Pascal and Francis Bibliographic Databases

Help

Search results

Your search

au.\*:("Zeng, Daniel D")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 156

  • Page / 7
Export

Selection :

  • and

ISI 2004 : intelligence and security informatics (Tucson AZ, 10-11 June 2004)Chen, Hsinchun; Moore, Reagan; Zeng, Daniel D et al.Lecture notes in computer science. 2004, issn 0302-9743, isbn 3-540-22125-5, XV, 536 p, isbn 3-540-22125-5Conference Proceedings

Efficient scheduling of periodic information monitoring requestsZENG, Daniel D; DROR, Moshe; CHEN, Hsinchun et al.European journal of operational research. 2006, Vol 173, Num 2, pp 583-599, issn 0377-2217, 17 p.Article

Rule+exception learning-based class specification and labeling in intelligence and security analysisJUE WANG; WANG, Fei-Yue; ZENG, Daniel D et al.Lecture notes in computer science. 2006, pp 181-182, issn 0302-9743, isbn 3-540-33361-4, 1Vol, 2 p.Conference Paper

Analyzing consumer-product graphs : Empirical findings and applications in recommender systemsZAN HUANG; ZENG, Daniel D; CHEN, Hsinchun et al.Management science. 2007, Vol 53, Num 7, pp 1146-1164, issn 0025-1909, 19 p.Article

Mining normal and intrusive activity patterns for computer intrusion detectionXIANGYANG LI; NONG YE.Lecture notes in computer science. 2004, pp 226-238, issn 0302-9743, isbn 3-540-22125-5, 13 p.Conference Paper

MIPT: Sharing Terrorism information resourcesELLIS, James O.Lecture notes in computer science. 2004, pp 520-525, issn 0302-9743, isbn 3-540-22125-5, 6 p.Conference Paper

Post-9/11 evolution of Al QaedaGUNARATNA, Rohan.Lecture notes in computer science. 2004, pp 526-530, issn 0302-9743, isbn 3-540-22125-5, 5 p.Conference Paper

Utilizing the social and behavioral sciences to assess, model, forecast and preemptively respond to terrorismSINAI, Joshua.Lecture notes in computer science. 2004, pp 531-533, issn 0302-9743, isbn 3-540-22125-5, 3 p.Conference Paper

Privacy-preserving inter-database operationsGANG LIANG; CHAWATHE, Sudarshan S.Lecture notes in computer science. 2004, pp 66-82, issn 0302-9743, isbn 3-540-22125-5, 17 p.Conference Paper

Finding unusual correlation using matrix decompositionsSKILLICORN, David B.Lecture notes in computer science. 2004, pp 83-99, issn 0302-9743, isbn 3-540-22125-5, 17 p.Conference Paper

ISI 2003 : intelligence and security informatics (Tucson AZ, 2-3 June 2003)Hsinchun Chen; Miranda, Richard; Zeng, Daniel D et al.Lecture notes in computer science. 2003, issn 0302-9743, isbn 3-540-40189-X, XIV, 392 p, isbn 3-540-40189-XConference Proceedings

Mind the gap: The growing distance between institutional and technical capabilities in organizations performing critical operationsROCHLIN, Gene I.Lecture notes in computer science. 2004, pp 349-358, issn 0302-9743, isbn 3-540-22125-5, 10 p.Conference Paper

Determining the gender of the unseen name through hyphenationWARREN, Robert H; LEURER, Christopher.Lecture notes in computer science. 2004, pp 510-511, issn 0302-9743, isbn 3-540-22125-5, 2 p.Conference Paper

The use of data mining techniques in operational crime fightingADDERLEY, Richard.Lecture notes in computer science. 2004, pp 418-425, issn 0302-9743, isbn 3-540-22125-5, 8 p.Conference Paper

Generating networks of illegal drug users using large samples of partial ego-network dataLEE, Ju-Sung.Lecture notes in computer science. 2004, pp 390-402, issn 0302-9743, isbn 3-540-22125-5, 13 p.Conference Paper

Towards a social network approach for monitoring insider threats to information securityNATARAJAN, Anand; HOSSAIN, Liaquat.Lecture notes in computer science. 2004, pp 501-507, issn 0302-9743, isbn 3-540-22125-5, 7 p.Conference Paper

Web-Based Intelligence Notification System: Architecture and designDOLOTOV, Alexander; STRICKLER, Mary.Lecture notes in computer science. 2004, pp 436-448, issn 0302-9743, isbn 3-540-22125-5, 13 p.Conference Paper

Optimal redundancy allocation for disaster recovery planning in the network economySHAO, Benjamin B. M.Lecture notes in computer science. 2004, pp 484-491, issn 0302-9743, isbn 3-540-22125-5, 8 p.Conference Paper

Interactive query languages for intelligence tasksBADIA, Antonio.Lecture notes in computer science. 2004, pp 114-124, issn 0302-9743, isbn 3-540-22125-5, 11 p.Conference Paper

Click Fraud and the Adverse Effects of Competition : Social and Economic ComputingXIARONG LI; ZENG, Daniel D; YONG LIU et al.IEEE intelligent systems. 2011, Vol 26, Num 6, pp 31-39, issn 1541-1672, 9 p.Article

Design principles of coordinated multi-incident emergency response systemsRUI CHEN; SHARMAN, Raj; RAGHAV RAO, H et al.Lecture notes in computer science. 2005, pp 81-98, issn 0302-9743, isbn 3-540-25999-6, 18 p.Conference Paper

Learning classifiers for misuse detection using a bag of system calls representationKANG, Dae-Ki; FULLER, Doug; HONAVAR, Vasant et al.Lecture notes in computer science. 2005, pp 511-516, issn 0302-9743, isbn 3-540-25999-6, 6 p.Conference Paper

Multi-modal biometrics with PKI technologies for border control applicationsKWON, Taekyoung; MOON, Hyeonjoon.Lecture notes in computer science. 2005, pp 99-114, issn 0302-9743, isbn 3-540-25999-6, 16 p.Conference Paper

An ontological approach to the document access problem of insider threatALEMAN-MEZA, Boanerges; BURNS, Phillip; EAVENSON, Matthew et al.Lecture notes in computer science. 2005, pp 486-491, issn 0302-9743, isbn 3-540-25999-6, 6 p.Conference Paper

Collecting and analyzing the presence of terrorists on the web : A case study of jihad websitesREID, Edna; JIALUN QIN; YILU ZHOU et al.Lecture notes in computer science. 2005, pp 402-411, issn 0302-9743, isbn 3-540-25999-6, 10 p.Conference Paper

  • Page / 7