Conferences in DBLP
Li-Chiou Chen , Boris Kaminsky , Tiffany Tummino , Kathleen M. Carley , Elizabeth Casman , Douglas B. Fridsma , Alex Yahja Aligning Simulation Models of Smallpox Outbreaks. [Citation Graph (0, 0)][DBLP ] ISI, 2004, pp:1-16 [Conf ] Donald J. Berndt , Sunil Bhat , John W. Fisher , Alan R. Hevner , James Studnicki Data Analytics for Bioterrorism Surveillance. [Citation Graph (0, 0)][DBLP ] ISI, 2004, pp:17-27 [Conf ] Daniel Dajun Zeng , Hsinchun Chen , Chunju Tseng , Catherine A. Larson , Millicent Eidson , Ivan Gotham , Cecil Lynch , Michael Ascher West Nile Virus and Botulism Portal: A Case Study in Infectious Disease Informatics. [Citation Graph (0, 0)][DBLP ] ISI, 2004, pp:28-41 [Conf ] Zhengyou Xia , Yichuan Jiang , YiPing Zhong , Shiyong Zhang A Novel Policy and Information Flow Security Model for Active Network. [Citation Graph (0, 0)][DBLP ] ISI, 2004, pp:42-55 [Conf ] Yichuan Jiang , Zhengyou Xia , YiPing Zhong , Shiyong Zhang A Novel Autonomous Trust Management Model for Mobile Agents. [Citation Graph (0, 0)][DBLP ] ISI, 2004, pp:56-65 [Conf ] Gang Liang , Sudarshan S. Chawathe Privacy-Preserving Inter-database Operations. [Citation Graph (0, 0)][DBLP ] ISI, 2004, pp:66-82 [Conf ] David B. Skillicorn Finding Unusual Correlation Using Matrix Decompositions. [Citation Graph (0, 0)][DBLP ] ISI, 2004, pp:83-99 [Conf ] Jenq-Haur Wang , Chien-Chung Huang , Jei-Wen Teng , Lee-Feng Chien Generating Concept Hierarchies from Text for Intelligence Analysis. [Citation Graph (0, 0)][DBLP ] ISI, 2004, pp:100-113 [Conf ] Antonio Badia Interactive Query Languages for Intelligence Tasks. [Citation Graph (0, 0)][DBLP ] ISI, 2004, pp:114-124 [Conf ] Edna Reid , Jialun Qin , Wingyan Chung , Jennifer Jie Xu , Yilu Zhou , Robert P. Schumaker , Marc Sageman , Hsinchun Chen Terrorism Knowledge Discovery Project: A Knowledge Discovery Approach to Addressing the Threats of Terrorism. [Citation Graph (0, 0)][DBLP ] ISI, 2004, pp:125-145 [Conf ] Alan J. Demers , Johannes Gehrke , Mirek Riedewald The Architecture of the Cornell Knowledge Broker. [Citation Graph (0, 0)][DBLP ] ISI, 2004, pp:146-162 [Conf ] Jinwei Cao , Ming Lin , Amit V. Deokar , Judee K. Burgoon , Janna M. Crews , Mark Adkins Computer-Based Training for Deception Detection: What Users Want? [Citation Graph (0, 0)][DBLP ] ISI, 2004, pp:163-175 [Conf ] Hung-Ching Chen , Mark K. Goldberg , Malik Magdon-Ismail Identifying Multi-ID Users in Open Forums. [Citation Graph (0, 0)][DBLP ] ISI, 2004, pp:176-186 [Conf ] Kent Marett , David P. Biros , Monti L. Knode Self-efficacy, Training Effectiveness, and Deception Detection: A Longitudinal Study of Lie Detection Training. [Citation Graph (0, 0)][DBLP ] ISI, 2004, pp:187-200 [Conf ] Joon S. Park , Shuyuan Mary Ho Composite Role-Based Monitoring (CRBM) for Countering Insider Threats. [Citation Graph (0, 0)][DBLP ] ISI, 2004, pp:201-213 [Conf ] William J. Tolone , David Wilson , Anita Raja , Wei-Ning Xiang , Huili Hao , Stuart Phelps , E. Wray Johnson Critical Infrastructure Integration Modeling and Simulation. [Citation Graph (0, 0)][DBLP ] ISI, 2004, pp:214-225 [Conf ] Xiangyang Li , Nong Ye Mining Normal and Intrusive Activity Patterns for Computer Intrusion Detection. [Citation Graph (0, 0)][DBLP ] ISI, 2004, pp:226-238 [Conf ] Enock Chisonge Mofya , Jonathan Cole Smith The Optimal Deployment of Filters to Limit Forged Address Attacks in Communication Networks. [Citation Graph (0, 0)][DBLP ] ISI, 2004, pp:239-251 [Conf ] Seyit Ahmet Çamtepe , Mukkai S. Krishnamoorthy , Bülent Yener A Tool for Internet Chatroom Surveillance. [Citation Graph (0, 0)][DBLP ] ISI, 2004, pp:252-265 [Conf ] Jason Bengel , Susan Gauch , Eera Mittur , Rajan Vijayaraghavan ChatTrack: Chat Room Topic Detection Using Classification. [Citation Graph (0, 0)][DBLP ] ISI, 2004, pp:266-277 [Conf ] Naren Kodali , Csilla Farkas , Duminda Wijesekera SECRETS : A Secure Real-Time Multimedia Surveillance System. [Citation Graph (0, 0)][DBLP ] ISI, 2004, pp:278-296 [Conf ] Petros Drineas , Mukkai S. Krishnamoorthy , Michael D. Sofka , Bülent Yener Studying E-Mail Graphs for Intelligence Monitoring and Analysis in the Absence of Semantic Information. [Citation Graph (0, 0)][DBLP ] ISI, 2004, pp:297-306 [Conf ] Csilla Farkas , Thomas C. Wingfield , James Bret Michael , Duminda Wijesekera THEMIS: Threat Evaluation Metamodel for Information Systems. [Citation Graph (0, 0)][DBLP ] ISI, 2004, pp:307-321 [Conf ] Chris C. Demchak , Kurt D. Fenstermacher Balancing Security and Privacy in the 21 st Century. [Citation Graph (0, 0)][DBLP ] ISI, 2004, pp:322-330 [Conf ] Wei T. Yue , Metin Çakanyildirim , Young U. Ryu , Dengpan Liu IT Security Risk Management under Network Effects and Layered Protection Strategy. [Citation Graph (0, 0)][DBLP ] ISI, 2004, pp:331-348 [Conf ] Gene I. Rochlin Mind the Gap: The Growing Distance between Institutional and Technical Capabilities in Organizations Performing Critical Operations. [Citation Graph (0, 0)][DBLP ] ISI, 2004, pp:349-358 [Conf ] Jennifer Jie Xu , Byron Marshall , Siddharth Kaza , Hsinchun Chen Analyzing and Visualizing Criminal Network Dynamics: A Case Study. [Citation Graph (0, 0)][DBLP ] ISI, 2004, pp:359-377 [Conf ] Jeffrey Baumes , Mark K. Goldberg , Malik Magdon-Ismail , William A. Wallace Discovering Hidden Groups in Communication Networks. [Citation Graph (0, 0)][DBLP ] ISI, 2004, pp:378-389 [Conf ] Ju-Sung Lee Generating Networks of Illegal Drug Users Using Large Samples of Partial Ego-Network Data. [Citation Graph (0, 0)][DBLP ] ISI, 2004, pp:390-402 [Conf ] Douglas P. Twitchell , Jay F. Nunamaker , Judee K. Burgoon Using Speech Act Profiling for Deception Detection. [Citation Graph (0, 0)][DBLP ] ISI, 2004, pp:403-410 [Conf ] Joey F. George , David P. Biros , Mark Adkins , Judee K. Burgoon , Jay F. Nunamaker Testing Various Modes of Computer-Based Training for Deception Detection. [Citation Graph (0, 0)][DBLP ] ISI, 2004, pp:411-417 [Conf ] Richard Adderley The Use of Data Mining Techniques in Operational Crime Fighting. [Citation Graph (0, 0)][DBLP ] ISI, 2004, pp:418-425 [Conf ] Donald Brown , Jason Dalton , Heidi Hoyle Spatial Forecast Methods for Terrorist Events in Urban Environments. [Citation Graph (0, 0)][DBLP ] ISI, 2004, pp:426-435 [Conf ] Alexander Dolotov , Mary Strickler Web-Based Intelligence Notification System: Architecture and Design. [Citation Graph (0, 0)][DBLP ] ISI, 2004, pp:436-448 [Conf ] Christopher C. Yang , Kar Wing Li Cross-Lingual Semantics for Crime Analysis Using Associate Constraint Network. [Citation Graph (0, 0)][DBLP ] ISI, 2004, pp:449-456 [Conf ] Jorge Levera , Benjamín Barán , Robert L. Grossman Experimental Studies Using Median Polish Procedure to Reduce Alarm Rates in Data Cubes of Intrusion Data. [Citation Graph (0, 0)][DBLP ] ISI, 2004, pp:457-466 [Conf ] Homa Atabakhsh , Cathy Larson , Tim Petersen , Chuck Violette , Hsinchun Chen Information Sharing and Collaboration Policies within Government Agencies. [Citation Graph (0, 0)][DBLP ] ISI, 2004, pp:467-475 [Conf ] Myung-Kyu Yi , Chong-Sun Hwang Intrusion-Tolerant Intrusion Detection System. [Citation Graph (0, 0)][DBLP ] ISI, 2004, pp:476-483 [Conf ] Benjamin B. M. Shao Optimal Redundancy Allocation for Disaster Recovery Planning in the Network Economy. [Citation Graph (0, 0)][DBLP ] ISI, 2004, pp:484-491 [Conf ] Svetlana Symonenko , Elizabeth D. Liddy , Ozgur Yilmazel , Robert Del Zoppo , Eric Brown , Matt Downey Semantic Analysis for Monitoring Insider Threats. [Citation Graph (0, 0)][DBLP ] ISI, 2004, pp:492-500 [Conf ] Anand Natarajan , Liaquat Hossain Towards a Social Network Approach for Monitoring Insider Threats to Information Security. [Citation Graph (0, 0)][DBLP ] ISI, 2004, pp:501-507 [Conf ] Eric Hughes , Amy Kazura , Arnie Rosenthal Policy-Based Information Sharing with Semantics. [Citation Graph (0, 0)][DBLP ] ISI, 2004, pp:508-509 [Conf ] Robert H. Warren , Christopher Leurer Determining the Gender of the Unseen Name through Hyphenation. [Citation Graph (0, 0)][DBLP ] ISI, 2004, pp:510-511 [Conf ] Raj Sharman , Himabindu Challapalli , H. Raghav Rao , Shambhu J. Upadhyaya A Framework for a Secure Federated Patient Healthcare System. [Citation Graph (0, 0)][DBLP ] ISI, 2004, pp:512-513 [Conf ] Eung Ki Park , Jung-Taek Seo , Eul-Gyu Im , Cheolwon Lee Vulnerability Analysis and Evaluation within an Intranet. [Citation Graph (0, 0)][DBLP ] ISI, 2004, pp:514-515 [Conf ] Susan M. Merritt , Allen Stix , Judith E. Sullivan Security Informatics: A Paradigm Shift in Information Technology Education. [Citation Graph (0, 0)][DBLP ] ISI, 2004, pp:516-517 [Conf ] Yufeng Chen , Yabo Dong , Dongming Lu , Zhengtao Xiang Research of Characteristics of Worm Traffic. [Citation Graph (0, 0)][DBLP ] ISI, 2004, pp:518-519 [Conf ] James O. Ellis III MIPT: Sharing Terrorism Information Resources. [Citation Graph (0, 0)][DBLP ] ISI, 2004, pp:520-525 [Conf ] Rohan Kumar Gunaratna Post-9/11 Evolution of Al Qaeda. [Citation Graph (0, 0)][DBLP ] ISI, 2004, pp:526-530 [Conf ] Joshua Sinai Utilizing the Social and Behavioral Sciences to Assess, Model, Forecast and Preemptively Respond to Terrorism. [Citation Graph (0, 0)][DBLP ] ISI, 2004, pp:531-533 [Conf ]