default search action
7th ISI 2009: Dallas, Texas, USA
- IEEE International Conference on Intelligence and Security Informatics, ISI 2009, Dallas, Texas, USA, June 8-11, 2009, Proceedings. IEEE 2009, ISBN 978-1-4244-4171-6
Part I: Long Papers
Network-Based Data Analytics
- Ryan Layfield, Murat Kantarcioglu, Bhavani Thuraisingham:
On the mitigation of bioterrorism through game theory. 1-6 - Stephen Kelley, Mark K. Goldberg, Malik Magdon-Ismail, Konstantin Mertsalov:
Stability of individual and group behavior in a blog network. 7-12 - Teruhiko Yoneyama, Mukkai S. Krishnamoorthy:
Observation of network structure in Amazon.com. 13-18 - Raymond Heatherly, Murat Kantarcioglu, Bhavani Thuraisingham:
Social network classification incorporating link type values. 19-24 - Peter Phillips, Ickjai Lee:
Mining top-k and bottom-k correlative crime patterns through graph representations. 25-30 - Chyng-Yang Jang, Michael Stefanone:
Factors influencing Bloggers' perceived indentifiability. 31-36
Adversarial Data and Text Mining
- Fatih Özgül, Zeki Erdem, Chris Bowerman:
Prediction of past unsolved terrorist attacks. 37-42 - M. A. J. Bourassa, David B. Skillicorn:
Hardening adversarial prediction with anomaly tracking. 43-48 - Antonio Badia:
Supporting data exploration in databases. 49-54 - Huiqi Zhang, Ram Dantu, João W. Cangussu:
Change point detection based on call detail records. 55-60 - Yulei Zhang, Yan Dang, Hsinchun Chen:
Gender difference analysis of political web forums: An experiment on an international islamic women's forum. 61-64 - Christopher C. Yang, Tobun Dorbin Ng:
Web opinions analysis with scalable distance-based clustering. 65-70 - Yulei Zhang, Shuo Zeng, Li Fan, Yan Dang, Catherine A. Larson, Hsinchun Chen:
Dark web forums portal: Searching and analyzing jihadist forums. 71-76
Situational Awareness and Decision Making
- Naveen Ashish, Jay Lickfett, Sharad Mehrotra, Nalini Venkatasubramanian:
The software EBox: Integrated information for situational awareness. 77-82 - Christopher Torpelund-Bruin, Ickjai Lee:
A Voronoi-based model for emergency planning using sequential-scan algorithms. 83-88 - Yi-Ming Chen, Dachrahn Wu, Cheng-Kuang Wu:
A game theory approach for the reallocation of security forces against terrorist diversionary attacks. 89-94 - Claus Atzenbeck, David L. Hicks, Nasrullah Memon:
Supporting emergent knowledge and team communication in police investigations. 95-100
Information Systems Security and Cyber Security
- Xiaoran Wang, Coskun Bayrak:
Injecting a permission-based delegation model to secure web-based workflow systems. 101-106 - Gary Doss, Gurvirender P. Tejay:
Developing insider attack detection model: A grounded approach. 107-112 - Ann-Marie Horcher, Gurvirender P. Tejay:
Building a better password: The role of cognitive load in information security training. 113-118 - Yanjun Zuo, Brajendra Panda:
Unifying strategies and tactics: A survivability framework for countering cyber attacks. 119-124 - Vikas Menon, William M. Pottenger:
A Higher Order Collective Classifier for detecting and classifying network events. 125-130 - Sudarshan S. Chawathe:
Effective whitelisting for filesystem forensics. 131-136 - Farah Jemili, Montaceur Zaghdoud, Mohamed Ben Ahmed:
Intrusion detection based on "Hybrid" propagation in Bayesian Networks. 137-142
Innovative and Emerging Applications
- Daniel T. Schmitt, Stuart H. Kurkowski, Michael J. Mendenhall:
Automated casing event detection in persistent video surveillance. 143-148 - Roopa Vishwanathan, Yan Huang:
A two-level protocol to answer private location-based queries. 149-154 - Robert Moskovitch, Clint Feher, Arik Messerman, Niklas Kirschnick, Tarik Mustafic, Seyit Ahmet Çamtepe, Bernhard Löhlein, Ulrich Heister, Sebastian Möller, Lior Rokach, Yuval Elovici:
Identity theft, computers and behavioral biometrics. 155-160
Part II: Short Papers
Data Mining and Data Management
- Li Ding, Dana Steil, Matthew Hudnall, Brandon Dixon, Randy K. Smith, David Brown, Allen S. Parrish:
PerpSearch: An integrated crime detection system. 161-163 - Chengyang Zhang, Yan Huang, Rada Mihalcea, Hector Cuellar:
A natural language interface for crime-related spatial queries. 164-166 - David Breitkreutz, Ickjai Lee:
Voronoi representation for areal data processing in data-rich environments. 167-169 - Stephen Kelley, Mark K. Goldberg, Malik Magdon-Ismail, Konstantin Mertsalov, William A. Wallace, Mohammed Javeed Zaki:
graphOnt: An ontology based library for conversion from semantic graphs to JUNG. 170-172
Text Mining and Content Analysis
- Hsinchun Chen:
IEDs in the dark web: Lexicon expansion and genre classification. 173-175 - Moshe Koppel, Navot Akiva, Eli Alshech, Kfir Bar:
Automatically Classifying Documents by Ideological and Organizational Affiliation. 176-178 - Tianjun Fu, Chunneng Huang, Hsinchun Chen:
Identification of extremist videos in online video sharing sites. 179-181 - Syed Toufeeq Ahmed, Ruchi Bhindwale, Hasan Davulcu:
Tracking terrorism news threads by extracting event signatures. 182-184 - Tobun Dorbin Ng, Christopher C. Yang:
A framework for harnessing public wisdom to ensure food safety. 185-187 - Linhai Song, Xueqi Cheng, Yan Guo, Yue Liu, Guodong Ding:
ContentEx: A framework for automatic content extraction programs. 188-190 - Bo Wu, Xueqi Cheng, Yu Wang, Gang Zhang, Guodong Ding:
Facilitating wrapper generation with page analysis. 191-193
Privacy Management
- Enkh-Amgalan Baatarjav, Ram Dantu, Yan Tang, João W. Cangussu:
BBN-based privacy management system for facebook. 194-196 - Florian Kerschbaum, Andreas Schaad, Debmalya Biswas:
Practical privacy-preserving protocols for criminal investigations. 197-199
Digital Forensics
- Kimin Seo, Jaemin Choi, Yong-seok Choi, Dong-chan Lee, Sangjin Lee:
Research about extracting and analyzing accounting data of company to detect financial fraud. 200-202 - Allyson M. Hoss, Doris L. Carver:
Weaving ontologies to support digital forensic analysis. 203-205
Infrastructure Protection and Cyber Security
- William Eberle, Lawrence B. Holder:
Applying graph-based anomaly detection approaches to the discovery of insider threats. 206-208 - Cyril Onwubiko:
Functional requirements of situational awareness in computer network security. 209-213 - Micah Jones, Kevin W. Hamlen:
Enforcing IRM security policies: Two case studies. 214-216
Innovative and Emerging Applications
- Daniel T. Schmitt, Stuart H. Kurkowski, Michael J. Mendenhall:
Building Social Networks in Persistent Video Surveillance. 217-219 - Shu Chen, Yan Huang:
Recognizing human activities from multi-modal sensors. 220-222 - Arash Moradkhani Roshandeh, Othman Che Puan:
Assessment of impact of variable message signs on traffic surveillance in Kuala Lumpur. 223-225 - Min-rui Zhang, Yangmei Zhang:
Color image watermarking algorithm in cepstrum domain. 226-228
Part III: Extended Abstracts
- Abbas Asosheh, Bijan Dehmoubed, Amir Khani:
A new quantitative approach for information security risk assessment. 229 - Xuning Tang, Christopher C. Yang:
Terrorist and criminal social network data sharing and integration. 230 - Youngkun Min, Bogju Lee, Chansu Yu:
MyMemex: A web service-based personal memex system. 231 - Santi Phithakkitnukoon, Ram Dantu:
Defense against SPIT using community signals. 232 - Jonathan White, Brajendra Panda:
Implementing PII honeytokens to mitigate against the threat of malicous insiders. 233 - Sayed Omid Azarkasb, Saeed Shiri Ghidary:
New approaches for intrusion detection based on logs correlation. 234 - Sahand KhakAbi:
Preventing SYN flood DoS attacks (Abstract) An improvement to SYN cookies. 235
Workshop I: SOCO 2009
2nd International Workshop on Social Computing (SOCO 2009)
- Ryan Layfield, Bhavani Thuraisingham, Latifur Khan, Murat Kantarcioglu, Jyothsna Rachapalli:
Design and implementation of a secure social network system. 236-247 - Xiaochen Li, Wenji Mao, Daniel Dajun Zeng, Peng Su, Fei-Yue Wang:
Performance evaluation of classification methods in cultural modeling. 248-250 - Peng Su, Wenji Mao, Daniel Zeng, Xiaochen Li, Fei-Yue Wang:
Handling Class Imbalance Problem in Cultural Modeling. 251-256 - Youzhong Wang, Daniel Zeng, Xiaolong Zheng, Fei-Yue Wang:
Propagation of online news: Dynamic patterns. 257-259 - Balaji Rajendran, K. Iyakutti:
Socio-contextual model of knowledge sharing among user assisting agents. 260-265 - Hengmin Zhou, Daniel Zeng, Changli Zhang:
Finding leaders from opinion networks. 266-268 - Jing Peng, Daniel Zeng:
Topic-based web page recommendation using tags. 269-271
Workshop II: WCCF 2009
2nd Workshop on Cybercrime and Computer Forensics (WCCF 2009)
- Michael Perelman, Ping Ji, Weifeng Chen:
Traffic and security analysis on Sony Playstation 3. 272-275 - Richard Arthur Bares:
Hiding in a virtual world: Using unconventionally installed operating systems. 276-284 - Jessica Ho, Ping Ji, Weifeng Chen, Raymond Hsieh:
Identifying Google Talk packets. 285-290 - Scott Treadwell, Mian Zhou:
A heuristic approach for detection of obfuscated malware. 291-299 - Noah Guilbault, Ratan Guha:
Experiment setup for temporal distributed intrusion detection system on Amazon's elastic compute cloud. 300-302 - Robert Lee, Sheau-Dong Lang, Kevin Stenger:
From digital forensic report to Bayesian network representation. 303-306
Workshop III: WAIS 2009
Workshop on Assured Information Sharing (WAIS 2009)
- Tim Finin, Anupam Joshi, Hillol Kargupta, Yelena Yesha, Joel Sachs, Elisa Bertino, Ninghui Li, Chris Clifton, Gene Spafford, Bhavani Thuraisingham, Murat Kantarcioglu, Alain Bensoussan, Nathan Berg, Latifur Khan, Jiawei Han, ChengXiang Zhai, Ravi S. Sandhu, Shouhuai Xu, Jim Massaro, Lada A. Adamic:
Assured Information Sharing Life Cycle. 307-309 - Shouhuai Xu, Qun Ni, Elisa Bertino, Ravi S. Sandhu:
A Characterization of the problem of secure provenance management. 310-314
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.