ti.\*:("ISI 2005 : intelligence and security informatics (Atlanta GA, 19-20 May 2005)")
Results 1 to 25 of 63
Selection :
Modeling and multiway analysis of chatroom tensorsACAR, Evrim; QAMTEPE, Seyit A; KRISHNAMOORTHY, Mukkai S et al.Lecture notes in computer science. 2005, pp 256-268, issn 0302-9743, isbn 3-540-25999-6, 13 p.Conference Paper
A conceptual model of counterterrorist operationsDAVIS, David; FRENDAK-BLUME, Allison; WHEELER, Jennifer et al.Lecture notes in computer science. 2005, pp 305-315, issn 0302-9743, isbn 3-540-25999-6, 11 p.Conference Paper
Active automation of the DITSCAPSEOK WON LEE; GANDHI, Robin A; AHN, Gail-Joon et al.Lecture notes in computer science. 2005, pp 479-485, issn 0302-9743, isbn 3-540-25999-6, 7 p.Conference Paper
Private mining of association rulesZHAN, Justin; MATWIN, Stan; LIWU CHANG et al.Lecture notes in computer science. 2005, pp 72-80, issn 0302-9743, isbn 3-540-25999-6, 9 p.Conference Paper
Integrating private databases for data analysisKE WANG; FUNG, Benjamin C. M; GUOZHU DONG et al.Lecture notes in computer science. 2005, pp 171-182, issn 0302-9743, isbn 3-540-25999-6, 12 p.Conference Paper
Link analysis tools for intelligence and counterterrorismBADIA, Antonio; KANTARDZIC, Mehmed.Lecture notes in computer science. 2005, pp 49-59, issn 0302-9743, isbn 3-540-25999-6, 11 p.Conference Paper
Collusion set detection through outlier discoveryJANEJA, Vandana P; ATLURI, Vijayalakshmi; VAIDYA, Jaideep et al.Lecture notes in computer science. 2005, pp 1-13, issn 0302-9743, isbn 3-540-25999-6, 13 p.Conference Paper
Biomonitoring, phylogenetics and anomaly aggregation systemsSTOCKWELL, David R. B; WANG, Jason T. L.Lecture notes in computer science. 2005, pp 523-529, issn 0302-9743, isbn 3-540-25999-6, 7 p.Conference Paper
Sensitivity analysis of an attack containment modelDANTU, Ram; CANGUSSU, Joao W; TURI, Janos et al.Lecture notes in computer science. 2005, pp 127-138, issn 0302-9743, isbn 3-540-25999-6, 12 p.Conference Paper
ISI 2005 : intelligence and security informatics (Atlanta GA, 19-20 May 2005)Kantor, Paul; Muresan, Gheorghe; Roberts, Fred et al.Lecture notes in computer science. 2005, issn 0302-9743, isbn 3-540-25999-6, XVIII, 674 p, isbn 3-540-25999-6Conference Proceedings
A survey of software watermarkingZHU, William; THOMBORSON, Clark; WANG, Fei-Yue et al.Lecture notes in computer science. 2005, pp 454-458, issn 0302-9743, isbn 3-540-25999-6, 5 p.Conference Paper
Selective fusion for speaker verification in surveillanceSOLEWICZ, Yosef A; KOPPEL, Moshe.Lecture notes in computer science. 2005, pp 269-279, issn 0302-9743, isbn 3-540-25999-6, 11 p.Conference Paper
Map-mediated GeoCollaborative crisis managementCAI, Guoray; MACEACHREN, Alan M; BREWER, Isaac et al.Lecture notes in computer science. 2005, pp 429-435, issn 0302-9743, isbn 3-540-25999-6, 7 p.Conference Paper
Connections in the world of international terrorismSHAHAR, Yael.Lecture notes in computer science. 2005, pp 554-560, issn 0302-9743, isbn 3-540-25999-6, 7 p.Conference Paper
Efficient identification of overlapping communitiesBAUMES, Jeffrey; GOLDBERG, Mark; MAGDON-ISMAIL, Malik et al.Lecture notes in computer science. 2005, pp 27-36, issn 0302-9743, isbn 3-540-25999-6, 10 p.Conference Paper
The qualitative challenge of insurgency informaticsTOUSLEY, Scott.Lecture notes in computer science. 2005, pp 571-578, issn 0302-9743, isbn 3-540-25999-6, 8 p.Conference Paper
Some marginal learning algorithms for unsupervised problemsQING TAO; WU, Gao-Wei; WANG, Fei-Yue et al.Lecture notes in computer science. 2005, pp 395-401, issn 0302-9743, isbn 3-540-25999-6, 7 p.Conference Paper
Incident and casualty databases as a tool for understanding low-intensity conflictsRADLAUER, Don.Lecture notes in computer science. 2005, pp 153-170, issn 0302-9743, isbn 3-540-25999-6, 18 p.Conference Paper
CODESSEAL : Compiler/FPGA approach to secure applicationsGELBART, Olga; OTT, Paul; NARAHARI, Bhagirath et al.Lecture notes in computer science. 2005, pp 530-535, issn 0302-9743, isbn 3-540-25999-6, 6 p.Conference Paper
Automatically determining an anonymous Author's native languageKOPPEL, Moshe; SCHLER, Jonathan; ZIGDON, Kfir et al.Lecture notes in computer science. 2005, pp 209-217, issn 0302-9743, isbn 3-540-25999-6, 9 p.Conference Paper
Digging in the details : A case study in network data miningGALLOWAY, John; SIMOFF, Simeon J.Lecture notes in computer science. 2005, pp 14-26, issn 0302-9743, isbn 3-540-25999-6, 13 p.Conference Paper
Risk management using behavior based bayesian networksDANTU, Ram; KOLAN, Prakash.Lecture notes in computer science. 2005, pp 115-126, issn 0302-9743, isbn 3-540-25999-6, 12 p.Conference Paper
Automatic extraction of deceptive behavioral cues from videoMESERVY, Thomas O; JENSEN, Matthew L; KRUSE, John et al.Lecture notes in computer science. 2005, pp 198-208, issn 0302-9743, isbn 3-540-25999-6, 11 p.Conference Paper
A new conceptual framework to resolve terrorism's root causesSINAI, Joshua.Lecture notes in computer science. 2005, pp 280-286, issn 0302-9743, isbn 3-540-25999-6, 7 p.Conference Paper
Forecasting terrorist Groups' warfare : 'conventional' to CBRNSINAI, Joshua.Lecture notes in computer science. 2005, pp 567-570, issn 0302-9743, isbn 3-540-25999-6, 4 p.Conference Paper