nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Acoustic environment identification using unsupervised learning
|
Malik, Hafiz |
|
2014 |
|
1 |
p. 1-17 |
artikel |
2 |
A framework of identity resolution: evaluating identity attributes and matching algorithms
|
Li, Jiexun |
|
2015 |
|
1 |
p. 1-12 |
artikel |
3 |
Algorithmic criminology
|
Berk, Richard |
|
2013 |
|
1 |
p. 1-14 |
artikel |
4 |
A measurement study of DNSSEC misconfigurations
|
Adrichem, Niels L. M. van |
|
2015 |
|
1 |
p. 1-14 |
artikel |
5 |
A multi-modal network architecture for knowledge discovery
|
Vineyard, Craig M |
|
2012 |
|
1 |
p. 1-12 |
artikel |
6 |
An activity theory analysis of boundary objects in cross-border information systems development for disaster management
|
Bharosa, Nitesh |
|
2012 |
|
1 |
p. 1-17 |
artikel |
7 |
An agent-based model and computational framework for counter-terrorism and public safety based on swarm intelligencea
|
Park, Andrew J |
|
2012 |
|
1 |
p. 1-9 |
artikel |
8 |
Analytics for characterising and measuring the naturalness of online personae
|
Nurse, Jason R. C. |
|
2016 |
|
1 |
p. 1-14 |
artikel |
9 |
An economic perspective of message-dropping attacks in peer-to-peer overlays
|
Hamlen, Kevin W |
|
2012 |
|
1 |
p. 1-22 |
artikel |
10 |
An “Estimate & Score Algorithm” for simultaneous parameter estimation and reconstruction of incomplete data on social networks
|
Hegemann, Rachel A |
|
2013 |
|
1 |
p. 1-13 |
artikel |
11 |
Anticipating complex network vulnerabilities through abstraction-based analysis
|
Colbaugh, Richard |
|
2012 |
|
1 |
p. 1-11 |
artikel |
12 |
Applying machine learning to criminology: semi-parametric spatial-demographic Bayesian regression
|
Marchant, Roman |
|
2018 |
|
1 |
p. 1-19 |
artikel |
13 |
A psychological perspective on virtual communities supporting terrorist & extremist ideologies as a tool for recruitment
|
Bowman-Grieve, Lorraine |
|
2013 |
|
1 |
p. 1-5 |
artikel |
14 |
Automated deception detection of 911 call transcripts
|
Burns, Mary B |
|
2014 |
|
1 |
p. 1-9 |
artikel |
15 |
Automatic detection of cyber-recruitment by violent extremists
|
Scanlon, Jacob R |
|
2014 |
|
1 |
p. 1-10 |
artikel |
16 |
Belief manipulation and message meaning for protocol analysis
|
Hunter, Aaron |
|
2014 |
|
1 |
p. 1-11 |
artikel |
17 |
Biologically-inspired analysis in the real world: computing, informatics, and ecologies of use
|
McNamara, Laura A |
|
2012 |
|
1 |
p. 1-10 |
artikel |
18 |
Bridging the perceptual gap: variations in crime perception of businesses at the neighborhood level
|
Spicer, Valerie |
|
2014 |
|
1 |
p. 1-11 |
artikel |
19 |
Combining modeling and gaming for predictive analytics
|
Riensche, Roderick M |
|
2012 |
|
1 |
p. 1-7 |
artikel |
20 |
CrimeFighter Investigator: Integrating synthesis and sense-making for criminal network investigation
|
Petersen, Rasmus Rosenqvist |
|
2013 |
|
1 |
p. 1-13 |
artikel |
21 |
Criminal network investigation
|
Wiil, Uffe Kock |
|
2014 |
|
1 |
p. 1 |
artikel |
22 |
Detecting obfuscated malware using reduced opcode set and optimised runtime trace
|
O’kane, Philip |
|
2016 |
|
1 |
p. 1-12 |
artikel |
23 |
Detecting unknown malicious code by applying classification techniques on OpCode patterns
|
Shabtai, Asaf |
|
2012 |
|
1 |
p. 1-22 |
artikel |
24 |
Developing an explanatory model for the process of online radicalisation and terrorism
|
Torok, Robyn |
|
2013 |
|
1 |
p. 1-10 |
artikel |
25 |
Distribution of event complexity in the British Columbia court system an analysis based on the CourBC analytical system
|
Ghaseminejad, Amir H |
|
2012 |
|
1 |
p. 1-7 |
artikel |
26 |
Diversity and resistance in a model network with adaptive software
|
Holtschulte, Neal |
|
2012 |
|
1 |
p. 1-11 |
artikel |
27 |
Early warning analysis for social diffusion events
|
Colbaugh, Richard |
|
2012 |
|
1 |
p. 1-26 |
artikel |
28 |
Emerging issues for education in E-discovery for electronic health records
|
Yuan, Shuai |
|
2015 |
|
1 |
p. 1-7 |
artikel |
29 |
Emotion classification of social media posts for estimating people’s reactions to communicated alert messages during crises
|
Brynielsson, Joel |
|
2014 |
|
1 |
p. 1-11 |
artikel |
30 |
Erratum to: Factors influencing network risk judgments: a conceptual inquiry and exploratory analysis
|
Cowley, Jennifer |
|
2015 |
|
1 |
p. 1 |
artikel |
31 |
Estimating the sentiment of social media content for security informatics applications
|
Glass, Kristin |
|
2012 |
|
1 |
p. 1-16 |
artikel |
32 |
Evaluating text visualization for authorship analysis
|
Benjamin, Victor |
|
2014 |
|
1 |
p. 1-13 |
artikel |
33 |
Evasion-resistant network scan detection
|
Harang, Richard E |
|
2015 |
|
1 |
p. 1-10 |
artikel |
34 |
Factors influencing network risk judgments: a conceptual inquiry and exploratory analysis
|
Cowley, Jennifer |
|
2015 |
|
1 |
p. 1-16 |
artikel |
35 |
Federated databases and actionable intelligence: using social network analysis to disrupt transnational wildlife trafficking criminal networks
|
Haas, Timothy C |
|
2015 |
|
1 |
p. 1-14 |
artikel |
36 |
Fluency of visualizations: linking spatiotemporal visualizations to improve cybersecurity visual analytics
|
Qian, Zhenyu Cheryl |
|
2014 |
|
1 |
p. 1-15 |
artikel |
37 |
Forecasting the locational dynamics of transnational terrorism: a network analytic approach
|
Desmarais, Bruce A |
|
2013 |
|
1 |
p. 1-12 |
artikel |
38 |
Generating test cases for marine safety and security scenarios: a composition framework
|
Shahir, Hamed Yaghoubi |
|
2012 |
|
1 |
p. 1-21 |
artikel |
39 |
Harvesting and analysis of weak signals for detecting lone wolf terrorists
|
Brynielsson, Joel |
|
2013 |
|
1 |
p. 1-15 |
artikel |
40 |
Improved lexicon-based sentiment analysis for social media analytics
|
Jurek, Anna |
|
2015 |
|
1 |
p. 1-13 |
artikel |
41 |
Introduction to a special issue on biologically inspired analysis of social systems: a security informatics perspective
|
Asal, Victor |
|
2012 |
|
1 |
p. 1-3 |
artikel |
42 |
Keeping pace with the creation of new malicious PDF files using an active-learning based detection framework
|
Nissim, Nir |
|
2016 |
|
1 |
p. 1-20 |
artikel |
43 |
Knowledge encapsulation framework for technosocial predictive modeling
|
Madison, Michael C |
|
2012 |
|
1 |
p. 1-18 |
artikel |
44 |
Language use in the Jihadist magazines inspire and Azan
|
Skillicorn, David B |
|
2014 |
|
1 |
p. 1-16 |
artikel |
45 |
Massively collaborative problem solving: new security solutions and new security risks
|
Greene, Kshanti |
|
2012 |
|
1 |
p. 1-17 |
artikel |
46 |
Modelling the spatial and social dynamics of insurgency
|
Giabbanelli, Philippe J |
|
2014 |
|
1 |
p. 1-15 |
artikel |
47 |
Natural security: how biological systems use information to adapt in an unpredictable world
|
Sagarin, Raphael D |
|
2012 |
|
1 |
p. 1-9 |
artikel |
48 |
Organised crime and social media: a system for detecting, corroborating and visualising weak signals of organised crime online
|
Andrews, Simon |
|
2018 |
|
1 |
p. 1-21 |
artikel |
49 |
“Our Little Secret”: pinpointing potential predators
|
Vartapetiance, Anna |
|
2014 |
|
1 |
p. 1-19 |
artikel |
50 |
Pathways to identity: using visualization to aid law enforcement in identification tasks
|
Bruce, Joe |
|
2014 |
|
1 |
p. 1-13 |
artikel |
51 |
Police patrol districting method and simulation evaluation using agent-based model & GIS
|
Zhang, Yue |
|
2013 |
|
1 |
p. 1-13 |
artikel |
52 |
Predicting sentencing outcomes with centrality measures
|
Morselli, Carlo |
|
2013 |
|
1 |
p. 1-9 |
artikel |
53 |
Security informatics research challenges for mitigating cyber friendly fire
|
Carroll, Thomas E |
|
2014 |
|
1 |
p. 1-14 |
artikel |
54 |
Semi-supervised learning for detecting human trafficking
|
Alvari, Hamidreza |
|
2017 |
|
1 |
p. 1-14 |
artikel |
55 |
Social and organizational influences on psychological hardiness: How leaders can increase stress resilience
|
Bartone, Paul T |
|
2012 |
|
1 |
p. 1-10 |
artikel |
56 |
Social network integration and analysis using a generalization and probabilistic approach for privacy preservation
|
Tang, Xuning |
|
2012 |
|
1 |
p. 1-14 |
artikel |
57 |
Specializing network analysis to detect anomalous insider actions
|
Chen, You |
|
2012 |
|
1 |
p. 1-24 |
artikel |
58 |
Technosocial predictive analytics for security informatics
|
Sanfilippo, Antonio |
|
2012 |
|
1 |
p. 1-3 |
artikel |
59 |
Terrorist networks and the lethality of attacks: an illustrative agent based model on evolutionary principles
|
Ormerod, Paul |
|
2012 |
|
1 |
p. 1-8 |
artikel |
60 |
The detection of criminal groups in real-world fused data: using the graph-mining algorithm “GraphExtract”
|
Robinson, David |
|
2018 |
|
1 |
p. 1-16 |
artikel |
61 |
The spatio-temporal modeling for criminal incidents
|
Wang, Xiaofeng |
|
2012 |
|
1 |
p. 1-17 |
artikel |
62 |
Through a computational lens: using dual computer-criminology degree programs to advance the study of criminology and criminal justice practice
|
Valentine, Colby L |
|
2013 |
|
1 |
p. 1-7 |
artikel |
63 |
Timeprints for identifying social media users with multiple aliases
|
Johansson, Fredrik |
|
2015 |
|
1 |
p. 1-11 |
artikel |
64 |
Using augmented reality for supporting information exchange in teams from the security domain
|
Datcu, Dragos |
|
2015 |
|
1 |
p. 1-17 |
artikel |
65 |
Using publicly visible social media to build detailed forecasts of civil unrest
|
Compton, Ryan |
|
2014 |
|
1 |
p. 1-10 |
artikel |
66 |
Validating distance decay through agent based modeling
|
Verma, Arvind |
|
2013 |
|
1 |
p. 1-11 |
artikel |