default search action
ISI 2015: Baltimore, MD, USA
- 2015 IEEE International Conference on Intelligence and Security Informatics, ISI 2015, Baltimore, MD, USA, May 27-29, 2015. IEEE 2015, ISBN 978-1-4799-9889-0
Part I: Long Papers
Data Science and Analytics in Security Informatics
- Quan Zheng, David B. Skillicorn
:
Analysis of criminal social networks with typed and directed edges. 1-6 - Chris Giannella, Eric Bloedorn:
Spectral malware behavior clustering. 7-12 - Weijie Wang, Baijian Yang
, Yingjie Victor Chen:
A visual analytics approach to detecting server redirections and data exfiltration. 13-18 - Ian A. Andrews, Srijan Kumar, Francesca Spezzano
, V. S. Subrahmanian:
SPINN: Suspicion prediction in nuclear networks. 19-24 - Mohammad A. Tayebi, Uwe Glässer, Patricia L. Brantingham:
Learning where to inspect: Location learning for crime prediction. 25-30 - Sagar Samtani
, Ryan Chinn, Hsinchun Chen:
Exploring hacker assets in underground forums. 31-36
Organizational, National, and International Issues in Counter-terrorism or Security Protection
- Ricardo Guedes, Vasco Furtado, Tarcisio H. C. Pequeno:
Multi-objective evolutionary algorithms and multiagent models for optimizing police dispatch. 37-42 - Royal A. Elmore, William S. Charlton:
Nonproliferation informatics: Employing Bayesian analysis, agent based modeling, and information theory for dynamic proliferation pathway studies. 43-48 - Yaqoub Alsarkal, Nan Zhang, Yilu Zhou:
Linking virtual and real-world identities. 49-54 - Wingyan Chung, Saike He, Daniel Dajun Zeng, Victor A. Benjamin:
Emotion extraction and entrainment in social media: The case of U.S. immigration and border security. 55-60 - David B. Skillicorn
:
Empirical assessment of al qaeda, ISIS, and taliban propaganda. 61-66
Human Behavior in the Security Applications
- Jie Gu, Heng Xu, An'an Hu, Lihua Huang:
Exploring the effect of permission notice on users' initial trust to an application store: The case of China's Android application market. 67-72 - Bryan Monk, Russell Allsup, Richard Frank:
LECENing places to hide: Geo-mapping child exploitation material. 73-78 - Victor A. Benjamin, Hsinchun Chen:
Developing understanding of hacker language through the use of lexical semantics. 79-84 - Victor A. Benjamin, Weifeng Li
, Thomas Holt, Hsinchun Chen:
Exploring threats and vulnerabilities in hacker web: Forums, IRC and carding shops. 85-90 - Sanjaya Wijeratne, Derek Doran, Amit P. Sheth, Jack L. Dustin:
Analyzing the social media footprint of street gangs. 91-96 - Jeffrey Gainer Proudfoot, Jeffrey L. Jenkins
, Judee K. Burgoon, Jay F. Nunamaker Jr.:
Deception is in the eye of the communicator: Investigating pupil diameter variations in automated deception detection interviews. 97-102
Security Infrastructure and Tools
- Jon R. Ward, Mohamed F. Younis:
Base station anonymity distributed self-assessment in Wireless Sensor Networks. 103-108 - Jayaprakash Kar
, Daniyal M. Alghazzawi
:
On construction of signcryption scheme for smart card security. 109-113 - Elisa Bertino, Nathan W. Hartman:
Cybersecurity for product lifecycle management a research roadmap. 114-119 - Julius Adebayo, Lalana Kagal:
A privacy protection procedure for large scale individual level data. 120-125 - Huseyin Ulusoy, Murat Kantarcioglu, Bhavani Thuraisingham, Latifur Khan
:
Honeypot based unauthorized data access detection in MapReduce systems. 126-131
Part II: Short Papers
Data Science and Analytics in Security Informatics
- Zhipeng Jin, Qiudan Li, Daniel Zeng, Lei Wang:
Filtering spam in Weibo using ensemble imbalanced classification and knowledge expansion. 132-134 - Chuan Luo, Xiaolong Zheng, Daniel Zeng:
Inferring social influence and meme interaction with Hawkes processes. 135-137 - Chuan Luo, Daniel Zeng:
Multivariate embedding based causaltiy detection with short time series. 138-140 - Jinie Pak, Lina Zhou:
A comparison of features for automatic deception detection in synchronous computer-mediated communication. 141-143 - Chase P. Dowling, Joshua J. Harrison, Arun V. Sathanur, Landon H. Sego, Courtney D. Corley:
Social sensor analytics: Making sense of network models in social media. 144-147 - Joshua J. Harrison, Eric Bell, Court D. Corley, Chase P. Dowling, Andrew J. Cowell
:
Assessment of user home location geoinference methods. 148-150 - Junjie Lin, Wenji Mao:
Personality based public sentiment classification in microblog. 151-153
Organizational, National, and International Issues in Counter-terrorism or Security Protection
- Heather Roy, Sue E. Kase:
The relation between microfinacing and corruption by country: An analysis of an open source dataset. 154-156
Human Behavior in the Security Applications
- Shuyuan Mary Ho, Jeffrey T. Hancock
, Cheryl Booth, Xiuwen Liu, Shashanka Surya Timmarajus, Mike Burmester:
Liar, Liar, IM on Fire: Deceptive language-action cues in spontaneous online communication. 157-159 - Saike He, Xiaolong Zheng, Daniel Zeng, Bo Xu, Changliang Li, Guanhua Tian, Lei Wang, Hongwei Hao:
Modeling emotion entrainment of online users in emergency events. 160-162 - Samuel Owusu, Lina Zhou:
Positive bystanding behavior in cyberbullying: The impact of empathy on adolescents' cyber bullied support behavior. 163-165
Security Infrastructure and Tools
- Fangyue Chen, Yunke Wang, Heng Song, Xiangyang Li:
A statistical study of covert timing channels using network packet frequency. 166-168 - Mohammad Vahidalizadehdizaj, Lixin Tao:
A new mobile payment protocol (GMPCP) by using a new key agreement protocol (GC). 169-172 - Tao Ding, Ahmed Aleroud, George Karabatis:
Multi-granular aggregation of network flows for security analysis. 173-175 - Garima Bajwa
, Mohamed Fazeen, Ram Dantu, Sonal Tanpure:
Unintentional bugs to vulnerability mapping in Android applications. 176-178 - Faisal Quader, Vandana Pursnani Janeja, Justin Stauffer:
Persistent threat pattern discovery. 179-181 - Cynthia L. Claiborne, Cathy C. Ncube, Ram Dantu:
Random anonymization of mobile sensor data: Modified Android framework. 182-184 - Josephine M. Namayanja, Vandana Pursnani Janeja:
Change detection in evolving computer networks: Changes in densification and diameter over time. 185-187
Part III: Poster Papers
Data Science and Analytics in Security Informatics
- Peng Su, Wenji Mao:
Power-function-based observation-weighting method for mining actionable behavioral rules. 188 - Naoto Oshiro:
Detection of financial statement fraud: Is accrual really useful as an early warning indicator? 189 - Yuhao Zhang, Wenji Mao, Xiaochen Li:
A bottom-up method for constructing topic hierarchies. 190 - Roger B. Bradford:
Distributed LSI: Parallel preprocessing and vector sharing. 191 - Kun Wang, Duoyong Sun:
Research on construction methods of the Shanghai cooperation organization meta-network model. 192
Security Infrastructure and Tools
- Leonidas Deligiannidis:
Elliptic curve cryptography in Java. 193 - Theogene Hakiza Bucuti, Ram Dantu:
An opportunistic encryption extension for the DNS protocol. 194 - Garima Bajwa
, Ram Dantu, Ryan Aldridge:
Pass-pic: A mobile user authentication. 195 - Jae-Jin Jang, Im Young Jung:
An access control resistant to shoulder-surfing. 196 - Jayaprakash Kar
:
Online/off-line ring signature scheme with provable security. 197
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.