|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 73 occurrences of 68 keywords
|
|
|
Results
Found 167 publication records. Showing 167 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Jau-Hwang Wang, Chien-Lung Lin |
An Association Model for Implicit Crime Link Analysis. |
PAISI |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Vakul Mohanty, Dhaval Moliya, Chittaranjan Hota, Muttukrishnan Rajarajan |
Secure Anonymous Routing for MANETs Using Distributed Dynamic Random Path Selection. |
PAISI |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Mingwu Zhang, Pengcheng Li, Bo Yang 0003, Hao Wang, Tsuyoshi Takagi |
Towards Confidentiality of ID-Based Signcryption Schemes under without Random Oracle Model. |
PAISI |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Fatih Özgül, Zeki Erdem, Chris Bowerman, Julian Bondy |
Combined Detection Model for Criminal Network Detection. |
PAISI |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Hsinchun Chen, Michael Chau, Shu-Hsing Li, Shalini R. Urs, Srinath Srinivasa, G. Alan Wang (eds.) |
Intelligence and Security Informatics, Pacific Asia Workshop, PAISI 2010, Hyderabad, India, June 21, 2010. Proceedings |
PAISI |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Yongxin Tong, Shilong Ma, Dan Yu, Yuanyuan Zhang, Zhao Li, Ke Xu 0001 |
Discovering Compatible Top-K Theme Patterns from Text Based on Users' Preferences. |
PAISI |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Lei Shi, Shenghui Su, Zhengrong Xiang |
Design of a Passport Anti-forgery System Based on Digital Signature Schemes. |
PAISI |
2009 |
DBLP DOI BibTeX RDF |
Passport anti-forgery, IC chip, Client / server, Algorithm, Digital signature scheme |
1 | Peter Phillips 0001, Ickjai Lee |
Criminal Cross Correlation Mining and Visualization. |
PAISI |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Kuo-Tay Chen, Jian-Shuen Lian, Yu-Ting Hsieh |
Quantifying News Reports to Proxy "Other Information" in ERC Models. |
PAISI |
2009 |
DBLP DOI BibTeX RDF |
earning response coefficient (ERC) model, textual information, news coverage, news sentiment |
1 | Robert Moskovitch, Clint Feher, Yuval Elovici |
A Chronological Evaluation of Unknown Malcode Detection. |
PAISI |
2009 |
DBLP DOI BibTeX RDF |
Unknown Malicious File Detection, Classification |
1 | Wei-Yi Yu, Hahn-Ming Lee |
An Incremental-Learning Method for Supervised Anomaly Detection by Cascading Service Classifier and ITI Decision Tree Methods. |
PAISI |
2009 |
DBLP DOI BibTeX RDF |
anomaly detection system (ADS), Kohonens’ self-organizing maps (SOM), ITI (incremental tree inducer), KDD’99, K-Means clustering |
1 | Hsinchun Chen, Christopher C. Yang, Michael Chau, Shu-Hsing Li (eds.) |
Intelligence and Security Informatics, Pacific Asia Workshop, PAISI 2009, Bangkok, Thailand, April 27, 2009. Proceedings |
PAISI |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Nichnan Kittiphattanabawon, Thanaruk Theeramunkong |
Relation Discovery from Thai News Articles Using Association Rule Mining. |
PAISI |
2009 |
DBLP DOI BibTeX RDF |
Document Relation, Thai News Document, Text Mining, Association Rule Mining |
1 | Fatih Özgül, Zeki Erdem, Chris Bowerman |
Prediction of Unsolved Terrorist Attacks Using Group Detection Algorithms. |
PAISI |
2009 |
DBLP DOI BibTeX RDF |
Terrorist groups, crime data mining, matching and predicting crimes, offender networks, group detection, clustering, classification |
1 | Teng Long, Shaojie Qiao, Changjie Tang, Liangxu Liu, Taiyong Li, Jiang Wu |
E3TP: A Novel Trajectory Prediction Algorithm in Moving Objects Databases. |
PAISI |
2009 |
DBLP DOI BibTeX RDF |
criminal tracking analysis, hotspot regions, frequent sequential routes, moving objects databases, trajectory prediction |
1 | Paul Wing Hing Kwan, Junbin Gao, Graham Leedham |
A User-Centered Framework for Adaptive Fingerprint Identification. |
PAISI |
2009 |
DBLP DOI BibTeX RDF |
Adaptive information processing, Biometrics, Relevance feedback, Dimensionality reduction, Fingerprint identification, User-centered |
1 | Kuo-Tay Chen, Tsai-Jyh Chen, Ju-Chun Yen |
Predicting Future Earnings Change Using Numeric and Textual Information in Financial Reports. |
PAISI |
2009 |
DBLP DOI BibTeX RDF |
Single-index model, earnings prediction, risk sentiment, textual information |
1 | Hsin-Min Lu, Nina WanHsin Huang, Zhu Zhang, Tsai-Jyh Chen |
Identifying Firm-Specific Risk Statements in News Articles. |
PAISI |
2009 |
DBLP DOI BibTeX RDF |
epistemic modality, evidentiality, machine learning, Risk management |
1 | Rua-Huan Tsaih, Wanying Lin, Shin-Ying Huang |
Exploring Fraudulent Financial Reporting with GHSOM. |
PAISI |
2009 |
DBLP DOI BibTeX RDF |
Financial Reporting Fraud, Growing Hierarchical Self-Organizing Map, Knowledge Extraction |
1 | Yan Guo 0001, Yu Wang 0009, Guodong Ding, Donglin Cao, Gang Zhang, Yi Lv |
Juicer: Scalable Extraction for Thread Meta-information of Web Forum. |
PAISI |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Bhavani Thuraisingham, Murat Kantarcioglu, Latifur Khan |
Building a Geosocial Semantic Web for Military Stabilization and Reconstruction Operations. |
PAISI |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Nattapong Tongtep, Thanaruk Theeramunkong |
A Feature-Based Approach for Relation Extraction from Thai News Documents. |
PAISI |
2009 |
DBLP DOI BibTeX RDF |
Thai Language Processing, Supervised Learning, Local Features, Relation Extraction, Named Entity Extraction |
1 | Jianbin Ma, Guifa Teng, Yuxin Zhang, Yueli Li, Ying Li |
A Cybercrime Forensic Method for Chinese Web Information Authorship Analysis. |
PAISI |
2009 |
DBLP DOI BibTeX RDF |
cybercrime forensic, Chinese web information, authorship analysis, Support Vector Machine, feature extraction |
1 | Christopher Torpelund-Bruin, Ickjai Lee |
When Generalized Voronoi Diagrams Meet GeoWeb for Emergency Management. |
PAISI |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Yang-ming Ma, Zhitang Li, Jie Lei 0004, Li Wang 0015, Dong Li |
An Intelligent Agent-Oriented System for Integrating Network Security Devices and Handling Large Amount of Security Events. |
PAISI |
2007 |
DBLP DOI BibTeX RDF |
security event, agent, network security, intelligence |
1 | Yungchang Ku, Ying-Chieh Chen, Kuo-Ching Wu, Chaochang Chiu |
An Empirical Analysis of Online Gaming Crime Characteristics from 2002 to 2004. |
PAISI |
2007 |
DBLP DOI BibTeX RDF |
online gaming crime, virtual property, MMORPG, cybercrime |
1 | Yang Li 0002, Binxing Fang, Li Guo 0001, You Chen |
TCM-KNN Algorithm for Supervised Network Intrusion Detection. |
PAISI |
2007 |
DBLP DOI BibTeX RDF |
supervised intrusion detection, TCM-KNN algorithm, data mining, machine learning, network security, TCM |
1 | Yong Deng, Jia Xiong, Ping Fu |
Airline Safety Evaluation Based on Fuzzy TOPSIS. |
PAISI |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Ki-Yoon Kim, Hyoung-Kee Choi |
A Symptom-Based Taxonomy for an Early Detection of Network Attacks. |
PAISI |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Young-Gab Kim, Jongin Lim 0001 |
HMM-Based Approach for Evaluating Risk Propagation. |
PAISI |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Chichao Lu, WenYuan Jen, Weiping Chang |
Trends in Computer Crime and Cybercrime Research During the Period 1974-2006: A Bibliometric Approach. |
PAISI |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Baowen Zhang, Jing Zhang, Ning Zhou, Mingang Chen |
Evaluating the Disaster Defense Ability of Information Systems. |
PAISI |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Li Jin, Zhengding Lu |
ASITL: Adaptive Secure Interoperation Using Trust-Level. |
PAISI |
2007 |
DBLP DOI BibTeX RDF |
Trust-level, Access Control, Secure Interoperation |
1 | Zhensong Liao, Hai Jin 0001 |
A RT0-Based Compliance Checker Model for Automated Trust Negotiation. |
PAISI |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Jidi Zhao, Tao Jin, Huizhang Shen |
A Case-Based Evolutionary Group Decision Support Method for Emergency Response. |
PAISI |
2007 |
DBLP DOI BibTeX RDF |
Bayesian Dynamic Forecasting, Emergency Response, CBR, GSS |
1 | Mi Wen, Ling Dong, Yanfei Zheng, Kefei Chen |
A Framework for Proving the Security of Data Transmission Protocols in Sensor Network. |
PAISI |
2007 |
DBLP DOI BibTeX RDF |
Data Transmission Protocol, Sensor Network, Provable Security |
1 | Ickjai Lee, Reece Pershouse, Peter Phillips 0001, Chris Christensen |
What-if Emergency Management System: A Generalized Voronoi Diagram Approach. |
PAISI |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Christopher C. Yang, Daniel Dajun Zeng, Michael Chau, Kuiyu Chang, Qing Yang, Xueqi Cheng, Jue Wang 0004, Fei-Yue Wang 0001, Hsinchun Chen (eds.) |
Intelligence and Security Informatics, Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007, Proceedings |
PAISI |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Yu Fu, Cong Jin, Chuanxiang Ma |
A Novel Relational Database Watermarking Algorithm. |
PAISI |
2007 |
DBLP DOI BibTeX RDF |
|
1 | William Zhu 0001 |
Informed Recognition in Software Watermarking. |
PAISI |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Kuiyu Chang, Qi He 0002, Ridzwan Aminuddin, Ridzwan Suri, Ee-Peng Lim |
Anticipatory Event Detection for Bursty Events. |
PAISI |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Yungchang Ku, Yuchi Chen, Chaochang Chiu |
A Proposed Data Mining Approach for Internet Auction Fraud Detection. |
PAISI |
2007 |
DBLP DOI BibTeX RDF |
Internet auction fraud, fraud detection |
1 | Hyun-A Park, Dong Hoon Lee 0001, Jongin Lim 0001, Sang Hyun Cho |
PPIDS: Privacy Preserving Intrusion Detection System. |
PAISI |
2007 |
DBLP DOI BibTeX RDF |
Host-based IDS, Privacy, Intrusion Detection System, Audit log, Privacy Homomorphism |
1 | Jau-Hwang Wang, Jiing-Long Jow, You-Lu Liao, Tyan-Muh Tsai, Garfield Hung |
An Overview of Telemarketing Fraud Problems and Countermeasures in Taiwan. |
PAISI |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Huimin Qian, Yaobin Mao, Jason Geng, Zhiquan Wang |
Object Tracking with Self-updating Tracking Window. |
PAISI |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Quan Qian, Mingjun Xin |
Research on Hidden Markov Model for System Call Anomaly Detection. |
PAISI |
2007 |
DBLP DOI BibTeX RDF |
Host System Calls, Hidden Markov Model, Anomaly Detection |
1 | Hsinchun Chen |
Exploring Extremism and Terrorism on the Web: The Dark Web Project. |
PAISI |
2007 |
DBLP DOI BibTeX RDF |
terrorism informatics, dark web, intelligence and security informatics |
1 | Eul-Gyu Im, Jung Sik Kim, In Woo Noh, Hyun Jun Jang |
A Hybrid Model for Worm Simulations in a Large Network. |
PAISI |
2007 |
DBLP DOI BibTeX RDF |
Internet incidents, simulation, Network modeling, Internet worms |
1 | Shejie Lu, Jun Li, Zhiyuan Liu, Guohua Cui |
A Secure Data Transmission Protocol for Mobile Ad Hoc Networks. |
PAISI |
2007 |
DBLP DOI BibTeX RDF |
secure data transmission, malicious behavior judgment, Ad Hoc network, intrusion detection |
1 | Leyi Shi, Chunfu Jia, Shuwang Lü, Zhenhua Liu |
Port and Address Hopping for Active Cyber-Defense. |
PAISI |
2007 |
DBLP DOI BibTeX RDF |
Port and address hopping, Active cyber-defense, Denial of Service, Eavesdropping |
1 | Daniel Dajun Zeng, Zan Huang |
Link Analysis-Based Detection of Anomalous Communication Patterns. |
PAISI |
2007 |
DBLP DOI BibTeX RDF |
|
1 | C. X. Wei, Xianbin Cao 0001, Yanwu Xu, Hong Qiao, Fei-Yue Wang 0001 |
The Treelike Assembly Classifier for Pedestrian Detection. |
PAISI |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Rong Qian, Wei Zhang, Bingru Yang |
Community Detection in Scale-Free Networks Based on Hypergraph Model. |
PAISI |
2007 |
DBLP DOI BibTeX RDF |
hypergraph model, local density, scale-free, community structure |
1 | Jianjiang Lu, Jinpeng Wang, Yafei Zhang, Bo Zhou 0019, Yanhui Li, Zhuang Miao |
An Inference Control Algorithm for RDF(S) Repository. |
PAISI |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Qiudan Li, Yaodong Li, Huiguang He, Guanggang Geng, Yuanping Zhu, Chunheng Wang |
Providing Personalized Services for HWME System by Item-Based Collaborative Filtering. |
PAISI |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Hao Tu, Zhitang Li, Bin Liu 0013 |
Detecting Botnets by Analyzing DNS Traffic. |
PAISI |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Haiguang Chen, Peng Han, Xi Zhou, Chuanshan Gao |
Lightweight Anomaly Intrusion Detection in Wireless Sensor Networks. |
PAISI |
2007 |
DBLP DOI BibTeX RDF |
Anomaly intrusion, Key feature, Security, Wireless sensor network, IDSs |
1 | Yujun Zheng 0001, Jinquan Wang, Jinyun Xue |
Agent Based Framework for Emergency Rescue and Assistance Planning. |
PAISI |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Xin Xu, Yongqiang Sun, Zunguo Huang |
Defending DDoS Attacks Using Hidden Markov Models and Cooperative Reinforcement Learning. |
PAISI |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Daniel Dajun Zeng, Li Zhang, Donghua Wei, Fei-Yue Wang 0001 |
A Web Portal for Terrorism Activities in China. |
PAISI |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Yuan-Fa Chen, Sandy Yu-Lan Yeh, Kuo-Ching Wu |
The Study of Government Website Information Disclosure in Taiwan. |
PAISI |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Wenji Mao, Daniel Dajun Zeng, Li Zhang, Donghua Wei, Fei-Yue Wang 0001 |
Social Modeling and Reasoning for Security Informatics. |
PAISI |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Qihong Liu, Changjie Tang, Shaojie Qiao, Qiwei Liu, Fenlian Wen |
Mining the Core Member of Terrorist Crime Group Based on Social Network Analysis. |
PAISI |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Christopher C. Yang, Tobun D. Ng, Jau-Hwang Wang, Chih-Ping Wei, Hsinchun Chen |
Analyzing and Visualizing Gray Web Forum Structure. |
PAISI |
2007 |
DBLP DOI BibTeX RDF |
Gray Web forum, security informatics, information visualization, information extraction, social network analysis |
1 | Hyungwoo Kang, Dong Hoon Lee 0001 |
Security Assessment for Application Network Services Using Fault Injection. |
PAISI |
2007 |
DBLP DOI BibTeX RDF |
RPC (Remote Procedure Call), Fault injection, Buffer overflow, Software security, Security assessment |
1 | Flora S. Tsai, Kap Luk Chan |
Detecting Cyber Security Threats in Weblogs Using Probabilistic Models. |
PAISI |
2007 |
DBLP DOI BibTeX RDF |
cyber terrorism, data mining, blog, weblog, probabilistic latent semantic analysis, cyber security, cyber crime |
1 | Zhitang Li, Jie Lei 0004, Li Wang 0015, Dong Li, Yang-ming Ma |
Towards Identifying True Threat from Network Security Data. |
PAISI |
2007 |
DBLP DOI BibTeX RDF |
|
Displaying result #101 - #167 of 167 (100 per page; Change: ) Pages: [ <<][ 1][ 2] |
|