default search action
Search dblp for Publications
export results for "toc:db/series/anis/anis9.bht:"
@incollection{DBLP:series/anis/ChaJLC10, author = {Shi{-}Cho Cha and Pei{-}Wen Juo and Li{-}Ting Liu and Wei{-}Ning Chen}, editor = {Christopher C. Yang and Michael Chau and Jau{-}Hwang Wang and Hsinchun Chen}, title = {Duplicate Work Reduction in Business Continuity and Risk Management Processes}, booktitle = {Security Informatics}, series = {Annals of Information Systems}, volume = {9}, pages = {155--170}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-1-4419-1325-8\_9}, doi = {10.1007/978-1-4419-1325-8\_9}, timestamp = {Thu, 13 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/anis/ChaJLC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/anis/ChenAC10, author = {Yi{-}Da Chen and Ahmed Abbasi and Hsinchun Chen}, editor = {Christopher C. Yang and Michael Chau and Jau{-}Hwang Wang and Hsinchun Chen}, title = {Framing Social Movement Identity with Cyber-Artifacts: {A} Case Study of the International Falun Gong Movement}, booktitle = {Security Informatics}, series = {Annals of Information Systems}, volume = {9}, pages = {1--23}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-1-4419-1325-8\_1}, doi = {10.1007/978-1-4419-1325-8\_1}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/anis/ChenAC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/anis/ChenWW10, author = {Yi{-}Ming Chen and Dachrahn Wu and Cheng{-}Kuang Wu}, editor = {Christopher C. Yang and Michael Chau and Jau{-}Hwang Wang and Hsinchun Chen}, title = {A Game Theoretic Framework for Multi-agent Deployment in Intrusion Detection Systems}, booktitle = {Security Informatics}, series = {Annals of Information Systems}, volume = {9}, pages = {117--133}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-1-4419-1325-8\_7}, doi = {10.1007/978-1-4419-1325-8\_7}, timestamp = {Fri, 11 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/anis/ChenWW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/anis/GlasserV10, author = {Uwe Gl{\"{a}}sser and Mona Vajihollahi}, editor = {Christopher C. Yang and Michael Chau and Jau{-}Hwang Wang and Hsinchun Chen}, title = {Identity Management Architecture}, booktitle = {Security Informatics}, series = {Annals of Information Systems}, volume = {9}, pages = {97--116}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-1-4419-1325-8\_6}, doi = {10.1007/978-1-4419-1325-8\_6}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/anis/GlasserV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/anis/LeePPLT10, author = {Ickjai Lee and Reece Pershouse and Peter Phillips and Kyungmi Lee and Christopher Torpelund{-}Bruin}, editor = {Christopher C. Yang and Michael Chau and Jau{-}Hwang Wang and Hsinchun Chen}, title = {What-If Emergency Response Through Higher Order Voronoi Diagrams}, booktitle = {Security Informatics}, series = {Annals of Information Systems}, volume = {9}, pages = {77--95}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-1-4419-1325-8\_5}, doi = {10.1007/978-1-4419-1325-8\_5}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/anis/LeePPLT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/anis/QiaoTJDCCH10, author = {Shaojie Qiao and Changjie Tang and Huidong Jin and Shucheng Dai and Xingshu Chen and Michael Chau and Jian Hu}, editor = {Christopher C. Yang and Michael Chau and Jau{-}Hwang Wang and Hsinchun Chen}, title = {Processing Constrained \emph{k}-Closest Pairs Queries in Crime Databases}, booktitle = {Security Informatics}, series = {Annals of Information Systems}, volume = {9}, pages = {59--75}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-1-4419-1325-8\_4}, doi = {10.1007/978-1-4419-1325-8\_4}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/anis/QiaoTJDCCH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/anis/SkillicornL10, author = {David B. Skillicorn and Ayron Little}, editor = {Christopher C. Yang and Michael Chau and Jau{-}Hwang Wang and Hsinchun Chen}, title = {Patterns of Word Use for Deception in Testimony}, booktitle = {Security Informatics}, series = {Annals of Information Systems}, volume = {9}, pages = {25--39}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-1-4419-1325-8\_2}, doi = {10.1007/978-1-4419-1325-8\_2}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/anis/SkillicornL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/anis/SuBXDDZLTCB10, author = {Stanley Y. W. Su and Howard W. Beck and Xuelian Xiao and Jeff DePree and Seema Degwekar and Chen Zhou and Minsoo Lee and Carla S. Thomas and Andrew Coggeshall and Richard Bostock}, editor = {Christopher C. Yang and Michael Chau and Jau{-}Hwang Wang and Hsinchun Chen}, title = {ETKnet: {A} Distributed Network System for Sharing Event Data and Multi-faceted Knowledge in a Collaboration Federation}, booktitle = {Security Informatics}, series = {Annals of Information Systems}, volume = {9}, pages = {135--153}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-1-4419-1325-8\_8}, doi = {10.1007/978-1-4419-1325-8\_8}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/anis/SuBXDDZLTCB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/anis/YangT10, author = {Christopher C. Yang and Xuning Tang}, editor = {Christopher C. Yang and Michael Chau and Jau{-}Hwang Wang and Hsinchun Chen}, title = {Information Integration for Terrorist or Criminal Social Networks}, booktitle = {Security Informatics}, series = {Annals of Information Systems}, volume = {9}, pages = {41--57}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-1-4419-1325-8\_3}, doi = {10.1007/978-1-4419-1325-8\_3}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/anis/YangT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/anis/2010-9, editor = {Christopher C. Yang and Michael Chau and Jau{-}Hwang Wang and Hsinchun Chen}, title = {Security Informatics}, series = {Annals of Information Systems}, volume = {9}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-1-4419-1325-8}, doi = {10.1007/978-1-4419-1325-8}, isbn = {978-1-4419-1324-1}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/anis/2010-9.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.