default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 34 matches
- 2006
- Sabah S. Al-Fedaghi:
Security Model for Informational Privacy. WISI 2006: 154-155 - Patrick S. Chen, K. C. Chang, Tai-Ping Hsing, Shihchieh Chou:
Mining Criminal Databases to Finding Investigation Clues-By Example of Stolen Automobiles Database. WISI 2006: 91-102 - Zeng-Guang Hou, Min Tan:
Design of an Emergency Prediction and Prevention Platform for Societal Security Decision Support Using Neural Networks. WISI 2006: 173-174 - Johan Huysmans, David Martens, Bart Baesens, Jan Vanthienen, Tony Van Gestel:
Country Corruption Analysis with Self Organizing Maps and Support Vector Machines. WISI 2006: 103-114 - Seongseob Hwang, Hyoungjoo Lee, Sungzoon Cho:
Improving Authentication Accuracy of Unfamiliar Passwords with Pauses and Cues for Keystroke Dynamics-Based Authentication. WISI 2006: 73-78 - WenYuan Jen, Weiping Chang, Shihchieh Chou:
Cybercrime in Taiwan - An Analysis of Suspect Records. WISI 2006: 38-48 - Tang Jun:
A Cross Datasets Referring Outlier Detection Model Applied to Suspicious Financial Transaction Discrimination. WISI 2006: 58-65 - Hyun-Ho Kang, Brian M. Kurkoski, Young-Ran Park, Sanguk Shin, Kazuhiko Yamaguchi, Kingo Kobayashi:
A Viable System for Tracing Illegal Users of Video. WISI 2006: 156-158 - Pilsung Kang, Sunghoon Park, Sungzoon Cho, Seongseob Hwang, Hyoungjoo Lee:
The Effectiveness of Artificial Rhythms and Cues in Keystroke Dynamics Based User Authentication. WISI 2006: 161-162 - SeongKi Kim, WanJin Park, Seok Kyoo Kim, Sunil Ahn, Sangyong Han:
Integration of a Cryptographic File System and Access Control. WISI 2006: 139-151 - Mark Last, Alex Markov, Abraham Kandel:
Multi-lingual Detection of Terrorist Content on the Web. WISI 2006: 16-30 - Ickjai Lee, Hossein Ghodosi:
Privacy and Security Enhanced Offline Oblivious Transfer for Massive Data Distribution. WISI 2006: 159-160 - Taek Lee, Hoh Peter In, Eul-Gyu Im, Heejo Lee:
Cascade Damage Estimation Model for Internet Attacks. WISI 2006: 163-164 - Liang Li, Jie Tian, Xin Yang:
A Novel Identity Authentication Technique Without Trustworthy Third-Party Based on Fingerprint Verification. WISI 2006: 175-176 - Dan Li, Kefei Wang, Jitender S. Deogun:
A Fuzzy Anomaly Detection System. WISI 2006: 167-168 - You-Lu Liao, Cynthia Tsai:
Analysis of Computer Crime Characteristics in Taiwan. WISI 2006: 49-57 - Zhiyong Liu, Hong Qiao:
Hidden Markov Model Based Intrusion Detection. WISI 2006: 169-170 - Peter Phillips, Ickjai Lee:
Mining Positive Associations of Urban Criminal Activities Using Hierarchical Crime Hot Spots. WISI 2006: 127-132 - Clifton Phua, Vincent C. S. Lee, Ross W. Gayler, Kate A. Smith:
Temporal Representation in Spike Detection of Sparse Personal Identity Streams. WISI 2006: 115-126 - Shaojie Qiao, Changjie Tang, Jing Peng, Hongjian Fan, Yong Xiang:
VCCM Mining: Mining Virtual Community Core Members Based on Gene Expression Programming. WISI 2006: 133-138 - Jialun Qin, Yilu Zhou, Edna Reid, Guanpi Lai, Hsinchun Chen:
Unraveling International Terrorist Groups' Exploitation of the Web: Technical Sophistication, Media Richness, and Web Interactivity. WISI 2006: 4-15 - Huizhang Shen, Jidi Zhao, Huanchen Wang:
Illegal Intrusion Detection Based on Hidden Information Database. WISI 2006: 79-84 - Zhen Sun, Ee-Peng Lim:
INEXT: An Investigative Search Tool for Knowledge Extraction. WISI 2006: 31-37 - Qing Tao, Gao-wei Wu, Jue Wang:
One-Class Strategies for Security Information Detection. WISI 2006: 171-172 - Bhavani M. Thuraisingham:
Data Mining for Security Applications. WISI 2006: 1-3 - Fei-Yue Wang:
A Computational Framework for Decision Analysis and Support in ISI: Artificial Societies, Computational Experiments, and Parallel Systems. WISI 2006: 183-184 - Jue Wang, Fei-Yue Wang, Daniel Dajun Zeng:
Rule+Exception Learning-Based Class Specification and Labeling in Intelligence and Security Analysis. WISI 2006: 181-182 - Tara Whalen, Carrie Gates:
Defender Personality Traits. WISI 2006: 85-90 - Baihua Xiao, Huiguang He, Yaodong Li, Chunheng Wang:
Cyberspace Community Analysis and Simulation Using Complex Dynamic Social Networks. WISI 2006: 177-178 - Feng Xie, Shuo Bai:
Detecting Novel Network Attacks with a Data Field. WISI 2006: 66-72
skipping 4 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-12-20 08:06 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint