Abstract is missing.
- An executive decision support system for longitudinal statistical analysis of crime and law enforcement performance crime analysis system pacific region (CASPR)Amir H. Ghaseminejad, Paul J. Brantingham. 1-6 [doi]
- Testing perception of crime in a virtual environmentAndrew J. Park, Valerie Spicer, Monique Guterres, Patricia L. Brantingham, Greg Jenion. 7-12 [doi]
- Identifying high risk crime areas using topologyRichard Frank, Andrew J. Park, Patricia L. Brantingham, Joseph Clare, Kathryn Wuschke, Mona Vajihollahi. 13-18 [doi]
- Natural Language Processing based on Semantic inferentialism for extracting crime information from textVladia Pinheiro, Vasco Furtado, Tarcisio H. C. Pequeno, Douglas Nogueira. 19-24 [doi]
- Predicting social ties in mobile phone networksHuiqi Zhang, Ram Dantu. 25-30 [doi]
- Network neighborhood analysisMichael D. Porter, Ryan Smith. 31-36 [doi]
- Early warning analysis for social diffusion eventsRichard Colbaugh, Kristin Glass. 37-42 [doi]
- Identifing influential users in an online healthcare social networkXuning Tang, Christopher C. Yang. 43-48 [doi]
- Generalizing terrorist social networks with K-nearest neighbor and edge betweeness for social network integration and privacy preservationXuning Tang, Christopher C. Yang. 49-54 [doi]
- The U.S. and the EU differences in anti-terrorism effortsMichael Gallagher. 55-58 [doi]
- Developing a Dark Web collection and infrastructure for computational and social sciencesYulei Zhang, Shuo Zeng, Chunneng Huang, Li Fan, Ximing Yu, Yan Dang, Catherine A. Larson, Dorothy Denning, Nancy Roberts, Hsinchun Chen. 59-64 [doi]
- Automatic construction of domain theory for attack planningXiaochen Li, Wenji Mao, Daniel Zeng, Fei-Yue Wang. 65-70 [doi]
- GENIUS: A computational modeling framework for counter-terrorism planning and responseHerbert H. Tsang, Andrew J. Park, Mengting Sun, Uwe Glässer. 71-76 [doi]
- Terrorist threat assessment with formal concept analysisPaul Elzinga, Jonas Poelmans, Stijn Viaene, Guido Dedene, Shanti Morsing. 77-82 [doi]
- Balancing security and information sharing in intelligence databasesAntonio Badia. 83-88 [doi]
- Agent based correlation model for intrusion detection alertsAyman E. Taha, Ismail Abdel Ghaffar, Ayman M. Bahaa Eldin, Hani M. K. Mahdi. 89-94 [doi]
- Cross-level behavioral analysis for robust early intrusion detectionShun-Wen Hsiao, Yeali S. Sun, Meng Chang Chen, Hui Zhang. 95-100 [doi]
- Intelligent decision support for Marine safety and Security OperationsUwe Glässer, Piper J. Jackson, Ali Khalili Araghi, Hamed Yaghoubi Shahir. 101-107 [doi]
- Automatically identifying the sources of large Internet eventsKristin Glass, Richard Colbaugh, Max Planck. 108-113 [doi]
- Cross Entropy approach for patrol route planning in dynamic environmentsXu Chen, Tak-Shing Peter Yum. 114-119 [doi]
- Computational knowledge and information management in veterinary epidemiologySvitlana Volkova, William H. Hsu. 120-125 [doi]
- Entity refinement using latent semantic indexingRoger B. Bradford. 126-128 [doi]
- Latent semantic analysis and keyword extraction for phishing classificationGaston L Huillier, Alejandro Hevia, Richard Weber, Sebastián A. Ríos. 129-131 [doi]
- Unsupervised multilingual concept discovery from daily online news extractsJenq-Haur Wang. 132-134 [doi]
- Estimating sentiment orientation in social media for intelligence monitoring and analysisRichard Colbaugh, Kristin Glass. 135-137 [doi]
- Desktop text mining for law enforcementJonathan Brett Crawley, Gerhard Wagner. 138-140 [doi]
- Tweets mining using WIKIPEDIA and impurity cluster measurementQing Chen, Timothy Shipper, Latifur Khan. 141-143 [doi]
- Comparing the virtual linkage intensity and real world proximity of social movementsDavid Zimbra, Hsinchun Chen. 144-146 [doi]
- Study of effect of node seniority in social networksBaojun Qiu, Kristinka Ivanova, John Yen, Peng Liu. 147-149 [doi]
- Measuring behavioral trust in social networksSibel Adali, Robert Escriva, Mark K. Goldberg, Mykola Hayvanovych, Malik Magdon-Ismail, Boleslaw K. Szymanski, William A. Wallace, Gregory Todd Williams. 150-152 [doi]
- Inter-Domain Routing Validator Based Spoofing Defence SystemLei Wang, Tianbing Xia, Jennifer Seberry. 153-155 [doi]
- Secure communication between set-top box and smart card for fair use in DTV broadcastingWei-Bin Lee, Hsing-Bai Chen, Ching-Chih Cheng. 156-158 [doi]
- Real time tracking of a remote moving object by active zoom camerasYan Gao, Xiaolin Zhang. 162-164 [doi]
- Rationalizing police patrol beats using Voronoi TessellationsArvind K. Verma, Ramyaa Ramyaa, Suresh Marru, Ye Fan, Raminder Singh. 165-167 [doi]
- Identifying vulgar content in eMule network through text classificationXiangtao Liu, Xueqi Cheng, Jingyuan Li, Haijun Zhai, Shuo Bai. 168 [doi]
- Protection of Critical National Information Infrastructure (CNII) against cyber terrorism: Development of strategy and policy frameworkZahri Yunos, Syahrul Hafidz Suid. 169 [doi]
- Global disease surveillance using social media: HIV/AIDS content intervention in web forumsYungchang Ku, Chaochang Chiu, Yulei Zhang, Li Fan, Hsinchun Chen. 170 [doi]
- A multibiometric access control architecture for continuous authenticationAdriana Esmeraldo de Oliveira, Gustavo Henrique Matos Bezerra Motta, Leonardo Vidal Batista. 171 [doi]
- Digitally signed document flexible sanitizing scheme based on bilinear mapsWen-Chung Kuo, Jiin-Chiou Cheng, Yen-Hung Lin, Lih-Chyau Wuu. 172 [doi]
- News mining for border security IntelligenceMartin Atkinson, Jenya Belayaeva, Vanni Zavarella, Jakub Piskorski, Silja Huttunen, Arto Vihavainen, Roman Yangarber. 173 [doi]
- Towards effective improvement of the Bayesian Belief Network Structure learningYan Tang, Kendra Cooper, João W. Cangussu, Kun Tian, Yin Wu. 174 [doi]
- Clustering and mapping related news about violence events on their time-linesSyed Toufeeq Ahmed, Sukru Tikves, Hasan Davulcu. 175 [doi]
- HPC - privacy model for collaborative skyline processingBoris Y. L. Chan, Vincent Ng. 176 [doi]
- Workshop on current issues in predictive approaches to intelligence and security analyticsAntonio Sanfilippo. 177-178 [doi]
- Automated sensing and social network analysis in virtual worldsLucas A. Overbey, Gregory McKoy, Jesse Gordon, Shannon McKitrick. 179-184 [doi]
- Multi-modeling of adversary behaviorsAlexander H. Levis, Lee W. Wagenhals, Abbas K. Zaidi. 185-189 [doi]
- Breadth-depth triangulation for validation of modeling and simulation of complex systemsWilliam N. Reynolds. 190-195 [doi]
- Combining System Dynamics and Bayesian Belief Networks for Socio-Technical Risk AnalysisZahra Mohaghegh. 196-201 [doi]
- Text analysis and entity extraction in asymmetric threat response and predictionErwin Chan, Jason Ginsburg, Brian Ten Eyck, Jerzy W. Rozenblit, Mike Dameron. 202-207 [doi]
- Integrated assessment modeling of energy consumption behavior and carbon emissionsThomas F. Sanquist, Bin Shui, Heather Orr. 208-211 [doi]
- Meta-model driven construction of Timed Influence NetsFaisal Mansoor, Abbas K. Zaidi, Alexander H. Levis. 212-217 [doi]
- Similarity kernels via bi-clustering for conventional intergovernmental organizationsMinh-Tam Le, John Sweeney, Edo Liberty, Steven W. Zucker. 218-220 [doi]
- Social media and social realityWilliam N. Reynolds, Marta S. Weber, Robert M. Farber, Courtney Corley, Andrew J. Cowell, Michelle L. Gregory. 221-226 [doi]
- Parameterizing bayesian network representations of social-behavioral models by expert elicitationStephen Walsh, Angela Dalton, Paul Whitney, Amanda M. White. 227-232 [doi]
- Collaborative knowledge discovery & marshalling for intelligence & security applicationsAndrew J. Cowell, Russell S. Jensen, Michelle L. Gregory, Peter Ellis, Keith Fligg, Liam McGrath, Kelly O Hara, Eric Bell. 233-238 [doi]