Search Results - "Kaza, Siddharth"
-
1
Security Injections@Towson: Integrating Secure Coding into Introductory Computer Science Courses
Published in ACM transactions on computing education (01-10-2016)“…Despite the critical societal importance of computer security, security is not well integrated into the undergraduate computing curriculum. Security classes…”
Get more information
Journal Article -
2
Evaluating ontology mapping techniques: An experiment in public safety information sharing
Published in Decision Support Systems (01-11-2008)“…The public safety community in the United States consists of thousands of local, state, and federal agencies, each with its own information system. In the past…”
Get full text
Journal Article -
3
-
4
Enhancing border security: Mutual information analysis to identify suspect vehicles
Published in Decision Support Systems (01-02-2007)“…In recent years border safety has been identified as a critical part of homeland security. The Department of Homeland Security searches vehicles entering the…”
Get full text
Journal Article -
5
Topological Analysis of Criminal Activity Networks: Enhancing Transportation Security
Published in IEEE transactions on intelligent transportation systems (01-03-2009)“…The security of border and transportation systems is a critical component of the national strategy for homeland security. The security concerns at the border…”
Get full text
Journal Article -
6
Designing, Implementing, and Evaluating Information Systems for Law Enforcement—A Long-Term Design-Science Research Project
Published in Communications of the Association for Information Systems (2011)“…The design science research (DSR) paradigm prescribes building and evaluating an Information Technology (IT) artifact to address organizational problems…”
Get full text
Journal Article -
7
Instance, evolution, and predictive modeling of social networks
Published 01-01-2008“…Various phenomena within the information systems discipline can be studied using the social network paradigm that views social entities as nodes with links…”
Get full text
Dissertation -
8
Effect of Inventor Status on Intra-Organizational Innovation Evolution
Published in 2009 42nd Hawaii International Conference on System Sciences (01-01-2009)“…Innovation is one of the primary characteristics that separates successful from unsuccessful organizations. Organizations have a choice in selecting knowledge…”
Get full text
Conference Proceeding -
9
Using eye-tracking to investigate content skipping: A study on learning modules in cybersecurity
Published in 2016 IEEE Conference on Intelligence and Security Informatics (ISI) (01-09-2016)“…Students skipping content is common in learning modules that present a large amount of information in a linear format. This may result in lower student…”
Get full text
Conference Proceeding -
10
Determining inventor status and its effect on knowledge diffusion: A study on nanotechnology literature from China, Russia, and India
Published in Journal of the American Society for Information Science and Technology (01-06-2011)“…In an increasingly global research landscape, it is important to identify the most prolific researchers in various institutions and their influence on the…”
Get full text
Journal Article -
11
Challenges, lessons learned and results from establishing a CyberCorps: Scholarship for Service program targeting undergraduate students
Published in 2016 IEEE Conference on Intelligence and Security Informatics (ISI) (01-09-2016)“…To attract and encourage the best and the brightest students to pursue state, federal and tribal government careers in cybersecurity, the National Science…”
Get full text
Conference Proceeding -
12
Identifying significant facilitators of dark network evolution
Published in Journal of the American Society for Information Science and Technology (01-04-2009)“…Social networks evolve over time with the addition and removal of nodes and links to survive and thrive in their environments. Previous studies have shown that…”
Get full text
Journal Article -
13
Evaluating Link-Based Techniques for Detecting Fake Pharmacy Websites
Published 27-09-2013“…Fake online pharmacies have become increasingly pervasive, constituting over 90% of online pharmacy websites. There is a need for fake website detection…”
Get full text
Journal Article -
14
Using importance flooding to identify interesting networks of criminal activity
Published in Journal of the American Society for Information Science and Technology (01-11-2008)“…Effectively harnessing available data to support homeland‐security‐related applications is a major focus in the emerging science of intelligence and security…”
Get full text
Journal Article -
15
Exploratory experiments to identify fake websites by using features from the network stack
Published in 2012 IEEE International Conference on Intelligence and Security Informatics (01-06-2012)“…Users on the web are unknowingly becoming more susceptible to scams from cyber deviants and malicious websites. There has been much work in the identification…”
Get full text
Conference Proceeding -
16
Dynamic Social Network Analysis of a Dark Network: Identifying Significant Facilitators
Published in 2007 IEEE Intelligence and Security Informatics (01-05-2007)“…"Dark Networks" refer to various illegal and covert social networks like criminal and terrorist networks. These networks evolve over time with the formation…”
Get full text
Conference Proceeding -
17
Using burst detection techniques to identify suspicious vehicular traffic at border crossings
Published in 2012 IEEE International Conference on Intelligence and Security Informatics (01-06-2012)“…Border safety is a critical part of national and international security. The Department of Homeland Security (DHS) searches vehicles entering the country at…”
Get full text
Conference Proceeding -
18
The Arizona IDMatcher: A Probabilistic Identity Matching System
Published in 2007 IEEE Intelligence and Security Informatics (01-05-2007)“…Various law enforcement and intelligence tasks require managing identity information in an effective and efficient way. However, the quality issues of identity…”
Get full text
Conference Proceeding -
19
Target vehicle identification for border safety using mutual information
Published in Proceedings. 2005 IEEE Intelligent Transportation Systems, 2005 (2005)“…The security of border and transportation systems is a critical component of the national strategy for homeland security. The security concerns at the border…”
Get full text
Conference Proceeding -
20
Identification of deliberately doctored text documents using frequent keyword chain (FKC) model
Published in Proceedings Fifth IEEE Workshop on Mobile Computing Systems and Applications (2003)“…Text documents have always been the most dominant source of data available. A number of classification techniques are used to organize these documents and a…”
Get full text
Conference Proceeding