COLLEGE DIRECTORY       :      VISIT ELLER      :      LOG IN 
The University of Arizona | Eller College of Management The University of Arizona Eller College of Management
Eller College Home > Information Assurance and Security Education Center > Publications
Eller Information Technology

Publications

Articles

Dr. Jay Nunamaker, Jr., Ph.D. (http://www.cmi.arizona.edu)

  1. Burgoon, J. K., Jensen, M. L., Meservy, T., Nunamaker, J.F., “A Framework for Deception Detection Based on Linguistics, Vocalics and Kinesics,” Group Decision and Negotiation,  In press, to appear 2008, Shakun, Mel (ed.)
  2. Twitchell, D., Burgoon, J. K. and Nunamaker, J. F., Jr., “Detecting Deception Using Speech Act Profiling,” Group Decision and Negotiation, to appear 2008.
    1. http://www.springerlink.com/content/ajeauy59kxjjttry
  3. Burgoon, J. K., Twitchell, D. P., Jensen, M. L., Adkins, M., Kruse, J., Deokar, A., Lu, S., Metaxas, D., Nunamaker, J. F., Jr., & Younger, R. E., “Detecting Concealment of Intent in Transportation Screening:  A Proof-of-Concept,” IEEE Transactions on Intelligent Transportation Systems, p., vol., (2008).  In press, to appear 2008, Zeng, Daniel (assoc. ed.),
    1. http://iasec.eller.arizona.edu/docs/Jay-IEEE-Trans-ITS-Concealment-Final.pdf
  4. George, J., Biros, D., Burgoon, J., Nunamaker, J. F., Crews, J., Cao, J., Marrett, Adkins, M. Kruse, J., Lin, M., “Deception through E-Training,” MISQ Executive, In press, to appear 2008, Beath, Cynthia, (ed.).

Dr. Hsinchun Chen, Ph.D. (http://ai.arizona.edu/hchen/index.htm)

  1. H. Chen, W. Chung, J. Qin, E. Reid, M. Sageman, and G. Weinmann, “Uncovering the Dark Web: A Case Study of Jihad on the Web,” Journal of the American Society for Information Science and Technology, Volume 59, Number 8, Pages 1347-1359, 2008.
    1. http://www.ai.arizona.edu/go/intranet/papers/H%20Chen%20and%20W%20Chung%202008.pdf
  2. J. Xu and H. Chen, “The Topology of Dark Networks,” Communications of the ACM, Volume 51, Number 10, Pages 58-65, 2008.
    1. http://www.ai.arizona.edu/go/intranet/papers/Xu-SNA-2008.pdf
  3. A. Abbasi and H. Chen, “Writeprints: A Stylometric Approach to Identify-Level Identification and Similarity Detection in Cyberspace,” ACM Transactions on Information Systems, Volume 26, Number 2, Pages 7:1-7:29, 2008.
    1. http://www.ai.arizona.edu/go/intranet/papers/Abbasi%20Writeprints%20TOIS%202008.pdf
  4. E. Reid and H. Chen, “Internet-savvy U.S. and Middle Eastern Extremist Groups,” Mobilization: An International Quarterly Review, Volume 12, Number 2, Pages 177-192, 2007.
    1. http://www.ai.arizona.edu/go/intranet/papers/Internet%20Savvy...etc.pdf
  5. J. Qin, Y. Zhou, E. Reid, G. Lai, and H. Chen, “Analyzing Terror Campaign on the Internet: Technical Sophistication, Content Richness, and Web Interactivity,” International Journal of Human-Computer Studies, special issue on Information Security in the Knowledge Economy, Volume 65, Pages 71-84, 2007.
    1. http://www.ai.arizona.edu/go/intranet/papers/paper-Jialun-WebMetrics.pdf

Dr. Sudha Ram, Ph.D. (http://adrg.eller.arizona.edu)

  1. Ram, S.,  Liu, J., “Understanding the Semantics of Data Provenance to Support Active Conceptual Modeling,” Computer Science 4512, Springer-Verlag, 2007, pp 17-29.
    1. http://kartik.eller.arizona.edu/ACML_Provenance_final.pdf
  2. Ram, S., Liu, J., “A Semiotics Framework for Analyzing Data Provenance Research,” Journal of computing Science and Engineering, Vol. 2 No. 3, September 2008, pp 221-248.
    1. http://iasec.eller.arizona.edu/docs/Ram-pub-2.pdf

Dr. Daniel Zeng Ph.D. (http://www.u.arizona.edu/~zeng)

  1. Yan, P., Chen, H., and Zeng, D. (2008). “Syndromic Surveillance Systems: Public Health and Biodefense.” Annual Review of Information Science and Technology (ARIST), Vol. ~42.
    1. http://iasec.eller.arizona.edu/docs/Zeng-Survey-manuscript-revised.pdf
  2. Zeng, D., Chawathe, S., Huang, H., and Wang, F.-Y, (2008). “Protecting Transportation Infrastructure,” IEEE Intelligent Systems, Vol. ~22, No.~5, September/October.
    1. http://iasec.eller.arizona.edu/docs/Zeng-IEEE-IS-Protecting-trans-inf.pdf
  3. Zeng, D, Chen, H., Wang, F.-Y., and Kargupta, H. (2008).  “Guest Editors’ Introduction: Special Issue on Intelligence and Security Informatics,” IEEE Transactions on Knowledge and Data Engineering, vol. ~20, No.~8, pp.~1-4, August.
    1. http://iasec.eller.arizona.edu/docs/Zeng-IEEE-TKDE-08-ISI-editorial.pdf

Books

Dr. Hsinchun Chen, Ph.D. (http://ai.arizona.edu/hchen/index.htm)

  1. H. Chen and C. Yang (Eds.), “Intelligence and Security Informatics: Techniques and Applications,” Springer, 2008.
    1. http://www.ai.arizona.edu/ISI%202008%20cover.htm
  2. H. Chen, E. Reid, J. Sinai, A. Silke, and B. Ganor (Eds.), “Terrorism Informatics: Knowledge Management and Data Mining for Homeland Security,” Springer, 2008.
  3. H. Chen, “Intelligence and Security Informatics for International Security: Information Sharing and Data Mining,” Springer, 2006.
    1. http://www.springer.com/computer/information+ systems/book/978-0-387-24379-5

Dr. Daniel Zeng Ph.D. (http://www.u.arizona.edu/~zeng)

  • D. Zeng, I. Gotham, K. Komatsu, C. Lynch, M. Thurmond, D. Madigan, B. Lober, J. Kvach, and H. Chen, (Eds.), Intelligence and Security Informatics: Biosurveillance, Proceedings the Second NSF Workshop, BioSurveillance 2007, Lecture Notes in Computer Science (LNCS 4506), Springer-Verlag, 2007.