| 1 | -- | 3 | Hsinchun Chen, Yilu Zhou, Edna Reid, Catherine A. Larson. Introduction to special issue on terrorism informatics |
| 21 | -- | 31 | David B. Skillicorn. Computational approaches to suspicion in adversarial settings |
| 33 | -- | 43 | Onook Oh, Manish Agrawal, H. Raghav Rao. Information control and terrorism: Tracking the Mumbai terrorist attack through twitter |
| 45 | -- | 59 | Marc Cheong, Vincent C. S. Lee. A microblogging-based approach to terrorism informatics: Exploration and chronicling civilian sentiment and response to terrorism events via Twitter |
| 61 | -- | 73 | Sheryl Prentice, Paul J. Taylor, Paul Rayson, Andrew Hoskins, Ben O Loughlin. Analyzing the semantic content and persuasive composition of extremist media: A case study of texts produced during the Gaza conflict |
| 75 | -- | 88 | Jialun Qin, Yilu Zhou, Hsinchun Chen. A multi-region empirical study on the internet presence of global extremist organizations |
| 89 | -- | 100 | Stephen C. Hayne, Lucy J. Troup, Sara A. McComb. Where s Farah? : Knowledge silos and information fusion by distributed collaborating teams |
| 101 | -- | 113 | Jiexun Li, G. Alan Wang, Hsinchun Chen. Identity matching using personal and social identity features |
| 115 | -- | 125 | Daniel Zeng, Donghua Wei, Michael Chau, Fei-Yue Wang. Domain-specific Chinese word segmentation using suffix tree and mutual information |
| 127 | -- | 137 | Jung-Wook Choi, Dong-Ik Oh. Tag-only aging-counter localization for the R-LIM2 system |
| 139 | -- | 151 | Rong Liu, Akhil Kumar. Leveraging information sharing to configure supply chains |