Abstract is missing.
- Dark Web: Exploring and Mining the Dark Side of the WebHsinchun Chen. 1-2 [doi]
- Computational CriminologyPatricia L. Brantingham. 3 [doi]
- Data Mining for Malicious Code Detection and Security ApplicationsBhavani M. Thuraisingham. 4-5 [doi]
- Desktop Text Mining for Open Source IntelligenceGerhard Wagner. 6 [doi]
- Discovering Complex Networks of Events and Relations in News SurveillanceRoman Yangarber. 7 [doi]
- Visualisation for Decision-MakersJoe Parry. 8 [doi]
- Who, What, When, Where and How: Semantics Semantics Help Connect the DotsGianluca Sensidoni. 9 [doi]
- Engineering Situation Analysis Decision Support SystemsRoozbeh Farahbod, Vladimir Avram, Uwe Glässer, Adel Guitouni. 10-18 [doi]
- Law Enforcement Ontology for Identification of Related Information of Interest Across Free Text DcoumentsJames R. (Bob) Johnson, Anita Miller, Latifur Khan. 19-27 [doi]
- Cybercrime: Awareness and Fear: Slovenian PerspectivesGorazd Mesko, Igor Bernik. 28-33 [doi]
- U.S. and EU Legislation on CybercrimeMike Redford. 34-37 [doi]
- On Refining Real-Time Multilingual News Event Extraction through Deployment of Cross-Lingual Information Fusion TechniquesJakub Piskorski, Jenya Belayeva, Martin Atkinson. 38-45 [doi]
- Capture-Recapture Method for Estimating the Number of Problem Drug Users: The Case of the NetherlandsM. Temurhan, Ronald Meijer, Sunil Choenni, M. van Ooyen-Houben, G. Cruts, M. van Laar. 46-51 [doi]
- Terrorism, Threat and Time: The Mediating Effect of Terrorist Threat on Public Willingness to Forego Civil LibertiesDale Elvy. 52-57 [doi]
- Challenges in Open Source IntelligenceClive Best. 58-62 [doi]
- Testing Elderly People's Fear of Crime Using a Virtual EnvironmentAndrew J. Park, Eunju Hwang, Valerie Spicer, Connie Cheng, Patricia L. Brantingham, Andrew Sixsmith. 63-69 [doi]
- Analyzing an Offender's Journey to Crime: A Criminal Movement Model (CriMM)Natalia Iwanski, Richard Frank, Vahid Dabbaghian, Andrew Reid, Patricia L. Brantingham. 70-77 [doi]
- The Online Institution: Psychiatric Power as an Explanatory Model for the Normalisation of Radicalisation and TerrorismRobyn Torok. 78-85 [doi]
- Finding Criminal Attractors Based on Offenders' Directionality of CrimesRichard Frank, Martin A. Andresen, Connie Cheng, Patricia L. Brantingham. 86-93 [doi]
- The Distribution of Event Complexity in the British Columbia Court System: An Analysis Based on the CourBC Analytical SystemPaul J. Brantingham, Amir H. Ghaseminejad, Patricia L. Brantingham. 94-99 [doi]
- Web Network and Content Changes Associated with the 2011 Muslim Middle-East and North African Early Uprisings: A Naturalistic Field ExperimentJames A. Danowski, Han Woo Park. 100-107 [doi]
- An Approach to Intelligent Information Fusion in Sensor Saturated Urban EnvironmentsCharalampos Doulaverakis, Nikolaos Konstantinou, Thomas Knape, Ioannis Kompatsiaris, John Soldatos. 108-115 [doi]
- Evolution of Terrorist Network Using Clustered Approach: A Case StudySarwat Nizamani, Nasrullah Memon. 116-122 [doi]
- Harvesting Information from Heterogeneous SourcesPir Abdul Rasool Qureshi, Nasrullah Memon, Uffe Kock Wiil, Panagiotis Karampelas, Jose Ignacio Nieto Sancheze. 123-128 [doi]
- Statistical Model for Content ExtractionPir Abdul Rasool Qureshi, Nasrullah Memon. 129-134 [doi]
- Public-Private Resilience: State vs. Private Conceptions of Security Risk Management in Danish Cyber-based Critical InfrastructuresSoren Matz. 135-141 [doi]
- Change Blindness in Intelligence: Effects of Attention Guidance by InstructionsUlrik Spak, Mats Lind. 142-148 [doi]
- Mechanisms of Polymorphic and Metamorphic VirusesXufang Li, Peter K. K. Loh, Freddy Tan. 149-154 [doi]
- A Method for Community Detection in Uncertain NetworksJohan Dahlin, Pontus Svenson. 155-162 [doi]
- Strategies to Disrupt Online Child Pornography NetworksKila Joffres, Martin Bouchard, Richard Frank, Bryce Westlake. 163-170 [doi]
- Forecasting the Locational Dynamics of Transnational Terrorism: A Network Analytic ApproachBruce A. Desmarais, Skyler J. Cranmer. 171-177 [doi]
- SVM Based Scheme for Predicting Number of Zombies in a DDoS AttackP. K. Agrawal, B. B. Gupta, Satbir Jain. 178-182 [doi]
- Two Novel 802.1x Denial of Service AttacksAbdulrahman Alruban, Emlyn Everitt. 183-190 [doi]
- Digital Forensic Readiness: An Insight into Governmental and Academic InitiativesAntonis Mouhtaropoulos, Marthie Grobler, Chang-Tsun Li. 191-196 [doi]
- CrimeFighter Investigator: A Novel Tool for Criminal Network InvestigationRasmus Rosenqvist Petersen, Uffe Kock Wiil. 197-202 [doi]
- Minimizing the Average Number of Inspections for Detecting Rare Items in Finite PopulationsAndre J. Hoogstrate, Chris A. J. Klaassen. 203-208 [doi]
- The Dark Net: Self-Regulation Dynamics of Illegal Online Markets for Identities and Related ServicesFrank Wehinger. 209-213 [doi]
- Web Analytics for Security InformaticsKristin Glass, Richard Colbaugh. 214-219 [doi]
- Toward Systematic Integration of Security Policies into Web ServicesAzzam Mourad, Hadi Otrok, Sara Ayoubi. 220-223 [doi]
- A Computationally-Enabled Analysis of Lashkar-e-Taiba Attacks in Jammu and KashmirAaron Mannes, J. Shakarian, Amy Sliva, V. S. Subrahmanian. 224-229 [doi]
- The Need to Introduce a New Tactical Telecommunication System in the Slovenian ArmyMihael Plevnik, Iztok Podbregar. 230-233 [doi]
- Extraction and Recognition of the Vehicle License Plate for Passing under Outside EnvironmentSeyed Hamidreza Mohades Kasaei, Seyed Mohammadreza Mohades Kasaei. 234-237 [doi]
- Localisation of Threat Substances in Urban Society - LOTUS: Tomorrow's System for Finding Illicit Manufacturing of Drugs and Home Made ExplosivesHans Önnerud, Sara Wallin, Henric Östmark. 238-243 [doi]
- A Psychological Perspective on Virtual Communities Supporting Terrorist and Extremist Ideologies as a Tool for RecruitmentLorraine Bowman-Grieve. 244-247 [doi]
- Global Defense Policy System of Laws: Graph Theory Approach to Balance of Power TheoryNewton Howard. 248-258 [doi]
- Automation Possibilities in Information Security ManagementRaydel Montesino, Stefan Fenz. 259-262 [doi]
- Multi-relational Network Analysis for Covert OrganizationsDuo-Yong Sun, Shu-Quan Guo, Xiao-Peng Liu, Jiang Li. 263-268 [doi]
- Detecting Hidden Friendship in Online Social NetworkGuido Barbian. 269-272 [doi]
- Extraction Distractions: A Comparison of Social Network Model Construction MethodsJames F. Morris, Keith Anthony, Kevin T. Kennedy, Richard F. Deckro. 273-276 [doi]
- Social Tension Detection and Intention Recognition Using Natural Language Semantic Analysis: On the Material of Russian-Speaking Social Networks and Web ForumsOlga Vybornova, Ivan Smirnov, Ilya Sochenkov, Alexander Kiselyov, Ilya Tikhomirov, Natalya Chudova, Yulia Kuznetsova, Gennady Osipov. 277-281 [doi]
- Trees Cannot Lie: Using Data Structures for Forensics PurposesPeter Kieseberg, Sebastian Schrittwieser, Martin Mulazzani, Markus Huber, Edgar Weippl. 282-285 [doi]
- A Comparative Study of Distributed Denial of Service Attacks, Intrusion Tolerance and Mitigation TechniquesAnupama Mishra, B. B. Gupta, Ramesh Chandra Joshi. 286-289 [doi]
- Analysis of the Financial Crisis of 2007-2009 and Its Impact on TerrorismIrina Sakharova. 290 [doi]
- Decision Support System for Intelligence AnalystsPeter Eachus, Ben Short. 291 [doi]
- Information Fusion for Port Security Decision SupportRobert Forsgren, Andreas Horndahl, Pontus Svenson, Edward Tjornhammar. 292 [doi]
- The Media: A Terrorist Tool or a Silent Ally?Chaditsa Poulatova. 293 [doi]
- Video Analytics: Opportunity or Spoof Story? The State of the Art of Intelligent Video SurveillanceMassimiliano Argiolu, Fabio Bisogni. 294 [doi]
- Analysis of Competing Hypothesis for Investigating Lone Wolf TerroristLisa Kaati, Pontus Svenson. 295-299 [doi]
- Interestingness - Directing Analyst Focus to Significant DataM. A. J. Bourassa, J. Fugère, David B. Skillicorn. 300-307 [doi]
- A System for Ranking Organizations Using Social Scale AnalysisSukru Tikves, Sujogya Banerjee, Hamy Temkit, Sedat Gokalp, Hasan Davulcu, Arunabha Sen, Steven R. Corman, Mark Woodward, Inayah Rohmaniyah, Ali Amin. 308-313 [doi]
- Changes in Muslim Nations' Centrality Mined from Open-Source World Jihad News: A Comparison of Networks in Late 2010, Early 2011, and Post-Bin LadenJames A. Danowski. 314-321 [doi]
- Text Mining for Opinion Target DetectionBénédicte Goujon. 322-326 [doi]
- Agile Sentiment Analysis of Social Media Content for Security Informatics ApplicationsRichard Colbaugh, Kristin Glass. 327-331 [doi]
- Retrieving Representative Structures from XML Documents Using Clustering TechniquesYin-Fu Huang, Po-Lun Liou. 332-339 [doi]
- Focused Crawling Using Name Disambiguation on Search Engine ResultsNicolas Martin, Khaled Khelif. 340-345 [doi]
- Detecting Emergent Conflicts through Web Mining and VisualizationFredrik Johansson, Joel Brynielsson, Pontus Hörling, Michael Malm, Christian Mårtenson, Staffan Truvé, Magnus Rosell. 346-353 [doi]
- Dealing with Lashkar-e-Taiba: A Multi-player Game-Theoretic PerspectiveJohn P. Dickerson, Aaron Mannes, V. S. Subrahmanian. 354-359 [doi]
- Node Removal in Criminal NetworksRasmus Rosenqvist Petersen, Christopher J. Rhodes, Uffe Kock Wiil. 360-365 [doi]
- A Framework for Internal Identity Theft Prevention in Retail IndustryMahmood Shah, Romanus Izuchukwu Okeke. 366-371 [doi]
- Trust Centrality in Online Social NetworksGuido Barbian. 372-377 [doi]
- A Recommendation Model for Social Resource Sharing Systems Based on Tripartite Graph ClusteringYonca Ustunbas, Sule Gündüz Ögüdücü. 378-381 [doi]
- IQ - A Web Mining ToolClive Best, David Horby. 382-384 [doi]
- A Hybrid Framework for Building a Web-Page Recommender SystemVasileios Anastopoulos, Panagiotis Karampelas, Panagiotis Kalagiakos, Reda Alhajj. 385-390 [doi]
- Technology vs. Infoxication - The Challenges of Obtaining Intelligence from the BuzzAlejandro Fernández-Cernuda Diaz. 391 [doi]