default search action
6th ISI 2008: Taipei, Taiwan - Workshops
- Christopher C. Yang, Hsinchun Chen, Michael Chau, Kuiyu Chang, Sheau-Dong Lang, Patrick S. Chen, Raymond Hsieh, Daniel Zeng, Fei-Yue Wang, Kathleen M. Carley, Wenji Mao, Justin Zhan:
Intelligence and Security Informatics, IEEE ISI 2008 International Workshops: PAISI, PACCF, and SOCO 2008, Taipei, Taiwan, June 17, 2008. Proceedings. Lecture Notes in Computer Science 5075, Springer 2008, ISBN 978-3-540-69136-5
Pacific Asia Workshop on Intelligence and Security Informatics (PAISI 2008)
Information Retrieval and Event Detection
- Daniel Zeng, Donghua Wei, Michael Chau, Fei-Yue Wang:
Chinese Word Segmentation for Terrorism-Related Contents. 1-13 - Sukanya Manna, Tom Gedeon:
A Term Association Inference Model for Single Documents: A Stepping Stone for Investigation through Information Extraction. 14-20
Internet Security and Cybercrime
- Young-Gab Kim, Sanghyun Cho, Junsup Lee, Min-Soo Lee, In Ho Kim, Sung Hoon Kim:
Method for Evaluating the Security Risk of a Website Against Phishing Attacks. 21-31 - Shihchieh Chou, Weiping Chang:
CyberIR - A Technological Approach to Fight Cybercrime. 32-43
Currency and Data Protection
- Shenghui Su, Yongquan Cai, Changxiang Shen:
The Banknote Anti-forgery System Based on Digital Signature Algorithms. 44-49 - Xuan Liu, Pengzhu Zhang, Daniel Dajun Zeng:
Sequence Matching for Suspicious Activity Detection in Anti-Money Laundering. 50-61 - Hyun Jun Jang, Dae Won Hwang, Eul-Gyu Im:
Data Protection in Memory Using Byte Reordering. 62-68
Cryptography
- Hung-Yu Chien, Tzong-Chen Wu:
Highly Efficient Password-Based Three-Party Key Exchange in Random Oracle Model. 69-76 - Hui-Feng Huang:
A Pairwise Key Pre-distribution Scheme for Wireless Sensor Network. 77-82
Image and Video Analysis
- Huo-Chong Ling, Raphael C.-W. Phan, Swee-Huay Heng:
Attacks on SVD-Based Watermarking Schemes. 83-91 - Sajimon Abraham, P. Sojan Lal:
Trigger Based Security Alarming Scheme for Moving Objects on Road Networks. 92-101 - Chan-Yun Yang, Wei-Wen Tseng, Jr-Syu Yang:
Reducing False Alarm of Video-Based Smoke Detection by Support Vector Machine. 102-113
Privacy Issues
- Justin Zhan, Gary Blosser, Christopher C. Yang, Lisa Singh:
Privacy-Preserving Collaborative Social Networks. 114-125 - Mingwu Zhang, Bo Yang, Shenglin Zhu, Wenzheng Zhang:
Efficient Secret Authenticatable Anonymous Signcryption Scheme with Identity Privacy. 126-137 - Jia Yu, Fanyu Kong, Rong Hao, Xuliang Li:
How to Publicly Verifiably Expand a Member without Changing Old Shares in a Secret Sharing Scheme. 138-148
Social Networks
- Fatih Özgül, Zeki Erdem, Hakan Aksoy:
Comparing Two Models for Terrorist Group Detection: GDM or OGDM?. 149-160 - Chung C. Chang, Kuo H. Hua:
Applying Case-Based Reasoning and Expert Systems to Coastal Patrol Crime Investigation in Taiwan. 161-170
Modeling and Visualization
- Luigi Ferrara, Christian Mårtenson, Pontus Svenson, Per Svensson, Justo Hidalgo, Anastasio Molano, Anders L. Madsen:
Integrating Data Sources and Network Analysis Tools to Support the Fight Against Organized Crime. 171-182 - Hanbo Dai, Ee-Peng Lim, Hady Wirawan Lauw, HweeHwa Pang:
Visual Analytics for Supporting Entity Relationship Discovery on Text Data. 183-194
Network Intrusion Detection
- Ming-Yang Su, Kai-Chi Chang, Hua-Fu Wei, Chun-Yuen Lin:
Feature Weighting and Selection for a Real-Time Network Intrusion Detection System Based on GA with KNN. 195-204 - Robert Lee, Sheau-Dong Lang:
Locality-Based Server Profiling for Intrusion Detection. 205-216
Pacific Asia Workshop on Cybercrime and Computer Forensics (PACCF 2008)
Forensic Information Management
- Phan Thien Son, Lan Du, Huidong Jin, Olivier Y. de Vel, Nianjun Liu, Terry Caelli:
A Simple WordNet-Ontology Based Email Retrieval System for Digital Forensics. 217-228 - Patrick S. Chen, Cheng-Yu Hung, Chiao-Hsin Ko, Ying-Chieh Chen:
Preservation of Evidence in Case of Online Gaming Crime. 229-244 - Da-Yu Kao, Shiuh-Jeng Wang, Frank Fu-Yuan Huang, Sajal Bhatia, Saurabh Gupta:
Dataset Analysis of Proxy Logs Detecting to Curb Propagations in Network Attacks. 245-250 - Jianbin Ma, Ying Li, Guifa Teng:
Identifying Chinese E-Mail Documents' Authorship for the Purpose of Computer Forensic. 251-259
Forensic Technologies
- Hsien-Ming Hsu, Yeali S. Sun, Meng Chang Chen:
A Collaborative Forensics Framework for VoIP Services in Multi-network Environments. 260-271 - Emmanuel Velasco, Weifeng Chen, Ping Ji, Raymond Hsieh:
Wireless Forensic: A New Radio Frequency Based Locating System. 272-277 - Wen-Chao Yang, Che-Yen Wen, Chung-Hao Chen:
Applying Public-Key Watermarking Techniques in Forensic Imaging to Preserve the Authenticity of the Evidence. 278-287
Forensic Principles and Tools
- Yi-Chi Lin, Jill Slay, I-Long Lin:
Computer Forensics and Culture. 288-297 - Fahim Akhter:
E-Commerce Security: The Categorical Role of Computers in Forensic Online Crime. 298-303 - Daniel M. Purcell, Sheau-Dong Lang:
Forensic Artifacts of Microsoft Windows Vista System. 304-319
Workshop on Social Computing (SOCO 2008)
Social Web and Social Information Management
- Daniel Zeng, Huiqian Li:
How Useful Are Tags? - An Empirical Analysis of Collaborative Tagging for Web Page Recommendation. 320-330 - Yingjie Zhou, Malik Magdon-Ismail, William A. Wallace, Mark K. Goldberg:
A Generative Model for Statistical Determination of Information Content from Conversation Threads. 331-342 - Chun-Hung Lu, Chih-Chien Wang, Min-Yuh Day, Chorng-Shyong Ong, Wen-Lian Hsu:
Using "Cited by" Information to Find the Context of Research Papers. 343-354 - Xiarong Li, Daniel Zeng, Wenji Mao, Fei-Yue Wang:
Online Communities: A Social Computing Perspective. 355-365 - Yang-Cheng Lin, Chung-Hsing Yeh:
User-Centered Interface Design of Social Websites. 366-376 - Aaron Sun, Daniel Zeng, Huiqian Li, Xiaolong Zheng:
Discovering Trends in Collaborative Tagging Systems. 377-383 - Balaji Rajendran:
Socio-contextual Filters for Discovering Similar Knowledge-Gathering Tasks in Generic Information Systems. 384-389 - Xiaolong Zheng, Huiqian Li, Aaron Sun:
Exploring Social Dynamics in Online Bookmarking Systems. 390-391
Social Networks and Agent-Based Modeling
- Peter A. Bibby:
Dispositional Factors in the Use of Social Networking Sites: Findings and Implications for Social Computing Research. 392-400 - Xiaochen Li, Wenji Mao, Daniel Zeng, Fei-Yue Wang:
Agent-Based Social Simulation and Modeling in Social Computing. 401-412 - Terrill L. Frantz, Kathleen M. Carley:
Transforming Raw-Email Data into Social-Network Information. 413-420 - Xian-Ming Xu, Justin Zhan, Hai-tao Zhu:
Using Social Networks to Organize Researcher Community. 421-427 - Yungchang Ku, Saurabh Gupta:
Online Gaming Perpetrators Model. 428-433 - Niriaska Perozo, José Aguilar, Oswaldo Terán:
Proposal for a Multiagent Architecture for Self-Organizing Systems (MA-SOS). 434-439
Social Opinions, E-Commerce, Security and Privacy Considerations
- Yungchang Ku, Chaochang Chiu, Bo-Hong Liou, Jyun-Hong Liou, Jheng-Ying Wu:
Applying Text Mining to Assist People Who Inquire HIV/AIDS Information from Internet. 440-448 - Changli Zhang, Daniel Zeng, Qingyang Xu, Xueling Xin, Wenji Mao, Fei-Yue Wang:
Polarity Classification of Public Health Opinions in Chinese. 449-454 - Cheng-Hsien Yu, Shi-Jen Lin:
Parallel Crawling and Capturing for On-Line Auction. 455-466 - Chao-Wen Chan, Chih-Hao Lin:
A New Credit Card Payment Scheme Using Mobile Phones Based on Visual Cryptography. 467-476 - (Withdrawn) Detecting Hidden Hierarchy in Terrorist Networks: Some Case Studies. 477-489
- Fei Xie, Xindong Wu, Xuegang Hu, Fei-Yue Wang:
Keyphrase Extraction from Chinese News Web Pages Based on Semantic Relations. 490-495 - Zhu Zhu, Gong-Qing Wu, Xindong Wu, Xuegang Hu, Fei-Yue Wang:
Automatic Recognition of News Web Pages. 496-501 - Hsiu-Mei Huang, Chun-Hung Hsieh, Pei-I Yang, Chung-Min Lai, Wei-Hong Lin:
Understanding Users' Attitudes Towards Using a VoIP Survey. 502-507 - Gary Blosser, Justin Zhan:
Privacy-Preserving Collaborative E-Voting. 508-513 - Hyun-A Park, Justin Zhan, Dong Hoon Lee:
Privacy-Aware Access Control through Negotiation in Daily Life Service. 514-519
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.