-
1
-
-
35048902741
-
Intelligence and Security Informatics: First NSF/NIJ Symposium
-
Tucson, AZ. H. Chen, R. Miranda, D. D. Zeng, C. Demchak, J. Schroeder, and T. Madhusudan, Eds. Heidelberg: Springer-Verlag
-
"Intelligence and Security Informatics: First NSF/NIJ Symposium". Proceedings of First NSF/NIJ Symposium, Tucson, AZ. H. Chen, R. Miranda, D. D. Zeng, C. Demchak, J. Schroeder, and T. Madhusudan, Eds. Heidelberg: Springer-Verlag, 2003
-
(2003)
Proceedings of First NSF/NIJ Symposium
-
-
-
2
-
-
1542340337
-
-
J. Allan, V. Lavrenko, D. Malin, and R. Swan, "Detections, Bounds, and Timelines: UMass and TDT-3," 2000, http://citeseer.nj.nec.com/455856.html.
-
(2000)
Detections, Bounds, and Timelines: UMass and TDT-3
-
-
Allan, J.1
Lavrenko, V.2
Malin, D.3
Swan, R.4
-
6
-
-
4544236162
-
Detecting Deception Through Linguistic Analysis
-
Tucson, AZ
-
J. Burgoon, J. Blair, T. Qin, and J. Nunamaker, Jr., "Detecting Deception Through Linguistic Analysis," presented at First NSF/NIJ Symposium on Intelligence and Security Informatics, Tucson, AZ, 2003
-
(2003)
First NSF/NIJ Symposium on Intelligence and Security Informatics
-
-
Burgoon, J.1
Blair, J.2
Qin, T.3
Nunamaker Jr., J.4
-
10
-
-
35048904174
-
Scenario Based Question-Answer Systems
-
E. D. Liddy, "Scenario Based Question-Answer Systems," presented at AQUAINT 2003 PI Meeting, 2003, http://cnlp.org/presentations/present.asp?show=conference.
-
(2003)
AQUAINT 2003 PI Meeting
-
-
Liddy, E.D.1
-
12
-
-
0242456149
-
Ontology in Information Security: A Useful Theoretical Foundation and Methodological Tool
-
V. Raskin, C. Hempelmann, K. Triezenberg, and S. Nirenburg, "Ontology in Information Security: a Useful Theoretical Foundation and Methodological Tool," presented at 2001 Workshop on New Security Paradigms, 2001, pp. 53-59
-
(2001)
2001 Workshop on New Security Paradigms
, pp. 53-59
-
-
Raskin, V.1
Hempelmann, C.2
Triezenberg, K.3
Nirenburg, S.4
-
13
-
-
35048840311
-
Emergent Semantics from Users' Browsing Paths
-
D. V. Sreenath, W. I. Grosky, and F. Fotouhi, "Emergent Semantics from Users' Browsing Paths," Intelligence and Security Informatics, vol. 2665, 2003, pp. 355-357
-
(2003)
Intelligence and Security Informatics
, vol.2665
, pp. 355-357
-
-
Sreenath, D.V.1
Grosky, W.I.2
Fotouhi, F.3
-
15
-
-
10244223943
-
Behavior Profiling of Email
-
Tucson, AZ, USA
-
S. Stolfo, S. Hershkop, K. Wang, O. Nimeskem, and C. Hu, "Behavior Profiling of Email," presented at First NSF/NIJ Symposium on Intelligence and Security Informatics., Tucson, AZ, USA, 2003
-
(2003)
First NSF/NIJ Symposium on Intelligence and Security Informatics
-
-
Stolfo, S.1
Hershkop, S.2
Wang, K.3
Nimeskem, O.4
Hu, C.5
-
16
-
-
0035195320
-
An Analytical Framework for Reasoning about Intrusions
-
S. Upadhyaya, R. Chinchani, and K. K., "An Analytical Framework for Reasoning About Intrusions," presented at 20th IEEE Symposium on Reliable Distributed Systems, 2001, pp. 99-108
-
(2001)
20th IEEE Symposium on Reliable Distributed Systems
, pp. 99-108
-
-
Upadhyaya, S.1
Chinchani, R.2
K., K.3
-
17
-
-
84944178665
-
Hierarchical grouping to optimize an objective function
-
J. H. Ward, Jr., "Hierarchical grouping to optimize an objective function," Journal of the American Statistical Association, vol. 58, pp. 236-244, 1963
-
(1963)
Journal of the American Statistical Association
, vol.58
, pp. 236-244
-
-
Ward Jr., J.H.1
-
19
-
-
35048871882
-
Authorship Analysis in Cybercrime Investigation
-
R. Zheng, O. Yi, H. Zan, and C. Hsinchun, "Authorship Analysis in Cybercrime Investigation," Intelligence and Security Informatics, vol. 2665, 2003, pp. 59-73
-
(2003)
Intelligence and Security Informatics
, vol.2665
, pp. 59-73
-
-
Zheng, R.1
Yi, O.2
Zan, H.3
Hsinchun, C.4
-
20
-
-
35248825459
-
A Longitudinal Analysis of Language Behavior of Deception in E-mail
-
L. Zhou, J. K. Burgoon, and D. P. Twitchell, "A Longitudinal Analysis of Language Behavior of Deception in E-mail," Intelligence and Security Informatics, vol. 2665, 2003, pp. 102-110
-
(2003)
Intelligence and Security Informatics
, vol.2665
, pp. 102-110
-
-
Zhou, L.1
Burgoon, J.K.2
Twitchell, D.P.3
|