Siddharth Kaza
Siddharth Kaza
Verified email at towson.edu
Title
Cited by
Cited by
Year
COPLINK: managing law enforcement data and knowledge
H Chen, D Zeng, H Atabakhsh, W Wyzga, J Schroeder
Communications of the ACM 46 (1), 28-34, 2003
2452003
Analyzing and visualizing criminal network dynamics: A case study
J Xu, B Marshall, S Kaza, H Chen
International conference on intelligence and security informatics, 359-377, 2004
832004
Evaluating ontology mapping techniques: An experiment in public safety information sharing
S Kaza, H Chen
Decision Support Systems 45 (4), 714-728, 2008
652008
Detecting fake medical web sites using recursive trust labeling
A Abbasi, FM Zahedi, S Kaza
ACM Transactions on Information Systems (TOIS) 30 (4), 1-36, 2012
502012
Security injections: modules to help students remember, understand, and apply secure coding techniques
B Taylor, S Kaza
Proceedings of the 16th annual joint conference on Innovation and technology …, 2011
452011
Identifying significant facilitators of dark network evolution
D Hu, S Kaza, H Chen
Journal of the American Society for Information Science and Technology 60 (4 …, 2009
452009
Visualization in law enforcement
H Chen, H Atabakhsh, C Tseng, B Marshall, S Kaza, S Eggers, H Gowda, ...
CHI'05 extended abstracts on Human factors in computing systems, 1268-1271, 2005
382005
Cross-jurisdictional criminal activity networks to support border and transportation security
B Marshall, S Kaza, J Xu, H Atabakhsh, T Petersen, C Violette, H Chen
Proceedings. The 7th International IEEE Conference on Intelligent …, 2004
372004
A model for piloting pathways for computational thinking in a general education curriculum
C Dierbach, H Hochheiser, S Collins, G Jerome, C Ariza, T Kelleher, ...
Proceedings of the 42nd ACM technical symposium on Computer science …, 2011
352011
Topological analysis of criminal activity networks: Enhancing transportation security
S Kaza, J Xu, B Marshall, H Chen
IEEE Transactions on Intelligent Transportation Systems 10 (1), 83-91, 2009
352009
Enhancing border security: Mutual information analysis to identify suspect vehicles
S Kaza, Y Wang, H Chen
Decision Support Systems 43 (1), 199-210, 2007
262007
Security in computer literacy: a model for design, dissemination, and assessment
CF Turner, B Taylor, S Kaza
Proceedings of the 42nd ACM technical symposium on Computer science …, 2011
252011
Dynamic social network analysis of a dark network: Identifying significant facilitators
S Kaza, D Hu, H Chen
2007 IEEE Intelligence and Security Informatics, 40-46, 2007
212007
Determining inventor status and its effect on knowledge diffusion: A study on nanotechnology literature from China, Russia, and India
X Liu, S Kaza, P Zhang, H Chen
Journal of the American Society for Information Science and Technology 62 (6 …, 2011
192011
Target vehicle identification for border safety using mutual information
S Kaza, T Wang, H Gowda, H Chen
Proceedings. 2005 IEEE Intelligent Transportation Systems, 2005., 1141-1146, 2005
152005
Topological analysis of criminal activity networks in multiple jurisdictions
S Kaza, J Xu, B Marshall, H Chen
Proceedings of the 2005 national conference on Digital government research …, 2005
132005
Injecting security in the curriculum–experiences in effective dissemination and assessment design
S Kaza, B Taylor, H Hochheiser, S Azadegan, M O’Leary, CF Turner
The Colloquium for Information Systems Security Education (CISSE) 8, 2010
122010
Using importance flooding to identify interesting networks of criminal activity
B Marshall, H Chen, S Kaza
Journal of the American Society for Information Science and Technology 59 …, 2008
122008
Effect of inventor status on intra-organizational innovation evolution
S Kaza, H Chen
2009 42nd Hawaii International Conference on System Sciences, 1-10, 2009
102009
Intelligence and security informatics
S Mehrotra, H Chen
Springer Berlin/Heidelberg., 2006
102006
The system can't perform the operation now. Try again later.
Articles 1–20