Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/isi/isi2011.bht:"
@inproceedings{DBLP:conf/isi/AnwarAA11, author = {Tarique Anwar and Muhammad Abulaish and Khaled Alghathbar}, title = {Web content mining for alias identification: {A} first step towards suspect tracking}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {195--197}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5984000}, doi = {10.1109/ISI.2011.5984000}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/AnwarAA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/BercovitchRHSRE11, author = {Maya Bercovitch and Meir Renford and Lior Hasson and Asaf Shabtai and Lior Rokach and Yuval Elovici}, title = {HoneyGen: An automated honeytokens generator}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {131--136}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5984063}, doi = {10.1109/ISI.2011.5984063}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/BercovitchRHSRE11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/BrantinghamBG11, author = {Patricia L. Brantingham and Paul J. Brantingham and Amir H. Ghaseminejad}, title = {The distribution of event complexity in the British Columbia court system}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {113--118}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5984060}, doi = {10.1109/ISI.2011.5984060}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/BrantinghamBG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/CasteigtsCBJ11, author = {Arnaud Casteigts and Marie{-}H{\'{e}}l{\`{e}}ne Chomienne and Louise Bouchard and Guy{-}Vincent Jourdan}, title = {Enabling dynamic linkage of linguistic census data at Statistics Canada (extended abstract)}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {228}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5984777}, doi = {10.1109/ISI.2011.5984777}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/CasteigtsCBJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/ChenBYH11, author = {Yueliang Chen and Guixue Bian and Lin Yi and Jianjun Hu}, title = {Study on distributions of fatigue crack-nucleating particle sizes and cracks formation in aluminum alloy}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {331--334}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5984108}, doi = {10.1109/ISI.2011.5984108}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/ChenBYH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/ChenDRLYH11, author = {Hsinchun Chen and Dorothy E. Denning and Nancy Roberts and Catherine A. Larson and Ximing Yu and Chunneng Huang}, title = {The Dark Web Forum Portal: From multi-lingual to video}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {7--14}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5984042}, doi = {10.1109/ISI.2011.5984042}, timestamp = {Mon, 28 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/ChenDRLYH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/ChenLEZW11, author = {Hsinchun Chen and Catherine A. Larson and Theodore Elhourani and David Zimbra and David Ware}, title = {The Geopolitical Web: Assessing societal risk in an uncertain world}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {60--64}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5984051}, doi = {10.1109/ISI.2011.5984051}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/ChenLEZW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/ChenNZM11, author = {You Chen and Steve Nyemba and Wen Zhang and Bradley A. Malin}, title = {Leveraging social networks to detect anomalous insider actions in collaborative environments}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {119--124}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5984061}, doi = {10.1109/ISI.2011.5984061}, timestamp = {Fri, 04 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/ChenNZM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/ColbaughG11, author = {Richard Colbaugh and Kristin Glass}, title = {Proactive defense for evolving cyber threats}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {125--130}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5984062}, doi = {10.1109/ISI.2011.5984062}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/ColbaughG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/ColbaughG11a, author = {Richard Colbaugh and Kristin Glass}, title = {Detecting emerging topics and trends via predictive analysis of 'meme' dynamics}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {192--194}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5983999}, doi = {10.1109/ISI.2011.5983999}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/ColbaughG11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/FanLJLW11, author = {Pengyi Fan and Pei Li and Zhihong Jiang and Wei Li and Hui Wang}, title = {Measurement and analysis of topology and information propagation on Sina-Microblog}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {396--401}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5984121}, doi = {10.1109/ISI.2011.5984121}, timestamp = {Tue, 12 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isi/FanLJLW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/FangZKWB11, author = {Xing Fang and Justin Zhan and Nicholas Koceja and Kenneth Williams and Justin Brewton}, title = {Integrating online social networks for enhancing reputation systems of e-commerce}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {384--389}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5984119}, doi = {10.1109/ISI.2011.5984119}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/FangZKWB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/FelixDMP11, author = {Edith Felix and Olivier Delande and Fabio Massacci and Federica Paci}, title = {Managing changes with legacy security engineering processes}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {137--142}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5984064}, doi = {10.1109/ISI.2011.5984064}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/FelixDMP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/GaoWWLLC11, author = {He Gao and Yuanzhuo Wang and Li Wang and Li Liu and Jinming Li and Xueqi Cheng}, title = {Trojan characteristics analysis based on Stochastic Petri Nets}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {213--215}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5984084}, doi = {10.1109/ISI.2011.5984084}, timestamp = {Thu, 28 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isi/GaoWWLLC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/GaoZZW11, author = {Chao Gao and Xin Zhang and Liang Zheng and Hui Wang}, title = {On image similarity in the context of multimedia social computing}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {402--406}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5984122}, doi = {10.1109/ISI.2011.5984122}, timestamp = {Thu, 21 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isi/GaoZZW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/GlassC11, author = {Kristin Glass and Richard Colbaugh}, title = {Estimating the sentiment of social media content for security informatics applications}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {65--70}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5984052}, doi = {10.1109/ISI.2011.5984052}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/GlassC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/GongWM11, author = {Jing Gong and William A. Wallace and John E. Mitchell}, title = {Decision modeling for resilient infrastructures}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {210--212}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5984083}, doi = {10.1109/ISI.2011.5984083}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/GongWM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/GuanGH11, author = {Jian Guan and James H. Graham and Jeffrey L. Hieb}, title = {A digraph model for risk identification and mangement in {SCADA} systems}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {150--155}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5983990}, doi = {10.1109/ISI.2011.5983990}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/GuanGH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/HaiCWTY11, author = {Yizhen Hai and Vincent C. Cheng and Shui Yee Wong and Kwok{-}Leung Tsui and Kwok{-}Yung Yuen}, title = {Logistic regression analysis for Predicting Methicillin-resistant Staphylococcus Aureus {(MRSA)} in-hospital mortality}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {349--353}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5984112}, doi = {10.1109/ISI.2011.5984112}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/HaiCWTY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/HarelSRE11, author = {Amir Harel and Asaf Shabtai and Lior Rokach and Yuval Elovici}, title = {Dynamic Sensitivity-Based Access Control}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {201--203}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5984080}, doi = {10.1109/ISI.2011.5984080}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/HarelSRE11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/He11, author = {Fangyi He}, title = {An optimal control algorithm based on Kalman filter for {ARMA} disturbances}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {345--348}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5984111}, doi = {10.1109/ISI.2011.5984111}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/He11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/HeX11, author = {Shuguang He and Chenghang Xiao}, title = {Multivariate process monitoring and fault identification model using decision tree learning techniques}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {325--330}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5984107}, doi = {10.1109/ISI.2011.5984107}, timestamp = {Thu, 09 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/HeX11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/HeatherlyK11, author = {Raymond Heatherly and Murat Kantarcioglu}, title = {Extending the classification of nodes in social networks}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {77--82}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5984054}, doi = {10.1109/ISI.2011.5984054}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/HeatherlyK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/HuCLHW11, author = {Jinsong Hu and Ling Cui and Zengqiang Li and Xiaogen Hu and Haixiang Wu}, title = {An new approach for newsboy problem with fuzzy demand}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {362--366}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5984115}, doi = {10.1109/ISI.2011.5984115}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/HuCLHW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/JacksonGSW11, author = {Piper J. Jackson and Uwe Gl{\"{a}}sser and Hamed Yaghoubi Shahir and Hans Wehn}, title = {An extensible decision engine for Marine Safety and Security}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {54--59}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5984050}, doi = {10.1109/ISI.2011.5984050}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/JacksonGSW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/JiangWZL11, author = {Zhihong Jiang and Hui Wang and Yubao Zhang and Pei Li}, title = {A geographic analysis of {P2P-TV} viewership}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {390--395}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5984120}, doi = {10.1109/ISI.2011.5984120}, timestamp = {Tue, 12 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isi/JiangWZL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/JohnsonMKTK11, author = {James R. (Bob) Johnson and Anita Miller and Latifur Khan and Bhavani Thuraisingham and Murat Kantarcioglu}, title = {Identification of related information of interest across free text documents}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {101--106}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5984058}, doi = {10.1109/ISI.2011.5984058}, timestamp = {Wed, 29 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/JohnsonMKTK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/JohnsonMKTK11a, author = {James R. (Bob) Johnson and Anita Miller and Latifur Khan and Bhavani Thuraisingham and Murat Kantarcioglu}, title = {Extraction of expanded entity phrases}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {107--112}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5984059}, doi = {10.1109/ISI.2011.5984059}, timestamp = {Wed, 29 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/JohnsonMKTK11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/KangK11, author = {Ji Hoon Kang and Seoung Bum Kim}, title = {Clustering algorithm-based control charts}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {272--277}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5984096}, doi = {10.1109/ISI.2011.5984096}, timestamp = {Wed, 10 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isi/KangK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/Lan-LanM11, author = {Liu Lan{-}Lan and Zhou Meng}, title = {The polynomial representation of Gray map on Zp2}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {239--241}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5984089}, doi = {10.1109/ISI.2011.5984089}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/Lan-LanM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/LeeKP11, author = {Kyu Jong Lee and Seoung Bum Kim and Sun{-}Kyoung Park}, title = {Daily, seasonal, and spatial patterns of {PM10} in Seoul, Korea}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {278--283}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5984097}, doi = {10.1109/ISI.2011.5984097}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/LeeKP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/LeiZW11, author = {Yin{-}zhi Lei and Xiao{-}yin Zhou and Xi{-}peng Wei}, title = {Research on government on-line information management and service}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {222--225}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5984086}, doi = {10.1109/ISI.2011.5984086}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/LeiZW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/LiL11, author = {Ben{-}xian Li and Meng{-}jun Li}, title = {Game analysis in international anti-terrorism strike}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {221}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5984774}, doi = {10.1109/ISI.2011.5984774}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/LiL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/LiLZ11, author = {Heping Li and Jie Liu and Shuwu Zhang}, title = {Automatic behavior model selection by iterative learning and abnormality recognition}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {31--36}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5984046}, doi = {10.1109/ISI.2011.5984046}, timestamp = {Tue, 28 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isi/LiLZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/LiLZ11a, author = {Xiarong Li and Yong Liu and Daniel Zeng}, title = {Publisher click fraud in the pay-per-click advertising market: Incentives and consequences}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {207--209}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5984082}, doi = {10.1109/ISI.2011.5984082}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/LiLZ11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/LiMZZ11, author = {Xiaochen Li and Wenji Mao and Daniel Zeng and Huachi Zhu}, title = {Forecasting group behavior via multiple plan recognition}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {184--186}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5983997}, doi = {10.1109/ISI.2011.5983997}, timestamp = {Mon, 15 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/LiMZZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/LiW11, author = {Jiexun Li and G. Alan Wang}, title = {Criminal identity resolution using social behavior and relationship attributes}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {173--175}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5983994}, doi = {10.1109/ISI.2011.5983994}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/LiW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/LiY11, author = {Xue{-}Jing Li and Dan Yu}, title = {A reliability integrated acceptance test plan for series systems whose components following exponential distributions}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {339--344}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5984110}, doi = {10.1109/ISI.2011.5984110}, timestamp = {Wed, 27 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/LiY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/LiYW11, author = {Xiaoting Li and Jingfu Yang and Zishan Wang}, title = {The construction of accounting information system under the environment of the network}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {220}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5984773}, doi = {10.1109/ISI.2011.5984773}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/LiYW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/LinJ11, author = {Zhenmin Lin and Jerzy W. Jaromczyk}, title = {Privacy preserving two-party k-means clustering over vertically partitioned dataset}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {187--191}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5983998}, doi = {10.1109/ISI.2011.5983998}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/LinJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/LiuLK11, author = {Jian Liu and Jing Li and Byoung Uk Kim}, title = {Bayesian reliability modeling of multi-level system with interdependent subsystems and components}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {252--257}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5984092}, doi = {10.1109/ISI.2011.5984092}, timestamp = {Tue, 27 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isi/LiuLK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/MoonOC11, author = {Il{-}Chul Moon and Alice H. Oh and Kathleen M. Carley}, title = {Analyzing social media in escalating crisis situations}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {71--76}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5984053}, doi = {10.1109/ISI.2011.5984053}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/MoonOC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/MooneySCY11, author = {Peter Mooney and Huabo Sun and Padraig Corcoran and Lei Yan}, title = {Citizen-generated spatial data and information: Risks and opportunities}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {232}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5984087}, doi = {10.1109/ISI.2011.5984087}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/MooneySCY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/NguyenCH11, author = {Tam T. Nguyen and Kuiyu Chang and Siu Cheung Hui}, title = {Supervised term weighting for sentiment analysis}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {89--94}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5984056}, doi = {10.1109/ISI.2011.5984056}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/NguyenCH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/NguyenD11, author = {Timmy Nguyen and Leonidas Deligiannidis}, title = {Utilizing infrared technology to prevent terrorist attacks}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {229}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5984778}, doi = {10.1109/ISI.2011.5984778}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/NguyenD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/OzgulACE11, author = {Fatih {\"{O}}zg{\"{u}}l and Claus Atzenbeck and Ahmet {\c{C}}elik and Zeki Erdem}, title = {Incorporating data sources and methodologies for crime data mining}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {176--180}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5983995}, doi = {10.1109/ISI.2011.5983995}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isi/OzgulACE11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/PaolinoPAL11, author = {Lilyam Paolino and Horacio Paggi and Fernando Alonso and Genoveva L{\'{o}}pez G{\'{o}}mez}, title = {Solving incidents in telecommunications using a multi-agent system}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {303--308}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5984102}, doi = {10.1109/ISI.2011.5984102}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/PaolinoPAL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/PlattHC11, author = {Alana Platt and Cynthia Hood and Levi Citrin}, title = {Organization of social network messages to improve understanding of an evolving crisis}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {230}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5984779}, doi = {10.1109/ISI.2011.5984779}, timestamp = {Thu, 07 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isi/PlattHC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/QuY11, author = {Yanzhen Qu and Weiwen Yang}, title = {Improving the security of the distributed enterprise data warehouse system}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {227}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5984776}, doi = {10.1109/ISI.2011.5984776}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/QuY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/QureshiMW11, author = {Pir Abdul Rasool Qureshi and Nasrullah Memon and Uffe Kock Wiil}, title = {LanguageNet: {A} novel framework for processing unstructured text information}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {95--100}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5984057}, doi = {10.1109/ISI.2011.5984057}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/QureshiMW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/QureshiMWKS11, author = {Pir Abdul Rasool Qureshi and Nasrullah Memon and Uffe Kock Wiil and Panagiotis Karampelas and Jose Ignacio Nieto Sancheze}, title = {heteroHarvest: Harvesting information from heterogeneous sources}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {231}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5984780}, doi = {10.1109/ISI.2011.5984780}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/QureshiMWKS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/RahmanMAMI11, author = {Sk. Md. Mizanur Rahman and Md. Mehedi Masud and Carlisle Adams and Hussein T. Mouftah and Atsuo Inomata}, title = {Session-wise private data exchange in eHealth peer-to-peer database management systems}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {204--206}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5984081}, doi = {10.1109/ISI.2011.5984081}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/RahmanMAMI11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/Sakharova11, author = {Irina Sakharova}, title = {Al Qaeda terrorist financing and technologies to track the finance network}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {20--25}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5984044}, doi = {10.1109/ISI.2011.5984044}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/Sakharova11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/ShahirGJW11, author = {Hamed Yaghoubi Shahir and Uwe Gl{\"{a}}sser and Piper J. Jackson and Hans Wehn}, title = {Test-case generation for marine safety and security scenarios}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {48--53}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5984049}, doi = {10.1109/ISI.2011.5984049}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/ShahirGJW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/ShaikhMW11, author = {Muniba Shaikh and Nasrullah Memon and Uffe Kock Wiil}, title = {Extended approximate string matching algorithms to detect name aliases}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {216--219}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5984085}, doi = {10.1109/ISI.2011.5984085}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/ShaikhMW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/ShenZ11, author = {Defeng Shen and Shunong Zhang}, title = {Design of logic processes for prognostics and health management in an avionics system}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {284--288}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5984098}, doi = {10.1109/ISI.2011.5984098}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/ShenZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/ShrivastavaC11, author = {Abhishek K. Shrivastava and Junjie Cao}, title = {A decomposition approach to imbalanced classification}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {258--260}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5984093}, doi = {10.1109/ISI.2011.5984093}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/ShrivastavaC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/Song11, author = {Jiwei Song}, title = {The analysis of military intelligence early warning based on open source intelligence}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {226}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5984775}, doi = {10.1109/ISI.2011.5984775}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/Song11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/SuMZZ11, author = {Peng Su and Wenji Mao and Daniel Zeng and Huimin Zhao}, title = {Mining actionable behavioral rules from group data}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {181--183}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5983996}, doi = {10.1109/ISI.2011.5983996}, timestamp = {Mon, 15 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/SuMZZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/SunGLL11, author = {Duo{-}Yong Sun and Shu{-}Quan Guo and Ben{-}xian Li and Xiao{-}Peng Liu}, title = {Study on covert networks of terrorists based on interactive relationship hypothesis}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {26--30}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5984045}, doi = {10.1109/ISI.2011.5984045}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/SunGLL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/SunGZL11, author = {Duo{-}Yong Sun and Shu{-}Quan Guo and Hai Zhang and Ben{-}xian Li}, title = {Study on covert networks of terroristic organizations based on text analysis}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {373--378}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5984117}, doi = {10.1109/ISI.2011.5984117}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/SunGZL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/SunN11, author = {Beiming Sun and Vincent T. Y. Ng}, title = {Lifespan and popularity measurement of online content on social networks}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {379--383}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5984118}, doi = {10.1109/ISI.2011.5984118}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/SunN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/TangF11, author = {Zhanyong Tang and Dingyi Fang}, title = {A tamper-proof software watermark using code encryption}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {156--160}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5983991}, doi = {10.1109/ISI.2011.5983991}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/TangF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/TuerhongK11, author = {Gulanbaier Tuerhong and Seoung Bum Kim}, title = {A nonparametric fault isolation approach through hybrid novelty score}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {261--266}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5984094}, doi = {10.1109/ISI.2011.5984094}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/TuerhongK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/WanP11, author = {Yun Wan and William Perry}, title = {Lessons from method: {A} successful Electronic Medical Record {(EMR)} system implementation}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {248--251}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5984091}, doi = {10.1109/ISI.2011.5984091}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/WanP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/Wang11, author = {Michael H. Wang}, title = {A cost-based {FMEA} decision tool for product quality design and management}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {297--302}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5984101}, doi = {10.1109/ISI.2011.5984101}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/Wang11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/WangB11, author = {Xiaofeng Wang and Donald E. Brown}, title = {The spatio-temporal generalized additive model for criminal incidents}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {42--47}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5984048}, doi = {10.1109/ISI.2011.5984048}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/WangB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/WangLP11, author = {Wenbin Wang and Yifang Liu and Michael G. Pecht}, title = {A theoretical model to minimize the operational cost for canary-equipped electronic system's health management}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {233--238}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5984088}, doi = {10.1109/ISI.2011.5984088}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/WangLP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/WangMZB11, author = {Yongqing Wang and Wenji Mao and Daniel Zeng and Ning Bao}, title = {Boosting rank with predictable training error}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {407--409}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5984123}, doi = {10.1109/ISI.2011.5984123}, timestamp = {Mon, 15 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/WangMZB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/WangXNM11, author = {Yan Fu Wang and Min Xie and Kien Ming Ng and Yi Fei Meng}, title = {Quantitative risk analysis model of integrating fuzzy fault tree with Bayesian Network}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {267--271}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5984095}, doi = {10.1109/ISI.2011.5984095}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isi/WangXNM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/WeerasingheFLZ11, author = {Hesiri Weerasinghe and Huirong Fu and Supeng Leng and Ye Zhu}, title = {Enhancing unlinkability in Vehicular Ad Hoc Networks}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {161--166}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5983992}, doi = {10.1109/ISI.2011.5983992}, timestamp = {Tue, 24 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/WeerasingheFLZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/WooSC11, author = {Jiyoung Woo and Jaebong Son and Hsinchun Chen}, title = {An {SIR} model for violent topic diffusion in social media}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {15--19}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5984043}, doi = {10.1109/ISI.2011.5984043}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/WooSC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/XiaoC11, author = {Haidong Xiao and Ning Chen}, title = {Analysis of cyberspace security situational awareness based on fuzz reason}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {316--319}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5984105}, doi = {10.1109/ISI.2011.5984105}, timestamp = {Thu, 23 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/XiaoC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/XiaoCH11, author = {Haidong Xiao and Ning Chen and Yan Hu}, title = {Situational awareness on disruption management: {A} system information propagation approach}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {313--315}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5984104}, doi = {10.1109/ISI.2011.5984104}, timestamp = {Thu, 23 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/XiaoCH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/XingMTP11, author = {Yinjiao Xing and Qiang Miao and Kwok{-}Leung Tsui and Michael G. Pecht}, title = {Prognostics and health monitoring for lithium-ion battery}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {242--247}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5984090}, doi = {10.1109/ISI.2011.5984090}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/XingMTP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/Yang11, author = {Christopher C. Yang}, title = {Preserving privacy in social network integration with {\(\tau\)}-tolerance}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {198--200}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5984001}, doi = {10.1109/ISI.2011.5984001}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/Yang11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/YangBCX11, author = {Maosheng Yang and Yuquan Bi and Yueliang Chen and Li Xu}, title = {Studying on influencing factors of Fretting fatigue life of aluminum alloy}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {335--338}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5984109}, doi = {10.1109/ISI.2011.5984109}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/YangBCX11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/YangTG11, author = {Christopher C. Yang and Xuning Tang and Xiajing Gong}, title = {Identifying Dark Web clusters with temporal coherence analysis}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {167--172}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5983993}, doi = {10.1109/ISI.2011.5983993}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/YangTG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/YuanH11, author = {Jinyu Yuan and Zhixing He}, title = {Empirical analysis on causal relationship between institution and economic development based on {VAR} method}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {309--312}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5984103}, doi = {10.1109/ISI.2011.5984103}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/YuanH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/ZengDW11, author = {Jianping Zeng and Jiangjiao Duan and Chengrong Wu}, title = {Topic discovery based on dual {EM} merging}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {83--88}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5984055}, doi = {10.1109/ISI.2011.5984055}, timestamp = {Thu, 01 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/ZengDW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/ZengLC11, author = {Shuo Zeng and Mingfeng Lin and Hsinchun Chen}, title = {Dynamic user-level affect analysis in social media: Modeling violence in the Dark Web}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {1--6}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5984041}, doi = {10.1109/ISI.2011.5984041}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/ZengLC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/ZhanOC11, author = {Justin Zhan and B. John Oommen and Johanna Crisostomo}, title = {Anomaly detection using weak estimators}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {143--149}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5984065}, doi = {10.1109/ISI.2011.5984065}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/ZhanOC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/ZhangSYLZ11, author = {Bingsen Zhang and Yaping Shi and Houjun Yang and Xiaojie Liu and Anling Zhang}, title = {Research on application of the minimum error average fitting method in computer color matching}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {293--296}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5984100}, doi = {10.1109/ISI.2011.5984100}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/ZhangSYLZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/ZhangTC11, author = {Danfeng Zhang and Xiaoming Tan and Yueliang Chen}, title = {Distribution rule of corrosion damage morphology parameters for aluminum alloy}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {358--361}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5984114}, doi = {10.1109/ISI.2011.5984114}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/ZhangTC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/ZhangZ11, author = {Sai{-}Yin Zhang and Zhong{-}Zhan Zhang}, title = {Analysis of accelerated degradation test under constant stress with errors for longitudinal data}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {320--324}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5984106}, doi = {10.1109/ISI.2011.5984106}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/ZhangZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/ZhangZYC11, author = {Tai Feng Zhang and Wei Yi Zhao and Xiao{-}Hua Yang and Zeng Jie Cai}, title = {Compiling the marine environment spectrum based on inversion satellite remote sensing data}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {354--357}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5984113}, doi = {10.1109/ISI.2011.5984113}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/ZhangZYC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/ZhangZYLZZ11, author = {Bingsen Zhang and Yongchang Zhang and Houjun Yang and Xiaojie Liu and Anling Zhang and Zhongwen Zhang}, title = {Research on numerical analysis for color matching in textile dyeing based on least square Fitting}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {289--292}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5984099}, doi = {10.1109/ISI.2011.5984099}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/ZhangZYLZZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/ZhaoFC11, author = {Ran Zhao and Guochun Fu and Jianhui Cheng}, title = {On the analysis of the applications and social influence of mobile phone reading in the medium and small cities in China: Take the first pilot city Baoding for an example}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {367--372}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5984116}, doi = {10.1109/ISI.2011.5984116}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/ZhaoFC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/ZilbermanDKES11, author = {Polina Zilberman and Shlomi Dolev and Gilad Katz and Yuval Elovici and Asaf Shabtai}, title = {Analyzing group communication for preventing data leakage via email}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {37--41}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5984047}, doi = {10.1109/ISI.2011.5984047}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/ZilbermanDKES11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/isi/2011, title = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/xpl/conhome/5975309/proceeding}, isbn = {978-1-4577-0082-8}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.