Abstract is missing.
- Counterterrorism and Open Source Intelligence: Models, Tools, Techniques, and Case StudiesUffe Kock Wiil. 1-6 [doi]
- Targeting by Transnational Terrorist GroupsAlexander Gutfraind. 9-32 [doi]
- A Framework for Analyst Focus from Computed SignificanceDavid B. Skillicorn, M. A. J. Bourassa. 33-47 [doi]
- Interdiction of Plots with Multiple OperativesGordon Woo. 49-59 [doi]
- Understanding Terrorist Network Topologies and Their Resilience Against DisruptionRoy Lindelauf, Peter Borm, Herbert Hamers. 61-72 [doi]
- Co-offending Network MiningPatricia L. Brantingham, Martin Ester, Richard Frank, Uwe Glässer, Mohammad A. Tayebi. 73-102 [doi]
- Region-Based Geospatial Abduction with Counter-IED ApplicationsPaulo Shakarian, V. S. Subrahmanian. 105-142 [doi]
- Finding Hidden Links in Terrorist Networks by Checking Indirect Links of Different Sub-NetworksAlan Chia-Lung Chen, Shang Gao, Panagiotis Karampelas, Reda Alhajj, Jon G. Rokne. 143-158 [doi]
- The Use of Open Source Intelligence in the Construction of Covert Social NetworksChristopher J. Rhodes. 159-170 [doi]
- A Novel Method to Analyze the Importance of Links in Terrorist NetworksUffe Kock Wiil, Jolanta Gniadek, Nasrullah Memon. 171-187 [doi]
- A Global Measure for Estimating the Degree of Organization and Effectiveness of Individual Actors with Application to Terrorist NetworksSara Aghakhani, Khaled Dawoud, Reda Alhajj, Jon G. Rokne. 189-222 [doi]
- Counterterrorism Mining for Individuals Semantically-Similar to Watchlist MembersJames A. Danowski. 223-247 [doi]
- Detection of Illegitimate Emails Using Boosting AlgorithmSarwat Nizamani, Nasrullah Memon, Uffe Kock Wiil. 249-264 [doi]
- Cluster Based Text Classification ModelSarwat Nizamani, Nasrullah Memon, Uffe Kock Wiil. 265-283 [doi]
- Effectiveness of Social Networks for Studying Biological Agents and Identifying Cancer BiomarkersGhada Naji, Mohamad Nagi, Abdallah M. ElSheikh, Shang Gao, Keivan Kianmehr, Tansel Özyer, Jon G. Rokne, Douglas J. Demetrick, Mick J. Ridley, Reda Alhajj. 285-313 [doi]
- From Terrorism Informatics to Dark Web ResearchHsinchun Chen. 317-341 [doi]
- Investigating Terrorist Attacks Using CDR Data: A Case StudyFatih Ozgul, Ahmet Çelik, Claus Atzenbeck, Nadir Gergin. 343-354 [doi]
- Multilingual Real-time Event Extraction for Border Security Intelligence GatheringMartin Atkinson, Jakub Piskorski, Erik Van der Goot, Roman Yangarber. 355-390 [doi]
- Mining the Web to Monitor the Political ConsensusFederico Neri, Carlo Aliprandi, Furio Camillo. 391-412 [doi]
- Exploring the Evolution of Terrorist NetworksNasrullah Memon, Uffe Kock Wiil, Pir Abdul Rasool Qureshi, Panagiotis Karampelas. 413-427 [doi]
- The Ultimate Hack: Re-inventing Intelligence to Re-engineer EarthRobert David Steele. 431-458 [doi]