Facet browsing currently unavailable
Page 1 of 67 results
Sort by: relevance publication year
Police patrol districting method and simulation evaluation using agent-based model & GIS JOURNAL ARTICLE published December 2013 in Security Informatics |
Detecting obfuscated malware using reduced opcode set and optimised runtime trace JOURNAL ARTICLE published December 2016 in Security Informatics |
Erratum to: Factors influencing network risk judgments: a conceptual inquiry and exploratory analysis JOURNAL ARTICLE published December 2015 in Security Informatics |
Emerging issues for education in E-discovery for electronic health records JOURNAL ARTICLE published December 2015 in Security Informatics |
A measurement study of DNSSEC misconfigurations JOURNAL ARTICLE published December 2015 in Security Informatics |
CrimeFighter Investigator: Integrating synthesis and sense-making for criminal network investigation JOURNAL ARTICLE published December 2013 in Security Informatics |
Evasion-resistant network scan detection JOURNAL ARTICLE published December 2015 in Security Informatics |
Applying machine learning to criminology: semi-parametric spatial-demographic Bayesian regression JOURNAL ARTICLE published December 2018 in Security Informatics |
Timeprints for identifying social media users with multiple aliases JOURNAL ARTICLE published December 2015 in Security Informatics |
Semi-supervised learning for detecting human trafficking JOURNAL ARTICLE published December 2017 in Security Informatics |
Acoustic environment identification using unsupervised learning JOURNAL ARTICLE published December 2014 in Security Informatics |
Through a computational lens: using dual computer-criminology degree programs to advance the study of criminology and criminal justice practice JOURNAL ARTICLE published December 2013 in Security Informatics |
Harvesting and analysis of weak signals for detecting lone wolf terrorists JOURNAL ARTICLE published December 2013 in Security Informatics |
Introduction to a special issue on biologically inspired analysis of social systems: a security informatics perspective JOURNAL ARTICLE published December 2012 in Security Informatics |
Detecting unknown malicious code by applying classification techniques on OpCode patterns JOURNAL ARTICLE published December 2012 in Security Informatics |
Evaluating text visualization for authorship analysis JOURNAL ARTICLE published December 2014 in Security Informatics |
Estimating the sentiment of social media content for security informatics applications JOURNAL ARTICLE published December 2012 in Security Informatics |
Algorithmic criminology JOURNAL ARTICLE published December 2013 in Security Informatics |
An agent-based model and computational framework for counter-terrorism and public safety based on swarm intelligencea JOURNAL ARTICLE published December 2012 in Security Informatics |
Improved lexicon-based sentiment analysis for social media analytics JOURNAL ARTICLE published December 2015 in Security Informatics |