Organizations are making substantial investments in information security to reduce the risk presented by vulnerabilities in their information technology (IT) infrastructure. Howev...
Mukul Gupta, Jackie Rees, Alok R. Chaturvedi, Jie ...
This paper describes our experience aligning two simulation models of disease progression after biological attacks. The first model is the Incubation-Prodromal-Fulminant (IPF) mod...
Li-Chiou Chen, Kathleen M. Carley, Douglas B. Frid...
Proactive information sharing is a challenging issue faced by intelligence agencies in effectively making critical decisions under time pressure in areas related to homeland secur...
John Yen, Xiaocong Fan, Shuang Sun, Timothy Hanrat...
The Internet is one of the fastest growing areas of intelligence gathering. We present a statistical approach, called principal clusters analysis, for analyzing millions of user n...
Harris Wu, Michael D. Gordon, Kurt DeMaagd, Weiguo...
In law enforcement applications, there is a critical need for new tools that can facilitate efficient and effective collaboration. Through a field study, we observe that crime ana...
J. Leon Zhao, Henry H. Bi, Hsinchun Chen, Daniel D...
The rapid growth of the consumer-to-consumer online auction market demands research into its market structure and future trends. We propose that online reputation is becoming an i...
Zhangxi Lin, Dahui Li, Balaji Janamanchi, Wayne Hu...
We describe a decision support system (DSS) that was developed for the management of the costs associated with the payment of fees to protect the intellectual property (IP) of org...