Sign in
ISI Workshops
2008
2008
2008
Keyphrases
Publications
2008
Hsien-Ming Hsu
,
Yeali S. Sun
,
Meng Chang Chen
A Collaborative Forensics Framework for VoIP Services in Multi-network Environments.
ISI Workshops
(2008)
Hyun Jun Jang
,
Dae Won Hwang
,
Eul-Gyu Im
Data Protection in Memory Using Byte Reordering.
ISI Workshops
(2008)
Chao-Wen Chan
,
Chih-Hao Lin
A New Credit Card Payment Scheme Using Mobile Phones Based on Visual Cryptography.
ISI Workshops
(2008)
Xiaochen Li
,
Wenji Mao
,
Daniel Zeng
,
Fei-Yue Wang
Agent-Based Social Simulation and Modeling in Social Computing.
ISI Workshops
(2008)
Hung-Yu Chien
,
Tzong-Chen Wu
Highly Efficient Password-Based Three-Party Key Exchange in Random Oracle Model.
ISI Workshops
(2008)
Hanbo Dai
,
Ee-Peng Lim
,
Hady Wirawan Lauw
,
HweeHwa Pang
Visual Analytics for Supporting Entity Relationship Discovery on Text Data.
ISI Workshops
(2008)
Huo-Chong Ling
,
Raphael C.-W. Phan
,
Swee-Huay Heng
Attacks on SVD-Based Watermarking Schemes.
ISI Workshops
(2008)
Chun-Hung Lu
,
Chih-Chien Wang
,
Min-Yuh Day
,
Chorng-Shyong Ong
,
Wen-Lian Hsu
Using "Cited by" Information to Find the Context of Research Papers.
ISI Workshops
(2008)
Daniel M. Purcell
,
Sheau-Dong Lang
Forensic Artifacts of Microsoft Windows Vista System.
ISI Workshops
(2008)
Fei Xie
,
Xindong Wu
,
Xuegang Hu
,
Fei-Yue Wang
Keyphrase Extraction from Chinese News Web Pages Based on Semantic Relations.
ISI Workshops
(2008)
Young-Gab Kim
,
Sanghyun Cho
,
Junsup Lee
,
Min-Soo Lee
,
In Ho Kim
,
Sung Hoon Kim
Method for Evaluating the Security Risk of a Website Against Phishing Attacks.
ISI Workshops
(2008)
Cheng-Hsien Yu
,
Shi-Jen Lin
Parallel Crawling and Capturing for On-Line Auction.
ISI Workshops
(2008)
Xian-Ming Xu
,
Justin Zhan
,
Hai-tao Zhu
Using Social Networks to Organize Researcher Community.
ISI Workshops
(2008)
Emmanuel Velasco
,
Weifeng Chen
,
Ping Ji
,
Raymond Hsieh
Wireless Forensic: A New Radio Frequency Based Locating System.
ISI Workshops
(2008)
Shihchieh Chou
,
Weiping Chang
CyberIR - A Technological Approach to Fight Cybercrime.
ISI Workshops
(2008)
Hsiu-Mei Huang
,
Chun-Hung Hsieh
,
Pei-I Yang
,
Chung-Min Lai
,
Wei-Hong Lin
Understanding Users' Attitudes Towards Using a VoIP Survey.
ISI Workshops
(2008)
Yingjie Zhou
,
Malik Magdon-Ismail
,
William A. Wallace
,
Mark K. Goldberg
A Generative Model for Statistical Determination of Information Content from Conversation Threads.
ISI Workshops
(2008)
Detecting Hidden Hierarchy in Terrorist Networks: Some Case Studies.
ISI Workshops
(2008)
Gary Blosser
,
Justin Zhan
Privacy-Preserving Collaborative E-Voting.
ISI Workshops
(2008)
Robert Lee
,
Sheau-Dong Lang
Locality-Based Server Profiling for Intrusion Detection.
ISI Workshops
(2008)
Chan-Yun Yang
,
Wei-Wen Tseng
,
Jr-Syu Yang
Reducing False Alarm of Video-Based Smoke Detection by Support Vector Machine.
ISI Workshops
(2008)
Da-Yu Kao
,
Shiuh-Jeng Wang
,
Frank Fu-Yuan Huang
,
Sajal Bhatia
,
Saurabh Gupta
Dataset Analysis of Proxy Logs Detecting to Curb Propagations in Network Attacks.
ISI Workshops
(2008)
Balaji Rajendran
Socio-contextual Filters for Discovering Similar Knowledge-Gathering Tasks in Generic Information Systems.
ISI Workshops
(2008)
Mingwu Zhang
,
Bo Yang
,
Shenglin Zhu
,
Wenzheng Zhang
Efficient Secret Authenticatable Anonymous Signcryption Scheme with Identity Privacy.
ISI Workshops
(2008)
Terrill L. Frantz
,
Kathleen M. Carley
Transforming Raw-Email Data into Social-Network Information.
ISI Workshops
(2008)
Fatih Özgül
,
Zeki Erdem
,
Hakan Aksoy
Comparing Two Models for Terrorist Group Detection: GDM or OGDM?.
ISI Workshops
(2008)
Fahim Akhter
E-Commerce Security: The Categorical Role of Computers in Forensic Online Crime.
ISI Workshops
(2008)
Sukanya Manna
,
Tom Gedeon
A Term Association Inference Model for Single Documents: A Stepping Stone for Investigation through Information Extraction.
ISI Workshops
(2008)
Yungchang Ku
,
Saurabh Gupta
Online Gaming Perpetrators Model.
ISI Workshops
(2008)
Daniel Zeng
,
Donghua Wei
,
Michael Chau
,
Fei-Yue Wang
Chinese Word Segmentation for Terrorism-Related Contents.
ISI Workshops
(2008)
Niriaska Perozo
,
José Aguilar
,
Oswaldo Terán
Proposal for a Multiagent Architecture for Self-Organizing Systems (MA-SOS).
ISI Workshops
(2008)
Xiaolong Zheng
,
Huiqian Li
,
Aaron Sun
Exploring Social Dynamics in Online Bookmarking Systems.
ISI Workshops
(2008)
Xiarong Li
,
Daniel Zeng
,
Wenji Mao
,
Fei-Yue Wang
Online Communities: A Social Computing Perspective.
ISI Workshops
(2008)
Zhu Zhu
,
Gong-Qing Wu
,
Xindong Wu
,
Xuegang Hu
,
Fei-Yue Wang
Automatic Recognition of News Web Pages.
ISI Workshops
(2008)
Patrick S. Chen
,
Cheng-Yu Hung
,
Chiao-Hsin Ko
,
Ying-Chieh Chen
Preservation of Evidence in Case of Online Gaming Crime.
ISI Workshops
(2008)
Justin Zhan
,
Gary Blosser
,
Christopher C. Yang
,
Lisa Singh
Privacy-Preserving Collaborative Social Networks.
ISI Workshops
(2008)
Hui-Feng Huang
A Pairwise Key Pre-distribution Scheme for Wireless Sensor Network.
ISI Workshops
(2008)
Phan Thien Son
,
Lan Du
,
Huidong Jin
,
Olivier Y. de Vel
,
Nianjun Liu
,
Terry Caelli
A Simple WordNet-Ontology Based Email Retrieval System for Digital Forensics.
ISI Workshops
(2008)
Aaron Sun
,
Daniel Zeng
,
Huiqian Li
,
Xiaolong Zheng
Discovering Trends in Collaborative Tagging Systems.
ISI Workshops
(2008)
Peter A. Bibby
Dispositional Factors in the Use of Social Networking Sites: Findings and Implications for Social Computing Research.
ISI Workshops
(2008)
Chung C. Chang
,
Kuo H. Hua
Applying Case-Based Reasoning and Expert Systems to Coastal Patrol Crime Investigation in Taiwan.
ISI Workshops
(2008)
Luigi Ferrara
,
Christian Mårtenson
,
Pontus Svenson
,
Per Svensson
,
Justo Hidalgo
,
Anastasio Molano
,
Anders L. Madsen
Integrating Data Sources and Network Analysis Tools to Support the Fight Against Organized Crime.
ISI Workshops
(2008)
Yi-Chi Lin
,
Jill Slay
,
I-Long Lin
Computer Forensics and Culture.
ISI Workshops
(2008)
Yungchang Ku
,
Chaochang Chiu
,
Bo-Hong Liou
,
Jyun-Hong Liou
,
Jheng-Ying Wu
Applying Text Mining to Assist People Who Inquire HIV/AIDS Information from Internet.
ISI Workshops
(2008)
Changli Zhang
,
Daniel Zeng
,
Qingyang Xu
,
Xueling Xin
,
Wenji Mao
,
Fei-Yue Wang
Polarity Classification of Public Health Opinions in Chinese.
ISI Workshops
(2008)
Jia Yu
,
Fanyu Kong
,
Rong Hao
,
Xuliang Li
How to Publicly Verifiably Expand a Member without Changing Old Shares in a Secret Sharing Scheme.
ISI Workshops
(2008)
Daniel Zeng
,
Huiqian Li
How Useful Are Tags? - An Empirical Analysis of Collaborative Tagging for Web Page Recommendation.
ISI Workshops
(2008)
Shenghui Su
,
Yongquan Cai
,
Changxiang Shen
The Banknote Anti-forgery System Based on Digital Signature Algorithms.
ISI Workshops
(2008)
Ming-Yang Su
,
Kai-Chi Chang
,
Hua-Fu Wei
,
Chun-Yuen Lin
Feature Weighting and Selection for a Real-Time Network Intrusion Detection System Based on GA with KNN.
ISI Workshops
(2008)
volume 5075, 2008
Intelligence and Security Informatics, IEEE ISI 2008 International Workshops: PAISI, PACCF, and SOCO 2008, Taipei, Taiwan, June 17, 2008. Proceedings
ISI Workshops
5075 (2008)