A Trust-Based Security Architecture for Ubiquitous Computing Systems (Englisch)
- Neue Suche nach: Hung, Le Xuan
- Neue Suche nach: Giang, Pho Duc
- Neue Suche nach: Zhung, Yonil
- Neue Suche nach: Phuong, Tran
- Neue Suche nach: Lee, Sungyoung
- Neue Suche nach: Lee, Young-Koo
- Neue Suche nach: Hung, Le Xuan
- Neue Suche nach: Giang, Pho Duc
- Neue Suche nach: Zhung, Yonil
- Neue Suche nach: Phuong, Tran
- Neue Suche nach: Lee, Sungyoung
- Neue Suche nach: Lee, Young-Koo
In:
Intelligence and Security Informatics
3
;
753-754
;
2006
- Aufsatz/Kapitel (Buch) / Elektronische Ressource
-
Titel:A Trust-Based Security Architecture for Ubiquitous Computing Systems
-
Beteiligte:Hung, Le Xuan ( Autor:in ) / Giang, Pho Duc ( Autor:in ) / Zhung, Yonil ( Autor:in ) / Phuong, Tran ( Autor:in ) / Lee, Sungyoung ( Autor:in ) / Lee, Young-Koo ( Autor:in )
-
Erschienen in:Intelligence and Security Informatics , 3 ; 753-754Lecture Notes in Computer Science ; 3975, 3 ; 753-754
-
Verlag:
- Neue Suche nach: Springer Berlin Heidelberg
-
Erscheinungsort:Berlin, Heidelberg
-
Erscheinungsdatum:01.01.2006
-
Format / Umfang:2 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz/Kapitel (Buch)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis E-Book
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Computer-Mediated Collaborative Reasoning and Intelligence AnalysisYeung, Douglas / Lowrance, John et al. | 2006
- 14
-
Using Importance Flooding to Identify Interesting Networks of Criminal ActivityMarshall, Byron / Chen, Hsinchun et al. | 2006
- 26
-
Towards Automatic Event TrackingBest, Clive / Pouliquen, Bruno / Steinberger, Ralf / Goot, Erik / Blackler, Ken / Fuart, Flavio / Oellinger, Tamara / Ignat, Camelia et al. | 2006
- 35
-
Interactive Refinement of Filtering Queries on Streaming Intelligence DataMa, Yiming / Seid, Dawit Yimam et al. | 2006
- 48
-
Semantic Analytics VisualizationDeligiannidis, Leonidas / Sheth, Amit P. / Aleman-Meza, Boanerges et al. | 2006
- 60
-
Visualizing Authorship for IdentificationAbbasi, Ahmed / Chen, Hsinchun et al. | 2006
- 72
-
A Dictionary-Based Approach to Fast and Accurate Name Matching in Large Law Enforcement DatabasesKursun, Olcay / Koufakou, Anna / Chen, Bing / Georgiopoulos, Michael / Reynolds, Kenneth M. / Eaglin, Ron et al. | 2006
- 83
-
Iterative Relational Classification Through Three–State Epidemic DynamicsGalstyan, Aram / Cohen, Paul R. et al. | 2006
- 93
-
Analyzing Entities and Topics in News Articles Using Statistical Topic ModelsNewman, David / Chemudugunta, Chaitanya / Smyth, Padhraic / Steyvers, Mark et al. | 2006
- 105
-
The Hats Simulator and Colab: An Integrated Information Fusion Challenge Problem and Collaborative Analysis EnvironmentMorrison, Clayton T. / Cohen, Paul R. et al. | 2006
- 117
-
Cost-Sensitive Access Control for Illegitimate Confidential Access by InsidersSeo, Young-Woo / Sycara, Katia et al. | 2006
- 129
-
Design and Implementation of a Policy-Based Privacy Authorization SystemChoi, HyangChang / Lee, SeungYong / Lee, HyungHyo et al. | 2006
- 141
-
Privacy Preserving DBSCAN for Vertically Partitioned DataAmirbekyan, Artak / Estivill-Castro, V. et al. | 2006
- 154
-
Inferring Privacy Information from Social NetworksHe, Jianming / Chu, Wesley W. / Liu, Zhenyu (Victor) et al. | 2006
- 166
-
Motion-Alert: Automatic Anomaly Detection in Massive Moving ObjectsLi, Xiaolei / Han, Jiawei / Kim, Sangkyum et al. | 2006
- 178
-
Adaptive Method for Monitoring Network and Early Detection of Internet WormsBo, Chen / Fang, Bin Xing / Yun, Xiao Chun et al. | 2006
- 190
-
Measures to Detect Word Substitution in Intercepted CommunicationFong, SzeWang / Skillicorn, David B. / Roussinov, D. et al. | 2006
- 201
-
Finding Hidden Group Structure in a Stream of CommunicationsBaumes, J. / Goldberg, M. / Hayvanovych, M. / Magdon-Ismail, M. / Wallace, W. / Zaki, M. et al. | 2006
- 213
-
Collective Sampling and Analysis of High Order Tensors for Chatroom CommunicationsAcar, Evrim / Çamtepe, Seyit A. / Yener, Bülent et al. | 2006
- 225
-
Naturally Occurring Incidents as Facsimiles for Biochemical Terrorist AttacksGriffiths, Jamie L. / Berndt, Donald J. / Hevner, Alan R. et al. | 2006
- 237
-
DrillSim: A Simulation Framework for Emergency Response DrillsBalasubramanian, Vidhya / Massaguer, Daniel / Mehrotra, Sharad / Venkatasubramanian, Nalini et al. | 2006
- 249
-
A Review of Public Health Syndromic Surveillance SystemsYan, Ping / Zeng, Daniel / Chen, Hsinchun et al. | 2006
- 261
-
A Novel Mechanism to Defend Against Low-Rate Denial-of-Service AttacksWei, Wei / Dong, Yabo / Lu, Dongming / Jin, Guang / Lao, Honglan et al. | 2006
- 272
-
Integrating IDS Alert Correlation and OS-Level Dependency TrackingZhai, Yan / Ning, Peng / Xu, Jun et al. | 2006
- 285
-
Attacking Confidentiality: An Agent Based ApproachGupta, Kapil Kumar / Nath, Baikunth / Ramamohanarao, Kotagiri / Kazi, Ashraf U. et al. | 2006
- 297
-
Viability of Critical Mission of Grid ComputingLiu, Fangfang / Chi, Yan / Shi, Yuliang et al. | 2006
- 308
-
Suspect Vehicle Identification for Border Safety with Modified Mutual InformationKaza, Siddharth / Wang, Yuan / Chen, Hsinchun et al. | 2006
- 319
-
Experimental Analysis of Sequential Decision Making Algorithms for Port of Entry Inspection ProceduresAnand, Saket / Madigan, David / Mammone, Richard / Pathak, Saumitr / Roberts, Fred et al. | 2006
- 331
-
Analyzing the Terrorist Social Networks with Visualization ToolsYang, Christopher C. / Liu, Nan / Sageman, Marc et al. | 2006
- 343
-
Tracing the Event Evolution of Terror Attacks from On-Line NewsYang, Christopher C. / Shi, Xiaodong / Wei, Chih-Ping et al. | 2006
- 355
-
Measuring Effectiveness of Anti-terrorism Programs Using Performance Logic ModelsRoss, Robert G. et al. | 2006
- 367
-
On the Topology of the Dark Web of Terrorist GroupsXu, Jennifer / Chen, Hsinchun / Zhou, Yilu / Qin, Jialun et al. | 2006
- 377
-
Indicators of Threat: Reflecting New TrendsShahar, Yael et al. | 2006
- 389
-
Practical Algorithms for Destabilizing Terrorist NetworksMemon, Nasrullah / Larsen, Henrik Legind et al. | 2006
- 401
-
Combating Terrorism Insurgency Resolution Software: A Research NoteSinai, Joshua et al. | 2006
- 407
-
A First Look at Domestic and International Global Terrorism Events, 1970–1997Dugan, Laura / LaFree, Gary / Fogg, Heather et al. | 2006
- 420
-
Computational Modeling and Experimental Validation of Aviation Security ProceduresGlässer, Uwe / Rastkar, Sarah / Vajihollahi, Mona et al. | 2006
- 432
-
Intelligent Face Recognition Using Feature AveragingKhashman, Adnan / Garad, Akram A. et al. | 2006
- 440
-
Multi-perspective Video Analysis of Persons and Vehicles for Enhanced Situational AwarenessPark, Sangho / Trivedi, Mohan M. et al. | 2006
- 452
-
Database Security Protection Via Inference DetectionChen, Yu / Chu, Wesley W. et al. | 2006
- 459
-
An Embedded Bayesian Network Hidden Markov Model for Digital ForensicsVel, Olivier / Liu, Nianjun / Caelli, Terry / Caetano, Tiberio S. et al. | 2006
- 466
-
Entity Workspace: An Evidence File That Aids Memory, Inference, and ReadingBier, Eric A. / Ishak, Edward W. / Chi, Ed et al. | 2006
- 473
-
Strategic Intelligence Analysis: From Information Processing to Meaning-MakingNeuman, Yair / Elihay, Liran / Adler, Meni / Goldberg, Yoav / Viner, Amir et al. | 2006
- 479
-
A Multi-layer Naïve Bayes Model for Approximate Identity MatchingWang, G. Alan / Chen, Hsinchun / Atabakhsh, Homa et al. | 2006
- 485
-
Towards Optimal Police Patrol Routes with Genetic AlgorithmsReis, Danilo / Melo, Adriano / Coelho, André L. V. / Furtado, Vasco et al. | 2006
- 492
-
SemanticSpy: Suspect Tracking Using Semantic Data in a Multimedia EnvironmentMathew, Amit / Sheth, Amit / Deligiannidis, Leonidas et al. | 2006
- 498
-
A Framework for Exploring Gray Web Forums: Analysis of Forum-Based Communities in TaiwanWang, Jau-Hwang / Fu, Tianjun / Lin, Hong-Ming / Chen, Hsinchun et al. | 2006
- 504
-
Detecting Deception in Person-of-Interest StatementsFuller, Christie / Biros, David P. / Adkins, Mark / Burgoon, Judee K. / Nunamaker, Jay F. Jr. / Coulon, Steven et al. | 2006
- 510
-
Personal Information Management (PIM) for Intelligence AnalysisBadia, Antonio et al. | 2006
- 516
-
Synergy: A Policy-Driven, Trust-Aware Information Dissemination FrameworkHasan, Ragib / Winslett, Marianne et al. | 2006
- 522
-
Sanitization of Databases for Refined Privacy Trade-OffsHajYasien, Ahmed / Estivill-Castro, Vladimir / Topor, Rodney et al. | 2006
- 529
-
Access Control Requirements for Preventing Insider ThreatsPark, Joon S. / Giordano, Joseph et al. | 2006
- 535
-
Venn Diagram Construction of Internet Chatroom ConversationsMcCarthy, James F. / Krishnamoorthy, Mukkai S. et al. | 2006
- 542
-
Spatial-Temporal Cross-Correlation Analysis: A New Measure and a Case Study in Infectious Disease InformaticsMa, Jian / Zeng, Daniel / Chen, Hsinchun et al. | 2006
- 55
-
Integration of Instance-Based Learning and Text Mining for Identification of Potential Virus/Bacterium as Bio-terrorism WeaponsHu, Xiaohua / Zhang, Xiaodan / Wu, Daniel / Zhou, Xiaohua / Rumm, Peter et al. | 2006
- 554
-
An Info-Gap Approach to Policy Selection for Bio-terror ResponseYoffe, Anna / Ben-Haim, Yakov et al. | 2006
- 560
-
Fighting Fear of a Bioterrorism Event with Information Technology: Real-World Examples and OpportunitiesBray, David A. / Konsynski, Benn R. et al. | 2006
- 566
-
Covering Based Granular Computing for Conflict AnalysisZhu, William / Wang, Fei-Yue et al. | 2006
- 572
-
Hybrid Modeling for Large-Scale Worm Propagation SimulationsIm, Eul Gyu / Seo, Jung Taek / Kim, Dong-Soo / Song, Yong Ho / Park, Yongsu et al. | 2006
- 578
-
Worm Traffic Modeling for Network Performance AnalysisChen, Yufeng / Dong, Yabo / Lu, Dongming / Pan, Yunhe / Lao, Honglan et al. | 2006
- 584
-
Analysis of Abnormalities of Worm Traffic for Obtaining Worm Detection VectorsXiang, Zhengtao / Chen, Yufeng / Dong, Yabo / Lao, Honglan et al. | 2006
- 590
-
A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks – A Friend ApproachRazak, Shukor Abd / Furnell, Steven / Clarke, Nathan / Brooke, Phillip et al. | 2006
- 596
-
Distributing the Cost of Securing a Transportation InfrastructureChawathe, Sudarshan S. et al. | 2006
- 602
-
Multi-document Summarization for Terrorism Information ExtractionWang, Fu Lee / Yang, Christopher C. / Shi, Xiaodong et al. | 2006
- 609
-
Rational Choice Deterrence and Israeli Counter-TerrorismRadlauer, Don et al. | 2006
- 615
-
Content Analysis of Jihadi Extremist Groups’ VideosSalem, Arab / Reid, Edna / Chen, Hsinchun et al. | 2006
- 621
-
Exploring the Dark Side of the Web: Collection and Analysis of U.S. Extremist Online ForumsZhou, Yilu / Qin, Jialun / Lai, Guanpi / Reid, Edna / Chen, Hsinchun et al. | 2006
- 627
-
Fast Pedestrian Detection Using Color InformationXu, Y. W. / Cao, X. B. / Qiao, H. / Wang, F. Y. et al. | 2006
- 633
-
SG-Robot: CDMA Network-Operated Mobile Robot for Security Guard at HomeRyu, Je-Goon / Kil, Se-Kee / Shim, Hyeon-Min / Lee, Sang-Moo / Lee, Eung-Hyuk / Hong, Seung-Hong et al. | 2006
- 639
-
Design of Syntactical Morphological and Semantical Analyzer (SMSA) for Processing Arabic TextsMouti, Samar / Sukkar, Fadel et al. | 2006
- 642
-
Using Author Topic to Detect Insider Threats from Email TrafficOkolica, James S. / Peterson, Gilbert L. / Mills, Robert F. et al. | 2006
- 644
-
Digitized Forensic Investigation at P2P Copyright Controversy, InfringementKao, Da-Yu / Wang, Shiuh-Jeng / Huang, Frank Fu-Yuan et al. | 2006
- 647
-
On Off-Topic Web BrowsingGoharian, Nazli / Platt, Alana / Frieder, Ophir et al. | 2006
- 650
-
Mining Weighted Sequential Patterns Based on Length-Decreasing Support ConstraintsYun, Unil / Leggett, John J. / Ong, TeongJoo et al. | 2006
- 652
-
Intelligence Analysis Using High Resolution DisplaysBuennemeyer, Timothy / Booker, John / Sabri, Andrew / North, Chris et al. | 2006
- 654
-
Privacy Preserving Mining of Global Association Rules on Distributed DatasetShen, Huizhang / Zhao, Jidi / Yao, Ruipu et al. | 2006
- 657
-
CC-GiST: Cache Conscious-Generalized Search Tree for Supporting Various Fast Intelligent ApplicationsKim, Won-Sik / Loh, Woong-Kee / Han, Wook-Shin et al. | 2006
- 659
-
KD3 Scheme for Privacy Preserving Data MiningZhang, Peng / Tong, Yunhai / Tang, Shiwei / Yang, Dongqing et al. | 2006
- 662
-
Using Logic Programming to Detect Deception on the Basis of ActionsJones, James D. et al. | 2006
- 664
-
Intelligent Information Retrieval Tools for PoliceKumar, Nishant / Beer, Jan / Vanthienen, Jan / Moens, Marie-Francine et al. | 2006
- 666
-
Evaluation of Information Retrieval and Text Mining Tools on Automatic Named Entity ExtractionKumar, Nishant / Beer, Jan / Vanthienen, Jan / Moens, Marie-Francine et al. | 2006
- 668
-
A Child’s Story to Illustrate Automated Reasoning Systems Using Opportunity and HistoryJones, James D. / Joshi, Hemant / Topaloglu, Umit / Nelson, Eric et al. | 2006
- 671
-
Detection Using Clustering Query ResultsGoharian, Nazli / Platt, Alana et al. | 2006
- 674
-
Application of Latent Semantic Indexing in Generating Graphs of Terrorist NetworksBradford, R. B. et al. | 2006
- 676
-
Mining the Acceleration-Like Association RulesPi, Dechang / Qin, Xiaolin / Gu, Wangfeng et al. | 2006
- 678
-
Analyzing Social Networks in E-Mail with Rich Syntactic FeaturesThompson, Paul / Zhang, Wei et al. | 2006
- 680
-
E-mail Traffic Analysis Using Visualisation and Decision TreesLim, Mark Jyn-Huey / Negnevitsky, Michael / Hartnett, Jacky et al. | 2006
- 682
-
Advanced Patterns and Matches in Link AnalysisWolverton, Michael / Harrison, Ian / Lowrance, John / Rodriguez, Andres / Thomere, Jerome et al. | 2006
- 684
-
A Flexible Context-Aware Authorization Framework for Mediation SystemsYang, Li / Kizza, Joseph M. / Ege, Raimund K. et al. | 2006
- 686
-
Continuous Authentication by Keystroke Dynamics Using Committee MachinesLima e Silva Filho, Sergio Roberto / Roisenberg, Mauro et al. | 2006
- 688
-
A Flexible and Scalable Access Control for Ubiquitous Computing EnvironmentsHung, Le Xuan / Diep, Nguyen Ngoc / Zhung, Yonil / Lee, Sungyoung / Lee, Young-Koo et al. | 2006
- 690
-
A Parallel System Strategy of Evaluation and Forecasting for Security Information with Artificial SocietyGuo, Dalei / Tang, Shuming et al. | 2006
- 692
-
Identifying Information Provenance in Support of Intelligence Analysis, Sharing, and ProtectionGoan, Terrance / Fujioka, Emi / Kaneshiro, Ryan / Gasch, Lynn et al. | 2006
- 694
-
Intelligence Use of Unstructured Data in a Data Warehouse EnvironmentWakefield, Jim et al. | 2006
- 696
-
An Evolutionary Approach in Threats Detection for Distributed Security Defence SystemsOnwubiko, C. / Lenaghan, A. P. et al. | 2006
- 699
-
Classification of Threats Via a Multi-sensor Security PortalSingh, Amar / Holder, Lawrence et al. | 2006
- 701
-
Exploring the Detection Process: Integrating Judgment and Outcome DecompositionMartinez-Moyano, Ignacio J. / Rich, Eliot H. / Conrad, Stephen H. et al. | 2006
- 704
-
Issues in Merging Internet Autonomous Systems for Emergency CommunicationsRussell, Selwyn et al. | 2006
- 706
-
CWME: A Framework of Group Support System for Emergency ResponsesLi, Yaodong / He, Huiguang / Xiao, Baihua / Wang, Chunheng / Wang, Feiyue et al. | 2006
- 708
-
Abnormal Detection Algorithm Based on Match Range ModelChen, Jungan et al. | 2006
- 711
-
Experimental Validation and Analysis of an Intelligent Detection and Response Strategy to False Positives and Network AttacksHooper, Emmanuel et al. | 2006
- 715
-
A PCA-LVQ Model for Intrusion Alert AnalysisWang, Jing-Xin / Wang, Zhi-Ying / Dai, Kui et al. | 2006
- 717
-
A Formalized Taxonomy of DDoS Attacks Based on SimilarityKang, Jian / Zhang, Yuan / Ju, Jiu-bin et al. | 2006
- 720
-
Practical Intrusion Detection Using Genetic-ClusteringLin, Chien-Chuan / Wang, Ming-Shi et al. | 2006
- 722
-
An Ontology-Based Network Intrusion Detection System: A User-Oriented ApproachHung, Shao-Shin / Liu, Damon Shing-Min et al. | 2006
- 724
-
Design and Implementation of FPGA Based High-Performance Intrusion Detection SystemKim, Byoung-Koo / Heo, Young-Jun / Oh, Jin-Tae et al. | 2006
- 726
-
Anomaly Detection of Excessive Network Traffic Based on Ratio and Volume AnalysisKim, Hyun Joo / Na, Jung C. / Jang, Jong S. et al. | 2006
- 728
-
Detecting Anomalies in Cargo Using Graph PropertiesEberle, William / Holder, Lawrence et al. | 2006
- 731
-
Design of a Reliable Hardware Stack to Defend Against Frame Pointer Overwrite AttacksPark, Yongsu / Song, Yong Ho / Im, Eul Gyu et al. | 2006
- 733
-
Email Worm Detection Using Naïve Bayes and Support Vector MachineMasud, Mohammad M. / Khan, Latifur / Al-Shaer, Ehab et al. | 2006
- 735
-
An Anomaly Detection Algorithm for Detecting Attacks in Wireless Sensor NetworksPhuong, Tran / Hung, Le Xuan / Cho, Seong Jin / Lee, Young-Koo / Lee, Sungyoung et al. | 2006
- 737
-
A New Methodology of Analyzing Security Vulnerability for Network ServicesSong, Yong Ho / Park, Jung Min / Park, Yongsu / Im, Eul Gyu et al. | 2006
- 739
-
Using One-Time Password Based Authentication for Wireless IP NetworkVaidya, Binod / Lee, SangDuck / Kim, Eung-Kon / Han, SeungJo et al. | 2006
- 741
-
Experimental Study on Wireless Sensor Network SecurityKwon, Taekyoung / Park, Sang-ho et al. | 2006
- 744
-
Terrorist Database: A Bangladesh StudyAlam, Abu Md. Zafor / Waheed, Sajjad et al. | 2006
- 746
-
Terrorist Organizations and Effects of Terrorism in BangladeshAlam, Abu Md. Zafor / Alam, Abu Md. Siddique / Khan, Mahjabeen et al. | 2006
- 748
-
Decider.Track, a Revolutionary Cyber-Tracker for Antiterrorist FightNaillon, Martine / Chiara, Prefect Jean-François / Eude, Bruno / Amathieux, Christian et al. | 2006
- 750
-
The Role of Information Superiority in the Global War on TerrorismSobel, Annette et al. | 2006
- 753
-
A Trust-Based Security Architecture for Ubiquitous Computing SystemsHung, Le Xuan / Giang, Pho Duc / Zhung, Yonil / Phuong, Tran / Lee, Sungyoung / Lee, Young-Koo et al. | 2006
- 755
-
A Trust Model for Uncertain Interactions in Ubiquitous EnvironmentsHung, Le Xuan / Jammeel, Hassan / Cho, Seong Jin / Weiwei, Yuan / Lee, Young-Koo / Lee, Sungyoung et al. | 2006
- 758
-
A Multiclass Classifier to Detect Pedestrians and Acquire Their Moving StylesChen, D. / Cao, X. B. / Qiao, H. / Wang, F. Y. et al. | 2006
- 760
-
A Home Firewall Solution for Securing Smart SpacesGiang, Pho Duc / Hung, Le Xuan / Zhung, Yonil / Lee, Sungyoung / Lee, Young-Koo et al. | 2006
- 762
-
The Security Performance Evaluation of Digital WatermarkingZhang, Xinhong / Li, Shejiao / Zhang, Fan et al. | 2006
- 764
-
A Novel Key Release Scheme from BiometricsSong, Ong Thian / Teoh, Andrew B. J. / Ngo, David C. L. et al. | 2006
- 766
-
Matching Images of Never-Before-Seen Individuals in Large Law Enforcement DatabasesKursun, Olcay / Reynolds, Kenneth M. / Favorov, Oleg et al. | 2006