The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Terrorism with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1982-2002 (39) 2003 (20) 2004 (25) 2005 (50) 2006 (65) 2007 (50) 2008 (40) 2009 (21) 2010 (18) 2011 (24) 2012 (18) 2013 (16) 2014-2015 (45) 2016 (18) 2017 (15) 2018 (21) 2019 (37) 2020 (25) 2021 (23) 2022 (22) 2023 (19) 2024 (3)
Publication types (Num. hits)
article(263) book(2) incollection(58) inproceedings(289) phdthesis(2)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 236 occurrences of 179 keywords

Results
Found 614 publication records. Showing 614 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
116Avishag Gordon Homeland security literature in relation to terrorism publications: The source and the response. Search on Bibsonomy Scientometrics The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
96Steven R. Haynes, Thomas George Kannampallil, Mark A. Cohen, Andrey Soares, Frank E. Ritter Rampart: A Service and Agent-Based Architecture for Anti-Terrorism Planning and Resource Allocation. Search on Bibsonomy EuroISI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Anti-terrorism planning, anti-terrorism resource allocation, service-oriented architectures, intelligent agents
92Edna Reid, Hsinchun Chen Mapping the Contemporary Terrorism Research Domain: Researchers, Publications, and Institutions Analysis. Search on Bibsonomy ISI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
79Fu Lee Wang, Christopher C. Yang, Xiaodong Shi Multi-document Summarization for Terrorism Information Extraction. Search on Bibsonomy ISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
79Abu Md. Zafor Alam, Abu Md. Siddique Alam, Mahjabeen Khan Terrorist Organizations and Effects of Terrorism in Bangladesh. Search on Bibsonomy ISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
75Hsinchun Chen Exploring Extremism and Terrorism on the Web: The Dark Web Project. Search on Bibsonomy PAISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF terrorism informatics, dark web, intelligence and security informatics
67Avishag Gordon Transient and continuant authors in a research field: The case of terrorism. Search on Bibsonomy Scientometrics The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
67JinKyu Lee 0003, H. Raghav Rao Understanding Socio-Technical Environments for Acceptance of Inter-Agency Anti/Counter-Terrorism Information Sharing Systems. Search on Bibsonomy HICSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
67Laura Dugan, Gary LaFree, Heather Fogg A First Look at Domestic and International Global Terrorism Events, 1970-1997. Search on Bibsonomy ISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
67Avishag Gordon The peripheral terrorism literature: Bringing it closer to the core. Search on Bibsonomy Scientometrics The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
67Sundri K. Khalsa Forecasting Terrorism: Indicators and Proven Analytic Techniques. Search on Bibsonomy ISI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
63Aixin Sun, Myo-Myo Naing, Ee-Peng Lim, Wai Lam Using Support Vector Machines for Terrorism Information Extraction. Search on Bibsonomy ISI The full citation details ... 2003 DBLP  DOI  BibTeX  RDF terrorism-related knowledge discovery, Information extraction
62Mitko Bogdanoski, Aleksandar Risteski, Marjan Bogdanoski Steganography in Support of the Global Terrorism. Search on Bibsonomy Terrorist Use of Cyberspace and Cyber Terrorism The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
62Nancy Houston How Human Issues Impact Confronting Cyber Terrorism. Search on Bibsonomy Terrorist Use of Cyberspace and Cyber Terrorism The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
62Krishna R. Pattipati, Peter Willett 0001, Jefferey Allanach, Haiying Tu, Satnam Singh Hidden Markov Models and Bayesian Networks for Counter-Terrorism. Search on Bibsonomy Emergent Information Technologies and Enabling Policies for Counter-Terrorism The full citation details ... 2006 DBLP  BibTeX  RDF
62Mark Lazaroff, David Snowden Anticipatory Models for Counter-Terrorism. Search on Bibsonomy Emergent Information Technologies and Enabling Policies for Counter-Terrorism The full citation details ... 2006 DBLP  BibTeX  RDF
62Paul A. Kogut, Yui Leung, Kathleen Ryan, Linda Gohari, Mieczyslaw M. Kokar, Jerzy Letkowski Applying Semantic Web Reasoning to Counter-Terrorism. Search on Bibsonomy Emergent Information Technologies and Enabling Policies for Counter-Terrorism The full citation details ... 2006 DBLP  BibTeX  RDF
62Aaron B. Frank, Desmond Saunders-Newton Journey from Analysis to Inquiry: Technology and Transformation of Counter-Terrorism Analysis. Search on Bibsonomy Emergent Information Technologies and Enabling Policies for Counter-Terrorism The full citation details ... 2006 DBLP  BibTeX  RDF
62Paul Rosenzweig Privacy and Consequences: Legal and Policy Structures for Implementing New Counter-Terrorism Technologies and Protecting Civil Liberty. Search on Bibsonomy Emergent Information Technologies and Enabling Policies for Counter-Terrorism The full citation details ... 2006 DBLP  BibTeX  RDF
54Dehai Liu Terrorism Root Cause Analysis Based on Subjective Game Model. Search on Bibsonomy WKDD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
54Yu-Ping Fan, Cheng-Wei Chen The performance analysis of anti- terrorism intelligence from Taiwan's Investigation Bureau of the Ministry of Justice. Search on Bibsonomy ISI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
54Zhen Sun, Ee-Peng Lim, Kuiyu Chang, Teng-Kwee Ong, Rohan Kumar Gunaratna Event-Driven Document Selection for Terrorism Information Extraction. Search on Bibsonomy ISI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF document selection, Information extraction
51JinKyu Lee 0003, H. Raghav Rao Exploring the causes and effects of inter-agency information sharing systems adoption in the anti/counter-terrorism and disaster management domains. Search on Bibsonomy DG.O The full citation details ... 2007 DBLP  BibTeX  RDF anti/counter-terrorism, information sharing, disaster management, inter-organizational systems
51H. Raghav Rao, JinKyu Lee 0003 Citizen centric analysis of anti/counter-terrorism e-government services. Search on Bibsonomy DG.O The full citation details ... 2006 DBLP  DOI  BibTeX  RDF anti-/counter-terrorism (ACT), channel choice, source choice, e-government, user acceptance, public safety
51Juan M. Estévez-Tapiador The Emergence of Cyber-Terrorism. Search on Bibsonomy IEEE Distributed Syst. Online The full citation details ... 2004 DBLP  DOI  BibTeX  RDF cyber-terrorism, Black Ice, Dan Verton, critical infrastructure
49Zao Liu Visualizing the intellectual structure in urban studies: A journal co-citation analysis (1992-2002). Search on Bibsonomy Scientometrics The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
47Robert J. Latino The Application of PROACT® RCA to Terrorism/Counter Terrorism Related Events. Search on Bibsonomy ISI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
45Flora S. Tsai, Kap Luk Chan Detecting Cyber Security Threats in Weblogs Using Probabilistic Models. Search on Bibsonomy PAISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF cyber terrorism, data mining, blog, weblog, probabilistic latent semantic analysis, cyber security, cyber crime
45David Mair Conforming to al Qaeda's single narrative - an analysis of al Shabaab's Tweets during the Westgate terrorist attack. Search on Bibsonomy Terrorist Use of Cyberspace and Cyber Terrorism The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
45Metodi Hadji-Janev Southeast European(SEE) States' International Legal Rights And Obligations In The Cyberspace. Search on Bibsonomy Terrorist Use of Cyberspace and Cyber Terrorism The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
45Nancy Houston Cultural Aspects of Information Sharing and Collaboration. Search on Bibsonomy Terrorist Use of Cyberspace and Cyber Terrorism The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
45Stefano Mele The Italian Strategic Response Against Cyber Threats and the Terrorist Use of Cyberspace. Search on Bibsonomy Terrorist Use of Cyberspace and Cyber Terrorism The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
45Ronald S. Bearse Protecting Critical Information Infrastructure from Terrorist Attacks and Other Threats: Strategic Challenges for NATO and its Partner Countries. Search on Bibsonomy Terrorist Use of Cyberspace and Cyber Terrorism The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
45Alan Brill The Use of Internet Technology by Cyber Terrorists & Cyber Criminals: The 2014 Report. Search on Bibsonomy Terrorist Use of Cyberspace and Cyber Terrorism The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
45Stuart MacDonald Assessing and Responding to the Cyberterrorism Threat. Search on Bibsonomy Terrorist Use of Cyberspace and Cyber Terrorism The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
45Alan Brill Virtual Currencies and Terrorist Financing: Basics for Anti-Terrorist Professionals. Search on Bibsonomy Terrorist Use of Cyberspace and Cyber Terrorism The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
45Elliot Zweig From Al-Qaeda To The Islamic State (ISIS), Jihadi Groups Engage in Cyber Jihad: Beginning with 1980s Promotion Of Use Of 'Electronic Technologies' Up To Today's Embrace Of Social Media to Attract A New Jihadi Generation. Search on Bibsonomy Terrorist Use of Cyberspace and Cyber Terrorism The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
45Raoul Chiesa Cyber-Attacking a Country: What Terrorists Haven't Done So Far (and they could do). Search on Bibsonomy Terrorist Use of Cyberspace and Cyber Terrorism The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
45Arthur L. Brocato Jr. Tackling Terrorists' Use of the Internet: Propaganda Dispersion & the Threat of Radicalization. Search on Bibsonomy Terrorist Use of Cyberspace and Cyber Terrorism The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
45Ivica Simonovski The Use Of Cyber Space For Terrorist Purposes - With Special Reference To The Financing Terrorist Activity. Search on Bibsonomy Terrorist Use of Cyberspace and Cyber Terrorism The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
45Zlatogor Minchev Human Factor Dual Role in Modern Cyberspace Social Engineering. Search on Bibsonomy Terrorist Use of Cyberspace and Cyber Terrorism The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
45Brian P. Kettler, Gary Edwards, Mark Hoffman Facilitating Information Sharing Across Intelligence Community Boundaries Using Knowledge Management and Semantic Web Technologies. Search on Bibsonomy Emergent Information Technologies and Enabling Policies for Counter-Terrorism The full citation details ... 2006 DBLP  BibTeX  RDF
45Jennifer Golbeck, Aaron Mannes, James A. Hendler Semantic Web Technologies for Terrorist Network Analysis. Search on Bibsonomy Emergent Information Technologies and Enabling Policies for Counter-Terrorism The full citation details ... 2006 DBLP  BibTeX  RDF
45 Legal Standards for Data Mining. Search on Bibsonomy Emergent Information Technologies and Enabling Policies for Counter-Terrorism The full citation details ... 2006 DBLP  BibTeX  RDF
45Janusz Marecki, Nathan Schurr, Milind Tambe Agent-Based Simulations for Disaster Rescue Using the DEFACTO Coordination System. Search on Bibsonomy Emergent Information Technologies and Enabling Policies for Counter-Terrorism The full citation details ... 2006 DBLP  BibTeX  RDF
45Reda A. Ammar, Steven A. Demurjian, Ian R. Greenshields, Krishna R. Pattipati, Sanguthevar Rajasekaran Analysis of Heterogeneous Data in Ultrahigh Dimensions. Search on Bibsonomy Emergent Information Technologies and Enabling Policies for Counter-Terrorism The full citation details ... 2006 DBLP  BibTeX  RDF
45Michael D. McNeese, Isaac Brewer, Rashaad E. T. Jones, Erik S. Connors Supporting Knowledge Management In Emergency Crisis Management Domains: Envisioned Designs for Collaborative Work. Search on Bibsonomy Emergent Information Technologies and Enabling Policies for Counter-Terrorism The full citation details ... 2006 DBLP  BibTeX  RDF
45Seth Greenblatt, Thayne Coffman, Sherry Marcus Behavioral Network Analysis for Terrorist Detection. Search on Bibsonomy Emergent Information Technologies and Enabling Policies for Counter-Terrorism The full citation details ... 2006 DBLP  BibTeX  RDF
45J. Brian Sharkey, Doyle Weishar, John W. Lockwood, Ron Loui, Richard Rohwer, John Byrnes, Krishna R. Pattipati, Stephen G. Eick, David Cousins, Michael Nicoletti Information Processing at Very High Speed Data Ingestion Rates. Search on Bibsonomy Emergent Information Technologies and Enabling Policies for Counter-Terrorism The full citation details ... 2006 DBLP  BibTeX  RDF
45Kim A. Taipale Designing Technical Systems to Support Policy: Enterprise Architecture, Policy Appliances, and Civil Liberties. Search on Bibsonomy Emergent Information Technologies and Enabling Policies for Counter-Terrorism The full citation details ... 2006 DBLP  BibTeX  RDF
45Shuang Sun, Xiaocong Fan, John Yen Sharing Intelligence Using Information Supply Chains. Search on Bibsonomy Emergent Information Technologies and Enabling Policies for Counter-Terrorism The full citation details ... 2006 DBLP  BibTeX  RDF
45Douglas W. Oard Transcending the Tower of Babel: Supporting Access to Multilingual Information with Cross-Language Information Retrieval. Search on Bibsonomy Emergent Information Technologies and Enabling Policies for Counter-Terrorism The full citation details ... 2006 DBLP  BibTeX  RDF
45Jeff Jonas, John Karat Anonymized Semantic Directories and a Privacy-Enhancing Architecture for Enterprise Discovery. Search on Bibsonomy Emergent Information Technologies and Enabling Policies for Counter-Terrorism The full citation details ... 2006 DBLP  BibTeX  RDF
45Tom Mifflin, Chris Boner, Greg Godfrey, Michael Greenblatt Detecting Terrorist Activities in the Twenty-First Century: A Theory of Detection for Transactional Networks. Search on Bibsonomy Emergent Information Technologies and Enabling Policies for Counter-Terrorism The full citation details ... 2006 DBLP  BibTeX  RDF
45Clifford Behrens, Hyong Sop Shim, Devasis Bassu Schemer: Consensus-Based Knowledge Validation and Collaboration Services for Virtual Teams of Intelligence Experts. Search on Bibsonomy Emergent Information Technologies and Enabling Policies for Counter-Terrorism The full citation details ... 2006 DBLP  BibTeX  RDF
45David B. Skillicorn Social Network Analysis Via Matrix Decompositions. Search on Bibsonomy Emergent Information Technologies and Enabling Policies for Counter-Terrorism The full citation details ... 2006 DBLP  BibTeX  RDF
45Nazli Choucri, Stuart E. Madnick, Michael D. Siegel Improving National and Homeland Security Through Context Knowledge Representation and Reasoning Technologies. Search on Bibsonomy Emergent Information Technologies and Enabling Policies for Counter-Terrorism The full citation details ... 2006 DBLP  BibTeX  RDF
45Robert L. Popp, David Allen, Claudio Cioffi-Revilla Utilizing Information and Social Science Technology to Understand and Counter the Twenty-First Century Strategic Threat 1. Search on Bibsonomy Emergent Information Technologies and Enabling Policies for Counter-Terrorism The full citation details ... 2006 DBLP  BibTeX  RDF
42Daniel Zeng 0001, Donghua Wei, Michael Chau, Fei-Yue Wang 0001 Chinese Word Segmentation for Terrorism-Related Contents. Search on Bibsonomy ISI Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Ukkonen algorithm, Lidstone flatness, Mutual information, suffix tree, N-gram, Heuristic rules
42Timothy William Hackworth, Philip C. Treleaven Modelling Terrorism. Search on Bibsonomy ICNSC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
42Daniel Dajun Zeng, Li Zhang, Donghua Wei, Fei-Yue Wang 0001 A Web Portal for Terrorism Activities in China. Search on Bibsonomy PAISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
42Joshua Sinai Combating Terrorism Insurgency Resolution Software: A Research Note. Search on Bibsonomy ISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
42Xiaohua Hu 0001, Xiaodan Zhang, Daniel Duanqing Wu, Xiaohua Zhou, Peter Rumm Integration of Instance-Based Learning and Text Mining for Identification of Potential Virus/Bacterium as Bio-terrorism Weapons. Search on Bibsonomy ISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
42Peter S. Probst Measuring Success in Countering Terrorism: Problems and Pitfalls. Search on Bibsonomy ISI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
42Xiaohua Hu 0001, Illhoi Yoo, Peter Rumm, Michael E. Atwood Mining Candidate Viruses as Potential Bio-terrorism Weapons from Biomedical Literature. Search on Bibsonomy ISI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
42Le Gruenwald, Gary McNutt, Adrien Mercier Using an Ontology to Improve Search in a Terrorism Database System. Search on Bibsonomy DEXA Workshops The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
38Uraiwan Inyaem, Phayung Meesad, Choochart Haruechaiyasak, Dat Tran 0001 Construction of Fuzzy Ontology-Based Terrorism Event Extraction. Search on Bibsonomy WKDD The full citation details ... 2010 DBLP  DOI  BibTeX  RDF terrorism domain, OWL, ontology construction, fuzzy ontology, event extraction
38Phillip Galjano, Vasily Popovich Theoretical Investigation of Terrorism. Ontology Development. Search on Bibsonomy IF&GIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Security, Ontology, Geographic information system, Monitoring system, Terrorism
38James A. Danowski Evaluative Word Locations in Semantic Networks from News Stories about Al Qaeda and Implications for Optimal Communication Messages in Anti-terrorism Campaigns. Search on Bibsonomy EuroISI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Anti-terrorism campaigns, optimal communication messages, emotional words, evaluative words, brain processing, semantic networks, persuasion, fMRI
38In-Jung Kim, Cheol Won Lee, Eul-Gyu Im Changes of Cyber-Terrorism: Autonomous Terrors and Counter-Measures. Search on Bibsonomy ICCSA (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF autogenous terror, cyber terrorism, CERT, ISAC
38Robert P. Schumaker, Hsinchun Chen, Tao Wang, Jerod W. Wilkerson Terror tracker system: a web portal for terrorism research. Search on Bibsonomy JCDL The full citation details ... 2005 DBLP  DOI  BibTeX  RDF news retrieval, security, terrorism
35Daegeon Kim Prediction of terrorism pattern accompanied by cyber-terrorism and the development direction of corresponding legal systems. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
35Jens Edlund, Daniel Brodén, Mats Fridlund, Cecilia Lindhé, Leif-Jöran Olsson, Magnus P. Ängsal, Patrik Öhberg A Multimodal Digital Humanities Study of Terrorism in Swedish Politics: An Interdisciplinary Mixed Methods Project on the Configuration of Terrorism in Parliamentary Debates, Legislation, and Policy Networks 1968-2018. Search on Bibsonomy IntelliSys (2) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
35Linda Markowsky, George Markowsky Lattice-Based Technique to Visualize and Compare Regional Terrorism Using the Global Terrorism Database. Search on Bibsonomy IDAACS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
35Raul Sormani Criticality assessment of terrorism related events at different time scales TENSOR clusTEriNg terroriSm actiOn pRediction. Search on Bibsonomy 2016   RDF
35Maria Rooijakkers, Abdul-Akeem Sadiq Critical infrastructure, terrorism, and the Chemical Facility Anti-Terrorism Standards: the need for collaboration. Search on Bibsonomy Int. J. Crit. Infrastructures The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
35Chris Arney, Zachary Silvis, Matthew Thielen, Jeff Yao Modeling the Complexity of the Terrorism/Counter-Terrorism Struggle: Mathematics of the "Hearts and Minds". Search on Bibsonomy Int. J. Oper. Res. Inf. Syst. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
35Marc Cheong, Vincent C. S. Lee A microblogging-based approach to terrorism informatics: Exploration and chronicling civilian sentiment and response to terrorism events via Twitter. Search on Bibsonomy Inf. Syst. Frontiers The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
35Hai-Cheng Chu, Der-Jiunn Deng, Han-Chieh Chao, Yueh-Min Huang Next Generation of Terrorism: Ubiquitous Cyber Terrorism with the Accumulation of all Intangible Fears. Search on Bibsonomy J. Univers. Comput. Sci. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
35Alvin M. Saperstein Mathematical modeling of the interaction between terrorism and counter-terrorism and its policy implications. Search on Bibsonomy Complex. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
35Edna Reid, Jialun Qin, Wingyan Chung, Jennifer Jie Xu 0001, Yilu Zhou, Robert P. Schumaker, Marc Sageman, Hsinchun Chen Terrorism Knowledge Discovery Project: A Knowledge Discovery Approach to Addressing the Threats of Terrorism. Search on Bibsonomy ISI The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
35Philip Westmacott Anti-Terrorism Legislation - UK: Big Brother never Forgets - The Data Retention Provisions of the Anti-Terrorism, Crime and Security Act 2001. Search on Bibsonomy Comput. Law Secur. Rev. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
33Mariusz Chmielewski, Andrzej Galka, Piotr Jarema, Kamil Krasowski, Artur Kosinski Semantic Knowledge Representation in Terrorist Threat Analysis for Crisis Management Systems. Search on Bibsonomy ICCCI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF counter-terrorism, GTD, ontology, GIS, decision support, crisis management
33Yilu Zhou, Edna Reid, Jialun Qin, Hsinchun Chen, Guanpi Lai US Domestic Extremist Groups on the Web: Link and Content Analysis. Search on Bibsonomy IEEE Intell. Syst. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Dark Web, Web harvesting, Web content analysis, Web link analysis, text mining, decision support systems, Web mining, data visualization, terrorism
33Shenzhi Li, Tianhao Wu 0004, William M. Pottenger Distributed higher order association rule mining using information extracted from textual data. Search on Bibsonomy SIGKDD Explor. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF criminal justice, distributed association rule mining, data mining, machine learning, evaluation, artificial intelligence, text mining, knowledge discovery, association rule mining, privacy-preserving, distributed data mining, law enforcement, terrorism
33Michael A. Caloyannides Is Privacy Really Constraining Security or Is this a Red Herring? Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF security, privacy, spam, terrorism
33Steven R. Johnston Development of a Legal Framework for Intrusion Detection. Search on Bibsonomy RAID The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Anti-terrorism law, criminal law, private communications, privacy, intrusion detection, wiretap, interception
30Yanzhao Li National Information Infrastructure Security and Cyber Terrorism in the Process of Industrializations. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
30Robert P. Schumaker, Ying Liu, Mark Ginsburg, Hsinchun Chen Evaluating the efficacy of a terrorism question/answer system. Search on Bibsonomy Commun. ACM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
30JinKyu Lee 0003, H. Raghav Rao Citizen centric analysis of anti/counter-terrorism e-government services. Search on Bibsonomy DG.O The full citation details ... 2007 DBLP  BibTeX  RDF
30Richard M. Adler A Dynamic Social Network Software Platform for Counter-Terrorism Decision Support. Search on Bibsonomy ISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
30Robert L. Popp, J. C. Poindexter Countering Terrorism through Information and Privacy Protection Technologies. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
30Paul Andrew Watters e-Learning for policing, intelligence and counter-terrorism: Performance. Search on Bibsonomy ICN/ICONS/MCL The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
30Robert G. Ross Measuring Effectiveness of Anti-terrorism Programs Using Performance Logic Models. Search on Bibsonomy ISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
30Annette Sobel The Role of Information Superiority in the Global War on Terrorism. Search on Bibsonomy ISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
30Don Radlauer Rational Choice Deterrence and Israeli Counter-Terrorism. Search on Bibsonomy ISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
30Yael Shahar Connections in the World of International Terrorism. Search on Bibsonomy ISI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
30Robert P. Schumaker, Hsinchun Chen Question Answer TARA: A Terrorism Activity Resource Application. Search on Bibsonomy ISI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
30W. Neville Holmes Terrorism, Technology, and the Profession. Search on Bibsonomy Computer The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
25Yi Zhang, Aixin Sun, Anwitaman Datta, Kuiyu Chang, Ee-Peng Lim Do Wikipedians follow domain experts?: a domain-specific study on Wikipedia knowledge building. Search on Bibsonomy JCDL The full citation details ... 2010 DBLP  DOI  BibTeX  RDF contributing behavior, Wikipedia, knowledge building
Displaying result #1 - #100 of 614 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license