Modeling and analysis of identity threat behaviors through text mining of identity theft stories
Nokhbeh Zaeem, Razieh, Manoharan, Monisha, Yang, Yongpeng, Barber, K. Suzanne
Published in Computers & security (01.03.2017)
Published in Computers & security (01.03.2017)
Get full text
Journal Article
Identity Threat Assessment and Prediction
Zaiss, Jim, Nokhbeh Zaeem, Razieh, Barber, K. Suzanne
Published in The Journal of consumer affairs (22.03.2019)
Published in The Journal of consumer affairs (22.03.2019)
Get full text
Journal Article
A Survival Game Analysis to Personal Identity Protection Strategies
Liau, David, Zaeem, Razieh Nokhbeh, Suzanne Barber, K.
Published in 2020 Second IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA) (01.10.2020)
Published in 2020 Second IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA) (01.10.2020)
Get full text
Conference Proceeding
US-Centric vs. International Personally Identifiable Information: A Comparison Using the UT CID Identity Ecosystem
Rana, Rima, Zaeem, Razieh Nokhbeh, Barber, K. Suzanne
Published in 2018 International Carnahan Conference on Security Technology (ICCST) (01.10.2018)
Published in 2018 International Carnahan Conference on Security Technology (ICCST) (01.10.2018)
Get full text
Conference Proceeding
Application of Action Selection, Information Gathering, and Information Evaluation Technologies to UAV Target Tracking
Han, David C., Park, Jisun, Fullam, Karen, Barber, K. Suzanne
Published in Defence Applications of Multi-Agent Systems (2006)
Published in Defence Applications of Multi-Agent Systems (2006)
Get full text
Book Chapter
Conference Proceeding
Is Your Phone You? How Privacy Policies of Mobile Apps Allow the Use of Your Personally Identifiable Information
Chang, Kai Chih, Nokhbeh Zaeem, Razieh, Barber, K. Suzanne
Published in 2020 Second IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA) (01.10.2020)
Published in 2020 Second IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA) (01.10.2020)
Get full text
Conference Proceeding
The Agent Reputation and Trust (ART) Testbed
Fullam, Karen K., Klos, Tomas, Muller, Guillaume, Sabater-Mir, Jordi, Barber, K. Suzanne, Vercouter, Laurent
Published in Lecture notes in computer science (2006)
Published in Lecture notes in computer science (2006)
Get full text
Book Chapter
Conference Proceeding
Risk Kit: Highlighting Vulnerable Identity Assets for Specific Age Groups
Zaeem, Razieh Nokhbeh, Manoharan, Monisha, Barber, K. Suzanne
Published in 2016 European Intelligence and Security Informatics Conference (EISIC) (01.08.2016)
Published in 2016 European Intelligence and Security Informatics Conference (EISIC) (01.08.2016)
Get full text
Conference Proceeding
Evaluating dynamic correctness properties of domain reference architectures
Barber, K.Suzanne, Graser, Tom, Holt, Jim
Published in The Journal of systems and software (15.12.2003)
Published in The Journal of systems and software (15.12.2003)
Get full text
Journal Article
Arcade: early dynamic property evaluation of requirements using partitioned software architecture models
Barber, K. Suzanne, Graser, Tom, Holt, Jim, Baker, Geoff
Published in Requirements engineering (01.11.2003)
Published in Requirements engineering (01.11.2003)
Get full text
Journal Article
An experience-based assembly sequence planner for mechanical assemblies
Swaminathan, A., Barber, K.S.
Published in IEEE transactions on robotics and automation (01.04.1996)
Published in IEEE transactions on robotics and automation (01.04.1996)
Get full text
Journal Article
Hybrid domain representation archive (HyDRA) for requirements model synthesis across viewpoints (poster session)
Barber, K. Suzanne, Jernigan, Stephen R.
Published in International Conference on Software Engineering: Proceedings of the 22nd international conference on Software engineering; 04-11 June 2000 (2000)
Published in International Conference on Software Engineering: Proceedings of the 22nd international conference on Software engineering; 04-11 June 2000 (2000)
Get full text
Conference Proceeding
Journal Article
Authority vs Affinity: Modeling User Intent in Expert Finding
Budalakoti, Suratna, Barber, K Suzanne
Published in 2010 IEEE Second International Conference on Social Computing (01.08.2010)
Published in 2010 IEEE Second International Conference on Social Computing (01.08.2010)
Get full text
Conference Proceeding
Adaptive decision-making frameworks for dynamic multi-agent organizational change
Martin, Cheryl, Barber, K. Suzanne
Published in Autonomous agents and multi-agent systems (01.11.2006)
Published in Autonomous agents and multi-agent systems (01.11.2006)
Get full text
Journal Article