The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ISI"( http://dblp.L3S.de/Venues/ISI )

URL (DBLP): http://dblp.uni-trier.de/db/conf/intelligent

Publication years (Num. hits)
1990 (47) 1991 (44) 1992 (35) 1994 (60) 1996 (36) 1998 (46) 2000 (19) 2002 (35) 2003 (41) 2004 (90) 2005 (101) 2006 (126) 2007 (126) 2008 (82) 2009 (130) 2010 (57) 2011 (149) 2012 (112) 2013 (199) 2014-2015 (114) 2016 (69) 2017 (55) 2018 (45)
Publication types (Num. hits)
inproceedings(1787) proceedings(31)
Venues (Conferences, Journals, ...)
ISI(1818)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 35 occurrences of 33 keywords

Results
Found 1818 publication records. Showing 1818 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Guandan Chen, Wenji Mao, Qingchao Kong, Han Han Joint Learning with Keyword Extraction for Event Detection in Social Media. Search on Bibsonomy ISI The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ryan Williams, Sagar Samtani, Mark W. Patton, Hsinchun Chen Incremental Hacker Forum Exploit Collection and Classification for Proactive Cyber Threat Intelligence: An Exploratory Study. Search on Bibsonomy ISI The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Stephen Moskal, Shanchieh Jay Yang, Michael E. Kuhl Extracting and Evaluating Similar and Unique Cyber Attack Strategies from Intrusion Alerts. Search on Bibsonomy ISI The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Mohammed Almukaynizi, Ericsson Marin, Eric Nunes, Paulo Shakarian, Gerardo I. Simari, Dipsy Kapoor, Timothy Siedlecki DARKMENTION: A Deployed System to Predict Enterprise-Targeted External Cyberattacks. Search on Bibsonomy ISI The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Mehdi Zakroum, Abdellah Houmz, Mounir Ghogho, Ghita Mezzour, Abdelkader Lahmadi, Jérôme François, Mohammed El Koutbi Exploratory Data Analysis of a Network Telescope Traffic and Prediction of Port Probing Rates. Search on Bibsonomy ISI The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Johan Fernquist, Lisa Kaati, Ralph Schroeder Political Bots and the Swedish General Election. Search on Bibsonomy ISI The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Shridatt Sugrim, Sridhar Venkatesan, Jason A. Youzwak, Cho-Yu Jason Chiang, Ritu Chadha, Massimiliano Albanese, Hasan Cam Measuring the Effectiveness of Network Deception. Search on Bibsonomy ISI The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Zikang Wang, Linjing Li, Daniel Dajun Zeng, Yue Chen Attention-based Multi-hop Reasoning for Knowledge Graph. Search on Bibsonomy ISI The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Antonio Badia A Broker Architecture, Push-Pull Database System for Intelligence Analysis. Search on Bibsonomy ISI The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Hamidreza Alvari, Elham Shaabani, Paulo Shakarian Early Identification of Pathogenic Social Media Accounts. Search on Bibsonomy ISI The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Brian Ricks, Bhavani M. Thuraisingham, Patrick Tague Lifting the Smokescreen: Detecting Underlying Anomalies During a DDoS Attack. Search on Bibsonomy ISI The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1David B. Skillicorn, Christian Leuprecht Copresence networks. Search on Bibsonomy ISI The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Cuneyt Gurcan Akcora, Jonathan Z. Bakdash, Yulia R. Gel, Murat Kantarcioglu, Laura R. Marusich, Bhavani M. Thuraisingham Attacklets: Modeling High Dimensionality in Real World Cyberattacks. Search on Bibsonomy ISI The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Elizabeth Riddle-Workman, Marina Evangelou, Niall M. Adams Adaptive Anomaly Detection on Network Data Streams. Search on Bibsonomy ISI The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Mohammed Almukaynizi, Vivin Paliath, Malay Shah, Malav Shah, Paulo Shakarian Finding Cryptocurrency Attack Indicators Using Temporal Logic and Darkweb Data. Search on Bibsonomy ISI The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Christopher R. Harrell, Mark W. Patton, Hsinchun Chen, Sagar Samtani Vulnerability Assessment, Remediation, and Automated Reporting: Case Studies of Higher Education Institutions. Search on Bibsonomy ISI The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Amirreza Niakanlahiji, Bei-Tseng Chu, Ehab Al-Shaer PhishMon: A Machine Learning Framework for Detecting Phishing Webpages. Search on Bibsonomy ISI The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Arya Renjan, Karuna Pande Joshi, Sandeep Nair Narayanan, Anupam Joshi DAbR: Dynamic Attribute-based Reputation scoring for Malicious IP Address Detection. Search on Bibsonomy ISI The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Po-Yi Du, Ning Zhang, Mohammedreza Ebrahimi, Sagar Samtani, Ben Lazarine, Nolan Arnold, Rachael Dunn, Sandeep Suntwal, Guadalupe Angeles, Robert Schweitzer, Hsinchun Chen Identifying, Collecting, and Presenting Hacker Community Data: Forums, IRC, Carding Shops, and DNMs. Search on Bibsonomy ISI The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ritika Pandey, George O. Mohler Evaluation of crime topic models: topic coherence vs spatial crime concentration. Search on Bibsonomy ISI The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1 2018 IEEE International Conference on Intelligence and Security Informatics, ISI 2018, Miami, FL, USA, November 9-11, 2018 Search on Bibsonomy ISI The full citation details ... 2018 DBLP  BibTeX  RDF
1Markus Heinrich, Jannik Vieten, Tolga Arul, Stefan Katzenbeisser 0001 Security Analysis of the RaSTA Safety Protocol. Search on Bibsonomy ISI The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Richard Frank, Myfanwy Thomson, Alexander Mikhaylov, Andrew J. Park Putting all eggs in a single basket: A cross-community analysis of 12 hacking forums. Search on Bibsonomy ISI The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Md Ariful Haque, Gael Kamdem De Teyou, Sachin Shetty, Bheshaj Krishnappa Cyber Resilience Framework for Industrial Control Systems: Concepts, Metrics, and Insights. Search on Bibsonomy ISI The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jack Hogan, Niall M. Adams A Study of Data Fusion for Predicting Novel Activity in Enterprise Cyber-Security. Search on Bibsonomy ISI The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Othmane Cherqi, Ghita Mezzour, Mounir Ghogho, Mohammed El Koutbi Analysis of Hacking Related Trade in the Darkweb. Search on Bibsonomy ISI The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Maede Zolanvari, Marcio Andrey Teixeira, Raj Jain Effect of Imbalanced Datasets on Security of Industrial IoT Using Machine Learning. Search on Bibsonomy ISI The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Priyanka Ranade, Sudip Mittal, Anupam Joshi, Karuna Pande Joshi Using Deep Neural Networks to Translate Multi-lingual Threat Intelligence. Search on Bibsonomy ISI The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Monica da Silva, José Viterbo, Flávia Bernardini, Cristiano Maciel Identifying Privacy Functional Requirements for Crowdsourcing Applications in Smart Cities. Search on Bibsonomy ISI The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Emma McMahon, Mark W. Patton, Sagar Samtani, Hsinchun Chen Benchmarking Vulnerability Assessment Tools for Enhanced Cyber-Physical System (CPS) Resiliency. Search on Bibsonomy ISI The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Yifan Huang, Wingyan Chung, Xinlin Tang A Temporal Recurrent Neural Network Approach to Detecting Market Anomaly Attacks Submission Type: Short Paper. Search on Bibsonomy ISI The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Zhiyuan Li, Weijia Xing, Dianxiang Xu Detecting Saturation Attacks in Software-Defined Networks. Search on Bibsonomy ISI The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Björn Pelzer, Lisa Kaati, Nazar Akrami Directed Digital Hate. Search on Bibsonomy ISI The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ghaith Husari, Xi Niu, Bill Chu, Ehab Al-Shaer Using Entropy and Mutual Information to Extract Threat Actions from Cyber Threat Intelligence. Search on Bibsonomy ISI The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Wingyan Chung, Jinwei Liu, Xinlin Tang, Vincent Siu-king Lai Extracting Textual Features of Financial Social Media to Detect Cognitive Hacking. Search on Bibsonomy ISI The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Fernanda Oliveira Gomes, Douglas Simões Silva, Bruno Machado Agostinho, Jean Everson Martina Privacy Preserving on Trajectories Created by Wi-Fi Connections in a University Campus. Search on Bibsonomy ISI The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jiaqi Liang, Linjing Li, Daniel Zeng, Yunwei Zhao Correlation-based Dynamics and Systemic Risk Measures in the Cryptocurrency Market. Search on Bibsonomy ISI The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Mohammad A. Tayebi, Hamed Yaghoubi Shahir, Uwe Glässer, Patricia L. Brantingham Spatial Patterns of Offender Groups. Search on Bibsonomy ISI The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Aswin Krishna Gunasekaran, Maryam Bahojb Imani, Latifur Khan, Christan Grant, Patrick T. Brandt, Jennifer S. Holmes SPERG: Scalable Political Event Report Geoparsing in Big Data. Search on Bibsonomy ISI The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1MohammadReza Ebrahimi, Mihai Surdeanu, Sagar Samtani, Hsinchun Chen Detecting Cyber Threats in Non-English Dark Net Markets: A Cross-Lingual Transfer Learning Approach. Search on Bibsonomy ISI The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Lida Huang, Guoray Cai, Hongyong Yuan, Jianguo Chen From Public Gatherings to the Burst of Collective Violence: An Agent-based Emotion Contagion Model. Search on Bibsonomy ISI The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Guandan Chen, Qingchao Kong, Wenji Mao, Daniel Zeng A Partition and Interaction Combined Model for Social Event Popularity Prediction. Search on Bibsonomy ISI The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Lorenzo Neil, Sudip Mittal, Anupam Joshi Mining Threat Intelligence about Open-Source Projects and Libraries from Code Repository Issues and Bug Reports. Search on Bibsonomy ISI The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Gordon Werner, Shanchieh Yang, Katie McConky Leveraging Intra-Day Temporal Variations to Predict Daily Cyberattack Activity. Search on Bibsonomy ISI The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Mayank Verma, Ponnurangam Kumarguru, Shuva Brata Deb, Anuradha Gupta Analysing Indicator of Compromises for Ransomware: Leveraging IOCs with Machine Learning Techniques. Search on Bibsonomy ISI The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Su Hou, Tianliang Lu, Yanhui Du, Jing Guo Static detection of Android malware based on improved random forest algorithm. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Saike He, Xiaolong Zheng 0001, Daniel Zeng The dynamics of health sentiments with competitive interactions in social media. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Hongyuan Ma, Ou Tao, Chunlu Zhao, Pengxiao Li, Lihong Wang Impact of replacement policies on static-dynamic query results cache in web search engines. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1John Grisham, Sagar Samtani, Mark W. Patton, Hsinchun Chen Identifying mobile malware and key threat actors in online hacker forums for proactive cyber threat intelligence. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Keyi Li, Yang Li, Jianyi Liu, Ru Zhang, Xi Duan Attack pattern mining algorithm based on security log. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Malaka El, Emma McMahon, Sagar Samtani, Mark W. Patton, Hsinchun Chen Benchmarking vulnerability scanners: An experiment on SCADA devices and scientific instruments. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Aaron Zimba, Zhaoshun Wang, Hongsong Chen Reasoning crypto ransomware infection vectors with Bayesian networks. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Hsin-Hsiung Huang, Zijing Wang, Wingyan Chung Efficient parameter selection for SVM: The case of business intelligence categorization. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Yasmeen Alufaisan, Yan Zhou, Murat Kantarcioglu, Bhavani M. Thuraisingham Hacking social network data mining. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ze Li, Duoyong Sun, Kun Cai, Bo Li 0030 Tie strength still matters: Investigating interaction patterns of Al-Qaeda network in terror operations. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jin-Seong Kim, Im Young Jung Android app protection using same identifier attack defensor. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Rodney R. Rohrmann, Vincent J. Ercolani, Mark W. Patton Large scale port scanning through tor using parallel Nmap scans to scan large portions of the IPv4 range. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Chiyu Cai, Linjing Li, Daniel Zeng Web-derived Emotional Word Detection in social media using Latent Semantic information. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Qian Li, Xiu-cun Wang The impact of different perceived support dimensions of mobile media APP users on customer commitment and customer recommendation. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Zhichao Cheng, Fanping Zeng, Xingqiu Zhong, Mingsong Zhou, Chengcheng Lv, Shuli Guo Resolving reflection methods in Android applications. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Pengshuai Cui, Peidong Zhu, Peng Xun, Zhuoqun Xia Enhance the robustness of cyber-physical systems by adding interdependency. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Guandan Chen, Qingchao Kong, Wenji Mao An attention-based neural popularity prediction model for social media events. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Emma McMahon, Ryan Williams, Malaka El, Sagar Samtani, Mark W. Patton, Hsinchun Chen Assessing medical device vulnerabilities on the Internet of Things. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Lu Luo, Peng Cao, Dazhong Mu Research on high-resolution imaging technology to extract the halftone-dot-information by iPhone. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Christopher Schon, Niall M. Adams, Marina Evangelou Clustering and monitoring edge behaviour in enterprise network traffic. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Wei Wang 0137, Ming Zhu, Jinlin Wang 0001, Xuewen Zeng, Zhongzhen Yang End-to-end encrypted traffic classification with one-dimensional convolution neural networks. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Chiyu Cai, Linjing Li, Daniel Zeng Behavior enhanced deep bot detection in social media. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Xiaohui Han, Lianhai Wang, Shujiang Xu, Guangqi Liu, Dawei Zhao Linking social network accounts by modeling user spatiotemporal habits. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Carlos Caminha, Vasco Furtado Impact of human mobility on police allocation. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Xiangfei Kong, Wenji Mao Ranking events based on user relevant query. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ryan Williams, Emma McMahon, Sagar Samtani, Mark W. Patton, Hsinchun Chen Identifying vulnerabilities of consumer Internet of Things (IoT) devices: A scalable approach. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Beibei Tian, Feifei Zheng, Yuqi Cao Research on the relationship between informatization level and global competitiveness. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Neda Abdelhamid, Fadi A. Thabtah, Hussein Abdel-jaber Phishing detection: A recent intelligent machine learning comparison based on models content and features. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Wingyan Chung Developing curricular modules for cybersecurity informatics: An active learning approach. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Zihao Liu, Bin Zhang, Ning Zhu, Lixun Li Hierarchical network threat situation assessment method for DDoS based on D-S evidence theory. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Peng Su, Yuqin Zhao, Jian Yang, Zhenpeng Li A new approach to security informatics: Actionable behavioral rules mining (ABRM). Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1C. Y. Tseung, K. P. Chow, X. Zhang Extended abstract: Anti-DDoS technique using self-learning bloom filter. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Dmitry Devyatkin, Ivan Smirnov, Ananyeva Margarita, Kobozeva Maria, Chepovskiy Andrey, Solovyev Fyodor Exploring linguistic features for extremist texts detection (on the material of Russian-speaking illegal texts). Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jie Bai, Linjing Li, Lan Lu, Yanwu Yang, Daniel Zeng Real-time prediction of meme burst. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Nan Xu Analyzing multimodal public sentiment based on hierarchical semantic attentional network. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Wingyan Chung, Elizabeth Mustaine, Daniel Zeng Criminal intelligence surveillance and monitoring on social media: Cases of cyber-trafficking. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Hongliang Liang, Yan Song, Da Xiao An end-to-end model for Android malware detection. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Linpeng Chai, Bin Zhang An identity-based one-off public key scheme for privacy preservation. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Sreyasee Das Bhattacharjee, Ashit Talukder, Ehab Al-Shaer, Pratik Doshi Prioritized active learning for malicious URL detection using weighted text-based features. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Saike He, Xiaolong Zheng 0001, Daniel Zeng Modeling online collective emotions through knowledge transfer. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Junjie Lin, Wenji Mao, Daniel Zeng Topic and user based refinement for competitive perspective identification. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Aaron Zimba, Zhaoshun Wang On Man-In-The-Cloud (MITC) attacks: The analytical case of Linux. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Mehdi Yousefi, Nhamo Mtetwa, Yan Zhang, Huaglory Tianfield A novel approach for analysis of attack graph. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Sonya H. Y. Hsu, Steven J. Dick Information sharing & cyber threats. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Charles Feng, Shuning Wu, Ningwei Liu A user-centric machine learning framework for cyber security operations center. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Canchu Lin, Jenell L. S. Wittmer Proactive information security behavior and individual creativity: Effects of group culture and decentralized IT governance. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Josephine K. Chow, Xiangyang Li, Xenia Mountrouidou Raising flags: Detecting covert storage channels using relative entropy. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1 2017 IEEE International Conference on Intelligence and Security Informatics, ISI 2017, Beijing, China, July 22-24, 2017 Search on Bibsonomy ISI The full citation details ... 2017 DBLP  BibTeX  RDF
1Yen-Lung Lai, Bok-Min Goi, Tong-Yuen Chai Alignment-free indexing-first-one hashing with bloom filter integration. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Yuhao Zhang, Wenji Mao, Daniel Zeng Topic evolution modeling in social media short texts based on recurrent semantic dependent CRP. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Song Sun, Qiudan Li, Peng Yan, Daniel Dajun Zeng Mapping users across social media platforms by integrating text and structure information. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Tuomo Hiippala Recognizing military vehicles in social media images using deep learning. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Wangyan Feng, Wenfeng Yan, Shuning Wu, Ningwei Liu Wavelet transform and unsupervised machine learning to detect insider threat on cloud file-sharing. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ravi Barreira, Vládia Pinheiro, Vasco Furtado A framework for digital forensics analysis based on semantic role labeling. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Guandan Chen, Qingchao Kong, Wenji Mao Online event detection and tracking in social media based on neural similarity metric learning. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 1818 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license