Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Achim Osswald |
For You, Me, Them? - Choosing Designated Communities for Personal Digital Archiving. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: Everything Changes, Everything Stays the Same? Understanding Information Spaces. Proceedings of the 15th International Symposium of Information Science, ISI 2017, Berlin, Germany, March 13-15, 2017., pp. 362-364, 2017, Verlag Werner Hülsbusch, 978-3-86488-117-6. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Dirk Lewandowski, Sebastian Sünkler, Friederike Kerkmann |
Are Ads on Google Search Engine Results Pages Labeled Clearly Enough? - The Influence of Knowledge on Search Ads on Users' Selection Behaviour. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: Everything Changes, Everything Stays the Same? Understanding Information Spaces. Proceedings of the 15th International Symposium of Information Science, ISI 2017, Berlin, Germany, March 13-15, 2017., pp. 62-74, 2017, Verlag Werner Hülsbusch, 978-3-86488-117-6. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Elisabeth Vogler, Christoph Schindler 0001, Alexander Botte, Marc Rittberger |
Are Altmetrics Effective in Transdisciplinary Research Fields? - Altmetric Coverage of Outputs in Educational Research. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: Everything Changes, Everything Stays the Same? Understanding Information Spaces. Proceedings of the 15th International Symposium of Information Science, ISI 2017, Berlin, Germany, March 13-15, 2017., pp. 203-215, 2017, Verlag Werner Hülsbusch, 978-3-86488-117-6. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Anthea Moravánszky |
How Can Social Software Enhance Training Measures within Software Implementations in the Financial Sector? ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: Everything Changes, Everything Stays the Same? Understanding Information Spaces. Proceedings of the 15th International Symposium of Information Science, ISI 2017, Berlin, Germany, March 13-15, 2017., pp. 343-347, 2017, Verlag Werner Hülsbusch, 978-3-86488-117-6. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Alexandra Linhart |
Google Now and User Data - A Diary Study on Perceptions of Collection and Use of Personal Data by Google Now Cards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: Everything Changes, Everything Stays the Same? Understanding Information Spaces. Proceedings of the 15th International Symposium of Information Science, ISI 2017, Berlin, Germany, March 13-15, 2017., pp. 281-284, 2017, Verlag Werner Hülsbusch, 978-3-86488-117-6. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Fabian Muster |
Data Strategy Model - A Reference Model to Develop Data Strategies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: Everything Changes, Everything Stays the Same? Understanding Information Spaces. Proceedings of the 15th International Symposium of Information Science, ISI 2017, Berlin, Germany, March 13-15, 2017., pp. 274-277, 2017, Verlag Werner Hülsbusch, 978-3-86488-117-6. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Fabian Odoni |
Development of Knowledge Management Performance Metrics for Enterprise Social Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: Everything Changes, Everything Stays the Same? Understanding Information Spaces. Proceedings of the 15th International Symposium of Information Science, ISI 2017, Berlin, Germany, March 13-15, 2017., pp. 314-320, 2017, Verlag Werner Hülsbusch, 978-3-86488-117-6. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Eva-Maria Meier, Patricia Böhm, Christian Wolff 0001 |
Comparing Heuristic Walkthrough and User Studies in Evaluating Digital Appliances. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: Everything Changes, Everything Stays the Same? Understanding Information Spaces. Proceedings of the 15th International Symposium of Information Science, ISI 2017, Berlin, Germany, March 13-15, 2017., pp. 146-157, 2017, Verlag Werner Hülsbusch, 978-3-86488-117-6. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Fabian Odoni, Wolfgang Semar, Elena Mastrandrea |
VICI - Visualisation of Collaboration in Social Enterprise Software Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: Everything Changes, Everything Stays the Same? Understanding Information Spaces. Proceedings of the 15th International Symposium of Information Science, ISI 2017, Berlin, Germany, March 13-15, 2017., pp. 386-388, 2017, Verlag Werner Hülsbusch, 978-3-86488-117-6. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Antje Michel |
"Information and Learning" - Research at the Interface between Information Science and the Learning Sciences. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: Everything Changes, Everything Stays the Same? Understanding Information Spaces. Proceedings of the 15th International Symposium of Information Science, ISI 2017, Berlin, Germany, March 13-15, 2017., pp. 264-268, 2017, Verlag Werner Hülsbusch, 978-3-86488-117-6. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Corinna Breitinger, Bela Gipp |
Virtual Patent - Enabling the Traceability of Ideas Shared Online Using Decentralized Trusted Timestamping. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: Everything Changes, Everything Stays the Same? Understanding Information Spaces. Proceedings of the 15th International Symposium of Information Science, ISI 2017, Berlin, Germany, March 13-15, 2017., pp. 89-95, 2017, Verlag Werner Hülsbusch, 978-3-86488-117-6. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Vera Hillebrand, Elke Greifeneder |
International Degree Mobility in Library and Information Science. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: Everything Changes, Everything Stays the Same? Understanding Information Spaces. Proceedings of the 15th International Symposium of Information Science, ISI 2017, Berlin, Germany, March 13-15, 2017., pp. 371-373, 2017, Verlag Werner Hülsbusch, 978-3-86488-117-6. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Ze Li, Duoyong Sun, Kun Cai, Bo Li 0030 |
Tie strength still matters: Investigating interaction patterns of Al-Qaeda network in terror operations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: 2017 IEEE International Conference on Intelligence and Security Informatics, ISI 2017, Beijing, China, July 22-24, 2017, pp. 37-42, 2017, IEEE, 978-1-5090-6727-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Carlos Caminha, Vasco Furtado |
Impact of human mobility on police allocation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: 2017 IEEE International Conference on Intelligence and Security Informatics, ISI 2017, Beijing, China, July 22-24, 2017, pp. 125-127, 2017, IEEE, 978-1-5090-6727-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Neda Abdelhamid, Fadi A. Thabtah, Hussein Abdel-jaber |
Phishing detection: A recent intelligent machine learning comparison based on models content and features. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: 2017 IEEE International Conference on Intelligence and Security Informatics, ISI 2017, Beijing, China, July 22-24, 2017, pp. 72-77, 2017, IEEE, 978-1-5090-6727-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Peng Su, Yuqin Zhao, Jian Yang, Zhenpeng Li |
A new approach to security informatics: Actionable behavioral rules mining (ABRM). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: 2017 IEEE International Conference on Intelligence and Security Informatics, ISI 2017, Beijing, China, July 22-24, 2017, pp. 197, 2017, IEEE, 978-1-5090-6727-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Yasmeen Alufaisan, Yan Zhou 0001, Murat Kantarcioglu, Bhavani Thuraisingham |
Hacking social network data mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: 2017 IEEE International Conference on Intelligence and Security Informatics, ISI 2017, Beijing, China, July 22-24, 2017, pp. 54-59, 2017, IEEE, 978-1-5090-6727-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Qian Li, Xiu-cun Wang |
The impact of different perceived support dimensions of mobile media APP users on customer commitment and customer recommendation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: 2017 IEEE International Conference on Intelligence and Security Informatics, ISI 2017, Beijing, China, July 22-24, 2017, pp. 146-148, 2017, IEEE, 978-1-5090-6727-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Saike He, Xiaolong Zheng 0001, Daniel Zeng 0001 |
Modeling online collective emotions through knowledge transfer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: 2017 IEEE International Conference on Intelligence and Security Informatics, ISI 2017, Beijing, China, July 22-24, 2017, pp. 194-196, 2017, IEEE, 978-1-5090-6727-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Aaron Zimba, Zhaoshun Wang, Hongsong Chen |
Reasoning crypto ransomware infection vectors with Bayesian networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: 2017 IEEE International Conference on Intelligence and Security Informatics, ISI 2017, Beijing, China, July 22-24, 2017, pp. 149-151, 2017, IEEE, 978-1-5090-6727-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Hongliang Liang, Yan Song, Da Xiao |
An end-to-end model for Android malware detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: 2017 IEEE International Conference on Intelligence and Security Informatics, ISI 2017, Beijing, China, July 22-24, 2017, pp. 140-142, 2017, IEEE, 978-1-5090-6727-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Xiangfei Kong, Wenji Mao |
Ranking events based on user relevant query. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: 2017 IEEE International Conference on Intelligence and Security Informatics, ISI 2017, Beijing, China, July 22-24, 2017, pp. 134-136, 2017, IEEE, 978-1-5090-6727-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Pengshuai Cui, Peidong Zhu, Peng Xun, Zhuoqun Xia |
Enhance the robustness of cyber-physical systems by adding interdependency. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: 2017 IEEE International Conference on Intelligence and Security Informatics, ISI 2017, Beijing, China, July 22-24, 2017, pp. 203, 2017, IEEE, 978-1-5090-6727-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Wangyan Feng, Wenfeng Yan, Shuning Wu, Ningwei Liu |
Wavelet transform and unsupervised machine learning to detect insider threat on cloud file-sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: 2017 IEEE International Conference on Intelligence and Security Informatics, ISI 2017, Beijing, China, July 22-24, 2017, pp. 155-157, 2017, IEEE, 978-1-5090-6727-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Junjie Lin, Wenji Mao, Daniel Zeng 0001 |
Topic and user based refinement for competitive perspective identification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: 2017 IEEE International Conference on Intelligence and Security Informatics, ISI 2017, Beijing, China, July 22-24, 2017, pp. 131-133, 2017, IEEE, 978-1-5090-6727-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Aaron Zimba, Zhaoshun Wang |
On Man-In-The-Cloud (MITC) attacks: The analytical case of Linux. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: 2017 IEEE International Conference on Intelligence and Security Informatics, ISI 2017, Beijing, China, July 22-24, 2017, pp. 170-172, 2017, IEEE, 978-1-5090-6727-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Guandan Chen, Qingchao Kong, Wenji Mao |
An attention-based neural popularity prediction model for social media events. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: 2017 IEEE International Conference on Intelligence and Security Informatics, ISI 2017, Beijing, China, July 22-24, 2017, pp. 161-163, 2017, IEEE, 978-1-5090-6727-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Emma McMahon, Ryan Williams, Malaka El, Sagar Samtani, Mark W. Patton, Hsinchun Chen |
Assessing medical device vulnerabilities on the Internet of Things. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: 2017 IEEE International Conference on Intelligence and Security Informatics, ISI 2017, Beijing, China, July 22-24, 2017, pp. 176-178, 2017, IEEE, 978-1-5090-6727-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Song Sun, Qiudan Li, Peng Yan, Daniel Dajun Zeng |
Mapping users across social media platforms by integrating text and structure information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: 2017 IEEE International Conference on Intelligence and Security Informatics, ISI 2017, Beijing, China, July 22-24, 2017, pp. 113-118, 2017, IEEE, 978-1-5090-6727-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Wingyan Chung |
Developing curricular modules for cybersecurity informatics: An active learning approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: 2017 IEEE International Conference on Intelligence and Security Informatics, ISI 2017, Beijing, China, July 22-24, 2017, pp. 164-166, 2017, IEEE, 978-1-5090-6727-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Dmitry Devyatkin, Ivan V. Smirnov, Ananyeva Margarita, Maria Kobozeva, Chepovskiy Andrey, Solovyev Fyodor |
Exploring linguistic features for extremist texts detection (on the material of Russian-speaking illegal texts). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: 2017 IEEE International Conference on Intelligence and Security Informatics, ISI 2017, Beijing, China, July 22-24, 2017, pp. 188-190, 2017, IEEE, 978-1-5090-6727-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | |
2017 IEEE International Conference on Intelligence and Security Informatics, ISI 2017, Beijing, China, July 22-24, 2017 ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![IEEE, 978-1-5090-6727-5 The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
1 | Ravi Barreira, Vládia Pinheiro, Vasco Furtado |
A framework for digital forensics analysis based on semantic role labeling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: 2017 IEEE International Conference on Intelligence and Security Informatics, ISI 2017, Beijing, China, July 22-24, 2017, pp. 66-71, 2017, IEEE, 978-1-5090-6727-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Linpeng Chai, Bin Zhang |
An identity-based one-off public key scheme for privacy preservation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: 2017 IEEE International Conference on Intelligence and Security Informatics, ISI 2017, Beijing, China, July 22-24, 2017, pp. 199, 2017, IEEE, 978-1-5090-6727-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Chiyu Cai, Linjing Li, Daniel Zeng 0001 |
Web-derived Emotional Word Detection in social media using Latent Semantic information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: 2017 IEEE International Conference on Intelligence and Security Informatics, ISI 2017, Beijing, China, July 22-24, 2017, pp. 95-100, 2017, IEEE, 978-1-5090-6727-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Sonya H. Y. Hsu, Steven J. Dick |
Information sharing & cyber threats. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: 2017 IEEE International Conference on Intelligence and Security Informatics, ISI 2017, Beijing, China, July 22-24, 2017, pp. 89-94, 2017, IEEE, 978-1-5090-6727-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Charles Feng, Shuning Wu, Ningwei Liu |
A user-centric machine learning framework for cyber security operations center. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: 2017 IEEE International Conference on Intelligence and Security Informatics, ISI 2017, Beijing, China, July 22-24, 2017, pp. 173-175, 2017, IEEE, 978-1-5090-6727-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Saike He, Xiaolong Zheng 0001, Daniel Zeng 0001 |
The dynamics of health sentiments with competitive interactions in social media. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: 2017 IEEE International Conference on Intelligence and Security Informatics, ISI 2017, Beijing, China, July 22-24, 2017, pp. 101-106, 2017, IEEE, 978-1-5090-6727-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Josephine K. Chow, Xiangyang Li, Xenia Mountrouidou |
Raising flags: Detecting covert storage channels using relative entropy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: 2017 IEEE International Conference on Intelligence and Security Informatics, ISI 2017, Beijing, China, July 22-24, 2017, pp. 25-30, 2017, IEEE, 978-1-5090-6727-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Jin-Seong Kim, Im Young Jung |
Android app protection using same identifier attack defensor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: 2017 IEEE International Conference on Intelligence and Security Informatics, ISI 2017, Beijing, China, July 22-24, 2017, pp. 201, 2017, IEEE, 978-1-5090-6727-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Yuhao Zhang, Wenji Mao, Daniel Zeng 0001 |
Topic evolution modeling in social media short texts based on recurrent semantic dependent CRP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: 2017 IEEE International Conference on Intelligence and Security Informatics, ISI 2017, Beijing, China, July 22-24, 2017, pp. 119-124, 2017, IEEE, 978-1-5090-6727-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Beibei Tian, Feifei Zheng, Yuqi Cao |
Research on the relationship between informatization level and global competitiveness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: 2017 IEEE International Conference on Intelligence and Security Informatics, ISI 2017, Beijing, China, July 22-24, 2017, pp. 198, 2017, IEEE, 978-1-5090-6727-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Keyi Li, Yang Li, Jianyi Liu, Ru Zhang, Xi Duan |
Attack pattern mining algorithm based on security log. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: 2017 IEEE International Conference on Intelligence and Security Informatics, ISI 2017, Beijing, China, July 22-24, 2017, pp. 205, 2017, IEEE, 978-1-5090-6727-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Wei Wang 0137, Ming Zhu, Jinlin Wang 0001, Xuewen Zeng, Zhongzhen Yang |
End-to-end encrypted traffic classification with one-dimensional convolution neural networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: 2017 IEEE International Conference on Intelligence and Security Informatics, ISI 2017, Beijing, China, July 22-24, 2017, pp. 43-48, 2017, IEEE, 978-1-5090-6727-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Ryan Williams, Emma McMahon, Sagar Samtani, Mark W. Patton, Hsinchun Chen |
Identifying vulnerabilities of consumer Internet of Things (IoT) devices: A scalable approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: 2017 IEEE International Conference on Intelligence and Security Informatics, ISI 2017, Beijing, China, July 22-24, 2017, pp. 179-181, 2017, IEEE, 978-1-5090-6727-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Sreyasee Das Bhattacharjee, Ashit Talukder, Ehab Al-Shaer, Pratik Doshi |
Prioritized active learning for malicious URL detection using weighted text-based features. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: 2017 IEEE International Conference on Intelligence and Security Informatics, ISI 2017, Beijing, China, July 22-24, 2017, pp. 107-112, 2017, IEEE, 978-1-5090-6727-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Lu Luo, Peng Cao, Dazhong Mu |
Research on high-resolution imaging technology to extract the halftone-dot-information by iPhone. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: 2017 IEEE International Conference on Intelligence and Security Informatics, ISI 2017, Beijing, China, July 22-24, 2017, pp. 202, 2017, IEEE, 978-1-5090-6727-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Mehdi Yousefi, Nhamo Mtetwa, Yan Zhang 0047, Huaglory Tianfield |
A novel approach for analysis of attack graph. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: 2017 IEEE International Conference on Intelligence and Security Informatics, ISI 2017, Beijing, China, July 22-24, 2017, pp. 7-12, 2017, IEEE, 978-1-5090-6727-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Malaka El, Emma McMahon, Sagar Samtani, Mark W. Patton, Hsinchun Chen |
Benchmarking vulnerability scanners: An experiment on SCADA devices and scientific instruments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: 2017 IEEE International Conference on Intelligence and Security Informatics, ISI 2017, Beijing, China, July 22-24, 2017, pp. 83-88, 2017, IEEE, 978-1-5090-6727-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Chiyu Cai, Linjing Li, Daniel Zeng 0001 |
Behavior enhanced deep bot detection in social media. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: 2017 IEEE International Conference on Intelligence and Security Informatics, ISI 2017, Beijing, China, July 22-24, 2017, pp. 128-130, 2017, IEEE, 978-1-5090-6727-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | John Grisham, Sagar Samtani, Mark W. Patton, Hsinchun Chen |
Identifying mobile malware and key threat actors in online hacker forums for proactive cyber threat intelligence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: 2017 IEEE International Conference on Intelligence and Security Informatics, ISI 2017, Beijing, China, July 22-24, 2017, pp. 13-18, 2017, IEEE, 978-1-5090-6727-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Rodney R. Rohrmann, Vincent J. Ercolani, Mark W. Patton |
Large scale port scanning through tor using parallel Nmap scans to scan large portions of the IPv4 range. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: 2017 IEEE International Conference on Intelligence and Security Informatics, ISI 2017, Beijing, China, July 22-24, 2017, pp. 185-187, 2017, IEEE, 978-1-5090-6727-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Zhichao Cheng, Fanping Zeng, Xingqiu Zhong, Mingsong Zhou, Chengcheng Lv, Shuli Guo |
Resolving reflection methods in Android applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: 2017 IEEE International Conference on Intelligence and Security Informatics, ISI 2017, Beijing, China, July 22-24, 2017, pp. 143-145, 2017, IEEE, 978-1-5090-6727-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Yen-Lung Lai, Bok-Min Goi, Tong-Yuen Chai |
Alignment-free indexing-first-one hashing with bloom filter integration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: 2017 IEEE International Conference on Intelligence and Security Informatics, ISI 2017, Beijing, China, July 22-24, 2017, pp. 78-82, 2017, IEEE, 978-1-5090-6727-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Zihao Liu, Bin Zhang, Ning Zhu, Lixun Li |
Hierarchical network threat situation assessment method for DDoS based on D-S evidence theory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: 2017 IEEE International Conference on Intelligence and Security Informatics, ISI 2017, Beijing, China, July 22-24, 2017, pp. 49-53, 2017, IEEE, 978-1-5090-6727-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Tuomo Hiippala |
Recognizing military vehicles in social media images using deep learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: 2017 IEEE International Conference on Intelligence and Security Informatics, ISI 2017, Beijing, China, July 22-24, 2017, pp. 60-65, 2017, IEEE, 978-1-5090-6727-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Jie Bai, Linjing Li, Lan Lu, Yanwu Yang, Daniel Zeng 0001 |
Real-time prediction of meme burst. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: 2017 IEEE International Conference on Intelligence and Security Informatics, ISI 2017, Beijing, China, July 22-24, 2017, pp. 167-169, 2017, IEEE, 978-1-5090-6727-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Wingyan Chung, Elizabeth Mustaine, Daniel Zeng 0001 |
Criminal intelligence surveillance and monitoring on social media: Cases of cyber-trafficking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: 2017 IEEE International Conference on Intelligence and Security Informatics, ISI 2017, Beijing, China, July 22-24, 2017, pp. 191-193, 2017, IEEE, 978-1-5090-6727-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | C. Y. Tseung, Kam-Pui Chow, X. Zhang |
Extended abstract: Anti-DDoS technique using self-learning bloom filter. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: 2017 IEEE International Conference on Intelligence and Security Informatics, ISI 2017, Beijing, China, July 22-24, 2017, pp. 204, 2017, IEEE, 978-1-5090-6727-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Xiaohui Han, Lianhai Wang, Shujiang Xu, Guangqi Liu, Dawei Zhao |
Linking social network accounts by modeling user spatiotemporal habits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: 2017 IEEE International Conference on Intelligence and Security Informatics, ISI 2017, Beijing, China, July 22-24, 2017, pp. 19-24, 2017, IEEE, 978-1-5090-6727-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Nan Xu |
Analyzing multimodal public sentiment based on hierarchical semantic attentional network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: 2017 IEEE International Conference on Intelligence and Security Informatics, ISI 2017, Beijing, China, July 22-24, 2017, pp. 152-154, 2017, IEEE, 978-1-5090-6727-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Hongyuan Ma, Ou Tao, Chunlu Zhao, Pengxiao Li, Lihong Wang |
Impact of replacement policies on static-dynamic query results cache in web search engines. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: 2017 IEEE International Conference on Intelligence and Security Informatics, ISI 2017, Beijing, China, July 22-24, 2017, pp. 137-139, 2017, IEEE, 978-1-5090-6727-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Canchu Lin, Jenell L. S. Wittmer |
Proactive information security behavior and individual creativity: Effects of group culture and decentralized IT governance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: 2017 IEEE International Conference on Intelligence and Security Informatics, ISI 2017, Beijing, China, July 22-24, 2017, pp. 1-6, 2017, IEEE, 978-1-5090-6727-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Christopher Schon, Niall M. Adams, Marina Evangelou |
Clustering and monitoring edge behaviour in enterprise network traffic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: 2017 IEEE International Conference on Intelligence and Security Informatics, ISI 2017, Beijing, China, July 22-24, 2017, pp. 31-36, 2017, IEEE, 978-1-5090-6727-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Su Hou, Tianliang Lu, Yanhui Du, Jing Guo |
Static detection of Android malware based on improved random forest algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: 2017 IEEE International Conference on Intelligence and Security Informatics, ISI 2017, Beijing, China, July 22-24, 2017, pp. 200, 2017, IEEE, 978-1-5090-6727-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Hsin-Hsiung Huang, Zijing Wang, Wingyan Chung |
Efficient parameter selection for SVM: The case of business intelligence categorization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: 2017 IEEE International Conference on Intelligence and Security Informatics, ISI 2017, Beijing, China, July 22-24, 2017, pp. 158-160, 2017, IEEE, 978-1-5090-6727-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Guandan Chen, Qingchao Kong, Wenji Mao |
Online event detection and tracking in social media based on neural similarity metric learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: 2017 IEEE International Conference on Intelligence and Security Informatics, ISI 2017, Beijing, China, July 22-24, 2017, pp. 182-184, 2017, IEEE, 978-1-5090-6727-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Brandon W. Jones, Wingyan Chung |
Topic modeling of small sequential documents: Proposed experiments for detecting terror attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: IEEE Conference on Intelligence and Security Informatics, ISI 2016, Tucson, AZ, USA, September 28-30, 2016, pp. 310-312, 2016, IEEE, 978-1-5090-3865-7. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Sumeet Kumar, Kathleen M. Carley |
DDoS cyber-attacks network: Who's attacking whom. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: IEEE Conference on Intelligence and Security Informatics, ISI 2016, Tucson, AZ, USA, September 28-30, 2016, pp. 218, 2016, IEEE, 978-1-5090-3865-7. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Benjamin W. K. Hung, Anura P. Jayasumana, Vidarshana W. Bandara |
Detecting radicalization trajectories using graph pattern matching algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: IEEE Conference on Intelligence and Security Informatics, ISI 2016, Tucson, AZ, USA, September 28-30, 2016, pp. 313-315, 2016, IEEE, 978-1-5090-3865-7. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Vincent J. Ercolani, Mark W. Patton, Hsinchun Chen |
Shodan visualized. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: IEEE Conference on Intelligence and Security Informatics, ISI 2016, Tucson, AZ, USA, September 28-30, 2016, pp. 193-195, 2016, IEEE, 978-1-5090-3865-7. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Patrick Rubin-Delanchy, Niall M. Adams, Nicholas A. Heard |
Disassortativity of computer networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: IEEE Conference on Intelligence and Security Informatics, ISI 2016, Tucson, AZ, USA, September 28-30, 2016, pp. 243-247, 2016, IEEE, 978-1-5090-3865-7. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Ze Li, Duoyong Sun, Hsinchun Chen, Shin-Ying Huang |
Identifying the socio-spatial dynamics of terrorist attacks in the Middle East. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: IEEE Conference on Intelligence and Security Informatics, ISI 2016, Tucson, AZ, USA, September 28-30, 2016, pp. 175-180, 2016, IEEE, 978-1-5090-3865-7. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Sagar Raina, Leon Bernard, Blair Taylor, Siddharth Kaza |
Using eye-tracking to investigate content skipping: A study on learning modules in cybersecurity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: IEEE Conference on Intelligence and Security Informatics, ISI 2016, Tucson, AZ, USA, September 28-30, 2016, pp. 261-266, 2016, IEEE, 978-1-5090-3865-7. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Leslie C. Milton, Atif Memon |
Intruder detector: A continuous authentication tool to model user behavior. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: IEEE Conference on Intelligence and Security Informatics, ISI 2016, Tucson, AZ, USA, September 28-30, 2016, pp. 286-291, 2016, IEEE, 978-1-5090-3865-7. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Jie Bai, Linjing Li, Daniel Zeng 0001 |
Activating topic models from a cognitive perspective. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: IEEE Conference on Intelligence and Security Informatics, ISI 2016, Tucson, AZ, USA, September 28-30, 2016, pp. 55-60, 2016, IEEE, 978-1-5090-3865-7. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | E. Allison Newcomb, Robert J. Hammell, Steve E. Hutchinson |
Effective prioritization of network intrusion alerts to enhance situational awareness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: IEEE Conference on Intelligence and Security Informatics, ISI 2016, Tucson, AZ, USA, September 28-30, 2016, pp. 73-78, 2016, IEEE, 978-1-5090-3865-7. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Sumeet Kumar, Matthew Benigni, Kathleen M. Carley |
The impact of US cyber policies on cyber-attacks trend. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: IEEE Conference on Intelligence and Security Informatics, ISI 2016, Tucson, AZ, USA, September 28-30, 2016, pp. 181-186, 2016, IEEE, 978-1-5090-3865-7. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Melissa J. Turcotte, Juston S. Moore, Nick Heard, Aaron McPhall |
Poisson factorization for peer-based anomaly detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: IEEE Conference on Intelligence and Security Informatics, ISI 2016, Tucson, AZ, USA, September 28-30, 2016, pp. 208-210, 2016, IEEE, 978-1-5090-3865-7. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Xiang Michelle Liu, Diane R. Murphy |
Engaging females in cybersecurity: K through Gray. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: IEEE Conference on Intelligence and Security Informatics, ISI 2016, Tucson, AZ, USA, September 28-30, 2016, pp. 255-260, 2016, IEEE, 978-1-5090-3865-7. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Wei Wei, Arti Mann, Kewei Sha, T. Andrew Yang |
Design and implementation of a multi-facet hierarchical cybersecurity education framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: IEEE Conference on Intelligence and Security Informatics, ISI 2016, Tucson, AZ, USA, September 28-30, 2016, pp. 273-278, 2016, IEEE, 978-1-5090-3865-7. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | John Grisham, Calvin Barreras, Cyran Afarin, Mark W. Patton, Hsinchun Chen |
Identifying top listers in Alphabay using Latent Dirichlet Allocation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: IEEE Conference on Intelligence and Security Informatics, ISI 2016, Tucson, AZ, USA, September 28-30, 2016, pp. 219, 2016, IEEE, 978-1-5090-3865-7. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Arthur Jicha, Mark W. Patton, Hsinchun Chen |
SCADA honeypots: An in-depth analysis of Conpot. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: IEEE Conference on Intelligence and Security Informatics, ISI 2016, Tucson, AZ, USA, September 28-30, 2016, pp. 196-198, 2016, IEEE, 978-1-5090-3865-7. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Khudran Alzhrani, Ethan M. Rudd, Terrance E. Boult, C. Edward Chow |
Automated big text security classification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: IEEE Conference on Intelligence and Security Informatics, ISI 2016, Tucson, AZ, USA, September 28-30, 2016, pp. 103-108, 2016, IEEE, 978-1-5090-3865-7. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Joel Brynielsson, Ulrik Franke, Muhammad Adnan Tariq, Stefan Varga |
Using cyber defense exercises to obtain additional data for attacker profiling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: IEEE Conference on Intelligence and Security Informatics, ISI 2016, Tucson, AZ, USA, September 28-30, 2016, pp. 37-42, 2016, IEEE, 978-1-5090-3865-7. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Jennifer Jie Xu 0001, Dongyu Chen, Michael Chau |
Identifying features for detecting fraudulent loan requests on P2P platforms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: IEEE Conference on Intelligence and Security Informatics, ISI 2016, Tucson, AZ, USA, September 28-30, 2016, pp. 79-84, 2016, IEEE, 978-1-5090-3865-7. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Mohiuddin Solaimani, Sayeed Salam, Ahmad M. Mustafa, Latifur Khan, Patrick T. Brandt, Bhavani Thuraisingham |
Near real-time atrocity event coding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: IEEE Conference on Intelligence and Security Informatics, ISI 2016, Tucson, AZ, USA, September 28-30, 2016, pp. 139-144, 2016, IEEE, 978-1-5090-3865-7. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Kangzhi Zhao, Yong Zhang 0002, Chunxiao Xing, Weifeng Li 0002, Hsinchun Chen |
Chinese underground market jargon analysis based on unsupervised learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: IEEE Conference on Intelligence and Security Informatics, ISI 2016, Tucson, AZ, USA, September 28-30, 2016, pp. 97-102, 2016, IEEE, 978-1-5090-3865-7. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Junjie Lin, Wenji Mao, Daniel Zeng 0001 |
Competitive perspective identification via topic based refinement for online documents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: IEEE Conference on Intelligence and Security Informatics, ISI 2016, Tucson, AZ, USA, September 28-30, 2016, pp. 214-216, 2016, IEEE, 978-1-5090-3865-7. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Mark Whitehouse, Marina Evangelou, Niall M. Adams |
Activity-based temporal anomaly detection in enterprise-cyber security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: IEEE Conference on Intelligence and Security Informatics, ISI 2016, Tucson, AZ, USA, September 28-30, 2016, pp. 248-250, 2016, IEEE, 978-1-5090-3865-7. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Zhen Fang, Xinyi Zhao, Qiang Wei, Guoqing Chen, Yong Zhang 0002, Chunxiao Xing, Weifeng Li 0002, Hsinchun Chen |
Exploring key hackers and cybersecurity threats in Chinese hacker communities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: IEEE Conference on Intelligence and Security Informatics, ISI 2016, Tucson, AZ, USA, September 28-30, 2016, pp. 13-18, 2016, IEEE, 978-1-5090-3865-7. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Saike He, Xiaolong Zheng 0001, Jiaojiao Wang, Zhijun Chang, Yin Luo, Daniel Zeng 0001 |
Meme extraction and tracing in crisis events. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: IEEE Conference on Intelligence and Security Informatics, ISI 2016, Tucson, AZ, USA, September 28-30, 2016, pp. 61-66, 2016, IEEE, 978-1-5090-3865-7. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Rodney Rohrmann, Mark W. Patton, Hsinchun Chen |
Anonymous port scanning: Performing network reconnaissance through Tor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: IEEE Conference on Intelligence and Security Informatics, ISI 2016, Tucson, AZ, USA, September 28-30, 2016, pp. 217, 2016, IEEE, 978-1-5090-3865-7. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Shiva Azadegan, Michael O'Leary |
An undergraduate Cyber Operations curriculum in the making: A 10+ year report. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: IEEE Conference on Intelligence and Security Informatics, ISI 2016, Tucson, AZ, USA, September 28-30, 2016, pp. 251-254, 2016, IEEE, 978-1-5090-3865-7. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Sagar Samtani, Shuo Yu, Hongyi Zhu, Mark W. Patton, Hsinchun Chen |
Identifying SCADA vulnerabilities using passive and active vulnerability assessment techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: IEEE Conference on Intelligence and Security Informatics, ISI 2016, Tucson, AZ, USA, September 28-30, 2016, pp. 25-30, 2016, IEEE, 978-1-5090-3865-7. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Jesus Pacheco, Shalaka Satam, Salim Hariri, Clarisa Grijalva, Helena Berkenbrock |
IoT Security Development Framework for building trustworthy Smart car services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: IEEE Conference on Intelligence and Security Informatics, ISI 2016, Tucson, AZ, USA, September 28-30, 2016, pp. 237-242, 2016, IEEE, 978-1-5090-3865-7. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Nick Heard, Konstantina Palla, Maria Skoularidou |
Topic modelling of authentication events in an enterprise computer network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: IEEE Conference on Intelligence and Security Informatics, ISI 2016, Tucson, AZ, USA, September 28-30, 2016, pp. 190-192, 2016, IEEE, 978-1-5090-3865-7. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Ahmed T. Zulkarnine, Richard Frank, Bryan Monk, Julianna Mitchell, Garth Davies |
Surfacing collaborated networks in dark web to find illicit and criminal content. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: IEEE Conference on Intelligence and Security Informatics, ISI 2016, Tucson, AZ, USA, September 28-30, 2016, pp. 109-114, 2016, IEEE, 978-1-5090-3865-7. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Jie Bai, Linjing Li, Daniel Zeng 0001, Junjie Lin |
Social role clustering with topic model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: IEEE Conference on Intelligence and Security Informatics, ISI 2016, Tucson, AZ, USA, September 28-30, 2016, pp. 211-213, 2016, IEEE, 978-1-5090-3865-7. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Nick Heard, Patrick Rubin-Delanchy |
Network-wide anomaly detection via the Dirichlet process. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: IEEE Conference on Intelligence and Security Informatics, ISI 2016, Tucson, AZ, USA, September 28-30, 2016, pp. 220-224, 2016, IEEE, 978-1-5090-3865-7. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|