- 2006
- Sabah S. Al-Fedaghi:
Security Model for Informational Privacy. WISI 2006: 154-155 - Patrick S. Chen, K. C. Chang, Tai-Ping Hsing, Shihchieh Chou:
Mining Criminal Databases to Finding Investigation Clues-By Example of Stolen Automobiles Database. WISI 2006: 91-102 - Zeng-Guang Hou, Min Tan:
Design of an Emergency Prediction and Prevention Platform for Societal Security Decision Support Using Neural Networks. WISI 2006: 173-174 - Johan Huysmans, David Martens, Bart Baesens, Jan Vanthienen, Tony Van Gestel:
Country Corruption Analysis with Self Organizing Maps and Support Vector Machines. WISI 2006: 103-114 - Seongseob Hwang, Hyoungjoo Lee, Sungzoon Cho:
Improving Authentication Accuracy of Unfamiliar Passwords with Pauses and Cues for Keystroke Dynamics-Based Authentication. WISI 2006: 73-78 - WenYuan Jen, Weiping Chang, Shihchieh Chou:
Cybercrime in Taiwan - An Analysis of Suspect Records. WISI 2006: 38-48 - Tang Jun:
A Cross Datasets Referring Outlier Detection Model Applied to Suspicious Financial Transaction Discrimination. WISI 2006: 58-65 - Hyun-Ho Kang, Brian M. Kurkoski, Young-Ran Park, Sanguk Shin, Kazuhiko Yamaguchi, Kingo Kobayashi:
A Viable System for Tracing Illegal Users of Video. WISI 2006: 156-158 - Pilsung Kang, Sunghoon Park, Sungzoon Cho, Seongseob Hwang, Hyoungjoo Lee:
The Effectiveness of Artificial Rhythms and Cues in Keystroke Dynamics Based User Authentication. WISI 2006: 161-162 - SeongKi Kim, WanJin Park, Seok Kyoo Kim, Sunil Ahn, Sangyong Han:
Integration of a Cryptographic File System and Access Control. WISI 2006: 139-151 - Mark Last, Alex Markov, Abraham Kandel:
Multi-lingual Detection of Terrorist Content on the Web. WISI 2006: 16-30 - Ickjai Lee, Hossein Ghodosi:
Privacy and Security Enhanced Offline Oblivious Transfer for Massive Data Distribution. WISI 2006: 159-160 - Taek Lee, Hoh Peter In, Eul-Gyu Im, Heejo Lee:
Cascade Damage Estimation Model for Internet Attacks. WISI 2006: 163-164 - Liang Li, Jie Tian, Xin Yang:
A Novel Identity Authentication Technique Without Trustworthy Third-Party Based on Fingerprint Verification. WISI 2006: 175-176 - Dan Li, Kefei Wang, Jitender S. Deogun:
A Fuzzy Anomaly Detection System. WISI 2006: 167-168 - You-Lu Liao, Cynthia Tsai:
Analysis of Computer Crime Characteristics in Taiwan. WISI 2006: 49-57 - Zhiyong Liu, Hong Qiao:
Hidden Markov Model Based Intrusion Detection. WISI 2006: 169-170 - Peter Phillips, Ickjai Lee:
Mining Positive Associations of Urban Criminal Activities Using Hierarchical Crime Hot Spots. WISI 2006: 127-132 - Clifton Phua, Vincent C. S. Lee, Ross W. Gayler, Kate A. Smith:
Temporal Representation in Spike Detection of Sparse Personal Identity Streams. WISI 2006: 115-126 - Shaojie Qiao, Changjie Tang, Jing Peng, Hongjian Fan, Yong Xiang:
VCCM Mining: Mining Virtual Community Core Members Based on Gene Expression Programming. WISI 2006: 133-138 - Jialun Qin, Yilu Zhou, Edna Reid, Guanpi Lai, Hsinchun Chen:
Unraveling International Terrorist Groups' Exploitation of the Web: Technical Sophistication, Media Richness, and Web Interactivity. WISI 2006: 4-15 - Huizhang Shen, Jidi Zhao, Huanchen Wang:
Illegal Intrusion Detection Based on Hidden Information Database. WISI 2006: 79-84 - Zhen Sun, Ee-Peng Lim:
INEXT: An Investigative Search Tool for Knowledge Extraction. WISI 2006: 31-37 - Qing Tao, Gao-wei Wu, Jue Wang:
One-Class Strategies for Security Information Detection. WISI 2006: 171-172 - Bhavani M. Thuraisingham:
Data Mining for Security Applications. WISI 2006: 1-3 - Fei-Yue Wang:
A Computational Framework for Decision Analysis and Support in ISI: Artificial Societies, Computational Experiments, and Parallel Systems. WISI 2006: 183-184 - Jue Wang, Fei-Yue Wang, Daniel Dajun Zeng:
Rule+Exception Learning-Based Class Specification and Labeling in Intelligence and Security Analysis. WISI 2006: 181-182 - Tara Whalen, Carrie Gates:
Defender Personality Traits. WISI 2006: 85-90 - Baihua Xiao, Huiguang He, Yaodong Li, Chunheng Wang:
Cyberspace Community Analysis and Simulation Using Complex Dynamic Social Networks. WISI 2006: 177-178 - Feng Xie, Shuo Bai:
Detecting Novel Network Attacks with a Data Field. WISI 2006: 66-72