default search action
Security Informatics, Volume 2
Volume 2, Number 1, December 2013
- Rachel A. Hegemann, Erik A. Lewis, Andrea L. Bertozzi:
An "Estimate & Score Algorithm" for simultaneous parameter estimation and reconstruction of incomplete data on social networks. 1 - Colby L. Valentine, Carter Hay, Kevin M. Beaver, Thomas G. Blomberg:
Through a computational lens: using dual computer-criminology degree programs to advance the study of criminology and criminal justice practice. 2 - Arvind K. Verma, Ramyaa Ramyaa, Suresh Marru:
Validating distance decay through agent based modeling. 3 - Carlo Morselli, Victor Hugo Masias, Fernando A. Crespo, Sigifredo Laengle:
Predicting sentencing outcomes with centrality measures. 4 - Richard Berk:
Algorithmic criminology. 5 - Robyn Torok:
Developing an explanatory model for the process of online radicalisation and terrorism. 6 - Yue Zhang, Donald E. Brown:
Police patrol districting method and simulation evaluation using agent-based model & GIS. 7 - Bruce A. Desmarais, Skyler J. Cranmer:
Forecasting the locational dynamics of transnational terrorism: a network analytic approach. 8 - Lorraine Bowman-Grieve:
A psychological perspective on virtual communities supporting terrorist & extremist ideologies as a tool for recruitment. 9 - Rasmus Rosenqvist Petersen, Uffe Kock Wiil:
CrimeFighter Investigator: Integrating synthesis and sense-making for criminal network investigation. 10 - Joel Brynielsson, Andreas Horndahl, Fredrik Johansson, Lisa Kaati, Christian Mårtenson, Pontus Svenson:
Harvesting and analysis of weak signals for detecting lone wolf terrorists. 11
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.