| COPLINK: managing law enforcement data and knowledge H Chen, D Zeng, H Atabakhsh, W Wyzga, J Schroeder ACM, 2003 | 245 | 2003 |
| Analyzing and visualizing criminal network dynamics: A case study J Xu, B Marshall, S Kaza, H Chen International conference on intelligence and security informatics, 359-377, 2004 | 84 | 2004 |
| Evaluating ontology mapping techniques: An experiment in public safety information sharing S Kaza, H Chen Decision Support Systems 45 (4), 714-728, 2008 | 63 | 2008 |
| Detecting fake medical web sites using recursive trust labeling A Abbasi, F Zahedi, S Kaza ACM Transactions on Information Systems (TOIS) 30 (4), 22, 2012 | 51 | 2012 |
| Identifying significant facilitators of dark network evolution D Hu, S Kaza, H Chen Journal of the American Society for Information Science and Technology 60 (4 …, 2009 | 43 | 2009 |
| Security injections: modules to help students remember, understand, and apply secure coding techniques B Taylor, S Kaza Proceedings of the 16th annual joint conference on Innovation and technology …, 2011 | 42 | 2011 |
| Visualization in law enforcement H Chen, H Atabakhsh, C Tseng, B Marshall, S Kaza, S Eggers, H Gowda, ... CHI'05 extended abstracts on Human factors in computing systems, 1268-1271, 2005 | 38 | 2005 |
| Cross-jurisdictional criminal activity networks to support border and transportation security B Marshall, S Kaza, J Xu, H Atabakhsh, T Petersen, C Violette, H Chen Proceedings. The 7th International IEEE Conference on Intelligent …, 2004 | 37 | 2004 |
| A model for piloting pathways for computational thinking in a general education curriculum C Dierbach, H Hochheiser, S Collins, G Jerome, C Ariza, T Kelleher, ... Proceedings of the 42nd ACM technical symposium on Computer science …, 2011 | 33 | 2011 |
| Topological analysis of criminal activity networks: Enhancing transportation security S Kaza, J Xu, B Marshall, H Chen IEEE Transactions on Intelligent Transportation Systems 10 (1), 83-91, 2009 | 33 | 2009 |
| Enhancing border security: Mutual information analysis to identify suspect vehicles S Kaza, Y Wang, H Chen Decision Support Systems 43 (1), 199-210, 2007 | 26 | 2007 |
| Security in computer literacy: a model for design, dissemination, and assessment CF Turner, B Taylor, S Kaza Proceedings of the 42nd ACM technical symposium on Computer science …, 2011 | 24 | 2011 |
| Dynamic social network analysis of a dark network: Identifying significant facilitators S Kaza, D Hu, H Chen 2007 IEEE Intelligence and Security Informatics, 40-46, 2007 | 20 | 2007 |
| Determining inventor status and its effect on knowledge diffusion: A study on nanotechnology literature from China, Russia, and India X Liu, S Kaza, P Zhang, H Chen Journal of the American Society for Information Science and Technology 62 (6 …, 2011 | 18 | 2011 |
| Target vehicle identification for border safety using mutual information S Kaza, T Wang, H Gowda, H Chen Proceedings. 2005 IEEE Intelligent Transportation Systems, 2005., 1141-1146, 2005 | 15 | 2005 |
| Topological analysis of criminal activity networks in multiple jurisdictions S Kaza, J Xu, B Marshall, H Chen Proceedings of the 2005 national conference on Digital government research …, 2005 | 13 | 2005 |
| Injecting security in the curriculum–experiences in effective dissemination and assessment design S Kaza, B Taylor, H Hochheiser, S Azadegan, M O’Leary, CF Turner The Colloquium for Information Systems Security Education (CISSE) 8, 2010 | 12 | 2010 |
| Using importance flooding to identify interesting networks of criminal activity B Marshall, H Chen, S Kaza Journal of the American Society for Information Science and Technology 59 …, 2008 | 12 | 2008 |
| Intelligence and security informatics S Mehrotra, H Chen Springer Berlin/Heidelberg., 2006 | 10 | 2006 |
| Identifying high-status nodes in knowledge networks S Kaza, H Chen data mining for social network data, 91-107, 2010 | 9 | 2010 |