2005 share record
persistent URL:
Ahmed Abbasi , Hsinchun Chen : Applying Authorship Analysis to Arabic Web Content. ISI 2005 : 183-197 share record
persistent URL:
Evrim Acar , Seyit Ahmet Çamtepe , Mukkai S. Krishnamoorthy , Bülent Yener : Modeling and Multiway Analysis of Chatroom Tensors. ISI 2005 : 256-268 export record
dblp key:
conf/isi/Aleman-MezaBEPS05 share record
persistent URL:
Boanerges Aleman-Meza , Phillip Burns , Matthew Eavenson , Devanand Palaniswami , Amit P. Sheth : An Ontological Approach to the Document Access Problem of Insider Threat. ISI 2005 : 486-491 export record
dblp key:
conf/isi/Aleman-MezaHSSA05 share record
persistent URL:
Boanerges Aleman-Meza , Christian Halaschek-Wiener , Satya Sanket Sahoo , Amit P. Sheth , Ismailcem Budak Arpinar : Template Based Semantic Similarity for Security Applications. ISI 2005 : 621-622 share record
persistent URL:
Antonio Badia , Mehmed M. Kantardzic : Link Analysis Tools for Intelligence and Counterterrorism. ISI 2005 : 49-59 share record
persistent URL:
Jeffrey Baumes , Mark K. Goldberg , Malik Magdon-Ismail : Efficient Identification of Overlapping Communities. ISI 2005 : 27-36 share record
persistent URL:
Clive Best , Erik Van der Goot , Monica de Paola : Thematic Indicators Derived from World News Reports. ISI 2005 : 436-447 share record
persistent URL:
Mihaela Bobeica , Jean-Paul Jéral , Teofilo Garcia , Clive Best : A Study of "Root Causes of Conflict" Using Latent Semantic Analysis. ISI 2005 : 595-596 share record
persistent URL:
Roger B. Bradford : Efficient Discovery of New Information in Large Text Databases. ISI 2005 : 374-380 share record
persistent URL:
Guoray Cai , Alan M. MacEachren , Isaac Brewer , Michael D. McNeese , Rajeev Sharma , Sven Fuhrmann : Map-Mediated GeoCollaborative Crisis Management. ISI 2005 : 429-435 share record
persistent URL:
Ana Isabel Canhoto , James Backhouse : Anti Money Laundering Reporting and Investigation - Sorting the Wheat from the Chaff. ISI 2005 : 600-601 share record
persistent URL:
Xianbin Cao , Hong Qiao , Fei-Yue Wang , Xinzheng Zhang : Application of Cooperative Co-evolution in Pedestrian Detection Systems. ISI 2005 : 664-665 share record
persistent URL:
Yufeng Chen , Yabo Dong , Dongming Lu , Yunhe Pan : The Multi-fractal Nature of Worm and Normal Traffic at Individual Source Level. ISI 2005 : 505-510 share record
persistent URL:
Rui Chen , Raj Sharman , H. Raghav Rao , Shambhu J. Upadhyaya : Design Principles of Coordinated Multi-incident Emergency Response Systems. ISI 2005 : 81-98 share record
persistent URL:
Xinjian Chen , Jie Tian , Qi Su , Xin Yang , Fei-Yue Wang : A Secured Mobile Phone Based on Embedded Fingerprint Recognition Systems. ISI 2005 : 549-553 share record
persistent URL:
Gregory J. Conti , Mustaque Ahamad , Robert Norback : Filtering, Fusion and Dynamic Information Presentation: Towards a General Information Firewall. ISI 2005 : 492-497 share record
persistent URL:
Ram Dantu , João W. Cangussu : An Architecture for Network Security Using Feedback Control. ISI 2005 : 636-637 share record
persistent URL:
Ram Dantu , João W. Cangussu , Janos Turi : Sensitivity Analysis of an Attack Containment Model. ISI 2005 : 127-138 share record
persistent URL:
Ram Dantu , Prakash Kolan : Risk Management Using Behavior Based Bayesian Networks. ISI 2005 : 115-126 share record
persistent URL:
David Davis , Allison Frendak-Blume , Jennifer Wheeler , Alexander E. R. Woodcock , Clarence Worrell III : A Conceptual Model of Counterterrorist Operations. ISI 2005 : 305-315 share record
persistent URL:
Boyd Davis , Vivian Lord , Peyton Mason : More Than a Summary: Stance-Shift Analysis. ISI 2005 : 608-609 share record
persistent URL:
Alan J. Demers , Johannes Gehrke , Mingsheng Hong , Mirek Riedewald : Processing High-Speed Intelligence Feeds in Real-Time. ISI 2005 : 617-618 share record
persistent URL:
Laura Dugan , Gary LaFree , Alex R. Piquero : Testing a Rational Choice Model of Airline Hijackings. ISI 2005 : 340-361 share record
persistent URL:
Yuval Elovici , Bracha Shapira , Mark Last , Omer Zaafrany , Menahem Friedman , Moti Schneider , Abraham Kandel : Content-Based Detection of Terrorists Browsing the Web Using an Advanced Terror Detection System (ATDS). ISI 2005 : 244-255 share record
persistent URL:
John Galloway , Simeon J. Simoff : Digging in the Details: A Case Study in Network Data Mining. ISI 2005 : 14-26 share record
persistent URL:
Olga Gelbart , Paul Ott , Bhagirath Narahari , Rahul Simha , Alok N. Choudhary , Joseph Zambreno : CODESSEAL: Compiler/FPGA Approach to Secure Applications. ISI 2005 : 530-535 share record
persistent URL:
Nazli Goharian , Ling Ma , Chris Meyers : Detecting Misuse of Information Retrieval Systems Using Data Mining Techniques. ISI 2005 : 604-605 share record
persistent URL:
Xiaoyan Gong , Haijun Gao : A Framework for Global Monitoring and Security Assistance Based on IPv6 and Multimedia Data Mining Techniques. ISI 2005 : 658-659 share record
persistent URL:
Zeng-Guang Hou : Principal Component Analysis (PCA) for Data Fusion and Navigation of Mobile Robots. ISI 2005 : 610-611 share record
persistent URL:
Xiaohua Hu , Illhoi Yoo , Peter Rumm , Michael E. Atwood : Mining Candidate Viruses as Potential Bio-terrorism Weapons from Biomedical Literature. ISI 2005 : 60-71