C
search
search
reviewers
reviewers
feeds
feeds
assignments
assignments
settings
logout
WISI
2006
2006
2006
Keyphrases
Publications
2006
You-Lu Liao
,
Cynthia Tsai
Analysis of Computer Crime Characteristics in Taiwan.
WISI
(2006)
Taek Lee
,
Hoh Peter In
,
Eul-Gyu Im
,
Heejo Lee
Cascade Damage Estimation Model for Internet Attacks.
WISI
(2006)
Johan Huysmans
,
David Martens
,
Bart Baesens
,
Jan Vanthienen
,
Tony Van Gestel
Country Corruption Analysis with Self Organizing Maps and Support Vector Machines.
WISI
(2006)
Pilsung Kang
,
Sunghoon Park
,
Sungzoon Cho
,
Seongseob Hwang
,
Hyoungjoo Lee
The Effectiveness of Artificial Rhythms and Cues in Keystroke Dynamics Based User Authentication.
WISI
(2006)
Patrick S. Chen
,
K. C. Chang
,
Tai-Ping Hsing
,
Shihchieh Chou
Mining Criminal Databases to Finding Investigation Clues-By Example of Stolen Automobiles Database.
WISI
(2006)
Shaojie Qiao
,
Changjie Tang
,
Jing Peng
,
Hongjian Fan
,
Yong Xiang
VCCM Mining: Mining Virtual Community Core Members Based on Gene Expression Programming.
WISI
(2006)
Jialun Qin
,
Yilu Zhou
,
Edna Reid
,
Guanpi Lai
,
Hsinchun Chen
Unraveling International Terrorist Groups' Exploitation of the Web: Technical Sophistication, Media Richness, and Web Interactivity.
WISI
(2006)
Zhen Sun
,
Ee-Peng Lim
INEXT: An Investigative Search Tool for Knowledge Extraction.
WISI
(2006)
Dan Li
,
Kefei Wang
,
Jitender S. Deogun
A Fuzzy Anomaly Detection System.
WISI
(2006)
Ickjai Lee
,
Hossein Ghodosi
Privacy and Security Enhanced Offline Oblivious Transfer for Massive Data Distribution.
WISI
(2006)
Peter Phillips
,
Ickjai Lee
Mining Positive Associations of Urban Criminal Activities Using Hierarchical Crime Hot Spots.
WISI
(2006)
Zeng-Guang Hou
,
Min Tan
Design of an Emergency Prediction and Prevention Platform for Societal Security Decision Support Using Neural Networks.
WISI
(2006)
Mark Last
,
Alex Markov
,
Abraham Kandel
Multi-lingual Detection of Terrorist Content on the Web.
WISI
(2006)
Tang Jun
A Cross Datasets Referring Outlier Detection Model Applied to Suspicious Financial Transaction Discrimination.
WISI
(2006)
SeongKi Kim
,
WanJin Park
,
Seok Kyoo Kim
,
Sunil Ahn
,
Sangyong Han
Integration of a Cryptographic File System and Access Control.
WISI
(2006)
Liang Li
,
Jie Tian
,
Xin Yang
A Novel Identity Authentication Technique Without Trustworthy Third-Party Based on Fingerprint Verification.
WISI
(2006)
WenYuan Jen
,
Weiping Chang
,
Shihchieh Chou
Cybercrime in Taiwan - An Analysis of Suspect Records.
WISI
(2006)
Tara Whalen
,
Carrie Gates
Defender Personality Traits.
WISI
(2006)
Huizhang Shen
,
Jidi Zhao
,
Huanchen Wang
Illegal Intrusion Detection Based on Hidden Information Database.
WISI
(2006)
William Zhu
,
Clark D. Thomborson
,
Fei-Yue Wang
Applications of Homomorphic Functions to Software Obfuscation.
WISI
(2006)
Clifton Phua
,
Vincent C. S. Lee
,
Ross W. Gayler
,
Kate A. Smith
Temporal Representation in Spike Detection of Sparse Personal Identity Streams.
WISI
(2006)
Seongseob Hwang
,
Hyoungjoo Lee
,
Sungzoon Cho
Improving Authentication Accuracy of Unfamiliar Passwords with Pauses and Cues for Keystroke Dynamics-Based Authentication.
WISI
(2006)
Jue Wang
,
Fei-Yue Wang
,
Daniel Dajun Zeng
Rule+Exception Learning-Based Class Specification and Labeling in Intelligence and Security Analysis.
WISI
(2006)
Feng Xie
,
Shuo Bai
Detecting Novel Network Attacks with a Data Field.
WISI
(2006)
Bhavani M. Thuraisingham
Data Mining for Security Applications.
WISI
(2006)
Eun-Jun Yoon
,
Kee-Young Yoo
A New Secure Key Exchange Protocol Between STB and Smart Card in DTV Broadcasting.
WISI
(2006)
Fei-Yue Wang
A Computational Framework for Decision Analysis and Support in ISI: Artificial Societies, Computational Experiments, and Parallel Systems.
WISI
(2006)
Zhiyong Liu
,
Hong Qiao
Hidden Markov Model Based Intrusion Detection.
WISI
(2006)
Baihua Xiao
,
Huiguang He
,
Yaodong Li
,
Chunheng Wang
Cyberspace Community Analysis and Simulation Using Complex Dynamic Social Networks.
WISI
(2006)
Sabah S. Al-Fedaghi
Security Model for Informational Privacy.
WISI
(2006)
Dongbin Zhao
,
Jianqiang Yi
Analysis of Infectious Disease Data Based on Evolutionary Computation.
WISI
(2006)
Qing Tao
,
Gao-wei Wu
,
Jue Wang
One-Class Strategies for Security Information Detection.
WISI
(2006)
Hyun-Ho Kang
,
Brian M. Kurkoski
,
Young-Ran Park
,
Sanguk Shin
,
Kazuhiko Yamaguchi
,
Kingo Kobayashi
A Viable System for Tracing Illegal Users of Video.
WISI
(2006)
volume 3917, 2006
Intelligence and Security Informatics, International Workshop, WISI 2006, Singapore, April 9, 2006, Proceedings
WISI
3917 (2006)