The SCEAS System
Navigation Menu

Conferences in DBLP

Intelligence and Security Informatics (isi)
2004 (conf/isi/2004)

  1. Li-Chiou Chen, Boris Kaminsky, Tiffany Tummino, Kathleen M. Carley, Elizabeth Casman, Douglas B. Fridsma, Alex Yahja
    Aligning Simulation Models of Smallpox Outbreaks. [Citation Graph (0, 0)][DBLP]
    ISI, 2004, pp:1-16 [Conf]
  2. Donald J. Berndt, Sunil Bhat, John W. Fisher, Alan R. Hevner, James Studnicki
    Data Analytics for Bioterrorism Surveillance. [Citation Graph (0, 0)][DBLP]
    ISI, 2004, pp:17-27 [Conf]
  3. Daniel Dajun Zeng, Hsinchun Chen, Chunju Tseng, Catherine A. Larson, Millicent Eidson, Ivan Gotham, Cecil Lynch, Michael Ascher
    West Nile Virus and Botulism Portal: A Case Study in Infectious Disease Informatics. [Citation Graph (0, 0)][DBLP]
    ISI, 2004, pp:28-41 [Conf]
  4. Zhengyou Xia, Yichuan Jiang, YiPing Zhong, Shiyong Zhang
    A Novel Policy and Information Flow Security Model for Active Network. [Citation Graph (0, 0)][DBLP]
    ISI, 2004, pp:42-55 [Conf]
  5. Yichuan Jiang, Zhengyou Xia, YiPing Zhong, Shiyong Zhang
    A Novel Autonomous Trust Management Model for Mobile Agents. [Citation Graph (0, 0)][DBLP]
    ISI, 2004, pp:56-65 [Conf]
  6. Gang Liang, Sudarshan S. Chawathe
    Privacy-Preserving Inter-database Operations. [Citation Graph (0, 0)][DBLP]
    ISI, 2004, pp:66-82 [Conf]
  7. David B. Skillicorn
    Finding Unusual Correlation Using Matrix Decompositions. [Citation Graph (0, 0)][DBLP]
    ISI, 2004, pp:83-99 [Conf]
  8. Jenq-Haur Wang, Chien-Chung Huang, Jei-Wen Teng, Lee-Feng Chien
    Generating Concept Hierarchies from Text for Intelligence Analysis. [Citation Graph (0, 0)][DBLP]
    ISI, 2004, pp:100-113 [Conf]
  9. Antonio Badia
    Interactive Query Languages for Intelligence Tasks. [Citation Graph (0, 0)][DBLP]
    ISI, 2004, pp:114-124 [Conf]
  10. Edna Reid, Jialun Qin, Wingyan Chung, Jennifer Jie Xu, Yilu Zhou, Robert P. Schumaker, Marc Sageman, Hsinchun Chen
    Terrorism Knowledge Discovery Project: A Knowledge Discovery Approach to Addressing the Threats of Terrorism. [Citation Graph (0, 0)][DBLP]
    ISI, 2004, pp:125-145 [Conf]
  11. Alan J. Demers, Johannes Gehrke, Mirek Riedewald
    The Architecture of the Cornell Knowledge Broker. [Citation Graph (0, 0)][DBLP]
    ISI, 2004, pp:146-162 [Conf]
  12. Jinwei Cao, Ming Lin, Amit V. Deokar, Judee K. Burgoon, Janna M. Crews, Mark Adkins
    Computer-Based Training for Deception Detection: What Users Want? [Citation Graph (0, 0)][DBLP]
    ISI, 2004, pp:163-175 [Conf]
  13. Hung-Ching Chen, Mark K. Goldberg, Malik Magdon-Ismail
    Identifying Multi-ID Users in Open Forums. [Citation Graph (0, 0)][DBLP]
    ISI, 2004, pp:176-186 [Conf]
  14. Kent Marett, David P. Biros, Monti L. Knode
    Self-efficacy, Training Effectiveness, and Deception Detection: A Longitudinal Study of Lie Detection Training. [Citation Graph (0, 0)][DBLP]
    ISI, 2004, pp:187-200 [Conf]
  15. Joon S. Park, Shuyuan Mary Ho
    Composite Role-Based Monitoring (CRBM) for Countering Insider Threats. [Citation Graph (0, 0)][DBLP]
    ISI, 2004, pp:201-213 [Conf]
  16. William J. Tolone, David Wilson, Anita Raja, Wei-Ning Xiang, Huili Hao, Stuart Phelps, E. Wray Johnson
    Critical Infrastructure Integration Modeling and Simulation. [Citation Graph (0, 0)][DBLP]
    ISI, 2004, pp:214-225 [Conf]
  17. Xiangyang Li, Nong Ye
    Mining Normal and Intrusive Activity Patterns for Computer Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    ISI, 2004, pp:226-238 [Conf]
  18. Enock Chisonge Mofya, Jonathan Cole Smith
    The Optimal Deployment of Filters to Limit Forged Address Attacks in Communication Networks. [Citation Graph (0, 0)][DBLP]
    ISI, 2004, pp:239-251 [Conf]
  19. Seyit Ahmet Çamtepe, Mukkai S. Krishnamoorthy, Bülent Yener
    A Tool for Internet Chatroom Surveillance. [Citation Graph (0, 0)][DBLP]
    ISI, 2004, pp:252-265 [Conf]
  20. Jason Bengel, Susan Gauch, Eera Mittur, Rajan Vijayaraghavan
    ChatTrack: Chat Room Topic Detection Using Classification. [Citation Graph (0, 0)][DBLP]
    ISI, 2004, pp:266-277 [Conf]
  21. Naren Kodali, Csilla Farkas, Duminda Wijesekera
    SECRETS: A Secure Real-Time Multimedia Surveillance System. [Citation Graph (0, 0)][DBLP]
    ISI, 2004, pp:278-296 [Conf]
  22. Petros Drineas, Mukkai S. Krishnamoorthy, Michael D. Sofka, Bülent Yener
    Studying E-Mail Graphs for Intelligence Monitoring and Analysis in the Absence of Semantic Information. [Citation Graph (0, 0)][DBLP]
    ISI, 2004, pp:297-306 [Conf]
  23. Csilla Farkas, Thomas C. Wingfield, James Bret Michael, Duminda Wijesekera
    THEMIS: Threat Evaluation Metamodel for Information Systems. [Citation Graph (0, 0)][DBLP]
    ISI, 2004, pp:307-321 [Conf]
  24. Chris C. Demchak, Kurt D. Fenstermacher
    Balancing Security and Privacy in the 21 st Century. [Citation Graph (0, 0)][DBLP]
    ISI, 2004, pp:322-330 [Conf]
  25. Wei T. Yue, Metin Çakanyildirim, Young U. Ryu, Dengpan Liu
    IT Security Risk Management under Network Effects and Layered Protection Strategy. [Citation Graph (0, 0)][DBLP]
    ISI, 2004, pp:331-348 [Conf]
  26. Gene I. Rochlin
    Mind the Gap: The Growing Distance between Institutional and Technical Capabilities in Organizations Performing Critical Operations. [Citation Graph (0, 0)][DBLP]
    ISI, 2004, pp:349-358 [Conf]
  27. Jennifer Jie Xu, Byron Marshall, Siddharth Kaza, Hsinchun Chen
    Analyzing and Visualizing Criminal Network Dynamics: A Case Study. [Citation Graph (0, 0)][DBLP]
    ISI, 2004, pp:359-377 [Conf]
  28. Jeffrey Baumes, Mark K. Goldberg, Malik Magdon-Ismail, William A. Wallace
    Discovering Hidden Groups in Communication Networks. [Citation Graph (0, 0)][DBLP]
    ISI, 2004, pp:378-389 [Conf]
  29. Ju-Sung Lee
    Generating Networks of Illegal Drug Users Using Large Samples of Partial Ego-Network Data. [Citation Graph (0, 0)][DBLP]
    ISI, 2004, pp:390-402 [Conf]
  30. Douglas P. Twitchell, Jay F. Nunamaker, Judee K. Burgoon
    Using Speech Act Profiling for Deception Detection. [Citation Graph (0, 0)][DBLP]
    ISI, 2004, pp:403-410 [Conf]
  31. Joey F. George, David P. Biros, Mark Adkins, Judee K. Burgoon, Jay F. Nunamaker
    Testing Various Modes of Computer-Based Training for Deception Detection. [Citation Graph (0, 0)][DBLP]
    ISI, 2004, pp:411-417 [Conf]
  32. Richard Adderley
    The Use of Data Mining Techniques in Operational Crime Fighting. [Citation Graph (0, 0)][DBLP]
    ISI, 2004, pp:418-425 [Conf]
  33. Donald Brown, Jason Dalton, Heidi Hoyle
    Spatial Forecast Methods for Terrorist Events in Urban Environments. [Citation Graph (0, 0)][DBLP]
    ISI, 2004, pp:426-435 [Conf]
  34. Alexander Dolotov, Mary Strickler
    Web-Based Intelligence Notification System: Architecture and Design. [Citation Graph (0, 0)][DBLP]
    ISI, 2004, pp:436-448 [Conf]
  35. Christopher C. Yang, Kar Wing Li
    Cross-Lingual Semantics for Crime Analysis Using Associate Constraint Network. [Citation Graph (0, 0)][DBLP]
    ISI, 2004, pp:449-456 [Conf]
  36. Jorge Levera, Benjamín Barán, Robert L. Grossman
    Experimental Studies Using Median Polish Procedure to Reduce Alarm Rates in Data Cubes of Intrusion Data. [Citation Graph (0, 0)][DBLP]
    ISI, 2004, pp:457-466 [Conf]
  37. Homa Atabakhsh, Cathy Larson, Tim Petersen, Chuck Violette, Hsinchun Chen
    Information Sharing and Collaboration Policies within Government Agencies. [Citation Graph (0, 0)][DBLP]
    ISI, 2004, pp:467-475 [Conf]
  38. Myung-Kyu Yi, Chong-Sun Hwang
    Intrusion-Tolerant Intrusion Detection System. [Citation Graph (0, 0)][DBLP]
    ISI, 2004, pp:476-483 [Conf]
  39. Benjamin B. M. Shao
    Optimal Redundancy Allocation for Disaster Recovery Planning in the Network Economy. [Citation Graph (0, 0)][DBLP]
    ISI, 2004, pp:484-491 [Conf]
  40. Svetlana Symonenko, Elizabeth D. Liddy, Ozgur Yilmazel, Robert Del Zoppo, Eric Brown, Matt Downey
    Semantic Analysis for Monitoring Insider Threats. [Citation Graph (0, 0)][DBLP]
    ISI, 2004, pp:492-500 [Conf]
  41. Anand Natarajan, Liaquat Hossain
    Towards a Social Network Approach for Monitoring Insider Threats to Information Security. [Citation Graph (0, 0)][DBLP]
    ISI, 2004, pp:501-507 [Conf]
  42. Eric Hughes, Amy Kazura, Arnie Rosenthal
    Policy-Based Information Sharing with Semantics. [Citation Graph (0, 0)][DBLP]
    ISI, 2004, pp:508-509 [Conf]
  43. Robert H. Warren, Christopher Leurer
    Determining the Gender of the Unseen Name through Hyphenation. [Citation Graph (0, 0)][DBLP]
    ISI, 2004, pp:510-511 [Conf]
  44. Raj Sharman, Himabindu Challapalli, H. Raghav Rao, Shambhu J. Upadhyaya
    A Framework for a Secure Federated Patient Healthcare System. [Citation Graph (0, 0)][DBLP]
    ISI, 2004, pp:512-513 [Conf]
  45. Eung Ki Park, Jung-Taek Seo, Eul-Gyu Im, Cheolwon Lee
    Vulnerability Analysis and Evaluation within an Intranet. [Citation Graph (0, 0)][DBLP]
    ISI, 2004, pp:514-515 [Conf]
  46. Susan M. Merritt, Allen Stix, Judith E. Sullivan
    Security Informatics: A Paradigm Shift in Information Technology Education. [Citation Graph (0, 0)][DBLP]
    ISI, 2004, pp:516-517 [Conf]
  47. Yufeng Chen, Yabo Dong, Dongming Lu, Zhengtao Xiang
    Research of Characteristics of Worm Traffic. [Citation Graph (0, 0)][DBLP]
    ISI, 2004, pp:518-519 [Conf]
  48. James O. Ellis III
    MIPT: Sharing Terrorism Information Resources. [Citation Graph (0, 0)][DBLP]
    ISI, 2004, pp:520-525 [Conf]
  49. Rohan Kumar Gunaratna
    Post-9/11 Evolution of Al Qaeda. [Citation Graph (0, 0)][DBLP]
    ISI, 2004, pp:526-530 [Conf]
  50. Joshua Sinai
    Utilizing the Social and Behavioral Sciences to Assess, Model, Forecast and Preemptively Respond to Terrorism. [Citation Graph (0, 0)][DBLP]
    ISI, 2004, pp:531-533 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002