Pascal and Francis Bibliographic Databases

Help

Search results

Your search

ti.\*:("Intelligence and security informatics (IEEE international conference on intelligence and security informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006)")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 103

  • Page / 5
Export

Selection :

  • and

Intelligence and security informatics (IEEE international conference on intelligence and security informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006)Lecture notes in computer science. 2006, issn 0302-9743, isbn 3-540-34478-0, 1Vol, XXII-772 p, isbn 3-540-34478-0Conference Proceedings

Database security protection via inference detectionYU CHEN; CHU, Wesley W.Lecture notes in computer science. 2006, pp 452-458, issn 0302-9743, isbn 3-540-34478-0, 1Vol, 7 p.Conference Paper

Distributing the cost of securing a transportation infrastructureCHAWATHE, Sudarshan S.Lecture notes in computer science. 2006, pp 596-601, issn 0302-9743, isbn 3-540-34478-0, 1Vol, 6 p.Conference Paper

Iterative relational classification through three-state epidemic dynamicsGALSTYAN, Aram; COHEN, Paul R.Lecture notes in computer science. 2006, pp 83-92, issn 0302-9743, isbn 3-540-34478-0, 1Vol, 10 p.Conference Paper

Measures to detect word substitution in intercepted communicationFONG, S. W; SKILLICORN, D. B; ROUSSINOV, D et al.Lecture notes in computer science. 2006, pp 190-200, issn 0302-9743, isbn 3-540-34478-0, 1Vol, 11 p.Conference Paper

Multi-document summarization for terrorism information extractionFU LEE WANG; YANG, Christopher C; XIAODONG SHI et al.Lecture notes in computer science. 2006, pp 602-608, issn 0302-9743, isbn 3-540-34478-0, 1Vol, 7 p.Conference Paper

A novel key release scheme from biometricsONG THIAN SONG; TEOH, Andrew B. J; NGO, David C. L et al.Lecture notes in computer science. 2006, pp 764-765, issn 0302-9743, isbn 3-540-34478-0, 1Vol, 2 p.Conference Paper

A review of public health syndromic surveillance systemsPING YAN; ZENG, Daniel; CHEN, Hsinchun et al.Lecture notes in computer science. 2006, pp 249-260, issn 0302-9743, isbn 3-540-34478-0, 1Vol, 12 p.Conference Paper

Access control requirements for preventing insider threatsPARK, Joon S; GIORDANO, Joseph.Lecture notes in computer science. 2006, pp 529-534, issn 0302-9743, isbn 3-540-34478-0, 1Vol, 6 p.Conference Paper

Analyzing the terrorist social networks with visualization toolsYANG, Christopher C; NAN LIU; SAGEMAN, Marc et al.Lecture notes in computer science. 2006, pp 331-342, issn 0302-9743, isbn 3-540-34478-0, 1Vol, 12 p.Conference Paper

Attacking confidentiality : An agent based approachKAPIL KUMAR GUPTA; NATH, Baikunth; RAMAMOHANARAO, Kotagiri et al.Lecture notes in computer science. 2006, pp 285-296, issn 0302-9743, isbn 3-540-34478-0, 1Vol, 12 p.Conference Paper

Computer-mediated collaborative reasoning and intelligence analysisYEUNG, Douglas; LOWRANCE, John.Lecture notes in computer science. 2006, pp 1-13, issn 0302-9743, isbn 3-540-34478-0, 1Vol, 13 p.Conference Paper

Digitized forensic investigation at P2P copyright controversy, infringementKAO, Da-Yu; WANG, Shiuh-Jeng; HUANG, Frank Fu-Yuan et al.Lecture notes in computer science. 2006, pp 644-646, issn 0302-9743, isbn 3-540-34478-0, 1Vol, 3 p.Conference Paper

Experimental study on wireless sensor network securityKWON, Taekyoung; PARK, Sang-Ho.Lecture notes in computer science. 2006, pp 741-743, issn 0302-9743, isbn 3-540-34478-0, 1Vol, 3 p.Conference Paper

Naturally occurring incidents as facsimiles for biochemical terrorist attacksGRIFFITHS, Jamie L; BERNDT, Donald J; HEVNER, Alan R et al.Lecture notes in computer science. 2006, pp 225-236, issn 0302-9743, isbn 3-540-34478-0, 1Vol, 12 p.Conference Paper

Semantic analytics visualizationDELIGIANNIDIS, Leonidas; SHETH, Amit P; ALEMAN-MEZA, Boanerges et al.Lecture notes in computer science. 2006, pp 48-59, issn 0302-9743, isbn 3-540-34478-0, 1Vol, 12 p.Conference Paper

Venn diagram construction of internet chatroom conversationsMCCARTHY, James F; KRISHNAMOORTHY, Mukkai S.Lecture notes in computer science. 2006, pp 535-541, issn 0302-9743, isbn 3-540-34478-0, 1Vol, 7 p.Conference Paper

Visualizing authorship for identificationABBASI, Ahmed; CHEN, Hsinchun.Lecture notes in computer science. 2006, pp 60-71, issn 0302-9743, isbn 3-540-34478-0, 1Vol, 12 p.Conference Paper

Worm traffic modeling for network performance analysisYUFENG CHEN; YABO DONG; DONGMING LU et al.Lecture notes in computer science. 2006, pp 578-583, issn 0302-9743, isbn 3-540-34478-0, 1Vol, 6 p.Conference Paper

A PCA-LVQ model for intrusion alert analysisWANG, Jing-Xin; WANG, Zhi-Ying; KUI DAI et al.Lecture notes in computer science. 2006, pp 715-716, issn 0302-9743, isbn 3-540-34478-0, 1Vol, 2 p.Conference Paper

Computational modeling and experimental validation of aviation security proceduresGLÄSSER, Uwe; RASTKAR, Sarah; VAJIHOLLAHI, Mona et al.Lecture notes in computer science. 2006, pp 420-431, issn 0302-9743, isbn 3-540-34478-0, 1Vol, 12 p.Conference Paper

Detecting deception in person-of-interest statementsFULLER, Christie; BIROS, David P; ADKINS, Mark et al.Lecture notes in computer science. 2006, pp 504-509, issn 0302-9743, isbn 3-540-34478-0, 1Vol, 6 p.Conference Paper

Fast pedestrian detection using color informationXU, Y. W; CAO, X. B; QIAO, H et al.Lecture notes in computer science. 2006, pp 627-632, issn 0302-9743, isbn 3-540-34478-0, 1Vol, 6 p.Conference Paper

Mining the acceleration-like association rulesDECHANG PI; XIAOLIN QIN; WANGFENG GU et al.Lecture notes in computer science. 2006, pp 676-677, issn 0302-9743, isbn 3-540-34478-0, 1Vol, 2 p.Conference Paper

Personal information management (PIM) for intelligence analysisBADIA, Antonio.Lecture notes in computer science. 2006, pp 510-515, issn 0302-9743, isbn 3-540-34478-0, 1Vol, 6 p.Conference Paper

  • Page / 5