The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "WISI"( http://dblp.L3S.de/Venues/WISI )

URL (DBLP): http://dblp.uni-trier.de/db/conf/wisi

Publication years (Num. hits)
2006 (34)
Publication types (Num. hits)
inproceedings(33) proceedings(1)
Venues (Conferences, Journals, ...)
WISI(34)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 2 occurrences of 2 keywords

Results
Found 34 publication records. Showing 34 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1You-Lu Liao, Cynthia Tsai Analysis of Computer Crime Characteristics in Taiwan. Search on Bibsonomy WISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Taek Lee, Hoh Peter In, Eul-Gyu Im, Heejo Lee Cascade Damage Estimation Model for Internet Attacks. Search on Bibsonomy WISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Johan Huysmans, David Martens, Bart Baesens, Jan Vanthienen, Tony Van Gestel Country Corruption Analysis with Self Organizing Maps and Support Vector Machines. Search on Bibsonomy WISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Pilsung Kang 0001, Sunghoon Park, Sungzoon Cho, Seongseob Hwang, Hyoungjoo Lee The Effectiveness of Artificial Rhythms and Cues in Keystroke Dynamics Based User Authentication. Search on Bibsonomy WISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Patrick S. Chen, K. C. Chang, Tai-Ping Hsing, Shihchieh Chou Mining Criminal Databases to Finding Investigation Clues-By Example of Stolen Automobiles Database. Search on Bibsonomy WISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Shaojie Qiao, Changjie Tang, Jing Peng, Hongjian Fan, Yong Xiang VCCM Mining: Mining Virtual Community Core Members Based on Gene Expression Programming. Search on Bibsonomy WISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Jialun Qin, Yilu Zhou, Edna Reid, Guanpi Lai, Hsinchun Chen Unraveling International Terrorist Groups' Exploitation of the Web: Technical Sophistication, Media Richness, and Web Interactivity. Search on Bibsonomy WISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Zhen Sun, Ee-Peng Lim INEXT: An Investigative Search Tool for Knowledge Extraction. Search on Bibsonomy WISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF knowledge extraction, Document ranking
1Dan Li 0002, Kefei Wang, Jitender S. Deogun A Fuzzy Anomaly Detection System. Search on Bibsonomy WISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Ickjai Lee, Hossein Ghodosi Privacy and Security Enhanced Offline Oblivious Transfer for Massive Data Distribution. Search on Bibsonomy WISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Peter Phillips 0001, Ickjai Lee Mining Positive Associations of Urban Criminal Activities Using Hierarchical Crime Hot Spots. Search on Bibsonomy WISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Zeng-Guang Hou, Min Tan 0001 Design of an Emergency Prediction and Prevention Platform for Societal Security Decision Support Using Neural Networks. Search on Bibsonomy WISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Mark Last, Alex Markov, Abraham Kandel Multi-lingual Detection of Terrorist Content on the Web. Search on Bibsonomy WISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Tang Jun A Cross Datasets Referring Outlier Detection Model Applied to Suspicious Financial Transaction Discrimination. Search on Bibsonomy WISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1SeongKi Kim, WanJin Park, Seok Kyoo Kim, Sunil Ahn, Sangyong Han Integration of a Cryptographic File System and Access Control. Search on Bibsonomy WISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Liang Li, Jie Tian 0001, Xin Yang 0001 A Novel Identity Authentication Technique Without Trustworthy Third-Party Based on Fingerprint Verification. Search on Bibsonomy WISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1WenYuan Jen, Weiping Chang, Shihchieh Chou Cybercrime in Taiwan - An Analysis of Suspect Records. Search on Bibsonomy WISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Tara Whalen, Carrie Gates Defender Personality Traits. Search on Bibsonomy WISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Huizhang Shen, Jidi Zhao, Huanchen Wang Illegal Intrusion Detection Based on Hidden Information Database. Search on Bibsonomy WISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1William Zhu 0001, Clark D. Thomborson, Fei-Yue Wang 0001 Applications of Homomorphic Functions to Software Obfuscation. Search on Bibsonomy WISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Clifton Phua, Vincent C. S. Lee, Ross W. Gayler, Kate A. Smith Temporal Representation in Spike Detection of Sparse Personal Identity Streams. Search on Bibsonomy WISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Hsinchun Chen, Fei-Yue Wang 0001, Christopher C. Yang, Daniel Dajun Zeng, Michael Chau, Kuiyu Chang (eds.) Intelligence and Security Informatics, International Workshop, WISI 2006, Singapore, April 9, 2006, Proceedings Search on Bibsonomy WISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Seongseob Hwang, Hyoungjoo Lee, Sungzoon Cho Improving Authentication Accuracy of Unfamiliar Passwords with Pauses and Cues for Keystroke Dynamics-Based Authentication. Search on Bibsonomy WISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Jue Wang 0004, Fei-Yue Wang 0001, Daniel Dajun Zeng Rule+Exception Learning-Based Class Specification and Labeling in Intelligence and Security Analysis. Search on Bibsonomy WISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Feng Xie, Shuo Bai Detecting Novel Network Attacks with a Data Field. Search on Bibsonomy WISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Bhavani M. Thuraisingham Data Mining for Security Applications. Search on Bibsonomy WISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Eun-Jun Yoon, Kee-Young Yoo A New Secure Key Exchange Protocol Between STB and Smart Card in DTV Broadcasting. Search on Bibsonomy WISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Fei-Yue Wang 0001 A Computational Framework for Decision Analysis and Support in ISI: Artificial Societies, Computational Experiments, and Parallel Systems. Search on Bibsonomy WISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Zhiyong Liu 0001, Hong Qiao Hidden Markov Model Based Intrusion Detection. Search on Bibsonomy WISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Baihua Xiao, Huiguang He, Yaodong Li, Chunheng Wang Cyberspace Community Analysis and Simulation Using Complex Dynamic Social Networks. Search on Bibsonomy WISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Sabah S. Al-Fedaghi Security Model for Informational Privacy. Search on Bibsonomy WISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Dongbin Zhao, Jianqiang Yi Analysis of Infectious Disease Data Based on Evolutionary Computation. Search on Bibsonomy WISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Qing Tao, Gao-wei Wu, Jue Wang 0004 One-Class Strategies for Security Information Detection. Search on Bibsonomy WISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Hyun-Ho Kang, Brian M. Kurkoski, Young-Ran Park, Sanguk Shin, Kazuhiko Yamaguchi, Kingo Kobayashi A Viable System for Tracing Illegal Users of Video. Search on Bibsonomy WISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #34 of 34 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license