


Остановите войну!
for scientists:


default search action
9th ISI 2011: Beijing, China
- 2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011, Beijing, China, 10-12 July, 2011. IEEE 2011, ISBN 978-1-4577-0082-8
Terrorism Informatics
- Shuo Zeng, Mingfeng Lin, Hsinchun Chen:
Dynamic user-level affect analysis in social media: Modeling violence in the Dark Web. 1-6 - Hsinchun Chen, Dorothy E. Denning, Nancy Roberts, Catherine A. Larson, Ximing Yu, Chunneng Huang:
The Dark Web Forum Portal: From multi-lingual to video. 7-14 - Jiyoung Woo, Jaebong Son, Hsinchun Chen:
An SIR model for violent topic diffusion in social media. 15-19 - Irina Sakharova:
Al Qaeda terrorist financing and technologies to track the finance network. 20-25 - Duo-Yong Sun, Shu-Quan Guo, Ben-xian Li, Xiao-Peng Liu:
Study on covert networks of terrorists based on interactive relationship hypothesis. 26-30
Infrastructure Protection and Emergency Responses
- Heping Li, Jie Liu, Shuwu Zhang:
Automatic behavior model selection by iterative learning and abnormality recognition. 31-36 - Polina Zilberman, Shlomi Dolev
, Gilad Katz
, Yuval Elovici, Asaf Shabtai:
Analyzing group communication for preventing data leakage via email. 37-41 - Xiaofeng Wang, Donald E. Brown:
The spatio-temporal generalized additive model for criminal incidents. 42-47 - Hamed Yaghoubi Shahir, Uwe Glässer, Piper J. Jackson
, Hans Wehn:
Test-case generation for marine safety and security scenarios. 48-53 - Piper J. Jackson
, Uwe Glässer, Hamed Yaghoubi Shahir, Hans Wehn:
An extensible decision engine for Marine Safety and Security. 54-59 - Hsinchun Chen, Catherine A. Larson, Theodore Elhourani, David Zimbra, David Ware:
The Geopolitical Web: Assessing societal risk in an uncertain world. 60-64
Network-based Data Analytics
- Kristin Glass, Richard Colbaugh:
Estimating the sentiment of social media content for security informatics applications. 65-70 - Il-Chul Moon, Alice H. Oh, Kathleen M. Carley:
Analyzing social media in escalating crisis situations. 71-76 - Raymond Heatherly, Murat Kantarcioglu:
Extending the classification of nodes in social networks. 77-82
Text Mining and Content Analysis
- Jianping Zeng, Jiangjiao Duan, Chengrong Wu:
Topic discovery based on dual EM merging. 83-88 - Tam T. Nguyen, Kuiyu Chang, Siu Cheung Hui:
Supervised term weighting for sentiment analysis. 89-94 - Pir Abdul Rasool Qureshi, Nasrullah Memon, Uffe Kock Wiil:
LanguageNet: A novel framework for processing unstructured text information. 95-100 - James R. (Bob) Johnson, Anita Miller, Latifur Khan
, Bhavani Thuraisingham, Murat Kantarcioglu:
Identification of related information of interest across free text documents. 101-106 - James R. (Bob) Johnson, Anita Miller, Latifur Khan
, Bhavani Thuraisingham, Murat Kantarcioglu:
Extraction of expanded entity phrases. 107-112 - Patricia L. Brantingham, Paul J. Brantingham, Amir H. Ghaseminejad:
The distribution of event complexity in the British Columbia court system. 113-118
Enterprise Risk Management and Information Systems Security
- You Chen, Steve Nyemba, Wen Zhang, Bradley A. Malin:
Leveraging social networks to detect anomalous insider actions in collaborative environments. 119-124 - Richard Colbaugh, Kristin Glass:
Proactive defense for evolving cyber threats. 125-130 - Maya Bercovitch, Meir Renford, Lior Hasson, Asaf Shabtai, Lior Rokach, Yuval Elovici:
HoneyGen: An automated honeytokens generator. 131-136 - Edith Felix, Olivier Delande, Fabio Massacci
, Federica Paci
:
Managing changes with legacy security engineering processes. 137-142 - Justin Zhan, B. John Oommen
, Johanna Crisostomo:
Anomaly detection using weak estimators. 143-149 - Jian Guan, James H. Graham, Jeffrey L. Hieb:
A digraph model for risk identification and mangement in SCADA systems. 150-155
Innovative and Emerging Applications
- Zhanyong Tang, Dingyi Fang
:
A tamper-proof software watermark using code encryption. 156-160 - Hesiri Weerasinghe, Huirong Fu, Supeng Leng, Ye Zhu:
Enhancing unlinkability in Vehicular Ad Hoc Networks. 161-166 - Christopher C. Yang, Xuning Tang, Xiajing Gong:
Identifying Dark Web clusters with temporal coherence analysis. 167-172
Information Sharing and Data/Text Mining
- Jiexun Li, G. Alan Wang:
Criminal identity resolution using social behavior and relationship attributes. 173-175 - Fatih Özgül
, Claus Atzenbeck, Ahmet Çelik, Zeki Erdem:
Incorporating data sources and methodologies for crime data mining. 176-180 - Peng Su, Wenji Mao, Daniel Zeng, Huimin Zhao:
Mining actionable behavioral rules from group data. 181-183 - Xiaochen Li, Wenji Mao, Daniel Zeng, Huachi Zhu:
Forecasting group behavior via multiple plan recognition. 184-186 - Zhenmin Lin, Jerzy W. Jaromczyk:
Privacy preserving two-party k-means clustering over vertically partitioned dataset. 187-191 - Richard Colbaugh, Kristin Glass:
Detecting emerging topics and trends via predictive analysis of 'meme' dynamics. 192-194 - Tarique Anwar
, Muhammad Abulaish
, Khaled Alghathbar:
Web content mining for alias identification: A first step towards suspect tracking. 195-197 - Christopher C. Yang:
Preserving privacy in social network integration with τ-tolerance. 198-200
Enterprise Risk Management and Information Systems Security
- Amir Harel, Asaf Shabtai, Lior Rokach, Yuval Elovici:
Dynamic Sensitivity-Based Access Control. 201-203 - Sk. Md. Mizanur Rahman
, Md. Mehedi Masud
, Carlisle Adams, Hussein T. Mouftah, Atsuo Inomata:
Session-wise private data exchange in eHealth peer-to-peer database management systems. 204-206 - Xiarong Li, Yong Liu, Daniel Zeng:
Publisher click fraud in the pay-per-click advertising market: Incentives and consequences. 207-209
Infrastructure Protection and Emergency Responses
- Jing Gong, William A. Wallace, John E. Mitchell:
Decision modeling for resilient infrastructures. 210-212 - He Gao, Yuanzhuo Wang, Li Wang, Li Liu, Jinming Li, Xueqi Cheng:
Trojan characteristics analysis based on Stochastic Petri Nets. 213-215
Innovative and Emerging Applications
- Muniba Shaikh, Nasrullah Memon, Uffe Kock Wiil:
Extended approximate string matching algorithms to detect name aliases. 216-219
Posters
- Xiaoting Li, Jingfu Yang, Zishan Wang:
The construction of accounting information system under the environment of the network. 220 - Ben-xian Li, Meng-jun Li:
Game analysis in international anti-terrorism strike. 221 - Yin-zhi Lei, Xiao-yin Zhou, Xi-peng Wei:
Research on government on-line information management and service. 222-225 - Jiwei Song:
The analysis of military intelligence early warning based on open source intelligence. 226 - Yanzhen Qu, Weiwen Yang:
Improving the security of the distributed enterprise data warehouse system. 227 - Arnaud Casteigts, Marie-Hélène Chomienne, Louise Bouchard, Guy-Vincent Jourdan:
Enabling dynamic linkage of linguistic census data at Statistics Canada (extended abstract). 228 - Timmy Nguyen, Leonidas Deligiannidis:
Utilizing infrared technology to prevent terrorist attacks. 229 - Alana Platt, Cynthia Hood, Levi Citrin:
Organization of social network messages to improve understanding of an evolving crisis. 230 - Pir Abdul Rasool Qureshi, Nasrullah Memon, Uffe Kock Wiil, Panagiotis Karampelas
, Jose Ignacio Nieto Sancheze:
heteroHarvest: Harvesting information from heterogeneous sources. 231 - Peter Mooney
, Huabo Sun, Padraig Corcoran, Lei Yan:
Citizen-generated spatial data and information: Risks and opportunities. 232
International Symposium on System Informatics and Engineering
- Wenbin Wang, Yifang Liu, Michael G. Pecht
:
A theoretical model to minimize the operational cost for canary-equipped electronic system's health management. 233-238 - Liu Lan-Lan, Zhou Meng:
The polynomial representation of Gray map on Zp2. 239-241 - Yinjiao Xing, Qiang Miao, Kwok-Leung Tsui
, Michael G. Pecht
:
Prognostics and health monitoring for lithium-ion battery. 242-247 - Yun Wan
, William Perry:
Lessons from method: A successful Electronic Medical Record (EMR) system implementation. 248-251 - Jian Liu, Jing Li, Byoung Uk Kim:
Bayesian reliability modeling of multi-level system with interdependent subsystems and components. 252-257 - Abhishek K. Shrivastava
, Junjie Cao:
A decomposition approach to imbalanced classification. 258-260 - Gulanbaier Tuerhong, Seoung Bum Kim:
A nonparametric fault isolation approach through hybrid novelty score. 261-266 - Yan Fu Wang, Min Xie
, Kien Ming Ng
, Yi Fei Meng:
Quantitative risk analysis model of integrating fuzzy fault tree with Bayesian Network. 267-271 - Ji Hoon Kang, Seoung Bum Kim:
Clustering algorithm-based control charts. 272-277 - Kyu Jong Lee, Seoung Bum Kim, Sun-Kyoung Park:
Daily, seasonal, and spatial patterns of PM10 in Seoul, Korea. 278-283 - Defeng Shen, Shunong Zhang:
Design of logic processes for prognostics and health management in an avionics system. 284-288 - Bingsen Zhang, Yongchang Zhang, Houjun Yang, Xiaojie Liu, Anling Zhang, Zhongwen Zhang:
Research on numerical analysis for color matching in textile dyeing based on least square Fitting. 289-292 - Bingsen Zhang, Yaping Shi, Houjun Yang, Xiaojie Liu, Anling Zhang:
Research on application of the minimum error average fitting method in computer color matching. 293-296 - Michael H. Wang:
A cost-based FMEA decision tool for product quality design and management. 297-302 - Lilyam Paolino, Horacio Paggi, Fernando Alonso, Genoveva López Gómez:
Solving incidents in telecommunications using a multi-agent system. 303-308 - Jinyu Yuan, Zhixing He:
Empirical analysis on causal relationship between institution and economic development based on VAR method. 309-312 - Haidong Xiao, Ning Chen, Yan Hu:
Situational awareness on disruption management: A system information propagation approach. 313-315 - Haidong Xiao, Ning Chen:
Analysis of cyberspace security situational awareness based on fuzz reason. 316-319 - Sai-Yin Zhang, Zhong-Zhan Zhang:
Analysis of accelerated degradation test under constant stress with errors for longitudinal data. 320-324 - Shuguang He, Chenghang Xiao:
Multivariate process monitoring and fault identification model using decision tree learning techniques. 325-330 - Yueliang Chen, Guixue Bian, Lin Yi, Jianjun Hu:
Study on distributions of fatigue crack-nucleating particle sizes and cracks formation in aluminum alloy. 331-334 - Maosheng Yang, Yuquan Bi, Yueliang Chen, Li Xu:
Studying on influencing factors of Fretting fatigue life of aluminum alloy. 335-338 - Xue-Jing Li, Dan Yu:
A reliability integrated acceptance test plan for series systems whose components following exponential distributions. 339-344 - Fangyi He:
An optimal control algorithm based on Kalman filter for ARMA disturbances. 345-348 - Yizhen Hai, Vincent C. Cheng, Shui Yee Wong
, Kwok-Leung Tsui
, Kwok-Yung Yuen
:
Logistic regression analysis for Predicting Methicillin-resistant Staphylococcus Aureus (MRSA) in-hospital mortality. 349-353 - Tai Feng Zhang, Wei Yi Zhao, Xiao-Hua Yang, Zeng Jie Cai:
Compiling the marine environment spectrum based on inversion satellite remote sensing data. 354-357 - Danfeng Zhang, Xiaoming Tan, Yueliang Chen:
Distribution rule of corrosion damage morphology parameters for aluminum alloy. 358-361 - Jinsong Hu, Ling Cui, Zengqiang Li, Xiaogen Hu, Haixiang Wu:
An new approach for newsboy problem with fuzzy demand. 362-366
International Workshop on Social Computing
- Ran Zhao, Guochun Fu, Jianhui Cheng:
On the analysis of the applications and social influence of mobile phone reading in the medium and small cities in China: Take the first pilot city Baoding for an example. 367-372 - Duo-Yong Sun, Shu-Quan Guo, Hai Zhang, Ben-xian Li:
Study on covert networks of terroristic organizations based on text analysis. 373-378 - Beiming Sun, Vincent T. Y. Ng
:
Lifespan and popularity measurement of online content on social networks. 379-383 - Xing Fang, Justin Zhan, Nicholas Koceja, Kenneth Williams, Justin Brewton:
Integrating online social networks for enhancing reputation systems of e-commerce. 384-389 - Zhihong Jiang, Hui Wang, Yubao Zhang, Pei Li:
A geographic analysis of P2P-TV viewership. 390-395 - Pengyi Fan, Pei Li, Zhihong Jiang, Wei Li, Hui Wang:
Measurement and analysis of topology and information propagation on Sina-Microblog. 396-401 - Chao Gao, Xin Zhang, Liang Zheng, Hui Wang:
On image similarity in the context of multimedia social computing. 402-406 - Yongqing Wang, Wenji Mao, Daniel Zeng, Ning Bao:
Boosting rank with predictable training error. 407-409

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.