Sciweavers

ISI
2005
Springer
13 years 9 months ago
Collecting and Analyzing the Presence of Terrorists on the Web: A Case Study of Jihad Websites
Abstract. The Internet which has enabled global businesses to flourish has become the very same channel for mushrooming ‘terrorist news networks.’ Terrorist organizations and t...
Edna Reid, Jialun Qin, Yilu Zhou, Guanpi Lai, Marc...
ISI
2005
Springer
13 years 9 months ago
Defending a Web Browser Against Spying with Browser Helper Objects
Beomsoo Park, Sungjin Hong, Jaewook Oh, Heejo Lee
ISI
2005
Springer
13 years 9 months ago
Performance Study of a Compiler/Hardware Approach to Embedded Systems Security
Abstract. Trusted software execution, prevention of code and data tampering, authentication, and providing a secure environment for software are some of the most important security...
Kripashankar Mohan, Bhagirath Narahari, Rahul Simh...
ISI
2005
Springer
13 years 9 months ago
Testing a Rational Choice Model of Airline Hijackings
Laura Dugan, Gary LaFree, Alex R. Piquero
ISI
2005
Springer
13 years 9 months ago
Active Automation of the DITSCAP
Seok Won Lee, Robin A. Gandhi, Gail-Joon Ahn, Deep...
ISI
2005
Springer
13 years 9 months ago
Filtering, Fusion and Dynamic Information Presentation: Towards a General Information Firewall
Intelligence analysts are flooded with massive amounts of data from a multitude of sources and in many formats. From this raw data they attempt to gain insight that will provide de...
Gregory J. Conti, Mustaque Ahamad, Robert Norback
ISI
2005
Springer
13 years 9 months ago
A Taxonomy of Cyber Attacks on 3G Networks
Kameswari Kotapati, Peng Liu, Yan Sun, Thomas F. L...
ISI
2005
Springer
13 years 9 months ago
Map-Mediated GeoCollaborative Crisis Management
Managing crises requires collecting geographical intelligence and making spatial decisions through collaborative efforts among multiple, distributed agencies and task groups. Crisi...
Guoray Cai, Alan M. MacEachren, Isaac Brewer, Mich...
ISI
2005
Springer
13 years 9 months ago
Link Analysis Tools for Intelligence and Counterterrorism
Association rule mining is an important data analysis tool that can be applied with success to a variety of domains. However, most association rule mining algorithms seek to discov...
Antonio Badia, Mehmed M. Kantardzic
ISI
2005
Springer
13 years 9 months ago
Template Based Semantic Similarity for Security Applications
Boanerges Aleman-Meza, Christian Halaschek-Wiener,...