Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/isi/isi2008.bht:"
@inproceedings{DBLP:conf/isi/Abraham08, author = {Ajith Abraham}, title = {Real time intrusion prediction, detection and prevention programs}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISI.2008.4565018}, doi = {10.1109/ISI.2008.4565018}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/isi/Abraham08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/AbrahamL08a, author = {Ajith Abraham and Hongbo Liu}, title = {Swarm intelligence based rough set reduction scheme for support vector machines}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings}, pages = {200--202}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISI.2008.4565056}, doi = {10.1109/ISI.2008.4565056}, timestamp = {Wed, 08 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/AbrahamL08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/Al-AhmadA08, author = {Walid Al{-}Ahmad and Reem Al{-}Kaabi}, title = {An extended security framework for e-government}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings}, pages = {294--295}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISI.2008.4565091}, doi = {10.1109/ISI.2008.4565091}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/Al-AhmadA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/Brachman08, author = {Jarret Brachman}, title = {Countering terrorism}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISI.2008.4565010}, doi = {10.1109/ISI.2008.4565010}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/Brachman08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/ChaJLC08, author = {Shi{-}Cho Cha and Pei{-}Wen Juo and Li{-}Ting Liu and Wei{-}Ning Chen}, title = {RiskPatrol: {A} risk management system considering the integration risk management with business continuity processes}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings}, pages = {110--115}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISI.2008.4565039}, doi = {10.1109/ISI.2008.4565039}, timestamp = {Thu, 13 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/ChaJLC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/ChangL08, author = {Yu{-}Jie Chang and Ja{-}Chen Lin}, title = {Data hiding using {VQ} index file}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings}, pages = {230--232}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISI.2008.4565064}, doi = {10.1109/ISI.2008.4565064}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/ChangL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/ChangLJ08, author = {Weiping Chang and Chichao Lu and WenYuan Jen}, title = {A study of integrated criminal justice data base system}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings}, pages = {290--291}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISI.2008.4565089}, doi = {10.1109/ISI.2008.4565089}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/ChangLJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/ChapanondK08, author = {A. Chapanond and M. S. Krishnamoorthy}, title = {Models and methods for prediction problem of evolving graphs}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings}, pages = {188--190}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISI.2008.4565052}, doi = {10.1109/ISI.2008.4565052}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/ChapanondK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/Charles08, author = {R. Charles}, title = {{KARIS:} {A} multiple-scheme framework for encryption based on an annotation model for enhanced information security}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings}, pages = {257--258}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISI.2008.4565073}, doi = {10.1109/ISI.2008.4565073}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/Charles08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/Chen08, author = {Hsinchun Chen}, title = {Homeland security data mining using social network analysis}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISI.2008.4565012}, doi = {10.1109/ISI.2008.4565012}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/Chen08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/Chen08a, author = {Hsinchun Chen}, title = {Discovery of improvised explosive device content in the Dark Web}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings}, pages = {88--93}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISI.2008.4565035}, doi = {10.1109/ISI.2008.4565035}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/Chen08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/Chen08b, author = {Hsinchun Chen}, title = {IEDs in the Dark Web: Genre classification of improvised explosive device web pages}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings}, pages = {94--97}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISI.2008.4565036}, doi = {10.1109/ISI.2008.4565036}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/Chen08b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/Chen08c, author = {Hsinchun Chen}, title = {Sentiment and affect analysis of Dark Web forums: Measuring radicalization on the internet}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings}, pages = {104--109}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISI.2008.4565038}, doi = {10.1109/ISI.2008.4565038}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/Chen08c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/ChenAC08, author = {Yi{-}Da Chen and Ahmed Abbasi and Hsinchun Chen}, title = {Developing ideological networks using social network analysis and writeprints: {A} case study of the international Falun Gong movement}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings}, pages = {7--12}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISI.2008.4565021}, doi = {10.1109/ISI.2008.4565021}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/ChenAC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/ChenCYW08, author = {Chung{-}Hao Chen and TeYu Chien and Wen{-}Chao Yang and Che{-}Yen Wen}, title = {Restoration of linear motion and out-of-focus blurred images in surveillance systems}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings}, pages = {239--241}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISI.2008.4565067}, doi = {10.1109/ISI.2008.4565067}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/ChenCYW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/ChenTF08, author = {Hsinchun Chen and S. Thoms and Tianjun Fu}, title = {Cyber extremism in Web 2.0: An exploratory study of international Jihadist groups}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings}, pages = {98--103}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISI.2008.4565037}, doi = {10.1109/ISI.2008.4565037}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/ChenTF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/ChenWW08, author = {Yi{-}Ming Chen and Dachrahn Wu and Cheng{-}Kuang Wu}, title = {A game theory approach for an emergency management security advisory system}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings}, pages = {116--121}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISI.2008.4565040}, doi = {10.1109/ISI.2008.4565040}, timestamp = {Fri, 11 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/ChenWW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/ChiuWK08, author = {Shih{-}Hsuan Chiu and Che{-}Yen Wen and Wei{-}Chieh Kao}, title = {An effective surveillance video retrieval method based upon motion detection}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings}, pages = {261--262}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISI.2008.4565075}, doi = {10.1109/ISI.2008.4565075}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/ChiuWK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/DangZSLC08, author = {Yan Dang and Yulei Zhang and Nichalin Suakkaphong and Cathy Larson and Hsinchun Chen}, title = {An integrated approach to mapping worldwide bioterrorism research capabilities}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings}, pages = {212--214}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISI.2008.4565059}, doi = {10.1109/ISI.2008.4565059}, timestamp = {Wed, 09 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/DangZSLC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/DuJVL08, author = {Lan Du and Huidong Jin and Olivier Y. de Vel and Nianjun Liu}, title = {A latent semantic indexing and WordNet based information retrieval model for digital forensics}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings}, pages = {70--75}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISI.2008.4565032}, doi = {10.1109/ISI.2008.4565032}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isi/DuJVL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/DutrisacS08, author = {J. G. Dutrisac and David B. Skillicorn}, title = {Subverting prediction in adversarial settings}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings}, pages = {19--24}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISI.2008.4565023}, doi = {10.1109/ISI.2008.4565023}, timestamp = {Fri, 19 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isi/DutrisacS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/DutrisacS08a, author = {J. G. Dutrisac and David B. Skillicorn}, title = {Hiding clusters in adversarial settings}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings}, pages = {185--187}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISI.2008.4565051}, doi = {10.1109/ISI.2008.4565051}, timestamp = {Fri, 19 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isi/DutrisacS08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/FanC08, author = {Yu{-}Ping Fan and Cheng{-}Wei Chen}, title = {The performance analysis of anti- terrorism intelligence from Taiwan's Investigation Bureau of the Ministry of Justice}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings}, pages = {259--260}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISI.2008.4565074}, doi = {10.1109/ISI.2008.4565074}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/FanC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/FangLL08, author = {Wen{-}Pinn Fang and Hong{-}Ru Lee and Fang{-}Pan Line}, title = {An novel two layer user identification method}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings}, pages = {292--293}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISI.2008.4565090}, doi = {10.1109/ISI.2008.4565090}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/FangLL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/FardM08, author = {Maryam Moghadam Fard and Mehdi Moghadam Fard and Nasser Mozayani}, title = {A new on-line signature verification by Spatio-Temporal neural network}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings}, pages = {233--235}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISI.2008.4565065}, doi = {10.1109/ISI.2008.4565065}, timestamp = {Tue, 27 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/FardM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/FarnLLY08, author = {Kwo{-}Jean Farn and Shu{-}Kuo Lin and Kuo{-}Sui Lin and Chung{-}Huang Yang}, title = {A study on critical infrastructure information technology Malfunction controls-- illustration of Taiwan}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings}, pages = {269--270}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISI.2008.4565079}, doi = {10.1109/ISI.2008.4565079}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/FarnLLY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/FuC08, author = {Tianjun Fu and Hsinchun Chen}, title = {Analysis of cyberactivism: {A} case study of online free Tibet activities}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings}, pages = {1--6}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISI.2008.4565020}, doi = {10.1109/ISI.2008.4565020}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/FuC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/FungWWD08, author = {Benjamin C. M. Fung and Ke Wang and Lingyu Wang and Mourad Debbabi}, title = {A framework for privacy-preserving cluster analysis}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings}, pages = {46--51}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISI.2008.4565028}, doi = {10.1109/ISI.2008.4565028}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/FungWWD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/GaoLLC08, author = {Zhong Gao and Guanming Lu and Mengjue Liu and Meng Cui}, title = {A novel risk assessment system for port state control inspection}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings}, pages = {242--244}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISI.2008.4565068}, doi = {10.1109/ISI.2008.4565068}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/GaoLLC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/Ghosh08, author = {Joydeep Ghosh}, title = {Probabilistic frameworks for privacy-aware data mining}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISI.2008.4565014}, doi = {10.1109/ISI.2008.4565014}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/Ghosh08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/GlasserV08, author = {Uwe Gl{\"{a}}sser and Mona Vajihollahi}, title = {Identity management architecture}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings}, pages = {137--144}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISI.2008.4565043}, doi = {10.1109/ISI.2008.4565043}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/GlasserV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/GoldbergMKM08, author = {Mark K. Goldberg and Malik Magdon{-}Ismail and Stephen Kelley and Konstantin Mertsalov}, title = {A locality model of the evolution of blog networks}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings}, pages = {191--193}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISI.2008.4565053}, doi = {10.1109/ISI.2008.4565053}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/GoldbergMKM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/JianT08, author = {Jian Zhang and Tianfang Yao}, title = {A study of the identification of authorship for Chinese texts}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings}, pages = {263--264}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISI.2008.4565076}, doi = {10.1109/ISI.2008.4565076}, timestamp = {Thu, 25 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/JianT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/KiyomotoT08, author = {Shinsaku Kiyomoto and Toshiaki Tanaka}, title = {Anonymous attribute authentication scheme using self-blindable certificates}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings}, pages = {215--217}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISI.2008.4565060}, doi = {10.1109/ISI.2008.4565060}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/KiyomotoT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/LayfieldKT08, author = {Ryan Layfield and Murat Kantarcioglu and Bhavani Thuraisingham}, title = {Simulating bioterrorism through epidemiology approximation}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings}, pages = {82--87}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISI.2008.4565034}, doi = {10.1109/ISI.2008.4565034}, timestamp = {Wed, 29 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/LayfieldKT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/LeBG08, author = {Duc{-}Phong Le and Alexis Bonnecaze and Alban Gabillon}, title = {Signtiming scheme based on aggregate signature}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings}, pages = {145--149}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISI.2008.4565044}, doi = {10.1109/ISI.2008.4565044}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isi/LeBG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/LeDLD08, author = {Minh{-}Tam Le and Hoang{-}Vu Dang and Ee{-}Peng Lim and Anwitaman Datta}, title = {WikiNetViz: Visualizing friends and adversaries in implicit social networks}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings}, pages = {52--57}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISI.2008.4565029}, doi = {10.1109/ISI.2008.4565029}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/LeDLD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/LeL08, author = {Ha{-}Thanh Le and Peter Kok Keong Loh}, title = {Evaluating {AVDL} descriptions for web application vulnerability analysis}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings}, pages = {279--281}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISI.2008.4565084}, doi = {10.1109/ISI.2008.4565084}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/LeL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/Lee08, author = {H. C. Lee}, title = {Cyber crime and challenges for crime investigation in the information era}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISI.2008.4565011}, doi = {10.1109/ISI.2008.4565011}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/Lee08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/LeeLY08, author = {Lung{-}Hao Lee and Cheng{-}Jye Luh and Chih{-}Jie Yang}, title = {A study on early decision making in objectionable web content classification}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings}, pages = {35--39}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISI.2008.4565026}, doi = {10.1109/ISI.2008.4565026}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/LeeLY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/LeeT08, author = {Ickjai Lee and Christopher Torpelund{-}Bruin}, title = {Multiplicatively-weighted order-k Minkowski-metric Voronoi models for disaster decision support systems}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings}, pages = {236--238}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISI.2008.4565066}, doi = {10.1109/ISI.2008.4565066}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/LeeT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/LiCHYW08, author = {Jan{-}Mou Li and Chung{-}Hao Chen and Shang{-}Hsing Hsieh and Wen{-}Chao Yang and Che{-}Yen Wen}, title = {Preparedness for post-disaster internet traffic management}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings}, pages = {282--283}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISI.2008.4565085}, doi = {10.1109/ISI.2008.4565085}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/LiCHYW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/LiWC08, author = {Jiexun Li and G. Alan Wang and Hsinchun Chen}, title = {PRM-based identity matching using social context}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings}, pages = {150--155}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISI.2008.4565045}, doi = {10.1109/ISI.2008.4565045}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isi/LiWC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/LienLMC08, author = {Yuanhung Lien and Xuefei Leng and Keith Mayes and Jung{-}Hui Chiu}, title = {Reading order independent grouping proof for {RFID} tags}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings}, pages = {128--136}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISI.2008.4565042}, doi = {10.1109/ISI.2008.4565042}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/LienLMC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/LinLF08, author = {Sen{-}Jen Lin and Ja{-}Chen Lin and Wen{-}Pinn Fang}, title = {Visual Cryptography {(VC)} with non-expanded shadow images: Hilbert-curve approach}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings}, pages = {271--272}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISI.2008.4565080}, doi = {10.1109/ISI.2008.4565080}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/LinLF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/LinW08, author = {Chien{-}Chuan Lin and Ming{-}Shi Wang}, title = {Depth evaluation intrusion detection using Coloured Stochastic Petri Nets}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings}, pages = {248--250}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISI.2008.4565070}, doi = {10.1109/ISI.2008.4565070}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/LinW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/LittleS08, author = {Ayron Little and David B. Skillicorn}, title = {Detecting deception in testimony}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings}, pages = {13--18}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISI.2008.4565022}, doi = {10.1109/ISI.2008.4565022}, timestamp = {Fri, 19 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isi/LittleS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/LiuMHM08, author = {Zhihong Liu and Jianfeng Ma and Qiping Huang and Sang{-}Jae Moon}, title = {Keying material based key pre-distribution scheme}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings}, pages = {218--221}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISI.2008.4565061}, doi = {10.1109/ISI.2008.4565061}, timestamp = {Fri, 28 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/LiuMHM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/LoC08, author = {N. W. Lo and Shiou{-}Hung Chen}, title = {A study of anti-robot agent mechanisms and process on online games}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings}, pages = {203--205}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISI.2008.4565057}, doi = {10.1109/ISI.2008.4565057}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/LoC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/LuZC08, author = {Hsin{-}Min Lu and Daniel Zeng and Hsinchun Chen}, title = {Bioterrorism event detection based on the Markov switching model: {A} simulated anthrax outbreak study}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings}, pages = {76--81}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISI.2008.4565033}, doi = {10.1109/ISI.2008.4565033}, timestamp = {Mon, 15 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/LuZC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/LuoC08, author = {Guo{-}Lun Luo and Henry Ker{-}Chang Chang}, title = {A new online auction with convertible authenticated encryption and authentication}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings}, pages = {288--289}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISI.2008.4565088}, doi = {10.1109/ISI.2008.4565088}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/LuoC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/MaTS08, author = {Wanli Ma and Dat Tran and Dharmendra Sharma}, title = {A study on the feature selection of network traffic for intrusion detection purpose}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings}, pages = {245--247}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISI.2008.4565069}, doi = {10.1109/ISI.2008.4565069}, timestamp = {Wed, 01 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isi/MaTS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/McMichaelFWJ08, author = {Daniel W. McMichael and Raymond Fu and Simon Williams and Geoff A. Jarrad}, title = {Sem@ntica: {A} system for semantic extraction and logical querying of text corpora}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings}, pages = {277--278}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISI.2008.4565083}, doi = {10.1109/ISI.2008.4565083}, timestamp = {Thu, 21 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isi/McMichaelFWJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/MielkeC08, author = {Clinton J. Mielke and Hsinchun Chen}, title = {Botnets, and the cybercriminal underground}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings}, pages = {206--211}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISI.2008.4565058}, doi = {10.1109/ISI.2008.4565058}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/MielkeC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/MoskovitchFE08, author = {Robert Moskovitch and Clint Feher and Yuval Elovici}, title = {Unknown malcode detection - {A} chronological evaluation}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings}, pages = {267--268}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISI.2008.4565078}, doi = {10.1109/ISI.2008.4565078}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/MoskovitchFE08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/MoskovitchSFNE08, author = {Robert Moskovitch and Dima Stopel and Clint Feher and Nir Nissim and Yuval Elovici}, title = {Unknown malcode detection via text categorization and the imbalance problem}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings}, pages = {156--161}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISI.2008.4565046}, doi = {10.1109/ISI.2008.4565046}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/MoskovitchSFNE08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/OngDCH08, author = {Chorng{-}Shyong Ong and Min{-}Yuh Day and Kuo{-}Tay Chen and Wen{-}Lian Hsu}, title = {User-centered evaluation of question answering systems}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings}, pages = {286--287}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISI.2008.4565087}, doi = {10.1109/ISI.2008.4565087}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/OngDCH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/PanjiyarMBSM08, author = {P. Panjiyar and P. Mourya and Nikhil Bansal and P. Srivastava and A. Mukherjee}, title = {Transport security using mobile technology}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings}, pages = {275--276}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISI.2008.4565082}, doi = {10.1109/ISI.2008.4565082}, timestamp = {Tue, 15 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isi/PanjiyarMBSM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/ParkLZB08, author = {Hyun{-}A Park and Dong Hoon Lee and Justin Zhan and Gary Blosser}, title = {Efficient keyword index search over encrypted documents of groups}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings}, pages = {225--229}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISI.2008.4565063}, doi = {10.1109/ISI.2008.4565063}, timestamp = {Mon, 31 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/ParkLZB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/PengW08, author = {Yiting Peng and Jau{-}Hwang Wang}, title = {Link analysis based on webpage co-occurrence mining - a case study on a notorious gang leader in Taiwan}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings}, pages = {31--34}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISI.2008.4565025}, doi = {10.1109/ISI.2008.4565025}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/PengW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/QiaoTJDC08, author = {Shaojie Qiao and Changjie Tang and Huidong Jin and Shucheng Dai and Xingshu Chen}, title = {Constrained k-closest pairs query processing based on growing window in crime databases}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings}, pages = {58--63}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISI.2008.4565030}, doi = {10.1109/ISI.2008.4565030}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isi/QiaoTJDC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/ShiehH08, author = {Wen{-}Gong Shieh and Wen{-}Bing Horng}, title = {Efficient and complete remote authentication scheme with smart cards}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings}, pages = {122--127}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISI.2008.4565041}, doi = {10.1109/ISI.2008.4565041}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/ShiehH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/ShiehWH08, author = {Wen{-}Gong Shieh and Jianmin Wang and Wen{-}Bing Horng}, title = {Secure remote control model for information appliances}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings}, pages = {222--224}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISI.2008.4565062}, doi = {10.1109/ISI.2008.4565062}, timestamp = {Fri, 20 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/ShiehWH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/Srivastava08, author = {J. Srivastava}, title = {Data mining for social network analysis}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISI.2008.4565015}, doi = {10.1109/ISI.2008.4565015}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/Srivastava08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/SuBDDXZL08, author = {Stanley Y. W. Su and Howard W. Beck and Seema Degwekar and Jeff DePree and Xuelian Xiao and Chen Zhou and Minsoo Lee}, title = {Distributed processing of event data and multi-faceted knowledge in a collaboration federation}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings}, pages = {64--69}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISI.2008.4565031}, doi = {10.1109/ISI.2008.4565031}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/SuBDDXZL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/SuCWL08a, author = {Ming{-}Yang Su and Kai{-}Chi Chang and Hua{-}Fu Wei and Chun{-}Yuen Lin}, title = {A real-time network intrusion detection system based on incremental mining approach}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings}, pages = {179--184}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISI.2008.4565050}, doi = {10.1109/ISI.2008.4565050}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/SuCWL08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/SungDYH08, author = {Cheng{-}Lung Sung and Min{-}Yuh Day and Hsu{-}Chun Yen and Wen{-}Lian Hsu}, title = {A template alignment algorithm for question classification}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings}, pages = {197--199}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISI.2008.4565055}, doi = {10.1109/ISI.2008.4565055}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/SungDYH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/ThomasB08, author = {Ciza Thomas and N. Balakrishnan}, title = {Advanced sensor fusion technique for enhanced Intrusion Detection}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings}, pages = {173--178}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISI.2008.4565049}, doi = {10.1109/ISI.2008.4565049}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/ThomasB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/Thuraisingham08, author = {Bhavani Thuraisingham}, title = {Data mining for security applications: Mining concept-drifting data streams to detect peer to peer botnet traffic}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISI.2008.4565013}, doi = {10.1109/ISI.2008.4565013}, timestamp = {Wed, 29 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/Thuraisingham08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/TranMS08, author = {Dat Tran and Wanli Ma and Dharmendra Sharma}, title = {Automated network feature weighting-based anomaly detection}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings}, pages = {162--166}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISI.2008.4565047}, doi = {10.1109/ISI.2008.4565047}, timestamp = {Wed, 01 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isi/TranMS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/Wang08, author = {Fei{-}Yue Wang}, title = {Social Computing: Fundamentals and applications}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISI.2008.4565016}, doi = {10.1109/ISI.2008.4565016}, timestamp = {Fri, 18 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/Wang08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/Wang08a, author = {Patrick S. P. Wang}, title = {Intelligent pattern recognition and biometrics}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISI.2008.4565017}, doi = {10.1109/ISI.2008.4565017}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/Wang08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/WangC08, author = {Wenjia Wang and Phuong Thanh Cao{-}Thai}, title = {Novel position-coded methods for mining web access patterns}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings}, pages = {194--196}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISI.2008.4565054}, doi = {10.1109/ISI.2008.4565054}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/WangC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/WangZ08, author = {Guomeng Wang and Yanping Zhao}, title = {A fast algorithm for data erasure}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings}, pages = {254--256}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISI.2008.4565072}, doi = {10.1109/ISI.2008.4565072}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/WangZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/WuLC08, author = {Chia{-}Long Wu and Der{-}Chyuan Lou and Te{-}Jen Chang}, title = {An efficient Montgomery exponentiation algorithm for public-key cryptosystems}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings}, pages = {284--285}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISI.2008.4565086}, doi = {10.1109/ISI.2008.4565086}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isi/WuLC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/WuSSL08, author = {Jun Wu and Dong{-}Hun Seo and Chi{-}Hwa Song and Won Don Lee}, title = {A new classifier for numerical incomplete data}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings}, pages = {273--274}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISI.2008.4565081}, doi = {10.1109/ISI.2008.4565081}, timestamp = {Sun, 11 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isi/WuSSL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/Yang08, author = {Christopher C. Yang}, title = {Information sharing and privacy protection of terrorist or criminal social networks}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings}, pages = {40--45}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISI.2008.4565027}, doi = {10.1109/ISI.2008.4565027}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/Yang08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/YangBHAF08, author = {Shanchieh Jay Yang and Stephen R. Byers and Jared Holsopple and Brian Argauer and Daniel S. Fava}, title = {Intrusion activity projection for cyber situational awareness}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings}, pages = {167--172}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISI.2008.4565048}, doi = {10.1109/ISI.2008.4565048}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/YangBHAF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/YangN08, author = {Christopher C. Yang and Tobun Dorbin Ng}, title = {Analyzing content development and visualizing social interactions in Web forum}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings}, pages = {25--30}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISI.2008.4565024}, doi = {10.1109/ISI.2008.4565024}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/YangN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/YehY08, author = {Chao{-}Hsi Yeh and Chung{-}Huang Yang}, title = {Design and implementation of honeypot systems based on open-source software}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings}, pages = {265--266}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISI.2008.4565077}, doi = {10.1109/ISI.2008.4565077}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/YehY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/ZhangGW08, author = {Ji Zhang and Qigang Gao and Hai H. Wang}, title = {Anomaly detection in high-dimensional network data streams: {A} case study}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings}, pages = {251--253}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISI.2008.4565071}, doi = {10.1109/ISI.2008.4565071}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/ZhangGW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/isi/2008, title = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings}, publisher = {{IEEE}}, year = {2008}, url = {https://ieeexplore.ieee.org/xpl/conhome/4557995/proceeding}, isbn = {978-1-4244-2414-6}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.