default search action
Security Informatics, Volume 3
Volume 3, Number 1, December 2014
- Uffe Kock Wiil:
Criminal network investigation. 1 - Philippe J. Giabbanelli:
Modelling the spatial and social dynamics of insurgency. 2 - Anna Vartapetiance, Lee Gillam:
"Our Little Secret": pinpointing potential predators. 3 - Ryan Compton, Craig Lee, Jiejun Xu, Luis Artieda-Moncada, Tsai-Ching Lu, Lalindra De Silva, Michael Macy:
Using publicly visible social media to build detailed forecasts of civil unrest. 4 - Jacob R. Scanlon, Matthew S. Gerber:
Automatic detection of cyber-recruitment by violent extremists. 5 - Zhenyu Cheryl Qian, Yingjie Victor Chen:
Fluency of visualizations: linking spatiotemporal visualizations to improve cybersecurity visual analytics. 6 - Joel Brynielsson, Fredrik Johansson, Carl Jonsson, Anders Westling:
Emotion classification of social media posts for estimating people's reactions to communicated alert messages during crises. 7 - Mary B. Burns, Kevin C. Moffitt:
Automated deception detection of 911 call transcripts. 8 - David B. Skillicorn, Edna F. Reid:
Language use in the Jihadist magazines inspire and Azan. 9 - Victor A. Benjamin, Wingyan Chung, Ahmed Abbasi, Joshua Chuang, Catherine A. Larson, Hsinchun Chen:
Evaluating text visualization for authorship analysis. 10 - Hafiz Malik, Hasan Mahmood:
Acoustic environment identification using unsupervised learning. 11 - Joseph Bruce, Jean Scholtz, Duncan Hodges, Lia R. Emanuel, Danaë Stanton Fraser, Sadie Creese, Oriana Love:
Pathways to identity: using visualization to aid law enforcement in identification tasks. 12 - Thomas E. Carroll, Frank L. Greitzer, Adam D. Roberts:
Security informatics research challenges for mitigating cyber friendly fire. 13 - Valerie Spicer, Justin Song, Patricia L. Brantingham:
Bridging the perceptual gap: variations in crime perception of businesses at the neighborhood level. 14 - Aaron Hunter:
Belief manipulation and message meaning for protocol analysis. 15
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.