| Collusion set detection through outlier discovery | p. 1 |
| Digging in the details : a case study in network data mining | p. 14 |
| Efficient identification of overlapping communities | p. 27 |
| Event-driven document selection for terrorism information extraction | p. 37 |
| Link analysis tools for intelligence and counterterrorism | p. 49 |
| Mining candidate viruses as potential bio-terrorism weapons from biomedical literature | p. 60 |
| Private mining of association rules | p. 72 |
| Design principles of coordinated multi-incident emergency response systems | p. 81 |
| Multi-modal biometrics with PKI technologies for border control applications | p. 99 |
| Risk management using behavior based Bayesian networks | p. 115 |
| Sensitivity analysis of an attack containment model | p. 127 |
| Toward a target-specific method of threat assessment | p. 139 |
| Incident and casualty databases as a tool for understanding low-intensity conflicts | p. 153 |
| Integrating private databases for data analysis | p. 171 |
| Applying authorship analysis to Arabic Web content | p. 183 |
| Automatic extraction of deceptive behavioral cues from video | p. 198 |
| Automatically determining an anonymous author's native language | p. 209 |
| A cognitive model for alert correlation in a distributed environment | p. 218 |
| Beyond keyword filtering for message and conversation detection | p. 231 |
| Content-based detection of terrorists browsing the Web using an advanced terror detection system (ATDS) | p. 244 |
| Modeling and multiway analysis of chatroom tensors | p. 256 |
| Selective fusion for speaker verification in surveillance | p. 269 |
| A new conceptual framework to resolve terrorism's root causes | p. 280 |
| Analyzing terrorist networks : a case study of the global Salafi Jihad network | p. 287 |
| A conceptual model of counterterrorist operations | p. 305 |
| Measuring success in countering terrorism : problems and pitfalls | p. 316 |
| Mapping the contemporary terrorism research domain : researchers, publications, and institutions analysis | p. 322 |
| Testing a rational choice model of airline hijackings | p. 340 |
| Analysis of three intrusion detection system benchmark datasets using machine learning algorithms | p. 362 |
| Discovering identity problems : a case study | p. 368 |
| Efficient discovery of new information in large text databases | p. 374 |
| Leveraging one-class SVM and semantic analysis to detect anomalous content | p. 381 |
| LSI-based taxonomy generation : the taxonomist system | p. 389 |
| Some marginal learning algorithms for unsupervised problems | p. 395 |
| Collecting and analyzing the presence of terrorists on the Web : a case study Jihad websites | p. 402 |
| Evaluating an infectious disease information sharing and analysis system | p. 412 |
| How question answering technology helps to locate malevolent online content | p. 418 |
| Information supply chain : a unified framework for information-sharing | p. 422 |
| Map-mediated GeoCollaborative crisis management | p. 429 |
| Thematic indicators derived from world news reports | p. 436 |
| A novel watermarking algorithm based on SVD and Zernike moments | p. 448 |
| A survey of software watermarking | p. 454 |
| Data distortion for privacy protection in a terrorist analysis system | p. 459 |
| Deception across cultures : bottom-up and top-down approaches | p. 465 |
| Detecting deception in synchronous computer-mediated communication using speech act profiling | p. 471 |
| Active automation of the DITSCAP | p. 479 |
| An ontological approach to the document access problem of insider threat | p. 486 |
| Filtering, fusion and dynamic information presentation : towards a general information firewall | p. 492 |
| Intrusion detection system using sequence and set preserving metric | p. 498 |
| The multi-fractal nature of worm and normal traffic at individual source level | p. 505 |
| Learning classifiers for misuse detection using a bag of system calls representation | p. 511 |
| A Jackson network-based model for quantitative analysis of network security | p. 517 |
| Biomonitoring, phylogenetics and anomaly aggregation systems | p. 523 |
| CODESSEAL : compiler/FPGA approach to secure applications | p. 530 |
| Computational tool in infrastructure emergency total evacuation analysis | p. 536 |
| Performance study of a compiler/hardware approach to embedded systems security | p. 543 |
| A secured mobile phone based on embedded fingerprint recognition systems | p. 549 |
| Connections in the world of international terrorism | p. 554 |
| Forecasting terrorism : indicators and proven analytic techniques | p. 561 |
| Forecasting terrorist groups' warfare : 'conventional' to CBRN | p. 567 |
| The qualitative challenge of insurgency informatics | p. 571 |
| The application of PROACT RCA to terrorism/counter terrorism related events | p. 579 |
| A group decision-support method for search and rescue based on Markov chain | p. 590 |
| A new relationship form in data mining | p. 593 |
| A study of "root causes of conflict" using latent semantic analysis | p. 595 |
| An empirical study on dynamic effects on deception detection | p. 597 |
| Anti money laundering reporting and investigation - sorting the wheat from the chaff | p. 600 |
| Application of latent semantic indexing to processing of noisy text | p. 602 |
| Detecting misuse of information retrieval systems using data mining techniques | p. 604 |
| Mining schemas in semistructured data using fuzzy decision trees | p. 606 |
| More than a summary : stance-shift analysis | p. 608 |
| Principal component analysis (PCA) for data fusion and navigation of mobile robots | p. 610 |
| BioPortal : sharing and analyzing infectious disease information | p. 612 |
| DIANE : revolutionizing the way we collect, analyze, and share information | p. 614 |
| Processing high-speed intelligence feeds in real-time | p. 617 |
| Question answer TARA : a terrorism activity resource application | p. 619 |
| Template based semantic similarity for security applications | p. 621 |
| The dark Web portal project : collecting and analyzing the presence of terrorist groups on the Web | p. 623 |
| Toward an ITS specific knowledge engine | p. 625 |
| A blind image watermarking using for copyright protection and tracing | p. 627 |
| Towards an effective wireless security policy for sensitive organizations | p. 629 |
| A taxonomy of cyber attacks on 3G networks | p. 631 |
| An adaptive approach to handle DoS attack for Web services | p. 634 |
| An architecture for network security using feedback control | p. 636 |
| Defending a Web browser against spying with browser helper objects | p. 638 |
| Dynamic security service negotiation to ensure security for information sharing on the Internet | p. 640 |
| Enhancing spatial database access control by eliminating the covert topology channel | p. 642 |
| Gathering digital evidence in response to information security incidents | p. 644 |
| On the QP algorithm in software watermarking | p. 646 |
| On the use of opaque predicates in mobile agent code obfuscation | p. 648 |
| Secure contents distribution using flash memory technology | p. 650 |
| Background use of sensitive information to aid in analysis of non-sensitive data on threats and vulnerabilities | p. 652 |
| Securing grid-based critical infrastructures | p. 654 |
| The safety alliance of cushing - a model example of cooperation as an effective counterterrorism tool | p. 656 |
| A framework for global monitoring and security assistance based on IPv6 and multimedia data mining techniques | p. 658 |
| An agent-based framework for a traffic security management system | p. 660 |
| Application of a decomposed support vector machine algorithm in pedestrian detection from a moving vehicle | p. 662 |
| Application of cooperative co-evolution in pedestrian detection systems | p. 664 |
| Biometric fingerprints based radio frequency identification | p. 666 |
| BorderSafe : cross-jurisdictional information sharing, analysis, and visualization | p. 669 |
| Table of Contents provided by Blackwell. All Rights Reserved. |