KMap
VOSviewer
Courses
- WCMWeb Computing and Mining
- TDWMTopics in Data and Web Mining
- DAData Analytics
- CWCCyber Warfare Capstone
Grants
- CISE-MSI: DP: SaTC: MSI Research Capacity Building for Artificial Intelligence (AI)-enabled Vulnerability Assessment and Remediation in Cyberinfrastructure
Principal Investigator (PI)
2022
$380.0K
Active - EAGER: SaTC-EDU: Artificial Intelligence and Cybersecurity Research and Education at Scale
Principal Investigator (PI)
2020
$297.7K
Active - Cybersecurity Scholarship-for-Service Renewal at The University of Arizona: The AZSecure SFS Program
Principal Investigator (PI)
2019
$2.4M
Active - CICI: SSC: Proactive Cyber Threat Intelligence and Comprehensive Network Monitoring for Scientific Cyberinfrastructure: The AZSecure Framework
Principal Investigator (PI)
2019
$998.0K
Active - SaTC: CORE: Small: Cybersecurity Big Data Research for Hacker Communities: A Topic and Language Modeling Approach
Principal Investigator (PI)
2019
$526.6K
Active - EAGER: A Longitudinal Study of Knowledge Diffusion and Societal Impact of Nanomanufacturing Research & Development: Harnessing Data for Science and Engineering
Principal Investigator (PI)
2018
$158.4K
- Women in Cybersecurity Conference 2017 (WiCyS 2017)
Principal Investigator (PI)
2017
$345.9K
- DRS - 2512 / ABRC/UofA Research Grant (Zhou)
Co-Investigator (COI)
2017
$225.0K
- Creating a Cybersecurity Big Data and Analytics Sharing Platform
Principal Investigator (PI)
2017
$180.0K
- SilverLink: A Smart and Connected Home Monitoring System for Senior Care: STTR Phase I
Principal Investigator (PI)
2016
$87.1K
Books
- Intelligence and Security Informatics: 12th Pacific Asia Workshop. Paisi 2017, Jeju Island, South Korea, May 23, 2017, Proceedings
2017
- Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface
2013
- Infectious Disease Informatics and Biosurveillance
2012
- Intelligence and security informatics: Pacific Asia Workshop, PAISI 2012, Kuala Lumpur, Malaysia, May 29, 2012: proceedings
2012
- Intelligence and Security Informatics: Pacific Asia Workshop, PAISI 2013, Beijing, China, August 3, 2013 : proceedings
2011
- Data Mining for Social Network Data
2010
- Infectious disease informatics
2010
- Intelligence and security informatics : Pacific Asia Workshop, PAISI 2010, Hyderabad, India, June 21, 2010 : proceedings
2010
- Analysis of Affect Intensities in Extremist Group Forums
2008
- Biosurveillance and Biosecurity
2008
- Intelligence and Security Informatics: Biosurveillance
2007
- Intelligence and Security Informatics: Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007, Proceedings
2007
- Intelligence and security informatics: international workshop, WISI 2006, Singapore, April 9, 2006 : proceedings
2006
- Digital Libraries: People, Knowledge, and Technology
2002
News
- UArizona Researchers Go on Offense, Defense in Battle Against Hackers
2019
- Cybersecurity Students Benefit From Scholarship Program
2019
- UA Expert Identifies 6 Easy Ways to Avoid Theft Online
2016
- New 'Rogue One' Film Provides Interesting Study in Cybersecurity
2016
- UA Talent Pipeline Stopping Data Breaches
2015
- UA Surgeon Takes on 'Medjacking'
2015
- UA Shares 'Never Settle' Progress With Regents
2015
- UA Offers Early Training in Cybersecurity
2015
- UA Honors 'Pillars' of Research, Teaching, Engagement
2014
- Brown Family Leaves Lasting Legacy on UA, Community
2014
- UA Regents’ Professors Named in College of Science, Eller College of Management
2013
- $5.4M in Cybersecurity Grants Awarded to UA Regents' Professor Hsinchun Chen
2013
- UA Innovator Awarded Thomas R. Brown Chair in Management and Technology
2013
- September 2013: Month in Review
2013
- November 2013: Month in Review
2013
- Three UA Faculty Members Inducted as Regents' Professors, Two as Distinguished Professors
2013
- Innovation Day Celebrates Entrepreneurship on Campus
2012
- New Center to Advance Movement of Ideas to Market
2011
- UA Tech Spinoff Acquired by IBM Corp.
2011
- UA Researchers Develop Prototype to Detect Fake Websites
2011
- UA-Led Asteroid Mission Wins State Innovation Award
2011
- Record Number of New Companies Launched by UA Researchers
2009
- Seven UA Scientists Named AAAS Fellows
2006
- Eller's Hsinchun Chen Awarded IEEE Fellowship
2006
- Lecture Series to Focus on Criminal Justice and Security
2005
- USS Arizona Bell Rings to Honor Outstanding Achievement
2005
- UA, Arizona Center for Innovation Hosts Inaugural Technology Innovation Awards
2004
- Second Security Symposium to Meet in Tucson
2004
- Al Qaeda Expert on Campus This Week
2004
- COPLINK Wins National Award
2003
- National Symposium on Intelligence and Security Informatics
2003
- Tucson, Phoenix Police Honor MIS Prof
2002
- Year in Review 2002: Eller College of Business and Public Administration
2002
- Eller College Named One of 20 Tech-Savvy Business Schools
2001
- Tucson To Host High-Level Law Enforcement Technology Workshop
2001
Publications (559)
- Counteracting Dark Web Text-Based CAPTCHA with Generative Adversarial Learning for Proactive Cyber Threat Intelligence
2022
- Linking Exploits from the Dark Web to Known Vulnerabilities for Proactive Cyber Threat Intelligence: An Attention-Based Deep Structured Semantic Model
2022
- Automated Analysis of Changes in Privacy Policies: A Structured Self-Attentive Sentence Embedding Approach
2022
- Key Factors Affecting User Adoption of Open-Access Data Repositories in Intelligence and Security Informatics
2022
- Wearable Sensor-based Chronic Condition Severity Assessment: An Adversarial Attention-based Deep Multisource Multitask Learning Approach
2022
- Cross-Lingual Cybersecurity Analytics in the International Dark Web with Adversarial Deep Representation Learning
2022
- A Multi-Disciplinary Perspective for Conducting Artificial Intelligence-enabled Privacy Analytics: Connecting Data, Algorithms, and Systems
2021
- Identifying and Categorizing Malicious Content on Paste Sites: A Neural Topic Modeling Approach
2021
- Single-Shot Black-Box Adversarial Attacks Against Malware Detectors: A Casual Language Model Approach
2021
- ACM KDD AI4Cyber: The 1st Workshop on Artificial Intelligence-enabled Cybersecurity Analytics
2021
- Automated PII Extraction for Social Media for Raising Privacy Awareness: A Deep Transfer Learning Approach
2021
- Deep Learning for Information Systems Research
2021
- Binary Black-box Evasion Attacks Against Deep Learning-based Static Malware Detectors with Adversarial Byte-Level Language Model
2021
- Exploring the Evolution of Exploit-Sharing Hackers: An Unsupervised Graph Embedding Approch
2021
- A Deep Learning Approach for Recognizing Activity of Daily Living (ADL) for Senior Care: Exploiting Interaction Dependency and Temporal Patterns
2021
- Leveraging the IS Success Model to Examine a Large-scale Social Media Search System
2021
- Binary Black-box Attacks Against Static Malware Detectors with Reinforcement Learning in Discrete Action Spaces
2021
- Distilling Contextual Embeddings Into A Static Word Embedding for Improving Hacker Forum Analytics
2021
- Fall Detection with Wearable Sensors: A Hierarchical Attention-based Convolutional Neural Network Approach
2021
- Linking Common Vulnerabilities and Exposures to the MITRE ATT CK Framework: A Self-Distillation Approach
2021
- A Multimodal Event-driven LSTM Model for Stock Prediction Using Online News
2021
- Identifying Vulnerable GitHub Repositories and Users in Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach
2020
- Detecting Cyber Threats in Non-English Hacker Forums: An Adversarial Cross-Lingual Knowledge Transfer Approach
2020
- Identifying, Collecting, and Monitoring Personally Identifiable Information: From the Dark Web to the Surface Web
2020
- Examining the Impacts of Mental Workload and Task Technology Fit on User Acceptance of the Social Media Search System
2020
- A Generative Adversarial Learning Framework for Breaking Text-Based CAPTCHA in the Dark Web
2020
- Connecting Systems, Data, and People: A Multidisciplinary Research Roadmap for Chronic Disease Management
2020
- Trailblazing the Artificial Intelligence for Cybersecurity Discipline: A Multi-Disciplinary Research Roadmap
2020
- Human Identification for Activities of Daily Living: A Deep Transfer Learning Approach
2020
- Smart Vulnerability Assessment for Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach
2020
- Semi-Supervised Cyber Threat Identification in Dark Net Markets: A Transductive and Deep Learning Approach
2020
- Proactively Identifying Emerging Threats from the Dark Web: A Diachronic Graph Embedding Framework (D-GEF)
2020
- Labeling Hacker Exploits for Proactive Cyber Threat Intelligence: A Deep Transfer Learning Approach
2020
- Finding People with Emotional Distress in Online Social Media: A Design Combining Machine Learning and Rule-Based Classification
2020
- Linking Personally Identifiable Information from the Dark Web to the Surface Web: A Deep Entity Resolution Approach
2020
- A Deep Learning Architecture for Psychometric Natural Language Processing
2020
- Dark Net Ecosystem Cyber Threat Intelligence Tool
2019
- Identifying High-Impact Opioid Products and Key Sellers in Dark Net Marketplaces: An Interpretable Text Analytics Approach
2019
- An Exploratory Study on the Virtual World: Investigating the Avatar Gender and Avatar Age Differences in Their Social Interactions for Help-Seeking
2019
- Examining Patterns of Scientific Knowledge Diffusion Based on Knowledge Cyber Infrastructure: A Multi-dimensional Network Approach
2019
- DICE-E: A Framework for Conducting Darknet Identification, Collection, Evaluation, with Ethics
2019
- Lecture Notes in Computer Science
2019
- Performance Modeling of Hyperledger Sawtooth Blockchain
2019
- Comparing Nanotechnology Landscapes in the US and China: A Patent Analysis Perspective
2019
- Do Electronic Health Records Affect Quality of Care? Evidence from the HITECH Act
2019
- Emoticon Analysis for Chinese Social Media and E-Commerce: The AZEmo System
2019
- Hidden Markov Model Based Fall Detection with Motion Sensor Orientation Calibration: A Case for Real-Life Home Monitoring
2018
- Motion Sensor-Based Assessment on Fall Risk and Parkinson’s Disease Severity: A Deep Multi-Source Multi-Task Learning (DMML) Approach
2018
- A Sequence-to-Sequence Model-Based Deep Learning Approach for Recognizing Activity of Daily Living for Senior Care
2018
- Web Media and Stock Markets: A Survey and Future Directions from a Big Data Perspective
2018
- The State-of-the-Art in Twitter Sentiment Analysis: A Review and Benchmark Evaluation
2018
- Lecture Notes in Computer Science 10983
2018
- Benchmarking Vulnerability Assessment Tools for Enhanced Cyber-Physical System (CPS) Resiliency
2018
- Identifying, Collecting and Presenting Hacker Community Data: Forums, IRC, Carding Shops and DNMs
2018
- Incremental Hacker Forum Exploit Collection and Classification for Proactive Cyber Threat Intelligence: An Exploratory Study
2018
- Vulnerability Assessment, Remediation, and Automated Reporting: Case Studies of Higher Education Institutions
2018
- Detecting Cyber Threats in Non-English Dark Net Markets: A Cross-Lingual Transfer Learning Approach: An Exploratory Study
2018
- Identifying SCADA Systems and Their Vulnerabilities on the Internet of Things: A Text-Mining Approach
2018
- Exploring Emerging Hacker Assets and Key Hackers for Proactive Cyber Threat Intelligence
2017
- Benchmarking vulnerability scanners: An experiment on SCADA devices and scientific instruments
2017
- Assessing medical device vulnerabilities on the Internet of Things
2017
- Investigating the Impacts of Avatar Gender, Avatar Age, and Region Theme on Avatar Activity in the Virtual World
2017
- Accessing Medical Device Vulnerabilities on the Internet of Things
2017
- Healthcare Predictive Analytics for Risk Profiling in Chronic Care: A Bayesian Multi-Task Learning Approach
2017
- Identifying Mobile Malware and Key Threat Actors in Online Hacker Forusm for Proactive Cyber Threat Intelligence
2017
- International perspective on nanotechnology papers, patents, and NSF awards (2000–2016)
2017
- Adverse Drug Reaction Early Warning Using User Search Data
2017
- Identifying vulnerabilities of consumer Internet of Things (IoT) devices: A scalable approach
2017
- Identifying mobile malware and key threat actors in online hacker forums for proactive cyber threat intelligence
2017
- Identify Key Data Breach Services with Nonparametric Supervised Topic Model
2016
- Examining Hacker Participation Length in Cybercriminal Internet-Relay-Chat Communities
2016
- Modeling One-Mode Projection of Bipartite Networks by Tagging Vertex Information
2016
- A Tensor-based Information Framework for Predicting the Stock Market
2016
- Effects of Heart Rate Variability Biofeedback Therapy on Patients with Poststroke Depression: A Case Study
2016
- Identify High Quality Carding Services in Underground Economy using Nonparametric Supervised Topic Model
2016
- Shodan Visualized
2016
- AZSecure Hacker Assets Portal: Cyber Threat Intelligence and Malware Analysis
2016
- NATERGM: A Model for Examining the Role of Nodal Attributes in Dynamic Social Media Networks
2016
- DiabeticLink: An Internationally Collaborative Cyber-Enabled Empowerment Platform
2016
- Targeting Key Data Breach Services in Underground Supply Chain
2016
- Tracing Topic Discussion with Event-driven SIR Model in Online Forums
2016
- Identifying Devices across the IPv4 Address Space
2016
- Identifying Language Groups within Multilingual Cybercriminal Forums
2016
- Deep Learning Based Topic Identification and Categorization: Mining Diabetes-Related Topics in Chinese Health Websites
2016
- Identifying and Profiling Key Sellers in Cyber Carding Community: AZSecure Text Mining System
2016
- Anonymous Port Scanning Performing Network -Reconnaissance Through Tor
2016
- Effects of Individuals Motivations on Communications in Online Health Forums
2016
- Exploring the Online Underground Marketplaces through Topic-Based Social Network and Clustering
2016
- Chinese Underground Market Jargon Analysis Based on Unsupervised Learning
2016
- Sentiment Analysis on Chinese Health Forums: A Preliminary Study of Different Language Models
2016
- Chronic Disease Related Entity Extraction in Online Chinese Question Answer Services
2016
- Identifying the Socio-Spatial Dynamics of Terrorist Attacks in the Middle East
2016
- Using Social Network Analysis to Identify Key Hackers for Keylogging Tools in Hacker Forums
2016
- Identifying Top Listers in Alphabay Using Latent Dirichlet Allocation
2016
- SCADA Honeypots: An In-depth Analysis of Conpot
2016
- Epidemic Model for Information Diffusion in Web Forums: Experiments in Marketing Exchange and Political Dialog
2016
- SilverLink: Smart Home Health Monitoring for Senior Care
2016
- Identifying SCADA Vulnerabilities Using Passive and Active Vulnerability Assessment Techniques
2016
- Exploring Key Hackers and Cybersecurity Threats in Chinese Hacker Communities
2016
- Health-related Spammer Detection on Chinese Social Media
2016
- Stakeholder Analyses of Firm-Related Web Forums: Applications in Stock Return Prediction
2015
- The roles of sharing, transfer, and public funding in nanotechnology knowledge-diffusion networks
2015
- The impact of individual attributes on knowledge diffusion in web forums
2015
- Enhancing Predictive Analytics for Anti-Phishing by Exploiting Website Genre Information
2015
- Modeling the dynamics of medical information through web forums in medical industry
2015
- Exploring Threats and Vulnerabilities in Hacker web: Forums, IRC and Carding Shops
2015
- Identifying Novel Adverse Drug Events from Health Social Media Using Distant Learning
2015
- A Research Framework for Pharmacovigilance in Health Social Media: Identification and Evaluation of Patient Adverse Drug Event Reports
2015
- Modeling Knowledge Diffusion in Scientific Innovation Networks: An Institutional Comparison Between China and U.S. with Illustration for Nanotechnology
2015
- Exploring Hacker Assets in Underground Forums
2015
- Improving YouTube Self-case Video Search: A Deep Learning Approach for Patuent Knowledge Extraction
2015
- Developing Understanding of Hacker Language through the use of Lexical Semantics
2015
- Identifying Adverse Drug Events from Patient Social Media A Case Study for Diabetes
2015
- Tensor-based Learning for Perceiving Information-driven Stock Movements
2015
- Evaluating text visualization for authorship analysis
2014
- Time-to-Event Predictive Modeling for Chronic Conditions Using Electronic Health Records
2014
- Collaborative Friendship Networks in Online Healthcare Communities: An Exponential Random Graph Model Analysis
2014
- Uninvited Connections: A Study of the Vulnerable Devices on the Internet of Things (IoT)
2014
- Nanotechnology knowledge diffusion: Measuring the impact of the research networking and a strategy for improvement
2014
- Identifying Adverse Drug Events from Health Social Media: A Case Study on Heart Disease Discussion Forums
2014
- HealthQA: A Chinese QA Summary System for Smart Health
2014
- Intelligence and Security Informatics - Pacific Asia Workshop, PAISI 2014, Tainan, Taiwan. Proceedings
2014
- Emoticon Analysis for Chinese Health and Fitness Topics
2014
- Smart and Connected Health (Guest Editor Introduction)
2014
- Descriptive Analytics: Investigating Expert Hackers in Hacker Forums
2014
- Diabetes-Related Topic Detection in Chinese Health Websites Using Deep Learning
2014
- Analyzing firm-specific social media and market: A stakeholder-based event analysis framework
2014
- Time-to-event Modeling for Predicting Hacker Community Participant Trajectory
2014
- Text Mining Self-Disclosing Health Information for Public Health Service
2014
- DiabeticLInk: An Integrated and Intelligent Cyber-enabled Health Social Platform for Diabetic Patients
2014
- Identifying Top Sellers in Underground Economy Using Deep Learning-based Sentiment Analysis
2014
- International Conference on Smart Health, Proceedings
2014
- International Conference on Smart Health, ICSH 2014, Beijing, China, July 2014. Proceedings
2014
- Bridging the Virtual and Real: The Relationship Between Web Content, Linkage, and Geographical Proximity of Social Movements
2014
- The information content of mandatory risk factor disclosures in corporate filings
2014
- An integrated framework for analyzing multilingual content in Web 2.0 social media
2014
- A Control Study on the Effects of HRV Biofeedback Therapy in Patients with Post-Stroke Depression
2014
- Analyzing market performance via social media: a case study of a banking industry crisis
2014
- Statistical modeling of nanotechnology knowledge diffusion networks
2013
- Recommendation as link prediction in bipartite graphs
2013
- Machine learning for attack vector identification in malicious source code
2013
- Research note: Examining gender emotional differences in Web forum communication
2013
- Analyzing sentiments in Web 2.0 social media data in Chinese: Experiments on business and marketing related Chinese Web forums
2013
- A computational approach to detecting and assessing sustainability-related communities in social media
2013
- Revealing the Hidden World of the Dark Web: Social Media Forums and Videos sup 1 /sup 1
2013
- Global nanotechnology development from 1991 to 2012: Patents, scientific publications, and effect of NSF funding
2013
- Evaluating text visualization: An experiment in authorship analysis
2013
- Business intelligence and analytics: Research directions
2013
- DiabeticLink: A health big data system for patient empowerment and personalized healthcare
2013
- Nanotechnology public funding and impact analysis: A tale of two decades (1991-2010)
2013
- AZDrugMiner: An information extraction system for mining patient-reported adverse drug events in online patient forums
2013
- MedTime: A temporal information extraction system for clinical narratives
2013
- SHB chairs' welcome
2012
- Partially supervised learning for radical opinion identification in hate group web forums
2012
- SHB 2012: International workshop on smart health and wellbeing
2012
- Sentimental Spidering: Leveraging Opinion Information in Focused Crawlers
2012
- Theory-informed design and evaluation of an advanced search and knowledge mapping system in nanotechnology
2012
- Credit Rating Change Modeling Using News and Financial Ratios
2012
- Using burst detection techniques to identify suspicious vehicular traffic at border crossings
2012
- Scalable sentiment classification across multiple dark web forums
2012
- An event-driven SIR model for topic diffusion in web forums
2012
- Understanding avatar sentiments using verbal and non- verbal cues
2012
- Evaluating sentiment in financial news articles
2012
- From Dark Web to GeoPolitical Web: Exploring the Value of Social Media Informatics
2012
- Evaluating an integrated forum portal for terrorist surveillance and analysis
2012
- Business intelligence and analytics: from big data to big impact
2012
- Artificial immune system for illicit content identification in social media
2012
- Securing cyberspace: Identifying key actors in hacker communities
2012
- Editorial: Design science, grand challenges, and societal impacts
2011
- Knowledge mapping for rapidly evolving domains: A design science approach
2011
- Giving context to accounting numbers: The role of news coverage
2011
- Enterprise risk and security management: Data, text and Web mining
2011
- Gender Classification for Web Forums
2011
- Determining inventor status and its effect on knowledge diffusion: A study on nanotechnology literature from China, Russia, and India
2011
- Social intelligence and cultural awareness
2011
- A multi-region empirical study on the internet presence of global extremist organizations
2011
- Smart market and money
2011
- The Geopolitical Web: Assessing societal risk in an uncertain world
2011
- Designing, Implementing, and Evaluating Information Systems for Law Enforcement—A Long-Term Design-Science Research Project
2011
- Identity matching using personal and social identity features
2011
- Analyzing information systems researchers' productivity and impacts: A perspective on the H index
2011
- Law enforcement officers' acceptance of advanced e-government technology: A survey study of COPLINK Mobile
2011
- An SIR model for violent topic diffusion in social media
2011
- An Integrated Framework for Avatar Data Collection from the Virtual World: A Case Study in Second Life
2011
- The Dark Web Forum Portal: From multi-lingual to video
2011
- Selecting attributes for sentiment classification using feature relation networks
2011
- A hierarchical Naïve Bayes model for approximate identity matching
2011
- ISI-KDD: SIGKDD workshop on intelligence and security informatics 2010
2011
- Special issue on social media analytics: Understanding the pulse of the society
2011
- Introduction to special issue on terrorism informatics
2011
- Dynamic user-level affect analysis in social media: Modeling violence in the dark web
2011
- Smart health and wellbeing
2011
- What are the grand challenges in information systems research? a debate and discussion
2011
- Managing emerging infectious diseases with information systems: Reconceptualizing outbreak management through the lens of loose coupling
2011
- Disease named entity recognition using semisupervised learning and conditional random fields
2011
- Trends and controversies
2011
- Al, Virtual Worlds, and Massively Multiplayer Online Games
2011
- A lexicon-enhanced method for sentiment classification: An experiment on online product reviews
2010
- An integrated framework for avatar data collection from the virtual world
2010
- Framing Social Movement Identity with Cyber-Artifacts: A Case Study of the International Falun Gong Movement
2010
- Financial text mining: Supporting decision making using web 2.0 content
2010
- Gene function prediction with gene interaction networks: a context graph kernel approach.
2010
- Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface
2010
- User-generated content on social media: Predicting market success with online word-of-mouth
2010
- Sports knowledge management and data mining
2010
- Visualizing social network concepts
2010
- Interaction Analysis of the ALICE Chatterbot: A Two-Study Investigation of Dialog and Domain Questioning
2010
- Embedded analogue nonvolatile memory with feedback-controlled programming circuit on-chip
2010
- Detecting fake websites: The contribution of statistical learning theory
2010
- Comparing the virtual linkage intensity and real world proximity of social movements
2010
- Editorial: Welcome to the first issue of ACM TMIS
2010
- Business and market intelligence 2.0
2010
- Social Media Analytics and Intelligence
2010
- Developing a Dark Web collection and infrastructure for computational and social sciences
2010
- Global disease surveillance using social media: HIV/AIDS content intervention in web forums
2010
- A discrete stock price prediction engine based on financial news
2010
- Evaluating the use of search engine development tools in IT education
2010
- Text-based video content classification for online video-sharing sites
2010
- Exploiting emotions in social interactions to detect online social communities
2010
- AI and opinion mining
2010
- A Cyber-archaeology Approach to Social Movement Research: Framework and Case Study
2010
- Trends in worldwide nanotechnology patent applications: 1991 to 2008
2010
- A focused crawler for dark web forums
2010
- AI and security informatics
2010
- Prospective Infectious Disease Outbreak Detection Using Markov Switching Models
2010
- Burst Detection From Multiple Data Streams: A Network-Based Approach
2010
- Security Informatics
2009
- Business stakeholder analyzer: An experiment of classifying stakeholders on the web
2009
- Multilingual chief complaint classification for syndromic surveillance: an experiment with Chinese chief complaints.
2009
- Topological analysis of criminal activity networks: Enhancing transportation security
2009
- Browsing the underdeveloped web: An experiment on the arabic medical web directory
2009
- Automatic online news monitoring and classification for syndromic surveillance
2009
- IEDs in the dark web: Lexicon expansion and genre classification
2009
- Recommendation as link prediction: A graph kernel-based machine learning approach
2009
- Knowledge sharing and diffusion patterns
2009
- Xu responds
2009
- The Dynamics of Terrorist Networks: Understanding the Survival Mechanisms of Global Salafi Jihad
2009
- Managing Knowledge in Light of Its Evolution Process: An Empirical Study on Citation Network-Based Patent Classification
2009
- Law enforcement officers' acceptance of advanced e-government technology: A survey study of COPLNK mobile
2009
- Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics (CSI-KDD): Preface
2009
- IEEE ISI 2009 welcome message from conference co-chairs
2009
- AI, e-government, and politics 2.0
2009
- A comparison of tools for detecting fake websites
2009
- Nano Mapper: An Internet knowledge mapping system for nanotechnology development
2009
- Using open web APIs in teaching web mining
2009
- A web-based system for near real-time surveillance and space-time cluster analysis of foot-and-mouth disease and other animal diseases.
2009
- A quantitative stock prediction system based on financial news
2009
- Effect of Inventor Status on Intra-Organizational Innovation Evolution
2009
- Examining agencies' satisfaction with electronic record management systems in e-government: A large-scale survey study
2009
- Trends for nanotechnology development in China, Russia, and India
2009
- Gender difference analysis of political web forums: An experiment on an international Islamic women's forum
2009
- A comparison of fraud cues and classification methods for fake escrow website detection
2009
- Dark web forums portal: Searching and analyzing Jihadist forums
2009
- Identification of extremist videos in online video sharing sites
2009
- AI for Global Disease Surveillance
2009
- Identifying significant facilitators of dark network evolution
2009
- Arizona literature mapper: An integrated approach to monitor and analyze global bioterrorism research literature
2009
- Disease surveillance based on spatial contact networks: A case study of Beijing 2003 SARS epidemic
2009
- High-speed and low-power feRAM utilising merged BL/PL array architecture with twin-bitline-driven scheme
2009
- Textual analysis of stock market prediction using breaking financial news: The AZFin text system
2009
- AI and global science and technology assessment
2009
- The strategic co-alignment for implementing information systems in E-government
2009
- Cyber extremism in Web 2.0: An exploratory study of international Jihadist groups
2008
- Stylometric identification in electronic markets: Scalability and robustness
2008
- Botnets, and the cybercriminal underground
2008
- IEDs in the Dark Web: Genre classification of improvised explosive device web pages
2008
- Trends in nanotechnology patents
2008
- Exploring gray web forums: Analysis and investigation of forum-based communities in Taiwan
2008
- PRM-based identity matching using social context
2008
- Uncovering the Dark Web: A case study of Jjihad on the Web
2008
- Homeland security data mining using social network analysis
2008
- Cybergate: A design framework and system for text analysis of computer-mediated communication
2008
- The topology of dark networks
2008
- Nuclear threat detection via the nuclear web and dark web: Framework and preliminary study
2008
- Discovery of improvised explosive device content in the Dark Web
2008
- Bioterrorism event detection based on the Markov switching model: A simulated anthrax outbreak study
2008
- Kernel-based learning for biomedical relation extraction
2008
- Guest Editors Introduction: Special Section on Intelligence and Security Informatics
2008
- SpidersRUs: Creating specialized search engines in multiple languages
2008
- Combining probability models and web mining models: A framework for proper name transliteration
2008
- Understanding the nexus of terrorist web sites
2008
- Writeprints: A stylometric approach to identity-level identification and similarity detection in cyberspace
2008
- Multimedia content coding and analysis: Unraveling the content of jihadi extremist groups' videos
2008
- Syndromic surveillance systems
2008
- A stack-based prospective spatio-temporal data analysis approach
2008
- A hybrid approach to web forum interactional coherence analysis
2008
- A longitudinal analysis of nanotechnology literature: 1976-2004
2008
- Mapping dark web geolocation
2008
- Affect analysis of web forums and blogs using correlation ensembles
2008
- Evaluating ontology mapping techniques: An experiment in public safety information sharing
2008
- Sentiment and affect analysis of Dark Web forums: measuring radicalization on the internet
2008
- A machine learning approach to web page filtering using content and structure analysis
2008
- Communication-Garden System: Visualizing a computer-mediated communication process
2008
- An integrated approach to mapping worldwide bioterrorism research capabilities
2008
- Developing ideological networks using social network analysis and writeprints: A case study of the international Falun Gong movement
2008
- Evaluating a news-aware quantitative trader: The effect of momentum and contrarian stock selection strategies
2008
- Ontology-enhanced automatic chief complaint classification for syndromic surveillance
2008
- Analysis of cyberactivism: A case study of online free Tibet activities
2008
- Welcome message from conference co-chairs
2008
- Suspect vehicle identification for border safety
2008
- Organizing domain-specific information on the Web: An experiment on the Spanish business Web directory
2008
- Editors' introduction special issue on multilingual knowledge management
2008
- Sentiment analysis in multiple languages: Feature selection for opinion classification in Web forums
2008
- Editorial: Introduction to the special issue on decision support in medicine
2007
- A framework for stylometric similarity detection in online settings
2007
- Identification of Marker Genes from High-Dimensional Microarray Data for Cancer Classification
2007
- Evaluating the efficacy of a terrorism question/answer system
2007
- Automatic patent classification using citation network information: An experimental study in nanotechnology
2007
- Exploring extremism and terrorism on the web: The Dark Web project
2007
- Automated criminal link analysis based on domain knowledge
2007
- Mapping the contemporary terrorism research domain
2007
- ISI 2007 Preface
2007
- Cyberinfrastructure for homeland security: Advances in information sharing, data mining, and collaboration systems
2007
- Analyzing and visualizing gray Web forum structure
2007
- Building a directory for the underdeveloped web: An experiment on the arabic medical web directory
2007
- Graph Kernel-Based Learning for Gene Function Prediction from Gene Interaction Network
2007
- A Comparison of Collaborative-Filtering Recommendation Algorithms for E-commerce
2007
- Categorization and analysis of text in computer mediated communication archives using visualization
2007
- Dynamic Social Network Analysis of a Dark Network: Identifying Significant Facilitators
2007
- An end user evaluation of query formulation and results review tools in three medical meta-search engines
2007
- Medical Ontology-Enhanced Text Processing for Infectious Disease Informatics
2007
- User-centered evaluation of Arizona BioPathway: an information extraction, integration, and visualization system
2007
- Interaction Coherence Analysis for Dark Web Forums
2007
- A comparison of collaborative-filtering algorithms for ecommerce
2007
- Collection of U.S. Extremist Online Forums: A Web Mining Approach
2007
- Millimetre-wave signal generation using FWM effect in SOA
2007
- Redips: Backlink search and analysis on the web for business intelligence analysis
2007
- System for infectious disease information sharing and analysis: design and evaluation.
2007
- The Arizona IDMatcher: A Probabilistic Identity Matching System
2007
- Longitudinal study on patent citations to academic research articles in nanotechnology (1976-2004)
2007
- Incorporating web analysis into neural networks: An example in hopfield net searching
2007
- Leveraging Question Answer technology to address terrorism inquiry
2007
- Large-scale regulatory network analysis from microarray data: modified Bayesian network learning and association rule mining
2007
- Worldwide nanotechnology development: A comparative study of USPTO, EPO, and JPO patents (1976-2004)
2007
- Global mapping of gene/protein interactions in PubMed abstracts: A framework and an experiment with P53 interactions
2007
- Analyzing Consumer-Product Graphs: Empirical Findings and Applications in Recommender Systems
2007
- An evaluation of the chat and knowledge delivery components of a low-level dialog system:The AZ-ALICE experiment
2007
- Introduction to the special issue on decision support in medicine
2007
- Incorporating geographical contacts into social network analysis for contact tracing in epidemiology: A study on Taiwan SARS data
2007
- Patent citation network in nanotechnology (1976-2004)
2007
- Optimal search-based gene subset selection for gene array cancer classification
2007
- Affect intensity analysis of dark web forums
2007
- Enhancing border security: Mutual information analysis to identify suspect vehicles
2007
- Analyzing terror campaigns on the internet: Technical sophistication, content richness, and Web interactivity
2007
- Intelligence and security informatics: Information systems perspective
2006
- A framework for authorship identification of online messages: Writing-style features and classification techniques
2006
- Process-driven collaboration support for intra-agency crime analysis
2006
- CMedPort: An integrated approach to facilitating Chinese medical information seeking
2006
- Target vehicle identification for border safety with modified mutual information
2006
- The BioPortal project: a national center of excellence for infectious disease informatics
2006
- Textual analysis of stock market prediction using financial news articles
2006
- Evaluating mass knowledge acquisition using the ALICE chatterbot: The AZ-ALICE dialog system
2006
- Summary in context: Searching versus browsing
2006
- Efficient Scheduling of Periodic Information Monitoring Requests
2006
- Connecting NSF funding to patent innovation in nanotechnology (2001-2004)
2006
- On the topology of the dark web of terrorist groups
2006
- Fighting cybercrime: a review and the Taiwan experience
2006
- Identity matching based on probabilistic relational models
2006
- Visualizing authorship for identification
2006
- Using importance flooding to identify interesting networks of criminal activity
2006
- A framework for exploring Gray Web Forums: Analysis of forum-based communities in Taiwan
2006
- Supporting non-English web searching: an experiment on the Spanish business and the Arabic medical intelligence portals
2006
- Ontology-Based Automatic Chief Complaints Classification for Syndromic Surveillance
2006
- From fingerprint to writeprint
2006
- Aggregating automatically extracted regulatory pathway relations
2006
- Examining the business-technology alignment in government agencies: A study of electronic record management systems in Taiwan
2006
- Unraveling International Terrorist Groups' exploitation of the Web: Technical sophistication, media richness, and web interactivity
2006
- Content analysis of Jiliadi extremist groups' videos
2006
- Moving digital libraries into the student learning space: The GetSmart experience
2006
- A framework of integrating gene relations from heterogeneous data sources: An experiment on Arabidopsis thaliana
2006
- Matching knowledge elements in concept maps using a similarity flooding algorithm
2006
- Intelligence and Security Informatics
2006
- Multilingual web retrieval: An experiment in English-Chinese business intelligence
2006
- A probabilistic model for approximate identity matching
2006
- Building a scientific knowledge web portal: The NanoPort experience
2006
- Editorial: Intelligence and security informatics: information systems perspective
2006
- Using Social Contextual Information to Match Criminal Identities
2006
- Suspect vehicle identification for border safety with modified mutual information
2006
- Automatically detecting criminal identity deception: an adaptive detection algorithm
2006
- Extremist social movement groups and their online digital libraries
2006
- Expertise visualization: An implementation and study based on cognitive fit theory
2006
- A multi-layer Naïve Bayes model for approximate identity matching
2006
- Exploring the dark side of the Web: Collection and analysis of U.S. extremist online forums
2006
- The dark web portal project: Collecting and analyzing the presence of terrorist groups on the web
2005
- Frame-based argumentation for group decision task generation and identification
2005
- Optimal search-based gene selection for cancer prognosis
2005
- Newsmap: a knowledge map for online news
2005
- Visualizing criminal relationships: comparison of a hyperbolic tree and a hierarchical list
2005
- Experimental verification of adaptive PMD compensation in a 40-channel DWDM transmission system with 40-Gbps CSRZ format
2005
- Supporting Information Seeking in Multinational Organizations: A Knowledge Portal Approach
2005
- Mapping the contemporary terrorism research domain: Researchers, publications, and institutions analysis
2005
- Analyzing terrorist networks: A case study of the global salafi jihad network
2005
- Target vehicle identification for border safety using mutual information
2005
- Information visualization
2005
- Visualization in law enforcement
2005
- Evaluating event visualization: A usability study of COPLINK Spatio-Temporal Visualizer
2005
- Using Genetic Algorithm in Building Domain-Specific Collections: An Experiment in the Nanotechnology Domain
2005
- Question answer TARA: A terrorism activity resource application
2005
- SpidersRUs: Automated development of vertical search engines in different domains and languages
2005
- US domestic extremist groups on the Web: link and content analysis
2005
- Lecture Notes in Computer Science: Preface
2005
- Prospective spatio-temporal data analysis for security informatics
2005
- Longitudinal nanotechnology development (1991 - 2002): National science foundation funding and its impact on patents
2005
- Coplink center: social network analysis and identity deception detection for law enforcement and homeland security intelligence and security informatics: a crime data mining approach to developing border safe research
2005
- Introduction to the special topic issue: Intelligence and security informatics
2005
- A visual framework for knowledge discovery on the web: An empirical study of business intelligence exploration
2005
- CrimeNet explorer: A framework for criminal network knowledge discovery
2005
- Building web directories in different languages for decision support: A semi-automatic approach
2005
- CRIMINAL network analysis and visualization
2005
- Transforming open-source documents to terror networks: The arizona terrornet
2005
- Studying the presence of terrorism on the web: an knowledge portal approach
2005
- Applying authorship analysis to extremist-group Web forum messages
2005
- Artificial intelligence for homeland security
2005
- Genescene: An ontology-enhanced integration of linguistic and Co-occurrence based relations in biomedical Texts
2005
- Building knowledge management system for researching terrorist groups on the web
2005
- Collecting and analyzing the presence of terrorists on the Web: A case study of Jihad Websites
2005
- Border Safe: Cross-jurisdictional information sharing, analysis, and visualization
2005
- User acceptance of intelligence and security informatics technology: A study of COPLINK
2005
- Studying the structure of terrorist networks: A web structural mining approach
2005
- Terror tracker system: A web portal for terrorism research
2005
- Digital library development in the Asia Pacific
2005
- BioPortal: a case study in infectious disease informatics
2005
- Using 3D interfaces to facilitate the spatial knowledge retrieval: A geo-referenced knowledge repository system
2005
- Applying authorship analysis to Arabic web content
2005
- Linking ontological resources using aggregatable substance identifiers to organize extracted relations
2005
- Link prediction approach to collaborative filtering
2005
- Discovering identity problems: A case study
2005
- Multilingual Web Retrieval: An Experiment on a Multilingual Business Intelligence Portal
2005
- Visualizing aggregated biological pathway relations
2005
- Cross-jurisdictional Criminal Activity Networks to support border and transportation security
2004
- Extracting gene pathway relations using a hybrid grammar: The Arizona Relation Parser
2004
- Biomedical informatics and security informatics research in digital library
2004
- Technology Implementation Management in Law Enforcement: COPLINK System Usability and User Acceptance Evaluations