


default search action
Intelligence and Security Informatics 2008
- Hsinchun Chen, Christopher C. Yang:

Intelligence and Security Informatics, Techniques and Applications. Studies in Computational Intelligence 135, Springer 2008, ISBN 978-3-540-69207-2
Terrorism Informatics and Data Mining
- Bhavani Thuraisingham:

Assured Information Sharing: Technologies, Challenges and Directions. 1-15 - Clive Best, Jakub Piskorski, Bruno Pouliquen, Ralf Steinberger, Hristo Tanev:

Automating Event Extraction for the Security Domain. 17-43 - Christopher C. Yang:

Knowledge Discovery and Information Visualization for Terrorist Social Networks. 45-64 - Jennifer Jie Xu, Hsinchun Chen:

Understanding the Nexus of Terrorist Web Sites. 65-78 - Mark Last, Alex Markov, Abraham Kandel:

Multi-lingual Detection of Web Terrorist Content. 79-96 - Qi He

, Kuiyu Chang, Ee-Peng Lim
:
Modeling Anticipatory Event Transitions. 97-119 - Jau-Hwang Wang, Tianjun Fu, Hong-Ming Lin, Hsinchun Chen:

Exploring Gray Web Forums: Analysis and Investigation of Forum-Based Communities in Taiwan. 121-134
Intelligence and Crime Analysis
- Byron Marshall:

Identifying Interesting Networks of Criminal Activity. 135-150 - Olcay Kursun

, Michael Georgiopoulos, Kenneth M. Reynolds:
Name Matching in Law Enforcement Database. 151-172 - Patrick S. Chen:

Discovering Investigation Clues through Mining Criminal Databases. 173-198 - Yiming Ma, Dawit Yimam Seid, Sharad Mehrotra:

Automated Filtering on Data Streaming for Intelligence Analysis. 199-213 - Antonio Badia

:
Personal Information Management for Intelligence Tasks. 215-226 - Johan Huysmans, Bart Baesens, Jan Vanthienen

:
A Data Miner's Approach to Country Corruption Analysis. 227-247
Access Control, Infrastructure Protection and Privacy
- Jianming He, Wesley W. Chu:

Protecting Private Information in Online Social Networks. 249-273 - Yu Chen, Wesley W. Chu:

Protection of Database Security Via Collaborative Inference Detection. 275-303 - Siddharth Kaza, Hsinchun Chen:

Suspect Vehicle Identification for Border Safety. 305-318 - Endre Boros, Elsayed A. Elsayed

, Paul B. Kantor, Fred S. Roberts
, Minge Xie:
Optimization Problems for Port-of-Entry Detection Systems. 319-335 - Uwe Glässer, Sarah Rastkar, Mona Vajihollahi:

Modeling and Validation of Aviation Security. 337-355
Surveillance and Emergency Response
- Xiaolei Li, Jiawei Han, Sangkyum Kim, Hector Gonzalez:

Anomaly Detection in Moving Object. 357-381 - Adnan Khashman:

Intelligent Face Recognition. 383-406 - Sangho Park, Mohan M. Trivedi:

Video Analysis of Vehicles and Persons for Surveillance. 407-424 - Matthew L. Jensen, Thomas O. Meservy

, Judee K. Burgoon, Jay F. Nunamaker Jr.:
Video-Based Deception Detection. 425-441

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














