default search action
7th ISI 2009: Dallas, Texas, USA
- IEEE International Conference on Intelligence and Security Informatics, ISI 2009, Dallas, Texas, USA, June 8-11, 2009, Proceedings. IEEE 2009, ISBN 978-1-4244-4171-6
Part I: Long Papers
Network-Based Data Analytics
- Ryan Layfield, Murat Kantarcioglu, Bhavani Thuraisingham:
On the mitigation of bioterrorism through game theory. 1-6 - Stephen Kelley, Mark K. Goldberg, Malik Magdon-Ismail, Konstantin Mertsalov:
Stability of individual and group behavior in a blog network. 7-12 - Teruhiko Yoneyama, Mukkai S. Krishnamoorthy:
Observation of network structure in Amazon.com. 13-18 - Raymond Heatherly, Murat Kantarcioglu, Bhavani Thuraisingham:
Social network classification incorporating link type values. 19-24 - Peter Phillips, Ickjai Lee
:
Mining top-k and bottom-k correlative crime patterns through graph representations. 25-30 - Chyng-Yang Jang
, Michael Stefanone:
Factors influencing Bloggers' perceived indentifiability. 31-36
Adversarial Data and Text Mining
- Fatih Özgül
, Zeki Erdem, Chris Bowerman:
Prediction of past unsolved terrorist attacks. 37-42 - M. A. J. Bourassa, David B. Skillicorn
:
Hardening adversarial prediction with anomaly tracking. 43-48 - Antonio Badia:
Supporting data exploration in databases. 49-54 - Huiqi Zhang, Ram Dantu, João W. Cangussu:
Change point detection based on call detail records. 55-60 - Yulei Zhang, Yan Dang, Hsinchun Chen:
Gender difference analysis of political web forums: An experiment on an international islamic women's forum. 61-64 - Christopher C. Yang, Tobun Dorbin Ng:
Web opinions analysis with scalable distance-based clustering. 65-70 - Yulei Zhang, Shuo Zeng, Li Fan, Yan Dang, Catherine A. Larson, Hsinchun Chen:
Dark web forums portal: Searching and analyzing jihadist forums. 71-76
Situational Awareness and Decision Making
- Naveen Ashish, Jay Lickfett, Sharad Mehrotra, Nalini Venkatasubramanian:
The software EBox: Integrated information for situational awareness. 77-82 - Christopher Torpelund-Bruin, Ickjai Lee
:
A Voronoi-based model for emergency planning using sequential-scan algorithms. 83-88 - Yi-Ming Chen, Dachrahn Wu, Cheng-Kuang Wu:
A game theory approach for the reallocation of security forces against terrorist diversionary attacks. 89-94 - Claus Atzenbeck, David L. Hicks, Nasrullah Memon:
Supporting emergent knowledge and team communication in police investigations. 95-100
Information Systems Security and Cyber Security
- Xiaoran Wang, Coskun Bayrak:
Injecting a permission-based delegation model to secure web-based workflow systems. 101-106 - Gary Doss, Gurvirender P. Tejay:
Developing insider attack detection model: A grounded approach. 107-112 - Ann-Marie Horcher, Gurvirender P. Tejay:
Building a better password: The role of cognitive load in information security training. 113-118 - Yanjun Zuo, Brajendra Panda:
Unifying strategies and tactics: A survivability framework for countering cyber attacks. 119-124 - Vikas Menon, William M. Pottenger:
A Higher Order Collective Classifier for detecting and classifying network events. 125-130 - Sudarshan S. Chawathe:
Effective whitelisting for filesystem forensics. 131-136 - Farah Jemili
, Montaceur Zaghdoud, Mohamed Ben Ahmed:
Intrusion detection based on "Hybrid" propagation in Bayesian Networks. 137-142
Innovative and Emerging Applications
- Daniel T. Schmitt, Stuart H. Kurkowski, Michael J. Mendenhall:
Automated casing event detection in persistent video surveillance. 143-148 - Roopa Vishwanathan, Yan Huang
:
A two-level protocol to answer private location-based queries. 149-154 - Robert Moskovitch, Clint Feher, Arik Messerman, Niklas Kirschnick, Tarik Mustafic, Seyit Ahmet Çamtepe
, Bernhard Löhlein, Ulrich Heister, Sebastian Möller
, Lior Rokach, Yuval Elovici:
Identity theft, computers and behavioral biometrics. 155-160
Part II: Short Papers
Data Mining and Data Management
- Li Ding, Dana Steil, Matthew Hudnall, Brandon Dixon, Randy K. Smith, David Brown, Allen S. Parrish:
PerpSearch: An integrated crime detection system. 161-163 - Chengyang Zhang, Yan Huang
, Rada Mihalcea, Hector Cuellar:
A natural language interface for crime-related spatial queries. 164-166 - David Breitkreutz, Ickjai Lee
:
Voronoi representation for areal data processing in data-rich environments. 167-169 - Stephen Kelley, Mark K. Goldberg, Malik Magdon-Ismail, Konstantin Mertsalov, William A. Wallace, Mohammed Javeed Zaki
:
graphOnt: An ontology based library for conversion from semantic graphs to JUNG. 170-172
Text Mining and Content Analysis
- Hsinchun Chen:
IEDs in the dark web: Lexicon expansion and genre classification. 173-175 - Moshe Koppel, Navot Akiva, Eli Alshech, Kfir Bar:
Automatically Classifying Documents by Ideological and Organizational Affiliation. 176-178 - Tianjun Fu, Chunneng Huang, Hsinchun Chen:
Identification of extremist videos in online video sharing sites. 179-181 - Syed Toufeeq Ahmed, Ruchi Bhindwale, Hasan Davulcu:
Tracking terrorism news threads by extracting event signatures. 182-184 - Tobun Dorbin Ng, Christopher C. Yang:
A framework for harnessing public wisdom to ensure food safety. 185-187 - Linhai Song, Xueqi Cheng, Yan Guo, Yue Liu, Guodong Ding:
ContentEx: A framework for automatic content extraction programs. 188-190 - Bo Wu, Xueqi Cheng, Yu Wang, Gang Zhang, Guodong Ding:
Facilitating wrapper generation with page analysis. 191-193
Privacy Management
- Enkh-Amgalan Baatarjav, Ram Dantu, Yan Tang, João W. Cangussu:
BBN-based privacy management system for facebook. 194-196 - Florian Kerschbaum, Andreas Schaad, Debmalya Biswas:
Practical privacy-preserving protocols for criminal investigations. 197-199
Digital Forensics
- Kimin Seo, Jaemin Choi, Yong-seok Choi, Dong-chan Lee, Sangjin Lee:
Research about extracting and analyzing accounting data of company to detect financial fraud. 200-202 - Allyson M. Hoss, Doris L. Carver:
Weaving ontologies to support digital forensic analysis. 203-205
Infrastructure Protection and Cyber Security
- William Eberle, Lawrence B. Holder:
Applying graph-based anomaly detection approaches to the discovery of insider threats. 206-208 - Cyril Onwubiko
:
Functional requirements of situational awareness in computer network security. 209-213 - Micah Jones, Kevin W. Hamlen:
Enforcing IRM security policies: Two case studies. 214-216
Innovative and Emerging Applications
- Daniel T. Schmitt, Stuart H. Kurkowski, Michael J. Mendenhall:
Building Social Networks in Persistent Video Surveillance. 217-219 - Shu Chen, Yan Huang
:
Recognizing human activities from multi-modal sensors. 220-222 - Arash Moradkhani Roshandeh, Othman Che Puan:
Assessment of impact of variable message signs on traffic surveillance in Kuala Lumpur. 223-225 - Min-rui Zhang, Yangmei Zhang:
Color image watermarking algorithm in cepstrum domain. 226-228
Part III: Extended Abstracts
- Abbas Asosheh, Bijan Dehmoubed, Amir Khani:
A new quantitative approach for information security risk assessment. 229 - Xuning Tang, Christopher C. Yang:
Terrorist and criminal social network data sharing and integration. 230 - Youngkun Min, Bogju Lee, Chansu Yu:
MyMemex: A web service-based personal memex system. 231 - Santi Phithakkitnukoon
, Ram Dantu:
Defense against SPIT using community signals. 232 - Jonathan White, Brajendra Panda:
Implementing PII honeytokens to mitigate against the threat of malicous insiders. 233 - Sayed Omid Azarkasb, Saeed Shiri Ghidary
:
New approaches for intrusion detection based on logs correlation. 234 - Sahand KhakAbi:
Preventing SYN flood DoS attacks (Abstract) An improvement to SYN cookies. 235
Workshop I: SOCO 2009
2nd International Workshop on Social Computing (SOCO 2009)
- Ryan Layfield, Bhavani Thuraisingham, Latifur Khan
, Murat Kantarcioglu, Jyothsna Rachapalli:
Design and implementation of a secure social network system. 236-247 - Xiaochen Li, Wenji Mao, Daniel Dajun Zeng, Peng Su, Fei-Yue Wang:
Performance evaluation of classification methods in cultural modeling. 248-250 - Peng Su, Wenji Mao, Daniel Zeng, Xiaochen Li, Fei-Yue Wang:
Handling Class Imbalance Problem in Cultural Modeling. 251-256 - Youzhong Wang, Daniel Zeng, Xiaolong Zheng
, Fei-Yue Wang:
Propagation of online news: Dynamic patterns. 257-259 - Balaji Rajendran, K. Iyakutti:
Socio-contextual model of knowledge sharing among user assisting agents. 260-265 - Hengmin Zhou, Daniel Zeng, Changli Zhang:
Finding leaders from opinion networks. 266-268 - Jing Peng, Daniel Zeng:
Topic-based web page recommendation using tags. 269-271
Workshop II: WCCF 2009
2nd Workshop on Cybercrime and Computer Forensics (WCCF 2009)
- Michael Perelman, Ping Ji, Weifeng Chen:
Traffic and security analysis on Sony Playstation 3. 272-275 - Richard Arthur Bares:
Hiding in a virtual world: Using unconventionally installed operating systems. 276-284 - Jessica Ho, Ping Ji, Weifeng Chen, Raymond Hsieh:
Identifying Google Talk packets. 285-290 - Scott Treadwell, Mian Zhou:
A heuristic approach for detection of obfuscated malware. 291-299 - Noah Guilbault, Ratan Guha:
Experiment setup for temporal distributed intrusion detection system on Amazon's elastic compute cloud. 300-302 - Robert Lee, Sheau-Dong Lang, Kevin Stenger:
From digital forensic report to Bayesian network representation. 303-306
Workshop III: WAIS 2009
Workshop on Assured Information Sharing (WAIS 2009)
- Tim Finin
, Anupam Joshi
, Hillol Kargupta, Yelena Yesha, Joel Sachs, Elisa Bertino, Ninghui Li, Chris Clifton, Gene Spafford
, Bhavani Thuraisingham, Murat Kantarcioglu, Alain Bensoussan
, Nathan Berg, Latifur Khan
, Jiawei Han, ChengXiang Zhai, Ravi S. Sandhu, Shouhuai Xu, Jim Massaro, Lada A. Adamic:
Assured Information Sharing Life Cycle. 307-309 - Shouhuai Xu, Qun Ni, Elisa Bertino, Ravi S. Sandhu:
A Characterization of the problem of secure provenance management. 310-314
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.