,
  author       = {Seongseob Hwang and
                  Hyoungjoo Lee and
                  Sungzoon Cho},
  editor       = {Hsinchun Chen and
                  Fei{-}Yue Wang and
                  Christopher C. Yang and
                  Daniel Dajun Zeng and
                  Michael Chau and
                  Kuiyu Chang},
  title        = {Improving Authentication Accuracy of Unfamiliar Passwords with Pauses
                  and Cues for Keystroke Dynamics-Based Authentication},
  booktitle    = {Intelligence and Security Informatics, International Workshop, {WISI}
                  2006, Singapore, April 9, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3917},
  pages        = {73--78},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11734628\_9},
  doi          = {10.1007/11734628\_9},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisi/HwangLC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisi/JenCC06,
  author       = {WenYuan Jen and
                  Weiping Chang and
                  Shihchieh Chou},
  editor       = {Hsinchun Chen and
                  Fei{-}Yue Wang and
                  Christopher C. Yang and
                  Daniel Dajun Zeng and
                  Michael Chau and
                  Kuiyu Chang},
  title        = {Cybercrime in Taiwan - An Analysis of Suspect Records},
  booktitle    = {Intelligence and Security Informatics, International Workshop, {WISI}
                  2006, Singapore, April 9, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3917},
  pages        = {38--48},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11734628\_5},
  doi          = {10.1007/11734628\_5},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisi/JenCC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisi/Jun06,
  author       = {Tang Jun},
  editor       = {Hsinchun Chen and
                  Fei{-}Yue Wang and
                  Christopher C. Yang and
                  Daniel Dajun Zeng and
                  Michael Chau and
                  Kuiyu Chang},
  title        = {A Cross Datasets Referring Outlier Detection Model Applied to Suspicious
                  Financial Transaction Discrimination},
  booktitle    = {Intelligence and Security Informatics, International Workshop, {WISI}
                  2006, Singapore, April 9, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3917},
  pages        = {58--65},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11734628\_7},
  doi          = {10.1007/11734628\_7},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisi/Jun06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisi/KangKPSYK06,
  author       = {Hyun{-}Ho Kang and
                  Brian M. Kurkoski and
                  Young{-}Ran Park and
                  Sanguk Shin and
                  Kazuhiko Yamaguchi and
                  Kingo Kobayashi},
  editor       = {Hsinchun Chen and
                  Fei{-}Yue Wang and
                  Christopher C. Yang and
                  Daniel Dajun Zeng and
                  Michael Chau and
                  Kuiyu Chang},
  title        = {A Viable System for Tracing Illegal Users of Video},
  booktitle    = {Intelligence and Security Informatics, International Workshop, {WISI}
                  2006, Singapore, April 9, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3917},
  pages        = {156--158},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11734628\_20},
  doi          = {10.1007/11734628\_20},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisi/KangKPSYK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisi/KangPCHL06,
  author       = {Pilsung Kang and
                  Sunghoon Park and
                  Sungzoon Cho and
                  Seongseob Hwang and
                  Hyoungjoo Lee},
  editor       = {Hsinchun Chen and
                  Fei{-}Yue Wang and
                  Christopher C. Yang and
                  Daniel Dajun Zeng and
                  Michael Chau and
                  Kuiyu Chang},
  title        = {The Effectiveness of Artificial Rhythms and Cues in Keystroke Dynamics
                  Based User Authentication},
  booktitle    = {Intelligence and Security Informatics, International Workshop, {WISI}
                  2006, Singapore, April 9, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3917},
  pages        = {161--162},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11734628\_22},
  doi          = {10.1007/11734628\_22},
  timestamp    = {Mon, 26 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisi/KangPCHL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisi/KimPKAH06,
  author       = {SeongKi Kim and
                  WanJin Park and
                  Seok Kyoo Kim and
                  Sunil Ahn and
                  Sangyong Han},
  editor       = {Hsinchun Chen and
                  Fei{-}Yue Wang and
                  Christopher C. Yang and
                  Daniel Dajun Zeng and
                  Michael Chau and
                  Kuiyu Chang},
  title        = {Integration of a Cryptographic File System and Access Control},
  booktitle    = {Intelligence and Security Informatics, International Workshop, {WISI}
                  2006, Singapore, April 9, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3917},
  pages        = {139--151},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11734628\_17},
  doi          = {10.1007/11734628\_17},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisi/KimPKAH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisi/LastMK06,
  author       = {Mark Last and
                  Alex Markov and
                  Abraham Kandel},
  editor       = {Hsinchun Chen and
                  Fei{-}Yue Wang and
                  Christopher C. Yang and
                  Daniel Dajun Zeng and
                  Michael Chau and
                  Kuiyu Chang},
  title        = {Multi-lingual Detection of Terrorist Content on the Web},
  booktitle    = {Intelligence and Security Informatics, International Workshop, {WISI}
                  2006, Singapore, April 9, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3917},
  pages        = {16--30},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11734628\_3},
  doi          = {10.1007/11734628\_3},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisi/LastMK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisi/LeeG06,
  author       = {Ickjai Lee and
                  Hossein Ghodosi},
  editor       = {Hsinchun Chen and
                  Fei{-}Yue Wang and
                  Christopher C. Yang and
                  Daniel Dajun Zeng and
                  Michael Chau and
                  Kuiyu Chang},
  title        = {Privacy and Security Enhanced Offline Oblivious Transfer for Massive
                  Data Distribution},
  booktitle    = {Intelligence and Security Informatics, International Workshop, {WISI}
                  2006, Singapore, April 9, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3917},
  pages        = {159--160},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11734628\_21},
  doi          = {10.1007/11734628\_21},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisi/LeeG06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisi/LeeIIL06,
  author       = {Taek Lee and
                  Hoh Peter In and
                  Eul{-}Gyu Im and
                  Heejo Lee},
  editor       = {Hsinchun Chen and
                  Fei{-}Yue Wang and
                  Christopher C. Yang and
                  Daniel Dajun Zeng and
                  Michael Chau and
                  Kuiyu Chang},
  title        = {Cascade Damage Estimation Model for Internet Attacks},
  booktitle    = {Intelligence and Security Informatics, International Workshop, {WISI}
                  2006, Singapore, April 9, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3917},
  pages        = {163--164},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11734628\_23},
  doi          = {10.1007/11734628\_23},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisi/LeeIIL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisi/LiTY06,
  author       = {Liang Li and
                  Jie Tian and
                  Xin Yang},
  editor       = {Hsinchun Chen and
                  Fei{-}Yue Wang and
                  Christopher C. Yang and
                  Daniel Dajun Zeng and
                  Michael Chau and
                  Kuiyu Chang},
  title        = {A Novel Identity Authentication Technique Without Trustworthy Third-Party
                  Based on Fingerprint Verification},
  booktitle    = {Intelligence and Security Informatics, International Workshop, {WISI}
                  2006, Singapore, April 9, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3917},
  pages        = {175--176},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11734628\_29},
  doi          = {10.1007/11734628\_29},
  timestamp    = {Wed, 31 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisi/LiTY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisi/LiWD06,
  author       = {Dan Li and
                  Kefei Wang and
                  Jitender S. Deogun},
  editor       = {Hsinchun Chen and
                  Fei{-}Yue Wang and
                  Christopher C. Yang and
                  Daniel Dajun Zeng and
                  Michael Chau and
                  Kuiyu Chang},
  title        = {A Fuzzy Anomaly Detection System},
  booktitle    = {Intelligence and Security Informatics, International Workshop, {WISI}
                  2006, Singapore, April 9, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3917},
  pages        = {167--168},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11734628\_25},
  doi          = {10.1007/11734628\_25},
  timestamp    = {Thu, 28 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisi/LiWD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisi/LiaoT06,
  author       = {You{-}Lu Liao and
                  Cynthia Tsai},
  editor       = {Hsinchun Chen and
                  Fei{-}Yue Wang and
                  Christopher C. Yang and
                  Daniel Dajun Zeng and
                  Michael Chau and
                  Kuiyu Chang},
  title        = {Analysis of Computer Crime Characteristics in Taiwan},
  booktitle    = {Intelligence and Security Informatics, International Workshop, {WISI}
                  2006, Singapore, April 9, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3917},
  pages        = {49--57},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11734628\_6},
  doi          = {10.1007/11734628\_6},
  timestamp    = {Mon, 05 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisi/LiaoT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisi/LiuQ06,
  author       = {Zhiyong Liu and
                  Hong Qiao},
  editor       = {Hsinchun Chen and
                  Fei{-}Yue Wang and
                  Christopher C. Yang and
                  Daniel Dajun Zeng and
                  Michael Chau and
                  Kuiyu Chang},
  title        = {Hidden Markov Model Based Intrusion Detection},
  booktitle    = {Intelligence and Security Informatics, International Workshop, {WISI}
                  2006, Singapore, April 9, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3917},
  pages        = {169--170},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11734628\_26},
  doi          = {10.1007/11734628\_26},
  timestamp    = {Sat, 29 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisi/LiuQ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisi/PhillipsL06,
  author       = {Peter Phillips and
                  Ickjai Lee},
  editor       = {Hsinchun Chen and
                  Fei{-}Yue Wang and
                  Christopher C. Yang and
                  Daniel Dajun Zeng and
                  Michael Chau and
                  Kuiyu Chang},
  title        = {Mining Positive Associations of Urban Criminal Activities Using Hierarchical
                  Crime Hot Spots},
  booktitle    = {Intelligence and Security Informatics, International Workshop, {WISI}
                  2006, Singapore, April 9, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3917},
  pages        = {127--132},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11734628\_15},
  doi          = {10.1007/11734628\_15},
  timestamp    = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisi/PhillipsL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisi/PhuaLGS06,
  author       = {Clifton Phua and
                  Vincent C. S. Lee and
                  Ross W. Gayler and
                  Kate A. Smith},
  editor       = {Hsinchun Chen and
                  Fei{-}Yue Wang and
                  Christopher C. Yang and
                  Daniel Dajun Zeng and
                  Michael Chau and
                  Kuiyu Chang},
  title        = {Temporal Representation in Spike Detection of Sparse Personal Identity
                  Streams},
  booktitle    = {Intelligence and Security Informatics, International Workshop, {WISI}
                  2006, Singapore, April 9, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3917},
  pages        = {115--126},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11734628\_14},
  doi          = {10.1007/11734628\_14},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisi/PhuaLGS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisi/QiaoTPFX06,
  author       = {Shaojie Qiao and
                  Changjie Tang and
                  Jing Peng and
                  Hongjian Fan and
                  Yong Xiang},
  editor       = {Hsinchun Chen and
                  Fei{-}Yue Wang and
                  Christopher C. Yang and
                  Daniel Dajun Zeng and
                  Michael Chau and
                  Kuiyu Chang},
  title        = {{VCCM} Mining: Mining Virtual Community Core Members Based on Gene
                  Expression Programming},
  booktitle    = {Intelligence and Security Informatics, International Workshop, {WISI}
                  2006, Singapore, April 9, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3917},
  pages        = {133--138},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11734628\_16},
  doi          = {10.1007/11734628\_16},
  timestamp    = {Tue, 06 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisi/QiaoTPFX06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisi/QinZRLC06,
  author       = {Jialun Qin and
                  Yilu Zhou and
                  Edna Reid and
                  Guanpi Lai and
                  Hsinchun Chen},
  editor       = {Hsinchun Chen and
                  Fei{-}Yue Wang and
                  Christopher C. Yang and
                  Daniel Dajun Zeng and
                  Michael Chau and
                  Kuiyu Chang},
  title        = {Unraveling International Terrorist Groups' Exploitation of the Web:
                  Technical Sophistication, Media Richness, and Web Interactivity},
  booktitle    = {Intelligence and Security Informatics, International Workshop, {WISI}
                  2006, Singapore, April 9, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3917},
  pages        = {4--15},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11734628\_2},
  doi          = {10.1007/11734628\_2},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisi/QinZRLC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisi/ShenZW06,
  author       = {Huizhang Shen and
                  Jidi Zhao and
                  Huanchen Wang},
  editor       = {Hsinchun Chen and
                  Fei{-}Yue Wang and
                  Christopher C. Yang and
                  Daniel Dajun Zeng and
                  Michael Chau and
                  Kuiyu Chang},
  title        = {Illegal Intrusion Detection Based on Hidden Information Database},
  booktitle    = {Intelligence and Security Informatics, International Workshop, {WISI}
                  2006, Singapore, April 9, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3917},
  pages        = {79--84},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11734628\_10},
  doi          = {10.1007/11734628\_10},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisi/ShenZW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisi/SunL06,
  author       = {Zhen Sun and
                  Ee{-}Peng Lim},
  editor       = {Hsinchun Chen and
                  Fei{-}Yue Wang and
                  Christopher C. Yang and
                  Daniel Dajun Zeng and
                  Michael Chau and
                  Kuiyu Chang},
  title        = {{INEXT:} An Investigative Search Tool for Knowledge Extraction},
  booktitle    = {Intelligence and Security Informatics, International Workshop, {WISI}
                  2006, Singapore, April 9, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3917},
  pages        = {31--37},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11734628\_4},
  doi          = {10.1007/11734628\_4},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisi/SunL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisi/TaoWW06,
  author       = {Qing Tao and
                  Gao{-}wei Wu and
                  Jue Wang},
  editor       = {Hsinchun Chen and
                  Fei{-}Yue Wang and
                  Christopher C. Yang and
                  Daniel Dajun Zeng and
                  Michael Chau and
                  Kuiyu Chang},
  title        = {One-Class Strategies for Security Information Detection},
  booktitle    = {Intelligence and Security Informatics, International Workshop, {WISI}
                  2006, Singapore, April 9, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3917},
  pages        = {171--172},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11734628\_27},
  doi          = {10.1007/11734628\_27},
  timestamp    = {Tue, 11 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisi/TaoWW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisi/Thuraisingham06,
  author       = {Bhavani M. Thuraisingham},
  editor       = {Hsinchun Chen and
                  Fei{-}Yue Wang and
                  Christopher C. Yang and
                  Daniel Dajun Zeng and
                  Michael Chau and
                  Kuiyu Chang},
  title        = {Data Mining for Security Applications},
  booktitle    = {Intelligence and Security Informatics, International Workshop, {WISI}
                  2006, Singapore, April 9, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3917},
  pages        = {1--3},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11734628\_1},
  doi          = {10.1007/11734628\_1},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisi/Thuraisingham06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisi/Wang06,
  author       = {Fei{-}Yue Wang},
  editor       = {Hsinchun Chen and
                  Fei{-}Yue Wang and
                  Christopher C. Yang and
                  Daniel Dajun Zeng and
                  Michael Chau and
                  Kuiyu Chang},
  title        = {A Computational Framework for Decision Analysis and Support in {ISI:}
                  Artificial Societies, Computational Experiments, and Parallel Systems},
  booktitle    = {Intelligence and Security Informatics, International Workshop, {WISI}
                  2006, Singapore, April 9, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3917},
  pages        = {183--184},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11734628\_33},
  doi          = {10.1007/11734628\_33},
  timestamp    = {Fri, 18 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisi/Wang06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisi/WangWZ06,
  author       = {Jue Wang and
                  Fei{-}Yue Wang and
                  Daniel Dajun Zeng},
  editor       = {Hsinchun Chen and
                  Fei{-}Yue Wang and
                  Christopher C. Yang and
                  Daniel Dajun Zeng and
                  Michael Chau and
                  Kuiyu Chang},
  title        = {Rule+Exception Learning-Based Class Specification and Labeling in
                  Intelligence and Security Analysis},
  booktitle    = {Intelligence and Security Informatics, International Workshop, {WISI}
                  2006, Singapore, April 9, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3917},
  pages        = {181--182},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11734628\_32},
  doi          = {10.1007/11734628\_32},
  timestamp    = {Fri, 18 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisi/WangWZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisi/WhalenG06,
  author       = {Tara Whalen and
                  Carrie Gates},
  editor       = {Hsinchun Chen and
                  Fei{-}Yue Wang and
                  Christopher C. Yang and
                  Daniel Dajun Zeng and
                  Michael Chau and
                  Kuiyu Chang},
  title        = {Defender Personality Traits},
  booktitle    = {Intelligence and Security Informatics, International Workshop, {WISI}
                  2006, Singapore, April 9, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3917},
  pages        = {85--90},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11734628\_11},
  doi          = {10.1007/11734628\_11},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisi/WhalenG06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisi/XiaoHLW06,
  author       = {Baihua Xiao and
                  Huiguang He and
                  Yaodong Li and
                  Chunheng Wang},
  editor       = {Hsinchun Chen and
                  Fei{-}Yue Wang and
                  Christopher C. Yang and
                  Daniel Dajun Zeng and
                  Michael Chau and
                  Kuiyu Chang},
  title        = {Cyberspace Community Analysis and Simulation Using Complex Dynamic
                  Social Networks},
  booktitle    = {Intelligence and Security Informatics, International Workshop, {WISI}
                  2006, Singapore, April 9, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3917},
  pages        = {177--178},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11734628\_30},
  doi          = {10.1007/11734628\_30},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisi/XiaoHLW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisi/XieB06,
  author       = {Feng Xie and
                  Shuo Bai},
  editor       = {Hsinchun Chen and
                  Fei{-}Yue Wang and
                  Christopher C. Yang and
                  Daniel Dajun Zeng and
                  Michael Chau and
                  Kuiyu Chang},
  title        = {Detecting Novel Network Attacks with a Data Field},
  booktitle    = {Intelligence and Security Informatics, International Workshop, {WISI}
                  2006, Singapore, April 9, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3917},
  pages        = {66--72},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11734628\_8},
  doi          = {10.1007/11734628\_8},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisi/XieB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisi/YoonY06,
  author       = {Eun{-}Jun Yoon and
                  Kee{-}Young Yoo},
  editor       = {Hsinchun Chen and
                  Fei{-}Yue Wang and
                  Christopher C. Yang and
                  Daniel Dajun Zeng and
                  Michael Chau and
                  Kuiyu Chang},
  title        = {A New Secure Key Exchange Protocol Between {STB} and Smart Card in
                  {DTV} Broadcasting},
  booktitle    = {Intelligence and Security Informatics, International Workshop, {WISI}
                  2006, Singapore, April 9, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3917},
  pages        = {165--166},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11734628\_24},
  doi          = {10.1007/11734628\_24},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisi/YoonY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisi/ZhaoY06,
  author       = {Dongbin Zhao and
                  Jianqiang Yi},
  editor       = {Hsinchun Chen and
                  Fei{-}Yue Wang and
                  Christopher C. Yang and
                  Daniel Dajun Zeng and
                  Michael Chau and
                  Kuiyu Chang},
  title        = {Analysis of Infectious Disease Data Based on Evolutionary Computation},
  booktitle    = {Intelligence and Security Informatics, International Workshop, {WISI}
                  2006, Singapore, April 9, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3917},
  pages        = {179--180},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11734628\_31},
  doi          = {10.1007/11734628\_31},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisi/ZhaoY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisi/ZhuTW06,
  author       = {William Zhu and
                  Clark D. Thomborson and
                  Fei{-}Yue Wang},
  editor       = {Hsinchun Chen and
                  Fei{-}Yue Wang and
                  Christopher C. Yang and
                  Daniel Dajun Zeng and
                  Michael Chau and
                  Kuiyu Chang},
  title        = {Applications of Homomorphic Functions to Software Obfuscation},
  booktitle    = {Intelligence and Security Informatics, International Workshop, {WISI}
                  2006, Singapore, April 9, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3917},
  pages        = {152--153},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11734628\_18},
  doi          = {10.1007/11734628\_18},
  timestamp    = {Thu, 13 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisi/ZhuTW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wisi/2006,
  editor       = {Hsinchun Chen and
                  Fei{-}Yue Wang and
                  Christopher C. Yang and
                  Daniel Dajun Zeng and
                  Michael Chau and
                  Kuiyu Chang},
  title        = {Intelligence and Security Informatics, International Workshop, {WISI}
                  2006, Singapore, April 9, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3917},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11734628},
  doi          = {10.1007/11734628},
  isbn         = {3-540-33361-4},
  timestamp    = {Fri, 18 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisi/2006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}