Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             66 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 Acoustic environment identification using unsupervised learning Malik, Hafiz
2014
1 p. 1-17
artikel
2 A framework of identity resolution: evaluating identity attributes and matching algorithms Li, Jiexun
2015
1 p. 1-12
artikel
3 Algorithmic criminology Berk, Richard
2013
1 p. 1-14
artikel
4 A measurement study of DNSSEC misconfigurations Adrichem, Niels L. M. van
2015
1 p. 1-14
artikel
5 A multi-modal network architecture for knowledge discovery Vineyard, Craig M
2012
1 p. 1-12
artikel
6 An activity theory analysis of boundary objects in cross-border information systems development for disaster management Bharosa, Nitesh
2012
1 p. 1-17
artikel
7 An agent-based model and computational framework for counter-terrorism and public safety based on swarm intelligencea Park, Andrew J
2012
1 p. 1-9
artikel
8 Analytics for characterising and measuring the naturalness of online personae Nurse, Jason R. C.
2016
1 p. 1-14
artikel
9 An economic perspective of message-dropping attacks in peer-to-peer overlays Hamlen, Kevin W
2012
1 p. 1-22
artikel
10 An “Estimate & Score Algorithm” for simultaneous parameter estimation and reconstruction of incomplete data on social networks Hegemann, Rachel A
2013
1 p. 1-13
artikel
11 Anticipating complex network vulnerabilities through abstraction-based analysis Colbaugh, Richard
2012
1 p. 1-11
artikel
12 Applying machine learning to criminology: semi-parametric spatial-demographic Bayesian regression Marchant, Roman
2018
1 p. 1-19
artikel
13 A psychological perspective on virtual communities supporting terrorist & extremist ideologies as a tool for recruitment Bowman-Grieve, Lorraine
2013
1 p. 1-5
artikel
14 Automated deception detection of 911 call transcripts Burns, Mary B
2014
1 p. 1-9
artikel
15 Automatic detection of cyber-recruitment by violent extremists Scanlon, Jacob R
2014
1 p. 1-10
artikel
16 Belief manipulation and message meaning for protocol analysis Hunter, Aaron
2014
1 p. 1-11
artikel
17 Biologically-inspired analysis in the real world: computing, informatics, and ecologies of use McNamara, Laura A
2012
1 p. 1-10
artikel
18 Bridging the perceptual gap: variations in crime perception of businesses at the neighborhood level Spicer, Valerie
2014
1 p. 1-11
artikel
19 Combining modeling and gaming for predictive analytics Riensche, Roderick M
2012
1 p. 1-7
artikel
20 CrimeFighter Investigator: Integrating synthesis and sense-making for criminal network investigation Petersen, Rasmus Rosenqvist
2013
1 p. 1-13
artikel
21 Criminal network investigation Wiil, Uffe Kock
2014
1 p. 1
artikel
22 Detecting obfuscated malware using reduced opcode set and optimised runtime trace O’kane, Philip
2016
1 p. 1-12
artikel
23 Detecting unknown malicious code by applying classification techniques on OpCode patterns Shabtai, Asaf
2012
1 p. 1-22
artikel
24 Developing an explanatory model for the process of online radicalisation and terrorism Torok, Robyn
2013
1 p. 1-10
artikel
25 Distribution of event complexity in the British Columbia court system an analysis based on the CourBC analytical system Ghaseminejad, Amir H
2012
1 p. 1-7
artikel
26 Diversity and resistance in a model network with adaptive software Holtschulte, Neal
2012
1 p. 1-11
artikel
27 Early warning analysis for social diffusion events Colbaugh, Richard
2012
1 p. 1-26
artikel
28 Emerging issues for education in E-discovery for electronic health records Yuan, Shuai
2015
1 p. 1-7
artikel
29 Emotion classification of social media posts for estimating people’s reactions to communicated alert messages during crises Brynielsson, Joel
2014
1 p. 1-11
artikel
30 Erratum to: Factors influencing network risk judgments: a conceptual inquiry and exploratory analysis Cowley, Jennifer
2015
1 p. 1
artikel
31 Estimating the sentiment of social media content for security informatics applications Glass, Kristin
2012
1 p. 1-16
artikel
32 Evaluating text visualization for authorship analysis Benjamin, Victor
2014
1 p. 1-13
artikel
33 Evasion-resistant network scan detection Harang, Richard E
2015
1 p. 1-10
artikel
34 Factors influencing network risk judgments: a conceptual inquiry and exploratory analysis Cowley, Jennifer
2015
1 p. 1-16
artikel
35 Federated databases and actionable intelligence: using social network analysis to disrupt transnational wildlife trafficking criminal networks Haas, Timothy C
2015
1 p. 1-14
artikel
36 Fluency of visualizations: linking spatiotemporal visualizations to improve cybersecurity visual analytics Qian, Zhenyu Cheryl
2014
1 p. 1-15
artikel
37 Forecasting the locational dynamics of transnational terrorism: a network analytic approach Desmarais, Bruce A
2013
1 p. 1-12
artikel
38 Generating test cases for marine safety and security scenarios: a composition framework Shahir, Hamed Yaghoubi
2012
1 p. 1-21
artikel
39 Harvesting and analysis of weak signals for detecting lone wolf terrorists Brynielsson, Joel
2013
1 p. 1-15
artikel
40 Improved lexicon-based sentiment analysis for social media analytics Jurek, Anna
2015
1 p. 1-13
artikel
41 Introduction to a special issue on biologically inspired analysis of social systems: a security informatics perspective Asal, Victor
2012
1 p. 1-3
artikel
42 Keeping pace with the creation of new malicious PDF files using an active-learning based detection framework Nissim, Nir
2016
1 p. 1-20
artikel
43 Knowledge encapsulation framework for technosocial predictive modeling Madison, Michael C
2012
1 p. 1-18
artikel
44 Language use in the Jihadist magazines inspire and Azan Skillicorn, David B
2014
1 p. 1-16
artikel
45 Massively collaborative problem solving: new security solutions and new security risks Greene, Kshanti
2012
1 p. 1-17
artikel
46 Modelling the spatial and social dynamics of insurgency Giabbanelli, Philippe J
2014
1 p. 1-15
artikel
47 Natural security: how biological systems use information to adapt in an unpredictable world Sagarin, Raphael D
2012
1 p. 1-9
artikel
48 Organised crime and social media: a system for detecting, corroborating and visualising weak signals of organised crime online Andrews, Simon
2018
1 p. 1-21
artikel
49 “Our Little Secret”: pinpointing potential predators Vartapetiance, Anna
2014
1 p. 1-19
artikel
50 Pathways to identity: using visualization to aid law enforcement in identification tasks Bruce, Joe
2014
1 p. 1-13
artikel
51 Police patrol districting method and simulation evaluation using agent-based model & GIS Zhang, Yue
2013
1 p. 1-13
artikel
52 Predicting sentencing outcomes with centrality measures Morselli, Carlo
2013
1 p. 1-9
artikel
53 Security informatics research challenges for mitigating cyber friendly fire Carroll, Thomas E
2014
1 p. 1-14
artikel
54 Semi-supervised learning for detecting human trafficking Alvari, Hamidreza
2017
1 p. 1-14
artikel
55 Social and organizational influences on psychological hardiness: How leaders can increase stress resilience Bartone, Paul T
2012
1 p. 1-10
artikel
56 Social network integration and analysis using a generalization and probabilistic approach for privacy preservation Tang, Xuning
2012
1 p. 1-14
artikel
57 Specializing network analysis to detect anomalous insider actions Chen, You
2012
1 p. 1-24
artikel
58 Technosocial predictive analytics for security informatics Sanfilippo, Antonio
2012
1 p. 1-3
artikel
59 Terrorist networks and the lethality of attacks: an illustrative agent based model on evolutionary principles Ormerod, Paul
2012
1 p. 1-8
artikel
60 The detection of criminal groups in real-world fused data: using the graph-mining algorithm “GraphExtract” Robinson, David
2018
1 p. 1-16
artikel
61 The spatio-temporal modeling for criminal incidents Wang, Xiaofeng
2012
1 p. 1-17
artikel
62 Through a computational lens: using dual computer-criminology degree programs to advance the study of criminology and criminal justice practice Valentine, Colby L
2013
1 p. 1-7
artikel
63 Timeprints for identifying social media users with multiple aliases Johansson, Fredrik
2015
1 p. 1-11
artikel
64 Using augmented reality for supporting information exchange in teams from the security domain Datcu, Dragos
2015
1 p. 1-17
artikel
65 Using publicly visible social media to build detailed forecasts of civil unrest Compton, Ryan
2014
1 p. 1-10
artikel
66 Validating distance decay through agent based modeling Verma, Arvind
2013
1 p. 1-11
artikel
                             66 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland