Search dblp for Publications

export results for "toc:db/conf/isi/isi2008.bht:"

 download as .bib file

@inproceedings{DBLP:conf/isi/Abraham08,
  author       = {Ajith Abraham},
  title        = {Real time intrusion prediction, detection and prevention programs},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISI.2008.4565018},
  doi          = {10.1109/ISI.2008.4565018},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/Abraham08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/AbrahamL08a,
  author       = {Ajith Abraham and
                  Hongbo Liu},
  title        = {Swarm intelligence based rough set reduction scheme for support vector
                  machines},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings},
  pages        = {200--202},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISI.2008.4565056},
  doi          = {10.1109/ISI.2008.4565056},
  timestamp    = {Wed, 08 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/AbrahamL08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/Al-AhmadA08,
  author       = {Walid Al{-}Ahmad and
                  Reem Al{-}Kaabi},
  title        = {An extended security framework for e-government},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings},
  pages        = {294--295},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISI.2008.4565091},
  doi          = {10.1109/ISI.2008.4565091},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/Al-AhmadA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/Brachman08,
  author       = {Jarret Brachman},
  title        = {Countering terrorism},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISI.2008.4565010},
  doi          = {10.1109/ISI.2008.4565010},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/Brachman08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/ChaJLC08,
  author       = {Shi{-}Cho Cha and
                  Pei{-}Wen Juo and
                  Li{-}Ting Liu and
                  Wei{-}Ning Chen},
  title        = {RiskPatrol: {A} risk management system considering the integration
                  risk management with business continuity processes},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings},
  pages        = {110--115},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISI.2008.4565039},
  doi          = {10.1109/ISI.2008.4565039},
  timestamp    = {Thu, 13 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/ChaJLC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/ChangL08,
  author       = {Yu{-}Jie Chang and
                  Ja{-}Chen Lin},
  title        = {Data hiding using {VQ} index file},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings},
  pages        = {230--232},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISI.2008.4565064},
  doi          = {10.1109/ISI.2008.4565064},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/ChangL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/ChangLJ08,
  author       = {Weiping Chang and
                  Chichao Lu and
                  WenYuan Jen},
  title        = {A study of integrated criminal justice data base system},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings},
  pages        = {290--291},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISI.2008.4565089},
  doi          = {10.1109/ISI.2008.4565089},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/ChangLJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/ChapanondK08,
  author       = {A. Chapanond and
                  M. S. Krishnamoorthy},
  title        = {Models and methods for prediction problem of evolving graphs},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings},
  pages        = {188--190},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISI.2008.4565052},
  doi          = {10.1109/ISI.2008.4565052},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/ChapanondK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/Charles08,
  author       = {R. Charles},
  title        = {{KARIS:} {A} multiple-scheme framework for encryption based on an
                  annotation model for enhanced information security},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings},
  pages        = {257--258},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISI.2008.4565073},
  doi          = {10.1109/ISI.2008.4565073},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/Charles08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/Chen08,
  author       = {Hsinchun Chen},
  title        = {Homeland security data mining using social network analysis},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISI.2008.4565012},
  doi          = {10.1109/ISI.2008.4565012},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/Chen08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/Chen08a,
  author       = {Hsinchun Chen},
  title        = {Discovery of improvised explosive device content in the Dark Web},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings},
  pages        = {88--93},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISI.2008.4565035},
  doi          = {10.1109/ISI.2008.4565035},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/Chen08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/Chen08b,
  author       = {Hsinchun Chen},
  title        = {IEDs in the Dark Web: Genre classification of improvised explosive
                  device web pages},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings},
  pages        = {94--97},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISI.2008.4565036},
  doi          = {10.1109/ISI.2008.4565036},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/Chen08b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/Chen08c,
  author       = {Hsinchun Chen},
  title        = {Sentiment and affect analysis of Dark Web forums: Measuring radicalization
                  on the internet},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings},
  pages        = {104--109},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISI.2008.4565038},
  doi          = {10.1109/ISI.2008.4565038},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/Chen08c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/ChenAC08,
  author       = {Yi{-}Da Chen and
                  Ahmed Abbasi and
                  Hsinchun Chen},
  title        = {Developing ideological networks using social network analysis and
                  writeprints: {A} case study of the international Falun Gong movement},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings},
  pages        = {7--12},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISI.2008.4565021},
  doi          = {10.1109/ISI.2008.4565021},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/ChenAC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/ChenCYW08,
  author       = {Chung{-}Hao Chen and
                  TeYu Chien and
                  Wen{-}Chao Yang and
                  Che{-}Yen Wen},
  title        = {Restoration of linear motion and out-of-focus blurred images in surveillance
                  systems},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings},
  pages        = {239--241},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISI.2008.4565067},
  doi          = {10.1109/ISI.2008.4565067},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/ChenCYW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/ChenTF08,
  author       = {Hsinchun Chen and
                  S. Thoms and
                  Tianjun Fu},
  title        = {Cyber extremism in Web 2.0: An exploratory study of international
                  Jihadist groups},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings},
  pages        = {98--103},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISI.2008.4565037},
  doi          = {10.1109/ISI.2008.4565037},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/ChenTF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/ChenWW08,
  author       = {Yi{-}Ming Chen and
                  Dachrahn Wu and
                  Cheng{-}Kuang Wu},
  title        = {A game theory approach for an emergency management security advisory
                  system},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings},
  pages        = {116--121},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISI.2008.4565040},
  doi          = {10.1109/ISI.2008.4565040},
  timestamp    = {Fri, 11 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/ChenWW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/ChiuWK08,
  author       = {Shih{-}Hsuan Chiu and
                  Che{-}Yen Wen and
                  Wei{-}Chieh Kao},
  title        = {An effective surveillance video retrieval method based upon motion
                  detection},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings},
  pages        = {261--262},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISI.2008.4565075},
  doi          = {10.1109/ISI.2008.4565075},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/ChiuWK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/DangZSLC08,
  author       = {Yan Dang and
                  Yulei Zhang and
                  Nichalin Suakkaphong and
                  Cathy Larson and
                  Hsinchun Chen},
  title        = {An integrated approach to mapping worldwide bioterrorism research
                  capabilities},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings},
  pages        = {212--214},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISI.2008.4565059},
  doi          = {10.1109/ISI.2008.4565059},
  timestamp    = {Wed, 09 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/DangZSLC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/DuJVL08,
  author       = {Lan Du and
                  Huidong Jin and
                  Olivier Y. de Vel and
                  Nianjun Liu},
  title        = {A latent semantic indexing and WordNet based information retrieval
                  model for digital forensics},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings},
  pages        = {70--75},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISI.2008.4565032},
  doi          = {10.1109/ISI.2008.4565032},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isi/DuJVL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/DutrisacS08,
  author       = {J. G. Dutrisac and
                  David B. Skillicorn},
  title        = {Subverting prediction in adversarial settings},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings},
  pages        = {19--24},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISI.2008.4565023},
  doi          = {10.1109/ISI.2008.4565023},
  timestamp    = {Fri, 19 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isi/DutrisacS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/DutrisacS08a,
  author       = {J. G. Dutrisac and
                  David B. Skillicorn},
  title        = {Hiding clusters in adversarial settings},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings},
  pages        = {185--187},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISI.2008.4565051},
  doi          = {10.1109/ISI.2008.4565051},
  timestamp    = {Fri, 19 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isi/DutrisacS08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/FanC08,
  author       = {Yu{-}Ping Fan and
                  Cheng{-}Wei Chen},
  title        = {The performance analysis of anti- terrorism intelligence from Taiwan's
                  Investigation Bureau of the Ministry of Justice},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings},
  pages        = {259--260},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISI.2008.4565074},
  doi          = {10.1109/ISI.2008.4565074},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/FanC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/FangLL08,
  author       = {Wen{-}Pinn Fang and
                  Hong{-}Ru Lee and
                  Fang{-}Pan Line},
  title        = {An novel two layer user identification method},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings},
  pages        = {292--293},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISI.2008.4565090},
  doi          = {10.1109/ISI.2008.4565090},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/FangLL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/FardM08,
  author       = {Maryam Moghadam Fard and
                  Mehdi Moghadam Fard and
                  Nasser Mozayani},
  title        = {A new on-line signature verification by Spatio-Temporal neural network},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings},
  pages        = {233--235},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISI.2008.4565065},
  doi          = {10.1109/ISI.2008.4565065},
  timestamp    = {Tue, 27 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/FardM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/FarnLLY08,
  author       = {Kwo{-}Jean Farn and
                  Shu{-}Kuo Lin and
                  Kuo{-}Sui Lin and
                  Chung{-}Huang Yang},
  title        = {A study on critical infrastructure information technology Malfunction
                  controls-- illustration of Taiwan},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings},
  pages        = {269--270},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISI.2008.4565079},
  doi          = {10.1109/ISI.2008.4565079},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/FarnLLY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/FuC08,
  author       = {Tianjun Fu and
                  Hsinchun Chen},
  title        = {Analysis of cyberactivism: {A} case study of online free Tibet activities},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISI.2008.4565020},
  doi          = {10.1109/ISI.2008.4565020},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/FuC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/FungWWD08,
  author       = {Benjamin C. M. Fung and
                  Ke Wang and
                  Lingyu Wang and
                  Mourad Debbabi},
  title        = {A framework for privacy-preserving cluster analysis},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings},
  pages        = {46--51},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISI.2008.4565028},
  doi          = {10.1109/ISI.2008.4565028},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/FungWWD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/GaoLLC08,
  author       = {Zhong Gao and
                  Guanming Lu and
                  Mengjue Liu and
                  Meng Cui},
  title        = {A novel risk assessment system for port state control inspection},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings},
  pages        = {242--244},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISI.2008.4565068},
  doi          = {10.1109/ISI.2008.4565068},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/GaoLLC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/Ghosh08,
  author       = {Joydeep Ghosh},
  title        = {Probabilistic frameworks for privacy-aware data mining},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISI.2008.4565014},
  doi          = {10.1109/ISI.2008.4565014},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/Ghosh08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/GlasserV08,
  author       = {Uwe Gl{\"{a}}sser and
                  Mona Vajihollahi},
  title        = {Identity management architecture},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings},
  pages        = {137--144},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISI.2008.4565043},
  doi          = {10.1109/ISI.2008.4565043},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/GlasserV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/GoldbergMKM08,
  author       = {Mark K. Goldberg and
                  Malik Magdon{-}Ismail and
                  Stephen Kelley and
                  Konstantin Mertsalov},
  title        = {A locality model of the evolution of blog networks},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings},
  pages        = {191--193},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISI.2008.4565053},
  doi          = {10.1109/ISI.2008.4565053},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/GoldbergMKM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/JianT08,
  author       = {Jian Zhang and
                  Tianfang Yao},
  title        = {A study of the identification of authorship for Chinese texts},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings},
  pages        = {263--264},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISI.2008.4565076},
  doi          = {10.1109/ISI.2008.4565076},
  timestamp    = {Thu, 25 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/JianT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/KiyomotoT08,
  author       = {Shinsaku Kiyomoto and
                  Toshiaki Tanaka},
  title        = {Anonymous attribute authentication scheme using self-blindable certificates},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings},
  pages        = {215--217},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISI.2008.4565060},
  doi          = {10.1109/ISI.2008.4565060},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/KiyomotoT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/LayfieldKT08,
  author       = {Ryan Layfield and
                  Murat Kantarcioglu and
                  Bhavani Thuraisingham},
  title        = {Simulating bioterrorism through epidemiology approximation},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings},
  pages        = {82--87},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISI.2008.4565034},
  doi          = {10.1109/ISI.2008.4565034},
  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/LayfieldKT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/LeBG08,
  author       = {Duc{-}Phong Le and
                  Alexis Bonnecaze and
                  Alban Gabillon},
  title        = {Signtiming scheme based on aggregate signature},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings},
  pages        = {145--149},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISI.2008.4565044},
  doi          = {10.1109/ISI.2008.4565044},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isi/LeBG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/LeDLD08,
  author       = {Minh{-}Tam Le and
                  Hoang{-}Vu Dang and
                  Ee{-}Peng Lim and
                  Anwitaman Datta},
  title        = {WikiNetViz: Visualizing friends and adversaries in implicit social
                  networks},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings},
  pages        = {52--57},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISI.2008.4565029},
  doi          = {10.1109/ISI.2008.4565029},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/LeDLD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/LeL08,
  author       = {Ha{-}Thanh Le and
                  Peter Kok Keong Loh},
  title        = {Evaluating {AVDL} descriptions for web application vulnerability analysis},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings},
  pages        = {279--281},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISI.2008.4565084},
  doi          = {10.1109/ISI.2008.4565084},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/LeL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/Lee08,
  author       = {H. C. Lee},
  title        = {Cyber crime and challenges for crime investigation in the information
                  era},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISI.2008.4565011},
  doi          = {10.1109/ISI.2008.4565011},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/Lee08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/LeeLY08,
  author       = {Lung{-}Hao Lee and
                  Cheng{-}Jye Luh and
                  Chih{-}Jie Yang},
  title        = {A study on early decision making in objectionable web content classification},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings},
  pages        = {35--39},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISI.2008.4565026},
  doi          = {10.1109/ISI.2008.4565026},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/LeeLY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/LeeT08,
  author       = {Ickjai Lee and
                  Christopher Torpelund{-}Bruin},
  title        = {Multiplicatively-weighted order-k Minkowski-metric Voronoi models
                  for disaster decision support systems},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings},
  pages        = {236--238},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISI.2008.4565066},
  doi          = {10.1109/ISI.2008.4565066},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/LeeT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/LiCHYW08,
  author       = {Jan{-}Mou Li and
                  Chung{-}Hao Chen and
                  Shang{-}Hsing Hsieh and
                  Wen{-}Chao Yang and
                  Che{-}Yen Wen},
  title        = {Preparedness for post-disaster internet traffic management},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings},
  pages        = {282--283},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISI.2008.4565085},
  doi          = {10.1109/ISI.2008.4565085},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/LiCHYW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/LiWC08,
  author       = {Jiexun Li and
                  G. Alan Wang and
                  Hsinchun Chen},
  title        = {PRM-based identity matching using social context},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings},
  pages        = {150--155},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISI.2008.4565045},
  doi          = {10.1109/ISI.2008.4565045},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isi/LiWC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/LienLMC08,
  author       = {Yuanhung Lien and
                  Xuefei Leng and
                  Keith Mayes and
                  Jung{-}Hui Chiu},
  title        = {Reading order independent grouping proof for {RFID} tags},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings},
  pages        = {128--136},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISI.2008.4565042},
  doi          = {10.1109/ISI.2008.4565042},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/LienLMC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/LinLF08,
  author       = {Sen{-}Jen Lin and
                  Ja{-}Chen Lin and
                  Wen{-}Pinn Fang},
  title        = {Visual Cryptography {(VC)} with non-expanded shadow images: Hilbert-curve
                  approach},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings},
  pages        = {271--272},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISI.2008.4565080},
  doi          = {10.1109/ISI.2008.4565080},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/LinLF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/LinW08,
  author       = {Chien{-}Chuan Lin and
                  Ming{-}Shi Wang},
  title        = {Depth evaluation intrusion detection using Coloured Stochastic Petri
                  Nets},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings},
  pages        = {248--250},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISI.2008.4565070},
  doi          = {10.1109/ISI.2008.4565070},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/LinW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/LittleS08,
  author       = {Ayron Little and
                  David B. Skillicorn},
  title        = {Detecting deception in testimony},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings},
  pages        = {13--18},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISI.2008.4565022},
  doi          = {10.1109/ISI.2008.4565022},
  timestamp    = {Fri, 19 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isi/LittleS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/LiuMHM08,
  author       = {Zhihong Liu and
                  Jianfeng Ma and
                  Qiping Huang and
                  Sang{-}Jae Moon},
  title        = {Keying material based key pre-distribution scheme},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings},
  pages        = {218--221},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISI.2008.4565061},
  doi          = {10.1109/ISI.2008.4565061},
  timestamp    = {Fri, 28 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/LiuMHM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/LoC08,
  author       = {N. W. Lo and
                  Shiou{-}Hung Chen},
  title        = {A study of anti-robot agent mechanisms and process on online games},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings},
  pages        = {203--205},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISI.2008.4565057},
  doi          = {10.1109/ISI.2008.4565057},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/LoC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/LuZC08,
  author       = {Hsin{-}Min Lu and
                  Daniel Zeng and
                  Hsinchun Chen},
  title        = {Bioterrorism event detection based on the Markov switching model:
                  {A} simulated anthrax outbreak study},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings},
  pages        = {76--81},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISI.2008.4565033},
  doi          = {10.1109/ISI.2008.4565033},
  timestamp    = {Mon, 15 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/LuZC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/LuoC08,
  author       = {Guo{-}Lun Luo and
                  Henry Ker{-}Chang Chang},
  title        = {A new online auction with convertible authenticated encryption and
                  authentication},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings},
  pages        = {288--289},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISI.2008.4565088},
  doi          = {10.1109/ISI.2008.4565088},
  timestamp    = {Fri, 08 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/LuoC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/MaTS08,
  author       = {Wanli Ma and
                  Dat Tran and
                  Dharmendra Sharma},
  title        = {A study on the feature selection of network traffic for intrusion
                  detection purpose},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings},
  pages        = {245--247},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISI.2008.4565069},
  doi          = {10.1109/ISI.2008.4565069},
  timestamp    = {Wed, 01 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isi/MaTS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/McMichaelFWJ08,
  author       = {Daniel W. McMichael and
                  Raymond Fu and
                  Simon Williams and
                  Geoff A. Jarrad},
  title        = {Sem@ntica: {A} system for semantic extraction and logical querying
                  of text corpora},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings},
  pages        = {277--278},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISI.2008.4565083},
  doi          = {10.1109/ISI.2008.4565083},
  timestamp    = {Thu, 21 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isi/McMichaelFWJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/MielkeC08,
  author       = {Clinton J. Mielke and
                  Hsinchun Chen},
  title        = {Botnets, and the cybercriminal underground},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings},
  pages        = {206--211},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISI.2008.4565058},
  doi          = {10.1109/ISI.2008.4565058},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/MielkeC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/MoskovitchFE08,
  author       = {Robert Moskovitch and
                  Clint Feher and
                  Yuval Elovici},
  title        = {Unknown malcode detection - {A} chronological evaluation},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings},
  pages        = {267--268},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISI.2008.4565078},
  doi          = {10.1109/ISI.2008.4565078},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/MoskovitchFE08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/MoskovitchSFNE08,
  author       = {Robert Moskovitch and
                  Dima Stopel and
                  Clint Feher and
                  Nir Nissim and
                  Yuval Elovici},
  title        = {Unknown malcode detection via text categorization and the imbalance
                  problem},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings},
  pages        = {156--161},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISI.2008.4565046},
  doi          = {10.1109/ISI.2008.4565046},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/MoskovitchSFNE08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/OngDCH08,
  author       = {Chorng{-}Shyong Ong and
                  Min{-}Yuh Day and
                  Kuo{-}Tay Chen and
                  Wen{-}Lian Hsu},
  title        = {User-centered evaluation of question answering systems},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings},
  pages        = {286--287},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISI.2008.4565087},
  doi          = {10.1109/ISI.2008.4565087},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/OngDCH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/PanjiyarMBSM08,
  author       = {P. Panjiyar and
                  P. Mourya and
                  Nikhil Bansal and
                  P. Srivastava and
                  A. Mukherjee},
  title        = {Transport security using mobile technology},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings},
  pages        = {275--276},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISI.2008.4565082},
  doi          = {10.1109/ISI.2008.4565082},
  timestamp    = {Tue, 15 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isi/PanjiyarMBSM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/ParkLZB08,
  author       = {Hyun{-}A Park and
                  Dong Hoon Lee and
                  Justin Zhan and
                  Gary Blosser},
  title        = {Efficient keyword index search over encrypted documents of groups},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings},
  pages        = {225--229},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISI.2008.4565063},
  doi          = {10.1109/ISI.2008.4565063},
  timestamp    = {Mon, 31 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/ParkLZB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/PengW08,
  author       = {Yiting Peng and
                  Jau{-}Hwang Wang},
  title        = {Link analysis based on webpage co-occurrence mining - a case study
                  on a notorious gang leader in Taiwan},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings},
  pages        = {31--34},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISI.2008.4565025},
  doi          = {10.1109/ISI.2008.4565025},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/PengW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/QiaoTJDC08,
  author       = {Shaojie Qiao and
                  Changjie Tang and
                  Huidong Jin and
                  Shucheng Dai and
                  Xingshu Chen},
  title        = {Constrained k-closest pairs query processing based on growing window
                  in crime databases},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings},
  pages        = {58--63},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISI.2008.4565030},
  doi          = {10.1109/ISI.2008.4565030},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isi/QiaoTJDC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/ShiehH08,
  author       = {Wen{-}Gong Shieh and
                  Wen{-}Bing Horng},
  title        = {Efficient and complete remote authentication scheme with smart cards},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings},
  pages        = {122--127},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISI.2008.4565041},
  doi          = {10.1109/ISI.2008.4565041},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/ShiehH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/ShiehWH08,
  author       = {Wen{-}Gong Shieh and
                  Jianmin Wang and
                  Wen{-}Bing Horng},
  title        = {Secure remote control model for information appliances},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings},
  pages        = {222--224},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISI.2008.4565062},
  doi          = {10.1109/ISI.2008.4565062},
  timestamp    = {Fri, 20 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/ShiehWH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/Srivastava08,
  author       = {J. Srivastava},
  title        = {Data mining for social network analysis},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISI.2008.4565015},
  doi          = {10.1109/ISI.2008.4565015},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/Srivastava08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/SuBDDXZL08,
  author       = {Stanley Y. W. Su and
                  Howard W. Beck and
                  Seema Degwekar and
                  Jeff DePree and
                  Xuelian Xiao and
                  Chen Zhou and
                  Minsoo Lee},
  title        = {Distributed processing of event data and multi-faceted knowledge in
                  a collaboration federation},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings},
  pages        = {64--69},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISI.2008.4565031},
  doi          = {10.1109/ISI.2008.4565031},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/SuBDDXZL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/SuCWL08a,
  author       = {Ming{-}Yang Su and
                  Kai{-}Chi Chang and
                  Hua{-}Fu Wei and
                  Chun{-}Yuen Lin},
  title        = {A real-time network intrusion detection system based on incremental
                  mining approach},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings},
  pages        = {179--184},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISI.2008.4565050},
  doi          = {10.1109/ISI.2008.4565050},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/SuCWL08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/SungDYH08,
  author       = {Cheng{-}Lung Sung and
                  Min{-}Yuh Day and
                  Hsu{-}Chun Yen and
                  Wen{-}Lian Hsu},
  title        = {A template alignment algorithm for question classification},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings},
  pages        = {197--199},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISI.2008.4565055},
  doi          = {10.1109/ISI.2008.4565055},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/SungDYH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/ThomasB08,
  author       = {Ciza Thomas and
                  N. Balakrishnan},
  title        = {Advanced sensor fusion technique for enhanced Intrusion Detection},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings},
  pages        = {173--178},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISI.2008.4565049},
  doi          = {10.1109/ISI.2008.4565049},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/ThomasB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/Thuraisingham08,
  author       = {Bhavani Thuraisingham},
  title        = {Data mining for security applications: Mining concept-drifting data
                  streams to detect peer to peer botnet traffic},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISI.2008.4565013},
  doi          = {10.1109/ISI.2008.4565013},
  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/Thuraisingham08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/TranMS08,
  author       = {Dat Tran and
                  Wanli Ma and
                  Dharmendra Sharma},
  title        = {Automated network feature weighting-based anomaly detection},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings},
  pages        = {162--166},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISI.2008.4565047},
  doi          = {10.1109/ISI.2008.4565047},
  timestamp    = {Wed, 01 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isi/TranMS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/Wang08,
  author       = {Fei{-}Yue Wang},
  title        = {Social Computing: Fundamentals and applications},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISI.2008.4565016},
  doi          = {10.1109/ISI.2008.4565016},
  timestamp    = {Fri, 18 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/Wang08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/Wang08a,
  author       = {Patrick S. P. Wang},
  title        = {Intelligent pattern recognition and biometrics},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISI.2008.4565017},
  doi          = {10.1109/ISI.2008.4565017},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/Wang08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/WangC08,
  author       = {Wenjia Wang and
                  Phuong Thanh Cao{-}Thai},
  title        = {Novel position-coded methods for mining web access patterns},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings},
  pages        = {194--196},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISI.2008.4565054},
  doi          = {10.1109/ISI.2008.4565054},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/WangC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/WangZ08,
  author       = {Guomeng Wang and
                  Yanping Zhao},
  title        = {A fast algorithm for data erasure},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings},
  pages        = {254--256},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISI.2008.4565072},
  doi          = {10.1109/ISI.2008.4565072},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/WangZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/WuLC08,
  author       = {Chia{-}Long Wu and
                  Der{-}Chyuan Lou and
                  Te{-}Jen Chang},
  title        = {An efficient Montgomery exponentiation algorithm for public-key cryptosystems},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings},
  pages        = {284--285},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISI.2008.4565086},
  doi          = {10.1109/ISI.2008.4565086},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isi/WuLC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/WuSSL08,
  author       = {Jun Wu and
                  Dong{-}Hun Seo and
                  Chi{-}Hwa Song and
                  Won Don Lee},
  title        = {A new classifier for numerical incomplete data},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings},
  pages        = {273--274},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISI.2008.4565081},
  doi          = {10.1109/ISI.2008.4565081},
  timestamp    = {Sun, 11 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isi/WuSSL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/Yang08,
  author       = {Christopher C. Yang},
  title        = {Information sharing and privacy protection of terrorist or criminal
                  social networks},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings},
  pages        = {40--45},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISI.2008.4565027},
  doi          = {10.1109/ISI.2008.4565027},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/Yang08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/YangBHAF08,
  author       = {Shanchieh Jay Yang and
                  Stephen R. Byers and
                  Jared Holsopple and
                  Brian Argauer and
                  Daniel S. Fava},
  title        = {Intrusion activity projection for cyber situational awareness},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings},
  pages        = {167--172},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISI.2008.4565048},
  doi          = {10.1109/ISI.2008.4565048},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/YangBHAF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/YangN08,
  author       = {Christopher C. Yang and
                  Tobun Dorbin Ng},
  title        = {Analyzing content development and visualizing social interactions
                  in Web forum},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings},
  pages        = {25--30},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISI.2008.4565024},
  doi          = {10.1109/ISI.2008.4565024},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/YangN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/YehY08,
  author       = {Chao{-}Hsi Yeh and
                  Chung{-}Huang Yang},
  title        = {Design and implementation of honeypot systems based on open-source
                  software},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings},
  pages        = {265--266},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISI.2008.4565077},
  doi          = {10.1109/ISI.2008.4565077},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/YehY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/ZhangGW08,
  author       = {Ji Zhang and
                  Qigang Gao and
                  Hai H. Wang},
  title        = {Anomaly detection in high-dimensional network data streams: {A} case
                  study},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings},
  pages        = {251--253},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISI.2008.4565071},
  doi          = {10.1109/ISI.2008.4565071},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/ZhangGW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isi/2008,
  title        = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/4557995/proceeding},
  isbn         = {978-1-4244-2414-6},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics