ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
2015 IEEE International Conference on Intelligence and Security Informatics (ISI)
Latest Publications
TOTAL DOCUMENTS
56
(FIVE YEARS 0)
H-INDEX
6
(FIVE YEARS 0)
Published By IEEE
9781479998890
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
A statistical study of covert timing channels using network packet frequency
2015 IEEE International Conference on Intelligence and Security Informatics (ISI)
◽
10.1109/isi.2015.7165963
◽
2015
◽
Cited By ~ 1
Author(s):
Fangyue Chen
◽
Yunke Wang
◽
Heng Song
◽
Xiangyang Li
Keyword(s):
Statistical Study
◽
Timing Channels
◽
Covert Timing Channels
Download Full-text
Multivariate embedding based causaltiy detection with short time series
2015 IEEE International Conference on Intelligence and Security Informatics (ISI)
◽
10.1109/isi.2015.7165954
◽
2015
◽
Author(s):
Chuan Luo
◽
Daniel Zeng
Keyword(s):
Time Series
◽
Short Time Series
◽
Short Time
Download Full-text
Filtering spam in Weibo using ensemble imbalanced classification and knowledge expansion
2015 IEEE International Conference on Intelligence and Security Informatics (ISI)
◽
10.1109/isi.2015.7165952
◽
2015
◽
Cited By ~ 5
Author(s):
Zhipeng Jin
◽
Qiudan Li
◽
Daniel Zeng
◽
Lei Wang
Keyword(s):
Imbalanced Classification
Download Full-text
Linking virtual and real-world identities
2015 IEEE International Conference on Intelligence and Security Informatics (ISI)
◽
10.1109/isi.2015.7165938
◽
2015
◽
Cited By ~ 2
Author(s):
Yaqoub Alsarkal
◽
Nan Zhang
◽
Yilu Zhou
Keyword(s):
Real World
Download Full-text
SPINN: Suspicion prediction in nuclear networks
2015 IEEE International Conference on Intelligence and Security Informatics (ISI)
◽
10.1109/isi.2015.7165933
◽
2015
◽
Cited By ~ 1
Author(s):
Ian A. Andrews
◽
Srijan Kumar
◽
Francesca Spezzano
◽
V.S. Subrahmanian
Download Full-text
An opportunistic encryption extension for the DNS protocol
2015 IEEE International Conference on Intelligence and Security Informatics (ISI)
◽
10.1109/isi.2015.7165976
◽
2015
◽
Cited By ~ 2
Author(s):
Theogene Hakiza Bucuti
◽
Ram Dantu
Download Full-text
An access control resistant to shoulder-surfing
2015 IEEE International Conference on Intelligence and Security Informatics (ISI)
◽
10.1109/isi.2015.7165978
◽
2015
◽
Author(s):
Jae-Jin Jang
◽
Im Y. Jung
Keyword(s):
Access Control
◽
Shoulder Surfing
Download Full-text
Random anonymization of mobile sensor data: Modified Android framework
2015 IEEE International Conference on Intelligence and Security Informatics (ISI)
◽
10.1109/isi.2015.7165968
◽
2015
◽
Cited By ~ 2
Author(s):
Cynthia L. Claiborne
◽
Cathy Ncube
◽
Ram Dantu
Keyword(s):
Sensor Data
◽
Mobile Sensor
Download Full-text
Nonproliferation informatics: Employing Bayesian analysis, agent based modeling, and information theory for dynamic proliferation pathway studies
2015 IEEE International Conference on Intelligence and Security Informatics (ISI)
◽
10.1109/isi.2015.7165937
◽
2015
◽
Author(s):
Royal A. Elmore
◽
William S. Charlton
Keyword(s):
Information Theory
◽
Bayesian Analysis
◽
Agent Based Modeling
◽
Agent Based
Download Full-text
The relation between microfinacing and corruption by country: An analysis of an open source dataset
2015 IEEE International Conference on Intelligence and Security Informatics (ISI)
◽
10.1109/isi.2015.7165959
◽
2015
◽
Author(s):
Heather Roy
◽
Sue Kase
Keyword(s):
Open Source
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close