AIRL Logo2005 Publications

  • H. Xu, Xinwen Fu, Y. Zhu, R. Bettati, J. Chen, and Wei Zhao, SAS: A Scalar Anonymous Communication System, in Proceedings of the International Conference on Computer Networks and Mobile Computing (ICCNMC), 2005, Accept ratio 25%.
  • Burgoon, J. K., Twitchell, D. P., Jensen, M. L., Adkins, M., Kruse, J., Deokar, A. V., Lu, S., Metaxas, D. N., Nunamaker, J. F., Jr. and Younger, R. E. "Detecting concealment of intent in transportation screening: a proof-of-concept," IEEE Transactions on Intelligent Transportation Systems, 2005.
  • Deokar, A. V., and Madhusudan, T. "Developing group decision support systems for deception detection," In Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 '05), Big Island, HI, 2005.
  • Tsechpenakis, G., Metaxas, D. N., Adkins, M., Kruse, J., Jensen, M. L., Meservy, T. O., Twitchell, D. P., Deokar, A. V., and Nunamaker, J. F., Jr. "HMM-based deception detection from visual cues," In Proceedings of the IEEE International Conference on Multimedia and Expo (ICME 2005), Amsterdam, Netherlands 2005.
  • Burgoon, J. K., Adkins, M., Kruse, J., Jensen, M. L., Meservy, T. O., Twitchell, D. P., Deokar, A. V., Nunamaker, J. F., Jr., Lu, S., Tsechpenakis, G., Metaxas, D. N., and Younger, R. E. "An approach for intent identification by building on deception detection," In Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 '05), Big Island, HI, 2005.
  • Surendra Sarnikar, and J. Leon Zhao, "A Bayesian Framework for Just-in-Time Knowledge Delivery", Proceedings of the Fourth Workshop on E-business (WeB 2005), Las Vegas, Nevada, December 10, 2005.
  • El-Gayar, O.F. and T. Dennis (2005). Effectiveness of Hybrid Learning Environments. Issues in Information Systems (IIS) 4(1-2). Y. Zhu, Xinwen Fu, R. Bettati, W. Zhao, Anonymity Analysis of Mix Networks against Flow-Correlation Attacks, in Proceedings of Globecom Computer & Network Security (Globecom), St. Louis, Nov. 25 ˜Dec 2, 2005, Accept ratio 30%.
  • Surendra Sarnikar, J. Leon Zhao, and Amar Gupta "Medical Information Filtering Using Content-based and Rule-based Profiles", Proceedings of the AIS Americas Conference on Information Systems (AMCIS 2005), Omaha, NE , August 11-14, 2005.
  • El-Gayar, O.F. and K. Tandekar (2005). An XML-based architecture for sharing heterogeneous models in Web and Distributed Computing Environments. Proceeding of the 2005 Americas Conference on Information Systems (AMCIS 2005), August 11-14, 2005, Omaha, Nebraska.
  • Fritz, B. and El-Gayar, O.F. (2005). ISSEC: A socio-technical DSS for information security planning. Proceeding of the 2005 Americas Conference on Information Systems (AMCIS 2005), August 11-14, 2005, Omaha, Nebraska.
  • El-Gayar, O.F. and B. Fritz (2005). Environmental management and the role of information systems. Proceeding of the 9th World Multi conference on Systemics, Cybernetics and informatics, July 10-13, 2005, Orlando, Florida.
  • B. Graham, Y. Zhu, Xinwen Fu, R. Bettati, Using Covert Channels to Evaluate the Effectiveness of Flow Confidentiality Measures, in Proceedings of the 11th International Conference on Parallel and Distributed Systems (ICPADS), July 20-22, Japan, 2005, Accept ratio 34%.
  • Y. Zhu, Xinwen Fu, and R. Bettati, On the Effectiveness of Continuous-Time Mixes under Flow-Correlation Based Anonymity Attacks, in Proceedings of the 4th IEEE International Symposium on Network Computing and Applications (NCA), July, 2005, Accept ratio 30%.
  • Xinwen Fu, Y. Zhu, B. Graham, R. Bettati, and Wei Zhao, On Flow Marking Attacks in Wireless Anonymous Communication Networks, in Proceedings of the 25th International Conference on Distributed Computing Systems (ICDCS), June 2005, Accept ratio 14%.
  • J. Pauli and D. Xu, "Trade-off Analysis of Misuse Case-based Secure Software Architectures: A Case Study", Proc. of the 3rd International Workshop on Verification & Validation of Enterprise Information Systems (VVEIS 2005), May2005, Miami, FL, USA.
  • J. Pauli and D. Xu, "Misuse Case-Based Design and Analysis of Secure Software Architecture", Proc. of the International Conference on Information Technology Coding and Computing (ITCC 2005), April 2005, Las Vegas, NV, USA.
  • El-Gayar, O.F., Kuanchin Chen, and Kanchana Tandekar. Multimedia Interactivity on the Internet. In: Encyclopaedia of Multimedia Technology and Networking (Ed.) Margherita Pagani Idea Group Inc. Hershey, PA. (Forthcoming, April, 2005).

Last Updated: 7/31/12