Search

Your search keyword '"Thuraisingham, Bhavani"' showing total 132 results

Search Constraints

Start Over You searched for: Author "Thuraisingham, Bhavani" Remove constraint Author: "Thuraisingham, Bhavani" Topic computer communication networks Remove constraint Topic: computer communication networks
132 results on '"Thuraisingham, Bhavani"'

Search Results

1. Secure Semantic Web Services.

2. Enforcing Honesty in Assured Information Sharing Within a Distributed System.

3. Managing Risks in RBAC Employed Distributed Environments.

4. Detection and Resolution of Anomalies in Firewall Policy Rules.

5. Experimental Validation and Analysis of an Intelligent Detection and Response Strategy to False Positives and Network Attacks.

6. Rational Choice Deterrence and Israeli Counter-Terrorism.

7. Multi-document Summarization for Terrorism Information Extraction.

8. A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks - A Friend Approach.

9. Distributing the Cost of Securing a Transportation Infrastructure.

10. SG-Robot: CDMA Network-Operated Mobile Robot for Security Guard at Home.

11. Exploring the Dark Side of the Web: Collection and Analysis of U.S. Extremist Online Forums.

12. Fast Pedestrian Detection Using Color Information.

13. Content Analysis of Jihadi Extremist Groups' Videos.

14. Analysis of Abnormalities of Worm Traffic for Obtaining Worm Detection Vectors.

15. An Info-Gap Approach to Policy Selection for Bio-terror Response.

16. Spatial-Temporal Cross-Correlation Analysis: A New Measure and a Case Study in Infectious Disease Informatics.

17. Venn Diagram Construction of Internet Chatroom Conversations.

18. Hybrid Modeling for Large-Scale Worm Propagation Simulations.

19. Sanitization of Databases for Refined Privacy Trade-Offs.

20. Worm Traffic Modeling for Network Performance Analysis.

21. Access Control Requirements for Preventing Insider Threats.

22. Covering Based Granular Computing for Conflict Analysis.

23. Fighting Fear of a Bioterrorism Event with Information Technology: Real-World Examples and Opportunities.

24. Synergy: A Policy-Driven, Trust-Aware Information Dissemination Framework.

25. Integration of Instance-Based Learning and Text Mining for Identification of Potential Virus/Bacterium as Bio-terrorism Weapons.

26. Personal Information Management (PIM) for Intelligence Analysis.

27. Detecting Deception in Person-of-Interest Statements.

28. A Framework for Exploring Gray Web Forums: Analysis of Forum-Based Communities in Taiwan.

29. SemanticSpy: Suspect Tracking Using Semantic Data in a Multimedia Environment.

30. A Multi-layer Naïve Bayes Model for Approximate Identity Matching.

31. Towards Optimal Police Patrol Routes with Genetic Algorithms.

32. Strategic Intelligence Analysis: From Information Processing to Meaning-Making.

33. Entity Workspace: An Evidence File That Aids Memory, Inference, and Reading.

34. An Embedded Bayesian Network Hidden Markov Model for Digital Forensics.

35. Database Security Protection Via Inference Detection.

36. Practical Algorithms for Destabilizing Terrorist Networks.

37. Intelligent Face Recognition Using Feature Averaging.

38. Computational Modeling and Experimental Validation of Aviation Security Procedures.

39. A First Look at Domestic and International Global Terrorism Events, 1970-1997.

40. Combating Terrorism Insurgency Resolution Software: A Research Note.

41. Multi-perspective Video Analysis of Persons and Vehicles for Enhanced Situational Awareness.

42. On the Topology of the Dark Web of Terrorist Groups.

43. Indicators of Threat: Reflecting New Trends.

44. Design and Implementation of a Policy-Based Privacy Authorization System.

45. Measuring Effectiveness of Anti-terrorism Programs Using Performance Logic Models.

46. Tracing the Event Evolution of Terror Attacks from On-Line News.

47. Analyzing the Terrorist Social Networks with Visualization Tools.

48. Experimental Analysis of Sequential Decision Making Algorithms for Port of Entry Inspection Procedures.

49. Suspect Vehicle Identification for Border Safety with Modified Mutual Information.

50. Viability of Critical Mission of Grid Computing.

Catalog

Books, media, physical & digital resources