The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "PAISI"( http://dblp.L3S.de/Venues/PAISI )

URL (DBLP): http://dblp.uni-trier.de/db/conf/paisi

Publication years (Num. hits)
2007 (43) 2009 (19) 2010 (19) 2011-2012 (32) 2013-2014 (20) 2015-2016 (24) 2017 (10)
Publication types (Num. hits)
inproceedings(157) proceedings(10)
Venues (Conferences, Journals, ...)
PAISI(167)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 73 occurrences of 68 keywords

Results
Found 167 publication records. Showing 167 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Jau-Hwang Wang, Chien-Lung Lin An Association Model for Implicit Crime Link Analysis. Search on Bibsonomy PAISI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Vakul Mohanty, Dhaval Moliya, Chittaranjan Hota, Muttukrishnan Rajarajan Secure Anonymous Routing for MANETs Using Distributed Dynamic Random Path Selection. Search on Bibsonomy PAISI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Mingwu Zhang, Pengcheng Li, Bo Yang 0003, Hao Wang, Tsuyoshi Takagi Towards Confidentiality of ID-Based Signcryption Schemes under without Random Oracle Model. Search on Bibsonomy PAISI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Fatih Özgül, Zeki Erdem, Chris Bowerman, Julian Bondy Combined Detection Model for Criminal Network Detection. Search on Bibsonomy PAISI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Hsinchun Chen, Michael Chau, Shu-Hsing Li, Shalini R. Urs, Srinath Srinivasa, G. Alan Wang (eds.) Intelligence and Security Informatics, Pacific Asia Workshop, PAISI 2010, Hyderabad, India, June 21, 2010. Proceedings Search on Bibsonomy PAISI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Yongxin Tong, Shilong Ma, Dan Yu, Yuanyuan Zhang, Zhao Li, Ke Xu 0001 Discovering Compatible Top-K Theme Patterns from Text Based on Users' Preferences. Search on Bibsonomy PAISI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Lei Shi, Shenghui Su, Zhengrong Xiang Design of a Passport Anti-forgery System Based on Digital Signature Schemes. Search on Bibsonomy PAISI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Passport anti-forgery, IC chip, Client / server, Algorithm, Digital signature scheme
1Peter Phillips 0001, Ickjai Lee Criminal Cross Correlation Mining and Visualization. Search on Bibsonomy PAISI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Kuo-Tay Chen, Jian-Shuen Lian, Yu-Ting Hsieh Quantifying News Reports to Proxy "Other Information" in ERC Models. Search on Bibsonomy PAISI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF earning response coefficient (ERC) model, textual information, news coverage, news sentiment
1Robert Moskovitch, Clint Feher, Yuval Elovici A Chronological Evaluation of Unknown Malcode Detection. Search on Bibsonomy PAISI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Unknown Malicious File Detection, Classification
1Wei-Yi Yu, Hahn-Ming Lee An Incremental-Learning Method for Supervised Anomaly Detection by Cascading Service Classifier and ITI Decision Tree Methods. Search on Bibsonomy PAISI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF anomaly detection system (ADS), Kohonens’ self-organizing maps (SOM), ITI (incremental tree inducer), KDD’99, K-Means clustering
1Hsinchun Chen, Christopher C. Yang, Michael Chau, Shu-Hsing Li (eds.) Intelligence and Security Informatics, Pacific Asia Workshop, PAISI 2009, Bangkok, Thailand, April 27, 2009. Proceedings Search on Bibsonomy PAISI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Nichnan Kittiphattanabawon, Thanaruk Theeramunkong Relation Discovery from Thai News Articles Using Association Rule Mining. Search on Bibsonomy PAISI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Document Relation, Thai News Document, Text Mining, Association Rule Mining
1Fatih Özgül, Zeki Erdem, Chris Bowerman Prediction of Unsolved Terrorist Attacks Using Group Detection Algorithms. Search on Bibsonomy PAISI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Terrorist groups, crime data mining, matching and predicting crimes, offender networks, group detection, clustering, classification
1Teng Long, Shaojie Qiao, Changjie Tang, Liangxu Liu, Taiyong Li, Jiang Wu E3TP: A Novel Trajectory Prediction Algorithm in Moving Objects Databases. Search on Bibsonomy PAISI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF criminal tracking analysis, hotspot regions, frequent sequential routes, moving objects databases, trajectory prediction
1Paul Wing Hing Kwan, Junbin Gao, Graham Leedham A User-Centered Framework for Adaptive Fingerprint Identification. Search on Bibsonomy PAISI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Adaptive information processing, Biometrics, Relevance feedback, Dimensionality reduction, Fingerprint identification, User-centered
1Kuo-Tay Chen, Tsai-Jyh Chen, Ju-Chun Yen Predicting Future Earnings Change Using Numeric and Textual Information in Financial Reports. Search on Bibsonomy PAISI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Single-index model, earnings prediction, risk sentiment, textual information
1Hsin-Min Lu, Nina WanHsin Huang, Zhu Zhang, Tsai-Jyh Chen Identifying Firm-Specific Risk Statements in News Articles. Search on Bibsonomy PAISI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF epistemic modality, evidentiality, machine learning, Risk management
1Rua-Huan Tsaih, Wanying Lin, Shin-Ying Huang Exploring Fraudulent Financial Reporting with GHSOM. Search on Bibsonomy PAISI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Financial Reporting Fraud, Growing Hierarchical Self-Organizing Map, Knowledge Extraction
1Yan Guo 0001, Yu Wang 0009, Guodong Ding, Donglin Cao, Gang Zhang, Yi Lv Juicer: Scalable Extraction for Thread Meta-information of Web Forum. Search on Bibsonomy PAISI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Bhavani Thuraisingham, Murat Kantarcioglu, Latifur Khan Building a Geosocial Semantic Web for Military Stabilization and Reconstruction Operations. Search on Bibsonomy PAISI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Nattapong Tongtep, Thanaruk Theeramunkong A Feature-Based Approach for Relation Extraction from Thai News Documents. Search on Bibsonomy PAISI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Thai Language Processing, Supervised Learning, Local Features, Relation Extraction, Named Entity Extraction
1Jianbin Ma, Guifa Teng, Yuxin Zhang, Yueli Li, Ying Li A Cybercrime Forensic Method for Chinese Web Information Authorship Analysis. Search on Bibsonomy PAISI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cybercrime forensic, Chinese web information, authorship analysis, Support Vector Machine, feature extraction
1Christopher Torpelund-Bruin, Ickjai Lee When Generalized Voronoi Diagrams Meet GeoWeb for Emergency Management. Search on Bibsonomy PAISI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Yang-ming Ma, Zhitang Li, Jie Lei 0004, Li Wang 0015, Dong Li An Intelligent Agent-Oriented System for Integrating Network Security Devices and Handling Large Amount of Security Events. Search on Bibsonomy PAISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security event, agent, network security, intelligence
1Yungchang Ku, Ying-Chieh Chen, Kuo-Ching Wu, Chaochang Chiu An Empirical Analysis of Online Gaming Crime Characteristics from 2002 to 2004. Search on Bibsonomy PAISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF online gaming crime, virtual property, MMORPG, cybercrime
1Yang Li 0002, Binxing Fang, Li Guo 0001, You Chen TCM-KNN Algorithm for Supervised Network Intrusion Detection. Search on Bibsonomy PAISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF supervised intrusion detection, TCM-KNN algorithm, data mining, machine learning, network security, TCM
1Yong Deng, Jia Xiong, Ping Fu Airline Safety Evaluation Based on Fuzzy TOPSIS. Search on Bibsonomy PAISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Ki-Yoon Kim, Hyoung-Kee Choi A Symptom-Based Taxonomy for an Early Detection of Network Attacks. Search on Bibsonomy PAISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Young-Gab Kim, Jongin Lim 0001 HMM-Based Approach for Evaluating Risk Propagation. Search on Bibsonomy PAISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Chichao Lu, WenYuan Jen, Weiping Chang Trends in Computer Crime and Cybercrime Research During the Period 1974-2006: A Bibliometric Approach. Search on Bibsonomy PAISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Baowen Zhang, Jing Zhang, Ning Zhou, Mingang Chen Evaluating the Disaster Defense Ability of Information Systems. Search on Bibsonomy PAISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Li Jin, Zhengding Lu ASITL: Adaptive Secure Interoperation Using Trust-Level. Search on Bibsonomy PAISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Trust-level, Access Control, Secure Interoperation
1Zhensong Liao, Hai Jin 0001 A RT0-Based Compliance Checker Model for Automated Trust Negotiation. Search on Bibsonomy PAISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Jidi Zhao, Tao Jin, Huizhang Shen A Case-Based Evolutionary Group Decision Support Method for Emergency Response. Search on Bibsonomy PAISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Bayesian Dynamic Forecasting, Emergency Response, CBR, GSS
1Mi Wen, Ling Dong, Yanfei Zheng, Kefei Chen A Framework for Proving the Security of Data Transmission Protocols in Sensor Network. Search on Bibsonomy PAISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Data Transmission Protocol, Sensor Network, Provable Security
1Ickjai Lee, Reece Pershouse, Peter Phillips 0001, Chris Christensen What-if Emergency Management System: A Generalized Voronoi Diagram Approach. Search on Bibsonomy PAISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Christopher C. Yang, Daniel Dajun Zeng, Michael Chau, Kuiyu Chang, Qing Yang, Xueqi Cheng, Jue Wang 0004, Fei-Yue Wang 0001, Hsinchun Chen (eds.) Intelligence and Security Informatics, Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007, Proceedings Search on Bibsonomy PAISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Yu Fu, Cong Jin, Chuanxiang Ma A Novel Relational Database Watermarking Algorithm. Search on Bibsonomy PAISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1William Zhu 0001 Informed Recognition in Software Watermarking. Search on Bibsonomy PAISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Kuiyu Chang, Qi He 0002, Ridzwan Aminuddin, Ridzwan Suri, Ee-Peng Lim Anticipatory Event Detection for Bursty Events. Search on Bibsonomy PAISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Yungchang Ku, Yuchi Chen, Chaochang Chiu A Proposed Data Mining Approach for Internet Auction Fraud Detection. Search on Bibsonomy PAISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Internet auction fraud, fraud detection
1Hyun-A Park, Dong Hoon Lee 0001, Jongin Lim 0001, Sang Hyun Cho PPIDS: Privacy Preserving Intrusion Detection System. Search on Bibsonomy PAISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Host-based IDS, Privacy, Intrusion Detection System, Audit log, Privacy Homomorphism
1Jau-Hwang Wang, Jiing-Long Jow, You-Lu Liao, Tyan-Muh Tsai, Garfield Hung An Overview of Telemarketing Fraud Problems and Countermeasures in Taiwan. Search on Bibsonomy PAISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Huimin Qian, Yaobin Mao, Jason Geng, Zhiquan Wang Object Tracking with Self-updating Tracking Window. Search on Bibsonomy PAISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Quan Qian, Mingjun Xin Research on Hidden Markov Model for System Call Anomaly Detection. Search on Bibsonomy PAISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Host System Calls, Hidden Markov Model, Anomaly Detection
1Hsinchun Chen Exploring Extremism and Terrorism on the Web: The Dark Web Project. Search on Bibsonomy PAISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF terrorism informatics, dark web, intelligence and security informatics
1Eul-Gyu Im, Jung Sik Kim, In Woo Noh, Hyun Jun Jang A Hybrid Model for Worm Simulations in a Large Network. Search on Bibsonomy PAISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Internet incidents, simulation, Network modeling, Internet worms
1Shejie Lu, Jun Li, Zhiyuan Liu, Guohua Cui A Secure Data Transmission Protocol for Mobile Ad Hoc Networks. Search on Bibsonomy PAISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF secure data transmission, malicious behavior judgment, Ad Hoc network, intrusion detection
1Leyi Shi, Chunfu Jia, Shuwang Lü, Zhenhua Liu Port and Address Hopping for Active Cyber-Defense. Search on Bibsonomy PAISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Port and address hopping, Active cyber-defense, Denial of Service, Eavesdropping
1Daniel Dajun Zeng, Zan Huang Link Analysis-Based Detection of Anomalous Communication Patterns. Search on Bibsonomy PAISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1C. X. Wei, Xianbin Cao 0001, Yanwu Xu, Hong Qiao, Fei-Yue Wang 0001 The Treelike Assembly Classifier for Pedestrian Detection. Search on Bibsonomy PAISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Rong Qian, Wei Zhang, Bingru Yang Community Detection in Scale-Free Networks Based on Hypergraph Model. Search on Bibsonomy PAISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF hypergraph model, local density, scale-free, community structure
1Jianjiang Lu, Jinpeng Wang, Yafei Zhang, Bo Zhou 0019, Yanhui Li, Zhuang Miao An Inference Control Algorithm for RDF(S) Repository. Search on Bibsonomy PAISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Qiudan Li, Yaodong Li, Huiguang He, Guanggang Geng, Yuanping Zhu, Chunheng Wang Providing Personalized Services for HWME System by Item-Based Collaborative Filtering. Search on Bibsonomy PAISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Hao Tu, Zhitang Li, Bin Liu 0013 Detecting Botnets by Analyzing DNS Traffic. Search on Bibsonomy PAISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Haiguang Chen, Peng Han, Xi Zhou, Chuanshan Gao Lightweight Anomaly Intrusion Detection in Wireless Sensor Networks. Search on Bibsonomy PAISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Anomaly intrusion, Key feature, Security, Wireless sensor network, IDSs
1Yujun Zheng 0001, Jinquan Wang, Jinyun Xue Agent Based Framework for Emergency Rescue and Assistance Planning. Search on Bibsonomy PAISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Xin Xu, Yongqiang Sun, Zunguo Huang Defending DDoS Attacks Using Hidden Markov Models and Cooperative Reinforcement Learning. Search on Bibsonomy PAISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Daniel Dajun Zeng, Li Zhang, Donghua Wei, Fei-Yue Wang 0001 A Web Portal for Terrorism Activities in China. Search on Bibsonomy PAISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Yuan-Fa Chen, Sandy Yu-Lan Yeh, Kuo-Ching Wu The Study of Government Website Information Disclosure in Taiwan. Search on Bibsonomy PAISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Wenji Mao, Daniel Dajun Zeng, Li Zhang, Donghua Wei, Fei-Yue Wang 0001 Social Modeling and Reasoning for Security Informatics. Search on Bibsonomy PAISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Qihong Liu, Changjie Tang, Shaojie Qiao, Qiwei Liu, Fenlian Wen Mining the Core Member of Terrorist Crime Group Based on Social Network Analysis. Search on Bibsonomy PAISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Christopher C. Yang, Tobun D. Ng, Jau-Hwang Wang, Chih-Ping Wei, Hsinchun Chen Analyzing and Visualizing Gray Web Forum Structure. Search on Bibsonomy PAISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Gray Web forum, security informatics, information visualization, information extraction, social network analysis
1Hyungwoo Kang, Dong Hoon Lee 0001 Security Assessment for Application Network Services Using Fault Injection. Search on Bibsonomy PAISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF RPC (Remote Procedure Call), Fault injection, Buffer overflow, Software security, Security assessment
1Flora S. Tsai, Kap Luk Chan Detecting Cyber Security Threats in Weblogs Using Probabilistic Models. Search on Bibsonomy PAISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF cyber terrorism, data mining, blog, weblog, probabilistic latent semantic analysis, cyber security, cyber crime
1Zhitang Li, Jie Lei 0004, Li Wang 0015, Dong Li, Yang-ming Ma Towards Identifying True Threat from Network Security Data. Search on Bibsonomy PAISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
Displaying result #101 - #167 of 167 (100 per page; Change: )
Pages: [<<][1][2]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license