- Jialun Qin, Yilu Zhou, Guanpi Lai, Edna Reid, Marc Sageman, Hsinchun Chen:
The Dark Web Portal Project: Collecting and Analyzing the Presence of Terrorist Groups on the Web. ISI 2005: 623-624 - Don Radlauer:
Incident and Casualty Databases as a Tool for Understanding Low-Intensity Conflicts. ISI 2005: 153-170 - Edna Reid, Hsinchun Chen:
Mapping the Contemporary Terrorism Research Domain: Researchers, Publications, and Institutions Analysis. ISI 2005: 322-339 - Edna Reid, Jialun Qin, Yilu Zhou, Guanpi Lai, Marc Sageman, Gabriel Weimann, Hsinchun Chen:
Collecting and Analyzing the Presence of Terrorists on the Web: A Case Study of Jihad Websites. ISI 2005: 402-411 - Dmitri Roussinov, Jose Antonio Robles-Flores:
How Question Answering Technology Helps to Locate Malevolent Online Content. ISI 2005: 418-421 - Robert P. Schumaker, Hsinchun Chen:
Question Answer TARA: A Terrorism Activity Resource Application. ISI 2005: 619-620 - Yael Shahar:
Toward a Target-Specific Method of Threat Assessment. ISI 2005: 139-152 - Yael Shahar:
Connections in the World of International Terrorism. ISI 2005: 554-560 - Huizhang Shen, Jidi Zhao, Ying Peng:
A Group Decision-Support Method for Search and Rescue Based on Markov Chain. ISI 2005: 590-592 - Joshua Sinai:
A New Conceptual Framework to Resolve Terrorism's Root Causes. ISI 2005: 280-286 - Joshua Sinai:
Forecasting Terrorist Groups' Warfare: 'Conventional' to CBRN. ISI 2005: 567-570 - Ambareen Siraj, Rayford B. Vaughn:
A Cognitive Model for Alert Correlation in a Distributed Environment. ISI 2005: 218-230 - David B. Skillicorn:
Beyond Keyword Filtering for Message and Conversation Detection. ISI 2005: 231-243 - Richard A. Smith:
Background Use of Sensitive Information to Aid in Analysis of Non-sensitive Data on Threats and Vulnerabilities. ISI 2005: 652-653 - Yosef A. Solewicz, Moshe Koppel:
Selective Fusion for Speaker Verification in Surveillance. ISI 2005: 269-279 - Yong Ho Song, Eul-Gyu Im:
Secure Contents Distribution Using Flash Memory Technology. ISI 2005: 650-651 - David R. B. Stockwell, Jason T. L. Wang:
Biomonitoring, Phylogenetics and Anomaly Aggregation Systems. ISI 2005: 523-529 - Wei Sun, Daxin Liu:
Mining Schemas in Semistructured Data Using Fuzzy Decision Trees. ISI 2005: 606-607 - Zhen Sun, Ee-Peng Lim, Kuiyu Chang, Teng-Kwee Ong, Rohan Kumar Gunaratna:
Event-Driven Document Selection for Terrorism Information Extraction. ISI 2005: 37-48 - Shuang Sun, John Yen:
Information Supply Chain: A Unified Framework for Information-Sharing. ISI 2005: 422-428 - Shuming Tang, Haijun Gao:
An Agent-Based Framework for a Traffic Security Management System. ISI 2005: 660-661 - Qing Tao, Gao-wei Wu, Fei-Yue Wang, Jue Wang:
Some Marginal Learning Algorithms for Unsupervised Problems. ISI 2005: 395-401 - Scott Tousley:
The Qualitative Challenge of Insurgency Informatics. ISI 2005: 571-578 - Douglas P. Twitchell, Nicole Forsgren, Karl Wiers, Judee K. Burgoon, Jay F. Nunamaker Jr.:
Detecting Deception in Synchronous Computer-Mediated Communication Using Speech Act Profiling. ISI 2005: 471-478 - Alan Gang Wang, Homa Atabakhsh, Tim Petersen, Hsinchun Chen:
Discovering Identity Problems: A Case Study. ISI 2005: 368-373 - Ke Wang, Benjamin C. M. Fung, Guozhu Dong:
Integrating Private Databases for Data Analysis. ISI 2005: 171-182 - Shiuh-Jeng Wang, Cheng-Hsing Yang:
Gathering Digital Evidence in Response to Information Security Incidents. ISI 2005: 644-645 - Janusz Wnek:
LSI-Based Taxonomy Generation: The Taxonomist System. ISI 2005: 389-394 - Kelvin H. L. Wong, Mingchun Luo:
Computational Tool in Infrastructure Emergency Total Evacuation Analysis. ISI 2005: 536-542 - Zhengyou Xia, Yichuan Jiang, Jian Wang:
Dynamic Security Service Negotiation to Ensure Security for Information Sharing on the Internet. ISI 2005: 640-641