default search action
Security Informatics 2010
- Christopher C. Yang, Michael Chau, Jau-Hwang Wang, Hsinchun Chen:
Security Informatics. Annals of Information Systems 9, Springer 2010, ISBN 978-1-4419-1324-1 - Yi-Da Chen, Ahmed Abbasi, Hsinchun Chen:
Framing Social Movement Identity with Cyber-Artifacts: A Case Study of the International Falun Gong Movement. 1-23 - David B. Skillicorn, Ayron Little:
Patterns of Word Use for Deception in Testimony. 25-39 - Christopher C. Yang, Xuning Tang:
Information Integration for Terrorist or Criminal Social Networks. 41-57 - Shaojie Qiao, Changjie Tang, Huidong Jin, Shucheng Dai, Xingshu Chen, Michael Chau, Jian Hu:
Processing Constrained k-Closest Pairs Queries in Crime Databases. 59-75 - Ickjai Lee, Reece Pershouse, Peter Phillips, Kyungmi Lee, Christopher Torpelund-Bruin:
What-If Emergency Response Through Higher Order Voronoi Diagrams. 77-95 - Uwe Glässer, Mona Vajihollahi:
Identity Management Architecture. 97-116 - Yi-Ming Chen, Dachrahn Wu, Cheng-Kuang Wu:
A Game Theoretic Framework for Multi-agent Deployment in Intrusion Detection Systems. 117-133 - Stanley Y. W. Su, Howard W. Beck, Xuelian Xiao, Jeff DePree, Seema Degwekar, Chen Zhou, Minsoo Lee, Carla S. Thomas, Andrew Coggeshall, Richard Bostock:
ETKnet: A Distributed Network System for Sharing Event Data and Multi-faceted Knowledge in a Collaboration Federation. 135-153 - Shi-Cho Cha, Pei-Wen Juo, Li-Ting Liu, Wei-Ning Chen:
Duplicate Work Reduction in Business Continuity and Risk Management Processes. 155-170
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.