nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A microblogging-based approach to terrorism informatics: Exploration and chronicling civilian sentiment and response to terrorism events via Twitter
|
Cheong, Marc |
|
2010 |
13 |
1 |
p. 45-59 |
artikel |
2 |
A multi-region empirical study on the internet presence of global extremist organizations
|
Qin, Jialun |
|
2010 |
13 |
1 |
p. 75-88 |
artikel |
3 |
Analyzing the semantic content and persuasive composition of extremist media: A case study of texts produced during the Gaza conflict
|
Prentice, Sheryl |
|
2010 |
13 |
1 |
p. 61-73 |
artikel |
4 |
Computational approaches to suspicion in adversarial settings
|
Skillicorn, David B. |
|
2010 |
13 |
1 |
p. 21-31 |
artikel |
5 |
Domain-specific Chinese word segmentation using suffix tree and mutual information
|
Zeng, Daniel |
|
2010 |
13 |
1 |
p. 115-125 |
artikel |
6 |
Identity matching using personal and social identity features
|
Li, Jiexun |
|
2010 |
13 |
1 |
p. 101-113 |
artikel |
7 |
Information control and terrorism: Tracking the Mumbai terrorist attack through twitter
|
Oh, Onook |
|
2010 |
13 |
1 |
p. 33-43 |
artikel |
8 |
Introduction to special issue on terrorism informatics
|
Chen, Hsinchun |
|
2011 |
13 |
1 |
p. 1-3 |
artikel |
9 |
Leveraging information sharing to configure supply chains
|
Liu, Rong |
|
2009 |
13 |
1 |
p. 139-151 |
artikel |
10 |
Tag-only aging-counter localization for the R-LIM2 system
|
Choi, Jung-Wook |
|
2009 |
13 |
1 |
p. 127-137 |
artikel |
11 |
Tracking and disrupting dark networks: Challenges of data collection and analysis
|
Roberts, Nancy C. |
|
2010 |
13 |
1 |
p. 5-19 |
artikel |
12 |
“Where’s Farah?”: Knowledge silos and information fusion by distributed collaborating teams
|
Hayne, Stephen C. |
|
2010 |
13 |
1 |
p. 89-100 |
artikel |