Abstract is missing.
- Intelligent Social Network Modeling and Analysis for Security InformaticsRonald R. Yager. 1-2 [doi]
- Nature Inspired Online Real Risk Assessment Models for Security SystemsAjith Abraham. 3 [doi]
- Homeland Security Data Mining Using Social Network AnalysisHsinchun Chen. 4 [doi]
- The Automatic Identification and Prioritisation of Criminal Networks from Police Crime DataRichard Adderley, Atta Badii, Chaoxin Wu. 5-14 [doi]
- An Information Theory Approach to Identify Sets of Key PlayersDaniel Ortiz Arroyo, Dil Muhammad Akbar Hussain. 15-26 [doi]
- Locating Key Actors in Social Networks Using Bayes Posterior Probability FrameworkDil Muhammad Akbar Hussain, Daniel Ortiz Arroyo. 27-38 [doi]
- Computational Modeling of Criminal ActivityUwe Glässer, Mona Vajihollahi. 39-50 [doi]
- SPYWatch, Overcoming Linguistic Barriers in Information ManagementFederico Neri, Angelo Priamo. 51-60 [doi]
- Dissecting the Meaning of an Encrypted Message: An Approach to Discovering the Goals of an AdversaryAaron Hunter. 61-72 [doi]
- Buzz Monitoring in Word SpaceMagnus Sahlgren, Jussi Karlgren. 73-84 [doi]
- Nuclear Threat Detection Via the Nuclear Web and Dark Web: Framework and Preliminary StudyHsinchun Chen. 85-96 [doi]
- Mapping Dark Web GeolocationClinton Mielke, Hsinchun Chen. 97-107 [doi]
- Jihadi Video and Auto-radicalisation: Evidence from an Exploratory YouTube StudyMaura Conway, Lisa McInerney. 108-118 [doi]
- Access Control of Federated Information SystemsAneta Poniszewska-Maranda. 119-130 [doi]
- Designing Information Systems Which Manage or Avoid Privacy IncidentsGiannakis Antoniou, Lynn Margaret Batten, Parampalli Udaya. 131-142 [doi]
- Secure Computation for Privacy Preserving Biometric Data Retrieval and AuthenticationBon Sy. 143-154 [doi]
- Digital Audio Watermarking for Copyright Protection Based on Multiwavelet TransformPrayoth Kumsawat, Kitti Attakitmongcol, Arthit Srikaew. 155-164 [doi]
- Problem Analyses and Recommendations in DRM Security PoliciesYoungseek Kim, Jessica Howard, Sharad Ravindranath, Joon S. Park. 165-178 [doi]
- A Distributed Framework for the Detection of New Worm-Related MalwareBoris Rozenberg, Ehud Gudes, Yuval Elovici. 179-190 [doi]
- Optimization of NIDS Placement for Protection of Intercommunicating Critical InfrastructuresRami Puzis, Marius David Klippel, Yuval Elovici, Shlomi Dolev. 191-203 [doi]
- Unknown Malcode Detection Using OPCODE RepresentationRobert Moskovitch, Clint Feher, Nir Tzachar, Eugene Berger, Marina Gitelman, Shlomi Dolev, Yuval Elovici. 204-215 [doi]
- Mobile and Stationary Sensors for Local Surveillance: System Architecture and ApplicationsSandro Leuchter, Thomas Partmann, Lothar Berger. 216-225 [doi]
- Fuzzy Distributed Workflows for Crisis Management Decision MakersJean-Francois Landry, Cedric Ulmer, Laurent Gomez. 226-236 [doi]
- Reconfigurable Radio Systems for Public Safety Based on Low-Cost PlatformsGianmarco Baldini, Raimondo Giuliani, Dimitrios Symeonidis. 237-247 [doi]
- An Information Systems Design Theory for Supporting WMD Knowledge ReachbackSteven R. Haynes, Jonathan M. Singel, Thomas George Kannampallil. 248-259 [doi]
- Rampart: A Service and Agent-Based Architecture for Anti-Terrorism Planning and Resource AllocationSteven R. Haynes, Thomas George Kannampallil, Mark A. Cohen, Andrey Soares, Frank E. Ritter. 260-270 [doi]
- Evaluative Word Locations in Semantic Networks from News Stories about Al Qaeda and Implications for Optimal Communication Messages in Anti-terrorism CampaignsJames A. Danowski. 271-273 [doi]
- Methodology for Experimental ICT Industrial and Critical Infrastructure Security TestsIgor Nai Fovino, Marcelo Masera. 274-275 [doi]