|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 542 occurrences of 370 keywords
|
|
|
Results
Found 3065 publication records. Showing 3065 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
164 | Heum Park, SunHo Cho, Hyuk-Chul Kwon |
Cyber Forensics Ontology for Cyber Criminal Investigation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers, pp. 160-165, 2009, Springer, 978-3-642-02311-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
criminal investigation, cyber forensics, ontology, digital evidence, cyber crime |
103 | Sandra Kalidien, Sunil Choenni, Ronald Meijer |
Crime statistics online: potentials and challenges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DG.O ![In: Proceedings of the 11th Annual International Conference on Digital Government Research, Public Administration Online: Challenges and Opportunities, DG.O 2010, Puebla, Mexico, May 17-20, 2010, pp. 131-137, 2010, Digital Government Research Center, 978-1-4503-0070-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
crime statistics, data spaces, online effects, mash ups |
103 | Su-Yin Tan, Robert Haining |
An Urban Study of Crime and Health Using an Exploratory Spatial Data Analysis Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (1) ![In: Computational Science and Its Applications - ICCSA 2009, International Conference, Seoul, Korea, June 29-July 2, 2009, Proceedings, Part I, pp. 269-284, 2009, Springer, 978-3-642-02453-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Deprivation, Spatial Regression, Spatial Error Model, Moran’s I, Sheffield, Health, Spatial Autocorrelation, LISA, Crime, UK |
95 | Markus Wolff, Hartmut Asche |
Geovisualization Approaches for Spatio-temporal Crime Scene Analysis - Towards 4D Crime Mapping. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCF ![In: Computational Forensics, Third International Workshop, IWCF 2009, The Hague, The Netherlands, August 13-14, 2009. Proceedings, pp. 78-89, 2009, Springer, 978-3-642-03520-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
3D crime mapping, geovirtual environments, GIS, spatio-temporal |
94 | Jau-Hwang Wang, Bill T. Lin, Ching-Chin Shieh, Peter S. Deng |
Criminal Record Matching Based on the Vector Space Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: Intelligence and Security Informatics, First NSF/NIJ Symposium, ISI 2003, Tucson, AZ, USA, June 2-3, 2003, Proceedings, pp. 386, 2003, Springer, 3-540-40189-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
93 | Shyam Varan Nath |
Crime Pattern Detection Using Data Mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAT Workshops ![In: Proceedings of the 2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology - Workshops, Hong Kong, China, 18-22 December 2006, pp. 41-44, 2006, IEEE Computer Society, 0-7695-2749-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Crime-patterns, data mining, clustering, semi-supervised learning, k-means, law-enforcement |
87 | Hsinchun Chen, Homa Atabakhsh, Chunju Tseng, Byron Marshall, Siddharth Kaza, Shauna Eggers, Hemanth Gowda, Ankit Shah, Tim Petersen, Chuck Violette |
Visualization in law enforcement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DG.O ![In: Proceedings of the 2005 National Conference on Digital Government Research, DG.O 2005, Atlanta, Georgia, USA, May 15-18, 2005, pp. 229-230, 2005, Digital Government Research Center. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
crime analysis, crime network, spatial and temporal visualization, social network analysis, law enforcement, association network |
86 | B. Chandra 0001, Manish Gupta 0005, M. P. Gupta 0001 |
Adaptive Query Interface for Mining Crime Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DNIS ![In: Databases in Networked Information Systems, 5th International Workshop, DNIS 2007, Aizu-Wakamatsu, Japan, October 17-19, 2007, Proceedings, pp. 285-296, 2007, Springer, 978-3-540-75511-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
82 | Masato Goto, Akira Hattori, Takami Yasuda, Shigeki Yokoi |
A Web-Based System for Gathering and Sharing Experience and Knowledge Information in Local Crime Prevention. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (2) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 10th International Conference, KES 2006, Bournemouth, UK, October 9-11, 2006, Proceedings, Part II, pp. 1079-1086, 2006, Springer, 3-540-46537-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Crime Prevention, Information Sharing, CMS, Local Community |
76 | Barbara Endicott-Popovsky |
Ethics and Teaching Information Assurance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 1(4), pp. 65-67, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Computer Crime Survey, Information Assurance, computer crime |
75 | Vasco Furtado, Adriano Melo, André L. V. Coelho, Ronaldo Menezes |
A crime simulation model based on social networks and swarm intelligence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), Seoul, Korea, March 11-15, 2007, pp. 56-57, 2007, ACM, 1-59593-480-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
application for law enforcement, social networks, swarm intelligence, multiagent simulation |
75 | Jerry H. Ratcliffe, Michael J. McCullagh |
Hotbeds of crime and the search for spatial accuracy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Geogr. Syst. ![In: J. Geogr. Syst. 1(4), pp. 385-398, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
72 | Markus Wolff, Hartmut Asche |
Geospatial Crime Scene Investigation - From Hotspot Analysis to Interactive 3D Visualization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (1) ![In: Computational Science and Its Applications - ICCSA 2009, International Conference, Seoul, Korea, June 29-July 2, 2009, Proceedings, Part I, pp. 285-299, 2009, Springer, 978-3-642-02453-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Crime mapping, 3D geovisualization, GIS |
72 | Michael Riesen, Gürsel Serpen |
Validation of a bayesian belief network representation for posterior probability calculations on national crime victimization survey. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Artif. Intell. Law ![In: Artif. Intell. Law 16(3), pp. 245-276, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
National crime victimization survey, Posterior probability calculations, Joint probability distribution, Machine learning, Bayesian belief network, Model validation, Probabilistic query |
72 | Ricardo O. Abu Hana, Cinthia Obladen de Almendra Freitas, Luiz S. Oliveira, Flávio Bortolozzi |
Crime scene classification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), Fortaleza, Ceara, Brazil, March 16-20, 2008, pp. 419-423, 2008, ACM, 978-1-59593-753-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
crime scenes, neural networks, classification, SVM, features |
72 | Stefan Kovachev, Patrick Reichert, Hendrik Speck |
Crimeblips: web based framework for crime incident analysis and visualization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
iiWAS ![In: iiWAS'2008 - The Tenth International Conference on Information Integration and Web-based Applications Services, 24-26 November 2008, Linz, Austria, pp. 694-697, 2008, ACM, 978-1-60558-349-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Berlin, Polizei, University of Applied Sciences Kaiserlautern, crime statistics, crimeblips, incident patterns, kriminalstatistik, police department, data mining, clustering, visualization, visualizing, GIS, indexing, graphical user interface, map, mapping, analysis, filtering, hot spots, trends, law enforcement, web based services, linguistic processing |
72 | Mark Blythe, Peter C. Wright, Andrew F. Monk |
Little brother: could and should wearable computing technologies be applied to reducing older people's fear of crime?. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Pers. Ubiquitous Comput. ![In: Pers. Ubiquitous Comput. 8(6), pp. 402-415, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Fear of crime, Personal ubiquitous computing, Surveillance technology, Social dependability, Privacy, Wearable computing, Older people, Webcams, Internet communities |
67 | Robert Willison, Mikko T. Siponen |
Overcoming the insider: reducing employee computer crime through Situational Crime Prevention. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Commun. ACM ![In: Commun. ACM 52(9), pp. 133-137, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
67 | Markus Wolff, Hartmut Asche |
Towards Geovisual Analysis of Crime Scenes - A 3D Crime Mapping Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AGILE Conf. ![In: Advances in GIScience, Proceedings of the 12th AGILE Conference, Hannover, Germany, 2-5 June 2009, pp. 429-448, 2009, Springer, 978-3-642-00317-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
65 | Richard Adderley, Atta Badii, Chaoxin Wu |
The Automatic Identification and Prioritisation of Criminal Networks from Police Crime Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroISI ![In: Intelligence and Security Informatics, First European Conference, EuroISI 2008, Esbjerg, Denmark, December 3-5, 2008. Proceedings, pp. 5-14, 2008, Springer, 978-3-540-89899-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Criminal networks, Criminal intelligence |
65 | Chih Hao Ku 0001, Alicia Iriberri, Gondy Leroy |
Natural language processing and e-Government: crime information extraction from heterogeneous data sources. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DG.O ![In: Proceedings of the 9th Annual International Conference on Digital Government Research, Partnerships for Public Innovation, DG.O 2008, Montreal, Canada, May 18-21, 2008, pp. 162-170, 2008, Digital Government Research Center, 978-1-60558-099-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
natural language processing, information extraction |
65 | Alicia Iriberri, Gondy Leroy |
Natural Language Processing and e-Government: Extracting Reusable Crime Report Information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IRI ![In: Proceedings of the IEEE International Conference on Information Reuse and Integration, IRI 2007, 13-15 August 2007, Las Vegas, Nevada, USA, pp. 221-226, 2007, IEEE Systems, Man, and Cybernetics Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
63 | R. D. Purdy |
Knowledge and Tools in Building GRANDJUR 1.1. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICAIL ![In: Proceedings of the Second International Conference on Artificial Intelligence and Law, ICAIL '89, Vancouver, BC, Canada, June 13-16, 1989, pp. 201-206, 1989, ACM, 0-89791-322-1. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
61 | Alicia Iriberri, Chih Hao Ku 0001, Gondy Leroy |
Enabling synergy between psychology and natural language processing for e-Government: crime reporting and investigative interview system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DG.O ![In: Proceedings of the 9th Annual International Conference on Digital Government Research, Partnerships for Public Innovation, DG.O 2008, Montreal, Canada, May 18-21, 2008, pp. 399-400, 2008, Digital Government Research Center, 978-1-60558-099-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
cognitive interview, e-Goverment, information extraction, crime |
61 | Chung C. Chang, Kuo H. Hua |
Applying Case-Based Reasoning and Expert Systems to Coastal Patrol Crime Investigation in Taiwan. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI Workshops ![In: Intelligence and Security Informatics, IEEE ISI 2008 International Workshops: PAISI, PACCF, and SOCO 2008, Taipei, Taiwan, June 17, 2008. Proceedings, pp. 161-170, 2008, Springer, 978-3-540-69136-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
case-based reasoning (CBR), experts systems (ES), computerassisted instruction (CAI), crime investigation, coastal patrol |
59 | Fatih Özgül, Zeki Erdem, Chris Bowerman |
Prediction of Unsolved Terrorist Attacks Using Group Detection Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAISI ![In: Intelligence and Security Informatics, Pacific Asia Workshop, PAISI 2009, Bangkok, Thailand, April 27, 2009. Proceedings, pp. 25-30, 2009, Springer, 978-3-642-01392-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Terrorist groups, crime data mining, matching and predicting crimes, offender networks, group detection, clustering, classification |
59 | Fatih Özgül, Zeki Erdem, Hakan Aksoy |
Comparing Two Models for Terrorist Group Detection: GDM or OGDM?. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI Workshops ![In: Intelligence and Security Informatics, IEEE ISI 2008 International Workshops: PAISI, PACCF, and SOCO 2008, Taipei, Taiwan, June 17, 2008. Proceedings, pp. 149-160, 2008, Springer, 978-3-540-69136-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
crime analysis, criminal data mining, terrorism related analytical methodologies and software tools, visualization, Social network analysis |
57 | H. C. Lee |
Cyber crime and challenges for crime investigation in the information era. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: IEEE International Conference on Intelligence and Security Informatics, ISI 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings, 2008, IEEE, 978-1-4244-2414-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
54 | Francesca Dardi, Federico Cervelli, Sergio Carrato |
A Texture Based Shoe Retrieval System for Shoe Marks of Real Crime Scenes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIAP ![In: Image Analysis and Processing - ICIAP 2009, 15th International Conference Vietri sul Mare, Italy, September 8-11, 2009, Proceedings, pp. 384-393, 2009, Springer, 978-3-642-04145-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
54 | Marcin Kwietniewski, Stephanie Wilson, Anna Topol, Sunbir Gill, Jarek Gryz, Michael Jenkin, Piotr Jasiobedzki, Ho-Kong Ng |
MED: A Multimedia Event Database for 3D Crime Scene Representation and Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDE ![In: Proceedings of the 24th International Conference on Data Engineering, ICDE 2008, April 7-12, 2008, Cancún, Mexico, pp. 1592-1595, 2008, IEEE Computer Society, 978-1-4244-1836-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
54 | Peng Chen, Hongyong Yuan, Xueming Shu |
Forecasting Crime Using the ARIMA Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSKD (5) ![In: Fifth International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2008, 18-20 October 2008, Jinan, Shandong, China, Proceedings, Volume 5, pp. 627-630, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
54 | Hsinchun Chen, Wingyan Chung, Jennifer Jie Xu 0001, Gang Wang, Yi Qin, Michael Chau |
Crime Data Mining: A General Framework and Some Examples. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 37(4), pp. 50-56, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
54 | Dale Dzemydiene, Vitalija Rudzkiene |
Multiple Regression Analysis in Crime Pattern Warehouse for Decision Support. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA ![In: Database and Expert Systems Applications, 13th International Conference, DEXA 2002, Aix-en-Provence, France, September 2-6, 2002, Proceedings, pp. 249-258, 2002, Springer, 3-540-44126-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
52 | Charlette M. Donalds, Kweku-Muata Osei-Bryson |
Criminal Investigation Knowledge System: CRIKS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), CD-ROM / Abstracts Proceedings, 4-7 January 2006, Kauai, HI, USA, 2006, IEEE Computer Society, 0-7695-2507-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
51 | Donn B. Parker |
The Dark Side of Computing: SRI International and the Study of Computer Crime. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Ann. Hist. Comput. ![In: IEEE Ann. Hist. Comput. 29(1), pp. 3-15, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
SRI International, Department of Justice, information security, computer crime, National Science Foundation, cybercrime |
51 | Katerina Pastra, Horacio Saggion, Yorick Wilks |
Intelligent Indexing of Crime Scene Photographs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Intell. Syst. ![In: IEEE Intell. Syst. 18(1), pp. 55-61, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
text-based image indexing, relational fact, crime investigation technology, image retrieval, image indexing |
49 | Hina Uttam Keval, Martina Angela Sasse |
To catch a thief - you need at least 8 frames per second: the impact of frame rates on user performance in a CCTV detection task. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Multimedia ![In: Proceedings of the 16th International Conference on Multimedia 2008, Vancouver, British Columbia, Canada, October 26-31, 2008, pp. 941-944, 2008, ACM, 978-1-60558-303-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
cctv video, crime detection, security, multimedia, video quality, frame rate, task performance |
45 | Ian Brown, B. Laurie |
Security Against Compelled Disclosure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA, pp. 2-10, 2000, IEEE Computer Society, 0-7695-0859-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
compelled disclosure, confidential information, government agencies, national economic security, organised crime, information assets, ethics, security of data, data security, data privacy, telecommunication security, legislation, legislation, organisations, computer crime, communication security |
44 | Benjamin P. Turnbull, Robert Taylor, Barry Blundell |
The Anatomy of Electronic Evidence - Quantitative Analysis of Police E-Crime Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Forth International Conference on Availability, Reliability and Security, ARES 2009, March 16-19, 2009, Fukuoka, Japan, pp. 143-149, 2009, IEEE Computer Society, 978-1-4244-3572-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
44 | Andrea F. Abate, Maria De Marsico, Stefano Levialdi, Vincenzo Mastronardi, Stefano Ricciardi, Genoveffa Tortora |
Gesture Based Interface for Crime Scene Analysis: A Proposal. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (2) ![In: Computational Science and Its Applications - ICCSA 2008, International Conference, Perugia, Italy, June 30 - July 3, 2008, Proceedings, Part II, pp. 143-154, 2008, Springer, 978-3-540-69840-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
44 | Fahim Akhter |
E-Commerce Security: The Categorical Role of Computers in Forensic Online Crime. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI Workshops ![In: Intelligence and Security Informatics, IEEE ISI 2008 International Workshops: PAISI, PACCF, and SOCO 2008, Taipei, Taiwan, June 17, 2008. Proceedings, pp. 298-303, 2008, Springer, 978-3-540-69136-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
44 | Chichao Lu, WenYuan Jen, Weiping Chang |
Trends in Computer Crime and Cybercrime Research During the Period 1974-2006: A Bibliometric Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAISI ![In: Intelligence and Security Informatics, Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007, Proceedings, pp. 244-250, 2007, Springer, 978-3-540-71548-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
44 | Qihong Liu, Changjie Tang, Shaojie Qiao, Qiwei Liu, Fenlian Wen |
Mining the Core Member of Terrorist Crime Group Based on Social Network Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAISI ![In: Intelligence and Security Informatics, Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007, Proceedings, pp. 311-313, 2007, Springer, 978-3-540-71548-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
44 | Wenjun Wang 0002, Wei Guo, Yingwei Luo, Xiaolin Wang 0001, Zhuoqun Xu |
The Study and Application of Crime Emergency Ontology Event Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (4) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 9th International Conference, KES 2005, Melbourne, Australia, September 14-16, 2005, Proceedings, Part IV, pp. 806-812, 2005, Springer, 3-540-28897-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Horacio Saggion, Katerina Pastra, Yorick Wilks |
Using Natural Language Processing for Semantic Indexing of Scene-of-Crime Photographs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICLing ![In: Computational Linguistics and Intelligent Text Processing, 4th International Conference, CICLing 2003, Mexico City, Mexico, February 16-22, 2003, Proceedings, pp. 526-536, 2003, Springer, 3-540-00532-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
43 | Himanshu Maheshwari, Harvey S. Hyman, Manish Agrawal |
A Comparison of Cyber-Crime Definitions in India and the United States. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security, Cyber Crime and Cyber Forensics ![In: Cyber Security, Cyber Crime and Cyber Forensics - Applications and Perspectives., pp. 33-45, 2011, IGI Global, 978-1-60960-123-2. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
42 | Giles Oatley, Brian Ewart, John Zeleznikow |
Decision support systems for police: Lessons from the application of data mining techniques to "soft" forensic evidence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Artif. Intell. Law ![In: Artif. Intell. Law 14(1-2), pp. 35-100, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
data mining, prediction, decision support systems, matching |
42 | Kamal Dahbur, Thomas Muscarello |
Classification System for Serial Criminal Patterns. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Artif. Intell. Law ![In: Artif. Intell. Law 11(4), pp. 251-269, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
data mining, neural networks, pattern classification |
42 | Richard W. Rahn |
Why the War on Money Laundering Should Be Aborted. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography, 5th International Conference, FC 2001, Grand Cayman, British West Indies, February 19-22, 2002, Proceedings, pp. 140-146, 2001, Springer, 3-540-44079-8. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP BibTeX RDF |
|
40 | Robert Codd-Downey, Michael Jenkin |
Crime scene robot and sensor simulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VRST ![In: Proceedings of the ACM Symposium on Virtual Reality Software and Technology, VRST 2009, Kyoto, Japan, November 18-20, 2009, pp. 231-232, 2009, ACM, 978-1-60558-869-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
bomb disposal simulation, crime scene simulation, virtual reality |
40 | Yungchang Ku, Ying-Chieh Chen, Kuo-Ching Wu, Chaochang Chiu |
An Empirical Analysis of Online Gaming Crime Characteristics from 2002 to 2004. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAISI ![In: Intelligence and Security Informatics, Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007, Proceedings, pp. 34-45, 2007, Springer, 978-3-540-71548-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
online gaming crime, virtual property, MMORPG, cybercrime |
40 | Simon Gibson, Toby Howard |
Interactive reconstruction of virtual environments from photographs, with application to scene-of-crime analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VRST ![In: Proceedings of the ACM Symposium on Virtual Reality Software and Technology, VRST 2000, Seoul, South Korea, October 22-25, 2000., pp. 41-48, 2000, ACM, 1-58113-316-2. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
Scene of Crime Reconstruction, Virtual Reality, Computer Vision, Texture, Model Building, Photogrammetry |
38 | Richard Bache, Fabio Crestani, David Canter, Donna Youngs |
A Language Modelling Approach to Linking Criminal Styles with Offender Characteristics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NLDB ![In: Natural Language and Information Systems, 13th International Conference on Applications of Natural Language to Information Systems, NLDB 2008, London, UK, June 24-27, 2008, Proceedings, pp. 257-268, 2008, Springer, 978-3-540-69857-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Crime Data, Investigative Psychology, Offender Profiling, Language Models, Text Data Mining |
38 | Yungchang Ku, Saurabh Gupta |
Online Gaming Perpetrators Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI Workshops ![In: Intelligence and Security Informatics, IEEE ISI 2008 International Workshops: PAISI, PACCF, and SOCO 2008, Taipei, Taiwan, June 17, 2008. Proceedings, pp. 428-433, 2008, Springer, 978-3-540-69136-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
online gaming crime, virtual property, perpetrators model |
38 | Da-Yu Kao, Shiuh-Jeng Wang, Frank Fu-Yuan Huang |
Digitized Forensic Investigation at P2P Copyright Controversy, Infringement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: Intelligence and Security Informatics, IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006, Proceedings, pp. 644-646, 2006, Springer, 3-540-34478-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
P2P Model, Copyright Protection, Digital Content, Forensic Analysis, Cyber-crime |
38 | Jennifer Jie Xu 0001, Hsinchun Chen |
CrimeNet explorer: a framework for criminal network knowledge discovery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. ![In: ACM Trans. Inf. Syst. 23(2), pp. 201-226, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
complete-link algorithm, crime investigation, clustering, visualization, knowledge discovery, social network analysis, multidimensional scaling, Law enforcement, concept space, precision and recall |
38 | Federico Mara, Valerio Cutini |
Modelling Crime Dynamics and Risky Places: A Basic Combination of Crime Theories and Space Syntax to Evaluate Spatial Crime Impedance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (Workshops 7) ![In: Computational Science and Its Applications - ICCSA 2023 Workshops - Athens, Greece, July 3-6, 2023, Proceedings, Part VII, pp. 227-243, 2023, Springer, 978-3-031-37122-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
38 | Muzammil Khan, Azmat Ali, Yasser Obaid Alharbi |
Predicting and Preventing Crime: A Crime Prediction Model Using San Francisco Crime Data by Classification Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Complex. ![In: Complex. 2022, pp. 4830411:1-4830411:13, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
38 | Brett Drury, Samuel Morais Drury, Md. Arafatur Rahman, Ihsan Ullah 0002 |
A social network of crime: A review of the use of social networks for crime and the detection of crime. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Online Soc. Networks Media ![In: Online Soc. Networks Media 30, pp. 100211, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
38 | Chris Baber, Mark Butler |
Expertise in Crime Scene Examination: Comparing Search Strategies of Expert and Novice Crime Scene Examiners in Simulated Crime Scenes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Hum. Factors ![In: Hum. Factors 54(3), pp. 413-424, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
38 | Ed Gabrys |
The International Dimensions of Cyber-Crime, Part 2: A Look at the Council of Europe's Cyber-Crime Convention and the Need for an International Regime to Fight Cyber-Crime. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Secur. J. A Glob. Perspect. ![In: Inf. Secur. J. A Glob. Perspect. 11(5), pp. 24-32, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
38 | Irini E. Vassilaki |
Multimedia crime: Multimedia crime - Emergence, phenomena and legal questions of "metacomputer crime". ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Law Secur. Rev. ![In: Comput. Law Secur. Rev. 13(3), pp. 158-162, 1997. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
34 | David Dittrich, Michael D. Bailey, Sven Dietrich |
Building an Active Computer Security Ethics Community. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 9(4), pp. 32-40, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
NONE, K.4.1.a Abuse and crime involving computers, K.4.1.c Ethics, K.4.1.g Regulation, K.4.2.a Abuse and crime involving computers, K.7.4.a Codes of ethics, K.7.4.c Ethical dilemmas, K.7.m.b Ethics |
34 | Hsinchun Chen, Homa Atabakhsh, Chunju Tseng, Byron Marshall, Siddharth Kaza, Shauna Eggers, Hemanth Gowda, Ankit Shah, Tim Petersen, Chuck Violette |
Visualization in law enforcement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI Extended Abstracts ![In: Extended Abstracts Proceedings of the 2005 Conference on Human Factors in Computing Systems, CHI 2005, Portland, Oregon, USA, April 2-7, 2005, pp. 1268-1271, 2005, ACM, 1-59593-002-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
crime analysis, crime network, spatial and temporal visualization, social network analysis, law enforcement, association network |
34 | Tibor Bosse, Charlotte Gerritsen, Mark Hoogendoorn, S. Waqar Jaffry, Jan Treur |
Comparison of Agent-Based and Population-Based Simulations of Displacement of Crime. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAT ![In: Proceedings of the 2008 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, Sydney, NSW, Australia, December 9-12, 2008, pp. 469-476, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
34 | Patrick S. Chen, Cheng-Yu Hung, Chiao-Hsin Ko, Ying-Chieh Chen |
Preservation of Evidence in Case of Online Gaming Crime. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI Workshops ![In: Intelligence and Security Informatics, IEEE ISI 2008 International Workshops: PAISI, PACCF, and SOCO 2008, Taipei, Taiwan, June 17, 2008. Proceedings, pp. 229-244, 2008, Springer, 978-3-540-69136-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
virtual property, Virtual Property Description Language, online gaming, digital evidence |
34 | Shaojie Qiao, Changjie Tang, Huidong Jin 0001, Shucheng Dai, Xingshu Chen |
Constrained k-closest pairs query processing based on growing window in crime databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: IEEE International Conference on Intelligence and Security Informatics, ISI 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings, pp. 58-63, 2008, IEEE, 978-1-4244-2414-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
34 | Peter Phillips 0001, Ickjai Lee |
Mining Positive Associations of Urban Criminal Activities Using Hierarchical Crime Hot Spots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISI ![In: Intelligence and Security Informatics, International Workshop, WISI 2006, Singapore, April 9, 2006, Proceedings, pp. 127-132, 2006, Springer, 3-540-33361-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
34 | Alicia Iriberri, Gondy Leroy, Nathan Garrett |
Reporting On-Campus Crime Online: User Intention to Use. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), CD-ROM / Abstracts Proceedings, 4-7 January 2006, Kauai, HI, USA, 2006, IEEE Computer Society, 0-7695-2507-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
34 | John Zeleznikow, Giles Oatley, Richard Leary |
A Methodology for Constructing Decision Support Systems for Crime Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (4) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 9th International Conference, KES 2005, Melbourne, Australia, September 14-16, 2005, Proceedings, Part IV, pp. 823-829, 2005, Springer, 3-540-28897-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
34 | Jennifer Schroeder, Jennifer Jie Xu 0001, Hsinchun Chen |
CrimeLink Explorer: Using Domain Knowledge to Facilitate Automated Crime Association Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: Intelligence and Security Informatics, First NSF/NIJ Symposium, ISI 2003, Tucson, AZ, USA, June 2-3, 2003, Proceedings, pp. 168-180, 2003, Springer, 3-540-40189-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
34 | Yifei Xue, Donald E. Brown |
Decision Based Spatial Analysis of Crime. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: Intelligence and Security Informatics, First NSF/NIJ Symposium, ISI 2003, Tucson, AZ, USA, June 2-3, 2003, Proceedings, pp. 153-167, 2003, Springer, 3-540-40189-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Spatial choice, preference specification, feature selection, model-based clustering |
34 | Hsinchun Chen |
From Digital Library to Digital Government: A Case Study in Crime Data Mapping and Mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICADL ![In: Digital Libraries: People, Knowledge, and Technology, 5th International Conference on Asian Digital Libraries, ICADL 2002 Singapore, December 11-14, 2002, Proceedings, pp. 36-52, 2002, Springer, 3-540-00261-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
34 | Jonathan Corcoran, Ian D. Wilson, Owen M. Lewis, J. Andrew Ware |
Data Clustering and Rule Abduction to Facilitate Crime Hot Spot Prediction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Fuzzy Days ![In: Computational Intelligence, Theory and Applications, International Conference, 7th Fuzzy Days, Dortmund, Germany, October 1-3, 2001, Proceedings, pp. 807-821, 2001, Springer, 3-540-42732-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
31 | Pei-Hua Yen, Chung-Huang Yang, Tae-Nam Ahn |
Design and implementation of a live-analysis digital forensic system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICHIT ![In: Proceedings of the 2009 International Conference on Hybrid Information Technology, ICHIT 2009, Daejeon, Korea, August 27-29, 2009, pp. 239-243, 2009, ACM, 978-1-60558-662-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
live DVD/USB, digital forensics, digital evidences, live-analysis |
31 | Peter Phillips 0001, Ickjai Lee |
Criminal Cross Correlation Mining and Visualization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAISI ![In: Intelligence and Security Informatics, Pacific Asia Workshop, PAISI 2009, Bangkok, Thailand, April 27, 2009. Proceedings, pp. 2-13, 2009, Springer, 978-3-642-01392-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
31 | Maria Pavlou, Nigel M. Allinson |
LS Footwear Database - Evaluating Automated Footwear Pattern Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICANN (2) ![In: Artificial Neural Networks - ICANN 2009, 19th International Conference, Limassol, Cyprus, September 14-17, 2009, Proceedings, Part II, pp. 445-454, 2009, Springer, 978-3-642-04276-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
31 | C. Corzo, F. Corzo S., Ning Zhang 0001, Andy Carpenter |
Using Automated Banking Certificates to Detect Unauthorised Financial Transactions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 10th International Conference, FC 2006, Anguilla, British West Indies, February 27-March 2, 2006, Revised Selected Papers, pp. 36-51, 2006, Springer, 3-540-46255-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
financial fraud, Data integrity, Security architecture, Insider threats |
31 | Khurshid Ahmad 0001, Bogdan Vrusias, Meng Zhu |
Visualising an Image Collection? ![Search on Bibsonomy](Pics/bibsonomy.png) |
IV ![In: 9th International Conference on Information Visualisation, IV 2005, 6-8 July 2005, London, UK, pp. 268-274, 2005, IEEE Computer Society, 0-7695-2397-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
31 | Kam-Pui Chow, C. F. Chong, Pierre K. Y. Lai, Lucas Chi Kwong Hui, Kevin K. H. Pun, Wai Wan Tsang, H. W. Chan |
Digital Evidence Search Kit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SADFE ![In: First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2005), 7-10 November 2005, Taipei, Taiwan, pp. 187-194, 2005, IEEE Computer Society, 0-7695-2478-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
31 | Michael Redmond, Cynthia Blackburn Line |
Empirical Analysis of Case-Based Reasoning and Other Prediction Methods in a Social Science Domain: Repeat Criminal Victimization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCBR ![In: Case-Based Reasoning Research and Development, 5th International Conference on Case-Based Reasoning, ICCBR 2003, Trondheim, Norway, June 23-26, 2003, Proceedings, pp. 452-464, 2003, Springer, 3-540-40433-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
31 | Jennifer Jie Xu 0001, Hsinchun Chen |
Untangling Criminal Networks: A Case Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: Intelligence and Security Informatics, First NSF/NIJ Symposium, ISI 2003, Tucson, AZ, USA, June 2-3, 2003, Proceedings, pp. 232-248, 2003, Springer, 3-540-40189-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
31 | Mathew Nicho, Maha Alblooki, Saeed AlMutiwei, Christopher D. McDermott, Olufemi Ilesanmi |
A Crime Scene Reconstruction for Digital Forensic Analysis: An SUV Case Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Digit. Crime Forensics ![In: Int. J. Digit. Crime Forensics 15(1), pp. 1-20, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
31 | Prathap Rudra Boppuru, Ramesha Kenchappa |
Spatio-Temporal Crime Analysis Using KDE and ARIMA Models in the Indian Context. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Digit. Crime Forensics ![In: Int. J. Digit. Crime Forensics 12(4), pp. 1-19, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
31 | Zhi Jun Liu |
A Cyber Crime Investigation Model Based on Case Characteristics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Digit. Crime Forensics ![In: Int. J. Digit. Crime Forensics 9(4), pp. 40-47, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
31 | M. Sindhu, S. Kumar Sajan, M. Sethumadhavan 0001 |
Error Linear Complexity Measures of Binary Multisequences. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security, Cyber Crime and Cyber Forensics ![In: Cyber Security, Cyber Crime and Cyber Forensics - Applications and Perspectives., pp. 240-249, 2011, IGI Global, 978-1-60960-123-2. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
31 | N. V. Narendra Kumar, Harshit J. Shah, R. K. Shyamasundar |
Towards Checking Tampering of Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security, Cyber Crime and Cyber Forensics ![In: Cyber Security, Cyber Crime and Cyber Forensics - Applications and Perspectives., pp. 204-219, 2011, IGI Global, 978-1-60960-123-2. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
31 | Asoke K. Talukder |
Securing Next Generation Internet Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security, Cyber Crime and Cyber Forensics ![In: Cyber Security, Cyber Crime and Cyber Forensics - Applications and Perspectives., pp. 87-105, 2011, IGI Global, 978-1-60960-123-2. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
31 | N. Harini, C. K. Shyamala, T. R. Padmanabhan |
Securing Cloud Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security, Cyber Crime and Cyber Forensics ![In: Cyber Security, Cyber Crime and Cyber Forensics - Applications and Perspectives., pp. 115-123, 2011, IGI Global, 978-1-60960-123-2. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
31 | Rajbir Kaur, Manoj Singh Gaur, P. Lalith Suresh, Vijay Laxmi |
DoS Attacks in MANETs: Detection and Countermeasures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security, Cyber Crime and Cyber Forensics ![In: Cyber Security, Cyber Crime and Cyber Forensics - Applications and Perspectives., pp. 124-145, 2011, IGI Global, 978-1-60960-123-2. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
31 | Divya Shankar, Manish Agrawal, H. Raghav Rao |
Emergency Response to Mumbai Terror Attacks: An Activity Theory Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security, Cyber Crime and Cyber Forensics ![In: Cyber Security, Cyber Crime and Cyber Forensics - Applications and Perspectives., pp. 46-58, 2011, IGI Global, 978-1-60960-123-2. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
31 | Narayanankutty Karuppath, P. Achuthan |
Einstein-Podolsky-Rosen Paradox and Certain Aspects of Quantum Cryptology with Some Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security, Cyber Crime and Cyber Forensics ![In: Cyber Security, Cyber Crime and Cyber Forensics - Applications and Perspectives., pp. 231-239, 2011, IGI Global, 978-1-60960-123-2. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
31 | Kenneth J. Giuliani, V. Kumar Murty |
An Examination of Identity Management Models in an Internet Setting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security, Cyber Crime and Cyber Forensics ![In: Cyber Security, Cyber Crime and Cyber Forensics - Applications and Perspectives., pp. 106-114, 2011, IGI Global, 978-1-60960-123-2. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
31 | C. Warren Axelrod, Sukumar Haldar |
Combined Impact of Outsourcing and Hard Times on BPO Risk and Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security, Cyber Crime and Cyber Forensics ![In: Cyber Security, Cyber Crime and Cyber Forensics - Applications and Perspectives., pp. 24-32, 2011, IGI Global, 978-1-60960-123-2. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
31 | Charulata Chaudhary, Ishupal Singh Kang |
Pirates of the Copyright and Cyberspace: Issues Involved. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security, Cyber Crime and Cyber Forensics ![In: Cyber Security, Cyber Crime and Cyber Forensics - Applications and Perspectives., pp. 59-68, 2011, IGI Global, 978-1-60960-123-2. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
31 | Chungath Srinivasan, K. V. Lakshmy, Madathil Sethumadhavan |
Complexity Measures of Cryptographically Secure Boolean Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security, Cyber Crime and Cyber Forensics ![In: Cyber Security, Cyber Crime and Cyber Forensics - Applications and Perspectives., pp. 220-230, 2011, IGI Global, 978-1-60960-123-2. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
31 | P. Vinod 0001, Vijay Laxmi, Manoj Singh Gaur |
Metamorphic Malware Analysis and Detection Methods. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security, Cyber Crime and Cyber Forensics ![In: Cyber Security, Cyber Crime and Cyber Forensics - Applications and Perspectives., pp. 178-202, 2011, IGI Global, 978-1-60960-123-2. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
31 | Rajarshi Chakraborty, Haricharan Rengamani, Ponnurangam Kumaraguru, H. Raghav Rao |
The UID Project: Lessons Learned from the West and Challenges Identified for India. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security, Cyber Crime and Cyber Forensics ![In: Cyber Security, Cyber Crime and Cyber Forensics - Applications and Perspectives., pp. 1-23, 2011, IGI Global, 978-1-60960-123-2. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
31 | P. P. Amritha, T. Gireesh Kumar |
A Survey on Digital Image Steganographic Methods. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security, Cyber Crime and Cyber Forensics ![In: Cyber Security, Cyber Crime and Cyber Forensics - Applications and Perspectives., pp. 250-258, 2011, IGI Global, 978-1-60960-123-2. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
31 | S. Sajan Kumar, M. Hari Krishna Prasad, Suresh Raju Pilli |
Extended Time Machine Design using Reconfigurable Computing for Efficient Recording and Retrieval of Gigabit Network Traffic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security, Cyber Crime and Cyber Forensics ![In: Cyber Security, Cyber Crime and Cyber Forensics - Applications and Perspectives., pp. 168-177, 2011, IGI Global, 978-1-60960-123-2. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 3065 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|