


default search action
11th ISI 2013: Seattle, WA, USA
- Kristin Glass, Richard Colbaugh, Antonio Sanfilippo, Anne Kao, Michael Gabbay, Courtney D. Corley, Jiexun Li, Latifur Khan, Adam Wynne, Lisa Coote, Wenji Mao, Daniel Zeng, Ahmad Yaghoobi:

2013 IEEE International Conference on Intelligence and Security Informatics, Seattle, WA, USA, June 4-7, 2013. IEEE 2013, ISBN 978-1-4673-6214-6 - Welcome message from conference co-chairs.

- Fabrizio Albertetti

, Paul Cotofrei, Lionel Grossrieder, Olivier Ribaux
, Kilian Stoffel:
Crime linkage: A fuzzy MCDM approach. 1-3 - Evmorfia N. Argyriou, Aikaterini A. Sotiraki

, Antonios Symvonis
:
Occupational fraud detection through visualization. 4-6 - Olga Babko-Malaya, Daniel Hunter, Andy Seidel, Fotios Barlos:

Flexible creation of indicators of scientific and technological emergence: Emerging phenomena and big data. 7-9 - Yolanda S. Baker, Rajeev Agrawal

, Sambit Bhattacharya:
Analyzing security threats as reported by the United States Computer Emergency Readiness Team (US-CERT). 10-12 - Travis L. Bauer, Daniel Garcia, Richard Colbaugh, Kristin Glass:

Detecting collaboration from behavior. 13-15 - Victor A. Benjamin, Wingyan Chung, Ahmed Abbasi

, Joshua Chuang, Catherine A. Larson, Hsinchun Chen:
Evaluating text visualization: An experiment in authorship analysis. 16-20 - Victor A. Benjamin, Hsinchun Chen:

Machine learning for attack vector identification in malicious source code. 21-23 - Lauren Bradel, Jessica Zeitz Self, Alex Endert, Mahmud Shahriar Hossain, Chris North, Naren Ramakrishnan

:
How analysts cognitively "connect the dots". 24-26 - Roger B. Bradford:

Use of latent semantic indexing to identify name variants in large data collections. 27-32 - Joel Brynielsson, Fredrik Johansson, Anders Westling:

Learning to classify emotional content in crisis-related tweets. 33-38 - Yingjie Victor Chen, Zhenyu Cheryl Qian:

From when and what to where: Linking spatio-temporal visualizations in visual analytics. 39-44 - Richard Colbaugh, Kristin Glass, Travis L. Bauer:

Dynamic information-theoretic measures for security informatics. 45-49 - Richard Colbaugh, Kristin Glass:

Moving target defense for adaptive adversaries. 50-55 - Ryan Compton, Craig Lee, Tsai-Ching Lu, Lalindra De Silva, Michael Macy:

Detecting future social unrest in unprocessed Twitter data: "Emerging phenomena and big data". 56-60 - Courtney D. Corley, Chase P. Dowling, Stuart J. Rose, Taylor McKenzie:

SociAL Sensor Analytics: Measuring phenomenology at scale. 61-66 - Dave DeBarr, Venkatesh Ramanathan, Harry Wechsler:

Phishing detection using traffic behavior, spectral clustering, and random forests. 67-72 - Zakariya Dehlawi, Norah Abokhodair:

Saudi Arabia's response to cyber conflict: A case study of the Shamoon malware incident. 73-75 - Sihao Ding, Qiang Zhai, Yuan F. Zheng, Dong Xuan:

Side-view face authentication based on wavelet and random forest with subsets. 76-81 - Honglu Du, Heng Xu, Mary Beth Rosson, John M. Carroll

:
Effects of Fear appeals and point of reference on the persuasiveness of IT security communications. 82-84 - Vinayak Elangovan

, Amjad Alkilani, Amir Shirkhodaie:
A multi-modality attributes representation scheme for Group Activity characterization and data fusion. 85-90 - Yolanda Gil

:
Towards task-centered network models through semantic workflows. 91-93 - Frank L. Greitzer, Thomas E. Carroll

, Adam D. Roberts:
Cyber friendly fire: Research challenges for security informatics. 94-99 - Siddharth Gupta, Casey Hanson, Carl A. Gunter, Mario Frank, David M. Liebovitz

, Bradley A. Malin
:
Modeling and detecting anomalous topic access. 100-105 - Kevin W. Hamlen:

Stealthy software: Next-generation cyber-attacks and defenses. 109-112 - Duncan Hodges

, Sadie Creese:
Building a better intelligence machine: A new approach to capability review and development. 113-115 - Luwen Huangfu, Wenji Mao, Daniel Zeng, Lei Wang:

OCC model-based emotion extraction from online reviews. 116-121 - James R. Johnson:

Information graphs of event threads: Identifying and building forward and backward event threads for societal events. 122-128 - John R. Johnson, Emilie Hogan:

A graph analytic metric for mitigating advanced persistent threat. 129-133 - Irfan E. Kanat

, Sathananda Siloju, T. S. Raghu, Ajay S. Vinze:
Gamification of emergency response training: A public health example. 134-136 - Anne Kao, William Ferng, Stephen R. Poteet, Lesley Quach, Rodney Tjoelker:

TALISON - Tensor analysis of social media data. 137-142 - Gabi Kedma, Mordechai Guri, Tom Sela, Yuval Elovici:

Analyzing users' web surfing patterns to trace terrorists and criminals. 143-145 - Brendan Kitts, Jing Ying Zhang, Albert Roux, Ron Mills:

Click Fraud Detection with Bot Signatures. 146-150 - Brendan Kitts, Jing Ying Zhang, Gang Wu, Raj Mahato:

Click fraud botnet detection by calculating mix adjusted traffic value: A method for de-cloaking click fraud attacks that is resistant to spoofing. 151-153 - Qingchao Kong, Wenji Mao, Daniel Zeng:

Predicting user participation in social networking sites. 154-156 - Donald R. Kretz, Charles W. Granderson:

An interdisciplinary approach to studying and improving terrorism analysis. 157-159 - C. E. Lamb, David B. Skillicorn

:
Detecting deception in interrogation settings. 160-162 - Minh Tam Le, John Sweeney, Matthew Lawlor, Steven W. Zucker:

Discovering thematic structure in political datasets. 163-165 - Li Liu, Yuanzhuo Wang, Jing Ding:

Stochastic game model for information dissemination of emergency events in social network. 166-168 - Pedro D. Manrique, Hong Qi, Ana Morgenstern, Nicolas Velasquez

, Tsai-Ching Lu, Neil F. Johnson:
Context matters: Improving the uses of big data for forecasting civil unrest: Emerging phenomena and big data. 169-172 - Rudolph Louis Mappus IV, Erica Briscoe:

Layered behavioral trace modeling for threat detection. 173-175 - David Matsumoto, Hyisung C. Hwang:

Differences between individuals with and without experience with assault in identifying facial signs of imminent aggression. 176-178 - Benjamin A. Miller, Nicholas Arcolano, Nadya T. Bliss:

Efficient anomaly detection in dynamic, attributed graphs: Emerging phenomena and big data. 179-184 - Jonathan Mugan, Eric McDermid

, Abbey McGrew, Laura Hitt:
Identifying groups of interest through temporal analysis and event response monitoring. 185-190 - Josephine M. Namayanja, Vandana Pursnani Janeja:

Discovery of persistent threat structures through temporal and geo-spatial characterization in evolving networks. 191-196 - Kenneth C. Olson, Christopher W. Karvetski:

Improving expert judgment by coherence weighting. 197-199 - Simon F. Pratt, Philippe J. Giabbanelli, Jean-Sebastien Mercier:

Detecting unfolding crises with Visual Analytics and Conceptual Maps Emerging phenomena and big data. 200-205 - Alan S. Ratner, Phillip Kelly:

Anomalies in network traffic. 206-208 - Andrew A. Reid, Mohammad A. Tayebi, Richard Frank:

Exploring the structural characteristics of social networks in a large criminal court database. 209-214 - Edna F. Reid:

Crowdsourcing and gamification techniques in Inspire (AQAP online magazine). 215-220 - William N. Reynolds, William J. Salter, Robert M. Farber, Courtney D. Corley, Chase P. Dowling, William O. Beeman

, Lynn Smith-Lovin, Joon Nak Choi:
Sociolect-based community detection. 221-226 - Bob G. Schlicher, Robert K. Abercrombie

, Lee M. Hively:
Conceptual framework to enable early warning of relevant phenomena "Emerging phenomena and big data". 227-229 - Hamed Yaghoubi Shahir, Uwe Glässer, Narek Nalbandyan, Hans Wehn:

Maritime situation analysis. 230-232 - Yanmin Shang, Peng Zhang, Yanan Cao, Li Guo:

Behavioral targeting with social regularization. 233-238 - David B. Skillicorn

, Edna F. Reid:
Language use in Inspire magazine. 239-244 - Justin Song, Valerie Spicer, Patricia L. Brantingham:

The edge effect: Exploring high crime zones near residential neighborhoods. 245-250 - Lora Weiss, Erica Briscoe, Walter Wright, Sim Harbert, Keith Kline, John Horgan, Lily Cushenbery, Casey Hilland:

A model docking system for understanding radicalization. 251-253 - David Zage, Kristin Glass, Richard Colbaugh:

Improving supply chain security using big data. 254-259 - Jessica Zeitz Self, Rebecca Zeitz, Chris North, Alan L. Breitler:

Auto-Highlighter: Identifying Salient Sentences in Text. 260-262 - Chen Zhong

, Deepak S. Kirubakaran, John Yen, Peng Liu, Steve E. Hutchinson, Hasan Cam:
How to use experience in cyber analysis: An analytical reasoning support system. 263-265 - Luca Cazzanti, Courosh Mehanian, Julie Penzotti, Doug Scott, Oliver Downs:

Unsupervised ranking and characterization of differentiated clusters. 266 - Laura Hitt, Matt McClain:

Identifying threatening networks from transactional data. 267 - Doowon Kim, Chaitanya Achan, Jinsuk Baek, Paul S. Fisher:

Implementation of framework to identify potential phishing websites. 268 - Wesley Brandi, Brendan Kitts, Raj Mahato, Jing Ying Zhang:

Armored ads. 269 - Sangho Lee, Da Young Ju:

Assessment of malicious applications using permissions and enhanced user interfaces on Android. 270 - Po-Ruey Lei:

Exploring trajectory behavior model for anomaly detection in maritime moving objects. 271 - Sadi Evren Seker

, Cihan Mert, Khaled Al-Naami, Ugur Ayan, Nuri Ozalp:
Ensemble classification over stock market time series and economy news. 272-273 - Peng Su, Dan Zhu, Daniel Dajun Zeng:

A new pruning method for resolving conflicts in actionable behavioral rules. 274 - Carrie Gates, Sophie Engle

:
Reflecting on visualization for cyber security. 275-277 - Christopher W. Berardi, Erin Treacy Solovey

, Mary L. Cummings:
Investigating the efficacy of network visualizations for intelligence tasks. 278-283 - Nicklaus A. Giacobe, Michael D. McNeese, Vincent F. Mancuso, Dev Minotra

:
Capturing human cognition in cyber-security simulations with NETS. 284-288 - John Donahue, Anand Paturi, Srinivas Mukkamala:

Visualization techniques for efficient malware detection. 289-291 - John T. Langton, Alex Baker:

Information visualization metrics and methods for cyber security evaluation. 292-294 - Ziyad Alshaikh, Abdulrahman Alarifi, Mansour Alsaleh:

Christopher Alexander's fifteen properties: Toward developing evaluation metrics for security visualizations. 295-300 - Nathan A. Baker

, Jonathan L. Barr
, George T. Bonheyo
, Cliff A. Joslyn
, Kannan Krishnaswami, Mark E. Oxley, Rich Quadrel, Landon H. Sego, Mark F. Tardiff, Adam S. Wynne:
Research towards a systematic signature discovery process. 301-308 - Alexander M. Venzin, Mark E. Oxley, Nathaniel Beagley:

An investigation into label fusion on sparse data. 309-314 - Emilie Hogan, John R. Johnson, Mahantesh Halappanavar, Chaomei Lo:

Graph analytics for signature discovery. 315-320 - Shan Suthaharan

, Laxmi Sunkara, Sweta Keshapagu:
Lame' curve-based signature discovery learning technique for network traffic classification. 321-326 - Arun V. Sathanur, Vikram Jandhyala, Chuanjia Xing:

Capturing signatures of anomalous behavior in online social networks. 327-329 - Elena S. Peterson, Darren S. Curtis

, Aaron R. Phillips, Jeremy Teuton
, Christopher S. Oehmen
:
A generalized bio-inspired method for discovering sequence-based signatures. 330-332 - Ka Yee Yeung:

Signature discovery for personalized medicine. 333-338 - Zoe N. Gastelum, Amanda M. White, Paul D. Whitney, Luke J. Gosink, Landon H. Sego:

The lifecycle of Bayesian network models developed for Multi-Source Signature assessment of Nuclear Programs. 339-345 - Landon H. Sego, Aimee E. Holmes, Luke J. Gosink, Bobbie-Jo M. Webb-Robertson

, Helen W. Kreuzer, Richard M. Anderson, Alan J. Brothers, Courtney D. Corley, Mark R. Tardiff:
Assessing the quality of bioforensic signatures. 346-351 - Yarden Livnat, Elizabeth Jurrus, Adi V. Gundlapalli, Per Gestland:

The CommonGround visual paradigm for biosurveillance. 352-357 - Arun V. Sathanur, Vikram Jandhyala, Chuanjia Xing:

PHYSENSE: Scalable sociological interaction models for influence estimation on online social networks. 358-363 - Daniel C. Krawczyk

, James Bartlett, Murat Kantarcioglu, Kevin W. Hamlen, Bhavani Thuraisingham:
Measuring expertise and bias in cyber security using cognitive and neuroscience approaches. 364-367 - Ansheng Ge, Wenji Mao, Daniel Zeng, Lei Wang:

Action knowledge extraction from Web text. 368-370 - Zhu Zhang, Xiaolong Zheng, Daniel Dajun Zeng, Kainan Cui, Chuan Luo, Saike He, Scott Leischow:

Discovering seasonal patterns of smoking behavior using online search information. 371-373 - Jie Wang, Xuwei Liang:

Discovering the rating pattern of online reviewers through data coclustering. 374-376 - Chase P. Dowling, Courtney D. Corley, Robert M. Farber, William N. Reynolds:

Jargon and graph modularity on twitter. 381-383

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














