Search dblp for Publications

export results for "toc:db/conf/isi/isi2011.bht:"

 download as .bib file

@inproceedings{DBLP:conf/isi/AnwarAA11,
  author       = {Tarique Anwar and
                  Muhammad Abulaish and
                  Khaled Alghathbar},
  title        = {Web content mining for alias identification: {A} first step towards
                  suspect tracking},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {195--197},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5984000},
  doi          = {10.1109/ISI.2011.5984000},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/AnwarAA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/BercovitchRHSRE11,
  author       = {Maya Bercovitch and
                  Meir Renford and
                  Lior Hasson and
                  Asaf Shabtai and
                  Lior Rokach and
                  Yuval Elovici},
  title        = {HoneyGen: An automated honeytokens generator},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {131--136},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5984063},
  doi          = {10.1109/ISI.2011.5984063},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/BercovitchRHSRE11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/BrantinghamBG11,
  author       = {Patricia L. Brantingham and
                  Paul J. Brantingham and
                  Amir H. Ghaseminejad},
  title        = {The distribution of event complexity in the British Columbia court
                  system},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {113--118},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5984060},
  doi          = {10.1109/ISI.2011.5984060},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/BrantinghamBG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/CasteigtsCBJ11,
  author       = {Arnaud Casteigts and
                  Marie{-}H{\'{e}}l{\`{e}}ne Chomienne and
                  Louise Bouchard and
                  Guy{-}Vincent Jourdan},
  title        = {Enabling dynamic linkage of linguistic census data at Statistics Canada
                  (extended abstract)},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {228},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5984777},
  doi          = {10.1109/ISI.2011.5984777},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/CasteigtsCBJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/ChenBYH11,
  author       = {Yueliang Chen and
                  Guixue Bian and
                  Lin Yi and
                  Jianjun Hu},
  title        = {Study on distributions of fatigue crack-nucleating particle sizes
                  and cracks formation in aluminum alloy},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {331--334},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5984108},
  doi          = {10.1109/ISI.2011.5984108},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/ChenBYH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/ChenDRLYH11,
  author       = {Hsinchun Chen and
                  Dorothy E. Denning and
                  Nancy Roberts and
                  Catherine A. Larson and
                  Ximing Yu and
                  Chunneng Huang},
  title        = {The Dark Web Forum Portal: From multi-lingual to video},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {7--14},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5984042},
  doi          = {10.1109/ISI.2011.5984042},
  timestamp    = {Mon, 28 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/ChenDRLYH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/ChenLEZW11,
  author       = {Hsinchun Chen and
                  Catherine A. Larson and
                  Theodore Elhourani and
                  David Zimbra and
                  David Ware},
  title        = {The Geopolitical Web: Assessing societal risk in an uncertain world},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {60--64},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5984051},
  doi          = {10.1109/ISI.2011.5984051},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/ChenLEZW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/ChenNZM11,
  author       = {You Chen and
                  Steve Nyemba and
                  Wen Zhang and
                  Bradley A. Malin},
  title        = {Leveraging social networks to detect anomalous insider actions in
                  collaborative environments},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {119--124},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5984061},
  doi          = {10.1109/ISI.2011.5984061},
  timestamp    = {Fri, 04 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/ChenNZM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/ColbaughG11,
  author       = {Richard Colbaugh and
                  Kristin Glass},
  title        = {Proactive defense for evolving cyber threats},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {125--130},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5984062},
  doi          = {10.1109/ISI.2011.5984062},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/ColbaughG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/ColbaughG11a,
  author       = {Richard Colbaugh and
                  Kristin Glass},
  title        = {Detecting emerging topics and trends via predictive analysis of 'meme'
                  dynamics},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {192--194},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5983999},
  doi          = {10.1109/ISI.2011.5983999},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/ColbaughG11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/FanLJLW11,
  author       = {Pengyi Fan and
                  Pei Li and
                  Zhihong Jiang and
                  Wei Li and
                  Hui Wang},
  title        = {Measurement and analysis of topology and information propagation on
                  Sina-Microblog},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {396--401},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5984121},
  doi          = {10.1109/ISI.2011.5984121},
  timestamp    = {Tue, 12 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isi/FanLJLW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/FangZKWB11,
  author       = {Xing Fang and
                  Justin Zhan and
                  Nicholas Koceja and
                  Kenneth Williams and
                  Justin Brewton},
  title        = {Integrating online social networks for enhancing reputation systems
                  of e-commerce},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {384--389},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5984119},
  doi          = {10.1109/ISI.2011.5984119},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/FangZKWB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/FelixDMP11,
  author       = {Edith Felix and
                  Olivier Delande and
                  Fabio Massacci and
                  Federica Paci},
  title        = {Managing changes with legacy security engineering processes},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {137--142},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5984064},
  doi          = {10.1109/ISI.2011.5984064},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/FelixDMP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/GaoWWLLC11,
  author       = {He Gao and
                  Yuanzhuo Wang and
                  Li Wang and
                  Li Liu and
                  Jinming Li and
                  Xueqi Cheng},
  title        = {Trojan characteristics analysis based on Stochastic Petri Nets},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {213--215},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5984084},
  doi          = {10.1109/ISI.2011.5984084},
  timestamp    = {Thu, 28 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isi/GaoWWLLC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/GaoZZW11,
  author       = {Chao Gao and
                  Xin Zhang and
                  Liang Zheng and
                  Hui Wang},
  title        = {On image similarity in the context of multimedia social computing},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {402--406},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5984122},
  doi          = {10.1109/ISI.2011.5984122},
  timestamp    = {Thu, 21 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isi/GaoZZW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/GlassC11,
  author       = {Kristin Glass and
                  Richard Colbaugh},
  title        = {Estimating the sentiment of social media content for security informatics
                  applications},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {65--70},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5984052},
  doi          = {10.1109/ISI.2011.5984052},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/GlassC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/GongWM11,
  author       = {Jing Gong and
                  William A. Wallace and
                  John E. Mitchell},
  title        = {Decision modeling for resilient infrastructures},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {210--212},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5984083},
  doi          = {10.1109/ISI.2011.5984083},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/GongWM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/GuanGH11,
  author       = {Jian Guan and
                  James H. Graham and
                  Jeffrey L. Hieb},
  title        = {A digraph model for risk identification and mangement in {SCADA} systems},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {150--155},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5983990},
  doi          = {10.1109/ISI.2011.5983990},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/GuanGH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/HaiCWTY11,
  author       = {Yizhen Hai and
                  Vincent C. Cheng and
                  Shui Yee Wong and
                  Kwok{-}Leung Tsui and
                  Kwok{-}Yung Yuen},
  title        = {Logistic regression analysis for Predicting Methicillin-resistant
                  Staphylococcus Aureus {(MRSA)} in-hospital mortality},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {349--353},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5984112},
  doi          = {10.1109/ISI.2011.5984112},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/HaiCWTY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/HarelSRE11,
  author       = {Amir Harel and
                  Asaf Shabtai and
                  Lior Rokach and
                  Yuval Elovici},
  title        = {Dynamic Sensitivity-Based Access Control},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {201--203},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5984080},
  doi          = {10.1109/ISI.2011.5984080},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/HarelSRE11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/He11,
  author       = {Fangyi He},
  title        = {An optimal control algorithm based on Kalman filter for {ARMA} disturbances},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {345--348},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5984111},
  doi          = {10.1109/ISI.2011.5984111},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/He11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/HeX11,
  author       = {Shuguang He and
                  Chenghang Xiao},
  title        = {Multivariate process monitoring and fault identification model using
                  decision tree learning techniques},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {325--330},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5984107},
  doi          = {10.1109/ISI.2011.5984107},
  timestamp    = {Thu, 09 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/HeX11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/HeatherlyK11,
  author       = {Raymond Heatherly and
                  Murat Kantarcioglu},
  title        = {Extending the classification of nodes in social networks},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {77--82},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5984054},
  doi          = {10.1109/ISI.2011.5984054},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/HeatherlyK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/HuCLHW11,
  author       = {Jinsong Hu and
                  Ling Cui and
                  Zengqiang Li and
                  Xiaogen Hu and
                  Haixiang Wu},
  title        = {An new approach for newsboy problem with fuzzy demand},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {362--366},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5984115},
  doi          = {10.1109/ISI.2011.5984115},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/HuCLHW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/JacksonGSW11,
  author       = {Piper J. Jackson and
                  Uwe Gl{\"{a}}sser and
                  Hamed Yaghoubi Shahir and
                  Hans Wehn},
  title        = {An extensible decision engine for Marine Safety and Security},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {54--59},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5984050},
  doi          = {10.1109/ISI.2011.5984050},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/JacksonGSW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/JiangWZL11,
  author       = {Zhihong Jiang and
                  Hui Wang and
                  Yubao Zhang and
                  Pei Li},
  title        = {A geographic analysis of {P2P-TV} viewership},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {390--395},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5984120},
  doi          = {10.1109/ISI.2011.5984120},
  timestamp    = {Tue, 12 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isi/JiangWZL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/JohnsonMKTK11,
  author       = {James R. (Bob) Johnson and
                  Anita Miller and
                  Latifur Khan and
                  Bhavani Thuraisingham and
                  Murat Kantarcioglu},
  title        = {Identification of related information of interest across free text
                  documents},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {101--106},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5984058},
  doi          = {10.1109/ISI.2011.5984058},
  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/JohnsonMKTK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/JohnsonMKTK11a,
  author       = {James R. (Bob) Johnson and
                  Anita Miller and
                  Latifur Khan and
                  Bhavani Thuraisingham and
                  Murat Kantarcioglu},
  title        = {Extraction of expanded entity phrases},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {107--112},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5984059},
  doi          = {10.1109/ISI.2011.5984059},
  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/JohnsonMKTK11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/KangK11,
  author       = {Ji Hoon Kang and
                  Seoung Bum Kim},
  title        = {Clustering algorithm-based control charts},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {272--277},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5984096},
  doi          = {10.1109/ISI.2011.5984096},
  timestamp    = {Wed, 10 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isi/KangK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/Lan-LanM11,
  author       = {Liu Lan{-}Lan and
                  Zhou Meng},
  title        = {The polynomial representation of Gray map on Zp2},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {239--241},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5984089},
  doi          = {10.1109/ISI.2011.5984089},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/Lan-LanM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/LeeKP11,
  author       = {Kyu Jong Lee and
                  Seoung Bum Kim and
                  Sun{-}Kyoung Park},
  title        = {Daily, seasonal, and spatial patterns of {PM10} in Seoul, Korea},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {278--283},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5984097},
  doi          = {10.1109/ISI.2011.5984097},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/LeeKP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/LeiZW11,
  author       = {Yin{-}zhi Lei and
                  Xiao{-}yin Zhou and
                  Xi{-}peng Wei},
  title        = {Research on government on-line information management and service},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {222--225},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5984086},
  doi          = {10.1109/ISI.2011.5984086},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/LeiZW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/LiL11,
  author       = {Ben{-}xian Li and
                  Meng{-}jun Li},
  title        = {Game analysis in international anti-terrorism strike},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {221},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5984774},
  doi          = {10.1109/ISI.2011.5984774},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/LiL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/LiLZ11,
  author       = {Heping Li and
                  Jie Liu and
                  Shuwu Zhang},
  title        = {Automatic behavior model selection by iterative learning and abnormality
                  recognition},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {31--36},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5984046},
  doi          = {10.1109/ISI.2011.5984046},
  timestamp    = {Tue, 28 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isi/LiLZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/LiLZ11a,
  author       = {Xiarong Li and
                  Yong Liu and
                  Daniel Zeng},
  title        = {Publisher click fraud in the pay-per-click advertising market: Incentives
                  and consequences},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {207--209},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5984082},
  doi          = {10.1109/ISI.2011.5984082},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/LiLZ11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/LiMZZ11,
  author       = {Xiaochen Li and
                  Wenji Mao and
                  Daniel Zeng and
                  Huachi Zhu},
  title        = {Forecasting group behavior via multiple plan recognition},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {184--186},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5983997},
  doi          = {10.1109/ISI.2011.5983997},
  timestamp    = {Mon, 15 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/LiMZZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/LiW11,
  author       = {Jiexun Li and
                  G. Alan Wang},
  title        = {Criminal identity resolution using social behavior and relationship
                  attributes},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {173--175},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5983994},
  doi          = {10.1109/ISI.2011.5983994},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/LiW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/LiY11,
  author       = {Xue{-}Jing Li and
                  Dan Yu},
  title        = {A reliability integrated acceptance test plan for series systems whose
                  components following exponential distributions},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {339--344},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5984110},
  doi          = {10.1109/ISI.2011.5984110},
  timestamp    = {Wed, 27 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/LiY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/LiYW11,
  author       = {Xiaoting Li and
                  Jingfu Yang and
                  Zishan Wang},
  title        = {The construction of accounting information system under the environment
                  of the network},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {220},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5984773},
  doi          = {10.1109/ISI.2011.5984773},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/LiYW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/LinJ11,
  author       = {Zhenmin Lin and
                  Jerzy W. Jaromczyk},
  title        = {Privacy preserving two-party k-means clustering over vertically partitioned
                  dataset},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {187--191},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5983998},
  doi          = {10.1109/ISI.2011.5983998},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/LinJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/LiuLK11,
  author       = {Jian Liu and
                  Jing Li and
                  Byoung Uk Kim},
  title        = {Bayesian reliability modeling of multi-level system with interdependent
                  subsystems and components},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {252--257},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5984092},
  doi          = {10.1109/ISI.2011.5984092},
  timestamp    = {Tue, 27 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isi/LiuLK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/MoonOC11,
  author       = {Il{-}Chul Moon and
                  Alice H. Oh and
                  Kathleen M. Carley},
  title        = {Analyzing social media in escalating crisis situations},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {71--76},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5984053},
  doi          = {10.1109/ISI.2011.5984053},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/MoonOC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/MooneySCY11,
  author       = {Peter Mooney and
                  Huabo Sun and
                  Padraig Corcoran and
                  Lei Yan},
  title        = {Citizen-generated spatial data and information: Risks and opportunities},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {232},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5984087},
  doi          = {10.1109/ISI.2011.5984087},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/MooneySCY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/NguyenCH11,
  author       = {Tam T. Nguyen and
                  Kuiyu Chang and
                  Siu Cheung Hui},
  title        = {Supervised term weighting for sentiment analysis},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {89--94},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5984056},
  doi          = {10.1109/ISI.2011.5984056},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/NguyenCH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/NguyenD11,
  author       = {Timmy Nguyen and
                  Leonidas Deligiannidis},
  title        = {Utilizing infrared technology to prevent terrorist attacks},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {229},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5984778},
  doi          = {10.1109/ISI.2011.5984778},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/NguyenD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/OzgulACE11,
  author       = {Fatih {\"{O}}zg{\"{u}}l and
                  Claus Atzenbeck and
                  Ahmet {\c{C}}elik and
                  Zeki Erdem},
  title        = {Incorporating data sources and methodologies for crime data mining},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {176--180},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5983995},
  doi          = {10.1109/ISI.2011.5983995},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isi/OzgulACE11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/PaolinoPAL11,
  author       = {Lilyam Paolino and
                  Horacio Paggi and
                  Fernando Alonso and
                  Genoveva L{\'{o}}pez G{\'{o}}mez},
  title        = {Solving incidents in telecommunications using a multi-agent system},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {303--308},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5984102},
  doi          = {10.1109/ISI.2011.5984102},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/PaolinoPAL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/PlattHC11,
  author       = {Alana Platt and
                  Cynthia Hood and
                  Levi Citrin},
  title        = {Organization of social network messages to improve understanding of
                  an evolving crisis},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {230},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5984779},
  doi          = {10.1109/ISI.2011.5984779},
  timestamp    = {Thu, 07 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isi/PlattHC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/QuY11,
  author       = {Yanzhen Qu and
                  Weiwen Yang},
  title        = {Improving the security of the distributed enterprise data warehouse
                  system},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {227},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5984776},
  doi          = {10.1109/ISI.2011.5984776},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/QuY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/QureshiMW11,
  author       = {Pir Abdul Rasool Qureshi and
                  Nasrullah Memon and
                  Uffe Kock Wiil},
  title        = {LanguageNet: {A} novel framework for processing unstructured text
                  information},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {95--100},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5984057},
  doi          = {10.1109/ISI.2011.5984057},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/QureshiMW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/QureshiMWKS11,
  author       = {Pir Abdul Rasool Qureshi and
                  Nasrullah Memon and
                  Uffe Kock Wiil and
                  Panagiotis Karampelas and
                  Jose Ignacio Nieto Sancheze},
  title        = {heteroHarvest: Harvesting information from heterogeneous sources},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {231},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5984780},
  doi          = {10.1109/ISI.2011.5984780},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/QureshiMWKS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/RahmanMAMI11,
  author       = {Sk. Md. Mizanur Rahman and
                  Md. Mehedi Masud and
                  Carlisle Adams and
                  Hussein T. Mouftah and
                  Atsuo Inomata},
  title        = {Session-wise private data exchange in eHealth peer-to-peer database
                  management systems},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {204--206},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5984081},
  doi          = {10.1109/ISI.2011.5984081},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/RahmanMAMI11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/Sakharova11,
  author       = {Irina Sakharova},
  title        = {Al Qaeda terrorist financing and technologies to track the finance
                  network},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {20--25},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5984044},
  doi          = {10.1109/ISI.2011.5984044},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/Sakharova11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/ShahirGJW11,
  author       = {Hamed Yaghoubi Shahir and
                  Uwe Gl{\"{a}}sser and
                  Piper J. Jackson and
                  Hans Wehn},
  title        = {Test-case generation for marine safety and security scenarios},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {48--53},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5984049},
  doi          = {10.1109/ISI.2011.5984049},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/ShahirGJW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/ShaikhMW11,
  author       = {Muniba Shaikh and
                  Nasrullah Memon and
                  Uffe Kock Wiil},
  title        = {Extended approximate string matching algorithms to detect name aliases},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {216--219},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5984085},
  doi          = {10.1109/ISI.2011.5984085},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/ShaikhMW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/ShenZ11,
  author       = {Defeng Shen and
                  Shunong Zhang},
  title        = {Design of logic processes for prognostics and health management in
                  an avionics system},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {284--288},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5984098},
  doi          = {10.1109/ISI.2011.5984098},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/ShenZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/ShrivastavaC11,
  author       = {Abhishek K. Shrivastava and
                  Junjie Cao},
  title        = {A decomposition approach to imbalanced classification},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {258--260},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5984093},
  doi          = {10.1109/ISI.2011.5984093},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/ShrivastavaC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/Song11,
  author       = {Jiwei Song},
  title        = {The analysis of military intelligence early warning based on open
                  source intelligence},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {226},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5984775},
  doi          = {10.1109/ISI.2011.5984775},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/Song11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/SuMZZ11,
  author       = {Peng Su and
                  Wenji Mao and
                  Daniel Zeng and
                  Huimin Zhao},
  title        = {Mining actionable behavioral rules from group data},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {181--183},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5983996},
  doi          = {10.1109/ISI.2011.5983996},
  timestamp    = {Mon, 15 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/SuMZZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/SunGLL11,
  author       = {Duo{-}Yong Sun and
                  Shu{-}Quan Guo and
                  Ben{-}xian Li and
                  Xiao{-}Peng Liu},
  title        = {Study on covert networks of terrorists based on interactive relationship
                  hypothesis},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {26--30},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5984045},
  doi          = {10.1109/ISI.2011.5984045},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/SunGLL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/SunGZL11,
  author       = {Duo{-}Yong Sun and
                  Shu{-}Quan Guo and
                  Hai Zhang and
                  Ben{-}xian Li},
  title        = {Study on covert networks of terroristic organizations based on text
                  analysis},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {373--378},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5984117},
  doi          = {10.1109/ISI.2011.5984117},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/SunGZL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/SunN11,
  author       = {Beiming Sun and
                  Vincent T. Y. Ng},
  title        = {Lifespan and popularity measurement of online content on social networks},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {379--383},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5984118},
  doi          = {10.1109/ISI.2011.5984118},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/SunN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/TangF11,
  author       = {Zhanyong Tang and
                  Dingyi Fang},
  title        = {A tamper-proof software watermark using code encryption},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {156--160},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5983991},
  doi          = {10.1109/ISI.2011.5983991},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/TangF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/TuerhongK11,
  author       = {Gulanbaier Tuerhong and
                  Seoung Bum Kim},
  title        = {A nonparametric fault isolation approach through hybrid novelty score},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {261--266},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5984094},
  doi          = {10.1109/ISI.2011.5984094},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/TuerhongK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/WanP11,
  author       = {Yun Wan and
                  William Perry},
  title        = {Lessons from method: {A} successful Electronic Medical Record {(EMR)}
                  system implementation},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {248--251},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5984091},
  doi          = {10.1109/ISI.2011.5984091},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/WanP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/Wang11,
  author       = {Michael H. Wang},
  title        = {A cost-based {FMEA} decision tool for product quality design and management},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {297--302},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5984101},
  doi          = {10.1109/ISI.2011.5984101},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/Wang11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/WangB11,
  author       = {Xiaofeng Wang and
                  Donald E. Brown},
  title        = {The spatio-temporal generalized additive model for criminal incidents},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {42--47},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5984048},
  doi          = {10.1109/ISI.2011.5984048},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/WangB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/WangLP11,
  author       = {Wenbin Wang and
                  Yifang Liu and
                  Michael G. Pecht},
  title        = {A theoretical model to minimize the operational cost for canary-equipped
                  electronic system's health management},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {233--238},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5984088},
  doi          = {10.1109/ISI.2011.5984088},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/WangLP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/WangMZB11,
  author       = {Yongqing Wang and
                  Wenji Mao and
                  Daniel Zeng and
                  Ning Bao},
  title        = {Boosting rank with predictable training error},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {407--409},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5984123},
  doi          = {10.1109/ISI.2011.5984123},
  timestamp    = {Mon, 15 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/WangMZB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/WangXNM11,
  author       = {Yan Fu Wang and
                  Min Xie and
                  Kien Ming Ng and
                  Yi Fei Meng},
  title        = {Quantitative risk analysis model of integrating fuzzy fault tree with
                  Bayesian Network},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {267--271},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5984095},
  doi          = {10.1109/ISI.2011.5984095},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isi/WangXNM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/WeerasingheFLZ11,
  author       = {Hesiri Weerasinghe and
                  Huirong Fu and
                  Supeng Leng and
                  Ye Zhu},
  title        = {Enhancing unlinkability in Vehicular Ad Hoc Networks},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {161--166},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5983992},
  doi          = {10.1109/ISI.2011.5983992},
  timestamp    = {Tue, 24 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/WeerasingheFLZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/WooSC11,
  author       = {Jiyoung Woo and
                  Jaebong Son and
                  Hsinchun Chen},
  title        = {An {SIR} model for violent topic diffusion in social media},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {15--19},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5984043},
  doi          = {10.1109/ISI.2011.5984043},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/WooSC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/XiaoC11,
  author       = {Haidong Xiao and
                  Ning Chen},
  title        = {Analysis of cyberspace security situational awareness based on fuzz
                  reason},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {316--319},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5984105},
  doi          = {10.1109/ISI.2011.5984105},
  timestamp    = {Thu, 23 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/XiaoC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/XiaoCH11,
  author       = {Haidong Xiao and
                  Ning Chen and
                  Yan Hu},
  title        = {Situational awareness on disruption management: {A} system information
                  propagation approach},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {313--315},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5984104},
  doi          = {10.1109/ISI.2011.5984104},
  timestamp    = {Thu, 23 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/XiaoCH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/XingMTP11,
  author       = {Yinjiao Xing and
                  Qiang Miao and
                  Kwok{-}Leung Tsui and
                  Michael G. Pecht},
  title        = {Prognostics and health monitoring for lithium-ion battery},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {242--247},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5984090},
  doi          = {10.1109/ISI.2011.5984090},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/XingMTP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/Yang11,
  author       = {Christopher C. Yang},
  title        = {Preserving privacy in social network integration with {\(\tau\)}-tolerance},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {198--200},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5984001},
  doi          = {10.1109/ISI.2011.5984001},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/Yang11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/YangBCX11,
  author       = {Maosheng Yang and
                  Yuquan Bi and
                  Yueliang Chen and
                  Li Xu},
  title        = {Studying on influencing factors of Fretting fatigue life of aluminum
                  alloy},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {335--338},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5984109},
  doi          = {10.1109/ISI.2011.5984109},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/YangBCX11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/YangTG11,
  author       = {Christopher C. Yang and
                  Xuning Tang and
                  Xiajing Gong},
  title        = {Identifying Dark Web clusters with temporal coherence analysis},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {167--172},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5983993},
  doi          = {10.1109/ISI.2011.5983993},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/YangTG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/YuanH11,
  author       = {Jinyu Yuan and
                  Zhixing He},
  title        = {Empirical analysis on causal relationship between institution and
                  economic development based on {VAR} method},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {309--312},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5984103},
  doi          = {10.1109/ISI.2011.5984103},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/YuanH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/ZengDW11,
  author       = {Jianping Zeng and
                  Jiangjiao Duan and
                  Chengrong Wu},
  title        = {Topic discovery based on dual {EM} merging},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {83--88},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5984055},
  doi          = {10.1109/ISI.2011.5984055},
  timestamp    = {Thu, 01 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/ZengDW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/ZengLC11,
  author       = {Shuo Zeng and
                  Mingfeng Lin and
                  Hsinchun Chen},
  title        = {Dynamic user-level affect analysis in social media: Modeling violence
                  in the Dark Web},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5984041},
  doi          = {10.1109/ISI.2011.5984041},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/ZengLC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/ZhanOC11,
  author       = {Justin Zhan and
                  B. John Oommen and
                  Johanna Crisostomo},
  title        = {Anomaly detection using weak estimators},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {143--149},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5984065},
  doi          = {10.1109/ISI.2011.5984065},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/ZhanOC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/ZhangSYLZ11,
  author       = {Bingsen Zhang and
                  Yaping Shi and
                  Houjun Yang and
                  Xiaojie Liu and
                  Anling Zhang},
  title        = {Research on application of the minimum error average fitting method
                  in computer color matching},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {293--296},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5984100},
  doi          = {10.1109/ISI.2011.5984100},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/ZhangSYLZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/ZhangTC11,
  author       = {Danfeng Zhang and
                  Xiaoming Tan and
                  Yueliang Chen},
  title        = {Distribution rule of corrosion damage morphology parameters for aluminum
                  alloy},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {358--361},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5984114},
  doi          = {10.1109/ISI.2011.5984114},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/ZhangTC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/ZhangZ11,
  author       = {Sai{-}Yin Zhang and
                  Zhong{-}Zhan Zhang},
  title        = {Analysis of accelerated degradation test under constant stress with
                  errors for longitudinal data},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {320--324},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5984106},
  doi          = {10.1109/ISI.2011.5984106},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/ZhangZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/ZhangZYC11,
  author       = {Tai Feng Zhang and
                  Wei Yi Zhao and
                  Xiao{-}Hua Yang and
                  Zeng Jie Cai},
  title        = {Compiling the marine environment spectrum based on inversion satellite
                  remote sensing data},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {354--357},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5984113},
  doi          = {10.1109/ISI.2011.5984113},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/ZhangZYC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/ZhangZYLZZ11,
  author       = {Bingsen Zhang and
                  Yongchang Zhang and
                  Houjun Yang and
                  Xiaojie Liu and
                  Anling Zhang and
                  Zhongwen Zhang},
  title        = {Research on numerical analysis for color matching in textile dyeing
                  based on least square Fitting},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {289--292},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5984099},
  doi          = {10.1109/ISI.2011.5984099},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/ZhangZYLZZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/ZhaoFC11,
  author       = {Ran Zhao and
                  Guochun Fu and
                  Jianhui Cheng},
  title        = {On the analysis of the applications and social influence of mobile
                  phone reading in the medium and small cities in China: Take the first
                  pilot city Baoding for an example},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {367--372},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5984116},
  doi          = {10.1109/ISI.2011.5984116},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/ZhaoFC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/ZilbermanDKES11,
  author       = {Polina Zilberman and
                  Shlomi Dolev and
                  Gilad Katz and
                  Yuval Elovici and
                  Asaf Shabtai},
  title        = {Analyzing group communication for preventing data leakage via email},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {37--41},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5984047},
  doi          = {10.1109/ISI.2011.5984047},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/ZilbermanDKES11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isi/2011,
  title        = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/5975309/proceeding},
  isbn         = {978-1-4577-0082-8},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics