share record
persistent URL:
Paul Jen-Hwa Hu , Daniel Dajun Zeng , Hsinchun Chen , Catherine A. Larson , Wei Chang , Chunju Tseng : Evaluating an Infectious Disease Information Sharing and Analysis System. ISI 2005 : 412-417 share record
persistent URL:
Eul-Gyu Im , Yong Ho Song : An Adaptive Approach to Handle DoS Attack for Web Services. ISI 2005 : 634-635 share record
persistent URL:
Vandana Pursnani Janeja , Vijayalakshmi Atluri , Jaideep Vaidya , Nabil R. Adam : Collusion Set Detection Through Outlier Discovery. ISI 2005 : 1-13 share record
persistent URL:
Sundaram Jayakumar , Senthilkumar Chandramohan : Biometric Fingerprints Based Radio Frequency Identification. ISI 2005 : 666-668 share record
persistent URL:
Dae-Ki Kang , Doug Fuller , Vasant G. Honavar : Learning Classifiers for Misuse Detection Using a Bag of System Calls Representation. ISI 2005 : 511-516 share record
persistent URL:
Hilmi Günes Kayacik , Nur Zincir-Heywood : Analysis of Three Intrusion Detection System Benchmark Datasets Using Machine Learning Algorithms. ISI 2005 : 362-367 share record
persistent URL:
Siddharth Kaza , Byron Marshall , Jennifer Jie Xu , Alan Gang Wang , Hemanth Gowda , Homa Atabakhsh , Tim Petersen , Chuck Violette , Hsinchun Chen : BorderSafe: Cross-Jurisdictional Information Sharing, Analysis, and Visualization. ISI 2005 : 669-670 share record
persistent URL:
Sundri K. Khalsa : Forecasting Terrorism: Indicators and Proven Analytic Techniques. ISI 2005 : 561-566 share record
persistent URL:
Suwimon Kooptiwoot , Muhammad Abdus Salam : A New Relationship Form in Data Mining. ISI 2005 : 593-594 share record
persistent URL:
Moshe Koppel , Jonathan Schler , Kfir Zigdon : Automatically Determining an Anonymous Author's Native Language. ISI 2005 : 209-217 share record
persistent URL:
Kameswari Kotapati , Peng Liu , Yan Sun , Thomas F. La Porta : A Taxonomy of Cyber Attacks on 3G Networks. ISI 2005 : 631-633 share record
persistent URL:
Pradeep Kumar , M. Venkateswara Rao , P. Radha Krishna , Raju S. Bapi , Arijit Laha : Intrusion Detection System Using Sequence and Set Preserving Metric. ISI 2005 : 498-504 share record
persistent URL:
Taekyoung Kwon , Hyeonjoon Moon : Multi-modal Biometrics with PKI Technologies for Border Control Applications. ISI 2005 : 99-114 share record
persistent URL:
Guanpi Lai , Fei-Yue Wang : Toward an ITS Specific Knowledge Engine. ISI 2005 : 625-626 share record
persistent URL:
Robert J. Latino : The Application of PROACT® RCA to Terrorism/Counter Terrorism Related Events. ISI 2005 : 579-589 share record
persistent URL:
Seok Won Lee , Robin A. Gandhi , Gail-Joon Ahn , Deepak S. Yavagal : Active Automation of the DITSCAP. ISI 2005 : 479-485 share record
persistent URL:
Haifeng Li , Shuxun Wang , Weiwei Song , Quan Wen : A Novel Watermarking Algorithm Based on SVD and Zernike Moments. ISI 2005 : 448-453 share record
persistent URL:
Haifeng Li , Shuxun Wang , Weiwei Song , Quan Wen : A Blind Image Watermarking Using for Copyright Protection and Tracing. ISI 2005 : 627-628 share record
persistent URL:
Anirban Majumdar , Clark D. Thomborson : On the Use of Opaque Predicates in Mobile Agent Code Obfuscation. ISI 2005 : 648-649 share record
persistent URL:
Michael Manley , Cheri McEntee , Anthony Molet , Joon S. Park : Towards an Effective Wireless Security Policy for Sensitive Organizations. ISI 2005 : 629-630 share record
persistent URL:
Thomas O. Meservy , Matthew L. Jensen , John Kruse , Judee K. Burgoon , Jay F. Nunamaker Jr. : Automatic Extraction of Deceptive Behavioral Cues from Video. ISI 2005 : 198-208 share record
persistent URL:
Kripashankar Mohan , Bhagirath Narahari , Rahul Simha , Paul Ott , Alok N. Choudhary , Joseph Zambreno : Performance Study of a Compiler/Hardware Approach to Embedded Systems Security. ISI 2005 : 543-548 share record
persistent URL:
Syed Naqvi , Michel Riguidel : Securing Grid-Based Critical Infrastructures. ISI 2005 : 654-655 share record
persistent URL:
Young-Hwan Oh , Hae-Young Bae : Enhancing Spatial Database Access Control by Eliminating the Covert Topology Channel. ISI 2005 : 642-643 share record
persistent URL:
Beomsoo Park , Sungjin Hong , Jaewook Oh , Heejo Lee : Defending a Web Browser Against Spying with Browser Helper Objects. ISI 2005 : 638-639 share record
persistent URL:
Robert J. Price , Anthony E. Zukas : Application of Latent Semantic Indexing to Processing of Noisy Text. ISI 2005 : 602-603 share record
persistent URL:
Peter S. Probst : Measuring Success in Countering Terrorism: Problems and Pitfalls. ISI 2005 : 316-321 share record
persistent URL:
Hong Qiao , Fei-Yue Wang , Xianbin Cao : Application of a Decomposed Support Vector Machine Algorithm in Pedestrian Detection from a Moving Vehicle. ISI 2005 : 662-663 share record
persistent URL:
Tiantian Qin , Judee K. Burgoon : An Empirical Study on Dynamic Effects on Deception Detection. ISI 2005 : 597-599 share record
persistent URL:
Jialun Qin , Jennifer Jie Xu , Daning Hu , Marc Sageman , Hsinchun Chen : Analyzing Terrorist Networks: A Case Study of the Global Salafi Jihad Network. ISI 2005 : 287-304