The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for criminal with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1969-1979 (15) 1981-1992 (16) 1993-1996 (16) 1997-1998 (17) 1999 (16) 2000-2001 (15) 2002-2003 (38) 2004 (27) 2005 (45) 2006 (57) 2007 (59) 2008 (59) 2009 (45) 2010 (32) 2011 (28) 2012 (30) 2013 (31) 2014 (30) 2015 (41) 2016 (32) 2017 (53) 2018 (44) 2019 (49) 2020 (79) 2021 (60) 2022 (61) 2023 (76) 2024 (16)
Publication types (Num. hits)
article(430) book(4) incollection(18) inproceedings(624) phdthesis(11)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 349 occurrences of 278 keywords

Results
Found 1087 publication records. Showing 1087 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
101Richard Adderley, Atta Badii, Chaoxin Wu The Automatic Identification and Prioritisation of Criminal Networks from Police Crime Data. Search on Bibsonomy EuroISI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Criminal networks, Criminal intelligence
91Song Lin, Donald E. Brown Criminal Incident Data Association Using the OLAP Technology. Search on Bibsonomy ISI The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Criminal incident association, OLAP, outlier
81Jeroen S. de Bruin, Tim K. Cocx, Walter A. Kosters, Jeroen F. J. Laros, Joost N. Kok Data Mining Approaches to Criminal Career Analysis. Search on Bibsonomy ICDM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
77Robert Willison, Mikko T. Siponen Overcoming the insider: reducing employee computer crime through Situational Crime Prevention. Search on Bibsonomy Commun. ACM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
75F. C. Smith Ethical Responsibilities and Legal Liabilities of Network Security Professionals. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF ethical responsibilities, legal liabilities, network security professionals, tort litigation, unregulated economic environment, public law enforcement, criminal abuses, technical solutions, civil wrongs, individual liberty, group liberty, criminal law, civil law, computer literate lawyers, computer security failures, millennium bug, legal liability, social redress, computer networks, computer networking, morality, network vulnerabilities, Year 2000 problem
70Tim K. Cocx, Walter A. Kosters, Jeroen F. J. Laros An Early Warning System for the Prediction of Criminal Careers. Search on Bibsonomy MICAI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
70Weiping Chang, Chichao Lu, WenYuan Jen A study of integrated criminal justice data base system. Search on Bibsonomy ISI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
70Jennifer Jie Xu 0001, Hsinchun Chen CrimeNet explorer: a framework for criminal network knowledge discovery. Search on Bibsonomy ACM Trans. Inf. Syst. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF complete-link algorithm, crime investigation, clustering, visualization, knowledge discovery, social network analysis, multidimensional scaling, Law enforcement, concept space, precision and recall
70Jennifer Jie Xu 0001, Hsinchun Chen Untangling Criminal Networks: A Case Study. Search on Bibsonomy ISI The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
69Patrick S. Chen Discovering Investigation Clues through Mining Criminal Databases. Search on Bibsonomy Intelligence and Security Informatics The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Criminal Data, Stolen Automobiles, Data Mining, Databases, Data Warehousing
69Tibor Bosse, Charlotte Gerritsen, Jan Treur Cognitive and social simulation of criminal behaviour: the intermittent explosive disorder case. Search on Bibsonomy AAMAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF cognitive simulation, criminal, analysis, social simulation
69Fredrik Sundt Breien, Ingerid Rødseth Usability factors of 3D criminal archive in an augmented reality environment. Search on Bibsonomy NordiCHI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF criminal investigation, usability, augmented reality, computer graphics, tangible user interfaces
68Ray Yeager Criminal computer forensics management. Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF criminal computer forensics, criminal computer forensics management, forensic evidence, standard operating procedures, quality assurance
66Yungchang Ku, Ying-Chieh Chen, Kuo-Ching Wu, Chaochang Chiu An Empirical Analysis of Online Gaming Crime Characteristics from 2002 to 2004. Search on Bibsonomy PAISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF online gaming crime, virtual property, MMORPG, cybercrime
64Uri J. Schild, Ruth Kannai Intelligent Computer Evaluation of Offender'sPrevious Record. Search on Bibsonomy Artif. Intell. Law The full citation details ... 2005 DBLP  DOI  BibTeX  RDF criminal sentencing, previous criminal record, decision support systems
58Heum Park, SunHo Cho, Hyuk-Chul Kwon Cyber Forensics Ontology for Cyber Criminal Investigation. Search on Bibsonomy e-Forensics The full citation details ... 2009 DBLP  DOI  BibTeX  RDF criminal investigation, cyber forensics, ontology, digital evidence, cyber crime
58Steve Sawyer, Michael Tyworth Integrated criminal justice systems: designing effective systems for inter-organizational action. Search on Bibsonomy DG.O The full citation details ... 2005 DBLP  BibTeX  RDF integrated criminal justice, design, mobility, systems, governance
58Siddharth Kaza, Jennifer Jie Xu 0001, Byron Marshall, Hsinchun Chen Topological analysis of criminal activity networks in multiple jurisdictions. Search on Bibsonomy DG.O The full citation details ... 2005 DBLP  BibTeX  RDF criminal networks, topological analysis
55Christopher C. Yang, Xuning Tang Social networks integration and privacy preservation using subgraph generalization. Search on Bibsonomy KDD Workshop on CyberSecurity and Intelligence Informatics The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
55Siddharth Kaza, Yuan Wang, Hsinchun Chen Suspect Vehicle Identification for Border Safety with Modified Mutual Information. Search on Bibsonomy ISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
54Steven R. Johnston Development of a Legal Framework for Intrusion Detection. Search on Bibsonomy RAID The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Anti-terrorism law, criminal law, private communications, privacy, intrusion detection, wiretap, interception
48Travis D. Breaux, Jonathan D. Lewis, Paul N. Otto, Annie I. Antón Identifying vulnerabilities and critical requirements using criminal court proceedings. Search on Bibsonomy SAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
48Byron Marshall Identifying Interesting Networks of Criminal Activity. Search on Bibsonomy Intelligence and Security Informatics The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
48Christopher C. Yang Information sharing and privacy protection of terrorist or criminal social networks. Search on Bibsonomy ISI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
48Patrick S. Chen, K. C. Chang, Tai-Ping Hsing, Shihchieh Chou Mining Criminal Databases to Finding Investigation Clues-By Example of Stolen Automobiles Database. Search on Bibsonomy WISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
48Margaret S. Elliott, John Leslie King A Common Information Space in Criminal Courts: Computer-Supported Cooperative Work (CSCW) Case Management Systems. Search on Bibsonomy HICSS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
48Chao-Lin Liu, Ting-Ming Liao Classifying Criminal Charges in Chinese for Web-Based Legal Services. Search on Bibsonomy APWeb The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
48Kamal Dahbur, Thomas Muscarello Classification System for Serial Criminal Patterns. Search on Bibsonomy Artif. Intell. Law The full citation details ... 2003 DBLP  DOI  BibTeX  RDF data mining, neural networks, pattern classification
47Florian Kerschbaum, Andreas Schaad Privacy-preserving social network analysis for criminal investigations. Search on Bibsonomy WPES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF criminal investigations, privacy, social network analysis, data sharing
47Siddharth Kaza, Daning Hu, Homa Atabakhsh, Hsinchun Chen Predicting criminal relationships using multivariate survival analysis. Search on Bibsonomy DG.O The full citation details ... 2007 DBLP  BibTeX  RDF criminal networks, social network analysis, intelligence and security informatics
47Steve Sawyer, Michael Tyworth Integrated criminal justice: ARJIS case study. Search on Bibsonomy DG.O The full citation details ... 2006 DBLP  DOI  BibTeX  RDF integrated criminal justice systems, organic development, architectures, case study, systems design, institutions, social informatics
44Siddharth Kaza, Hsinchun Chen Suspect Vehicle Identification for Border Safety. Search on Bibsonomy Intelligence and Security Informatics The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
44Subramanian Appavu, Ramasamy Rajaram Association Rule Mining for Suspicious Email Detection: A Data Mining Approach. Search on Bibsonomy ISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
44Siddharth Kaza, Yuan Wang, Hsinchun Chen Target vehicle identification for border safety with modified mutual information. Search on Bibsonomy DG.O The full citation details ... 2006 DBLP  DOI  BibTeX  RDF mutual information, homeland security, intelligence and security informatics
44Hsinchun Chen, Homa Atabakhsh, Chunju Tseng, Byron Marshall, Siddharth Kaza, Shauna Eggers, Hemanth Gowda, Ankit Shah, Tim Petersen, Chuck Violette Visualization in law enforcement. Search on Bibsonomy DG.O The full citation details ... 2005 DBLP  BibTeX  RDF crime analysis, crime network, spatial and temporal visualization, social network analysis, law enforcement, association network
37Amin Milani Fard, Martin Ester Collaborative Mining in Multiple Social Networks Data for Criminal Group Discovery. Search on Bibsonomy CSE (4) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Uwe Glässer, Mona Vajihollahi Computational Modeling of Criminal Activity. Search on Bibsonomy EuroISI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Computational Criminology, Modeling Social Systems, Discrete Event Simulation, Abstract State Machines
37Jörg Preuß, Steven Furnell, Maria Papadaki Considering the potential of criminal profiling to combat hacking. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
37Richard Bache, Fabio Crestani, David Canter, Donna Youngs Mining Police Digital Archives to Link Criminal Styles with Offender Characteristics. Search on Bibsonomy ICADL The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Crime Data, Investigative Psychology, Offender Profiling, Language Models, Document Classification, Text Data Mining
37Michal Choras Intelligent Computing for Automated Biometrics, Criminal and Forensic Applications. Search on Bibsonomy ICIC (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
37Wingyan Chung, G. Alan Wang Profiling and Visualizing Cyber-criminal Activities: A General Framework. Search on Bibsonomy ISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
37Tibor Bosse, Charlotte Gerritsen, Jan Treur Case Analysis of Criminal Behaviour. Search on Bibsonomy IEA/AIE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
37G. Alan Wang, Jennifer Jie Xu 0001, Hsinchun Chen Using Social Contextual Information to Match Criminal Identities. Search on Bibsonomy HICSS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
36Fatih Özgül, Zeki Erdem, Chris Bowerman, Claus Atzenbeck Comparison of Feature-Based Criminal Network Detection Models with k-Core and n-Clique. Search on Bibsonomy ASONAM The full citation details ... 2010 DBLP  DOI  BibTeX  RDF criminal networks, k-core, n-clique, detection
33Hsinchun Chen Homeland Security Data Mining Using Social Network Analysis. Search on Bibsonomy EuroISI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
33Hsinchun Chen Homeland security data mining using social network analysis. Search on Bibsonomy ISI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
33Shiuh-Jeng Wang, Cheng-Hsing Yang Gathering Digital Evidence in Response to Information Security Incidents. Search on Bibsonomy ISI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
33Glenn S. Dardick, Linda K. Lau Interdisciplinary minor in digital forensics, security and law. Search on Bibsonomy SIGITE Conference The full citation details ... 2005 DBLP  DOI  BibTeX  RDF cyberlaw, electronic evidence, curriculum, digital forensics, computer forensics, digital evidence
33Volker Roth 0002, Kai Richter 0002, Rene Freidinger A PIN-entry method resilient against shoulder surfing. Search on Bibsonomy CCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF cognitive trapdoor games, ATM, password, PIN, shoulder surfing
33Marius J. A. Duker, Arno R. Lodder Sentencing and information management: consistency and the particularities of a case. Search on Bibsonomy ICAIL The full citation details ... 1999 DBLP  DOI  BibTeX  RDF procedural legitmatization, sentencing systems, information management, mediating systems
33Eric Simon, Gerry Gaes ASSYST - Computer Support for Guideline Sentencing. Search on Bibsonomy ICAIL The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
32Teng Long, Shaojie Qiao, Changjie Tang, Liangxu Liu, Taiyong Li, Jiang Wu E3TP: A Novel Trajectory Prediction Algorithm in Moving Objects Databases. Search on Bibsonomy PAISI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF criminal tracking analysis, hotspot regions, frequent sequential routes, moving objects databases, trajectory prediction
32Michael Tyworth, Steve Sawyer Organic development: a top-down and bottom-up approach to design of public sector information systems. Search on Bibsonomy DG.O The full citation details ... 2006 DBLP  DOI  BibTeX  RDF emergent design, integrated criminal justice systems, organic design, institutional theory, social informatics
32T. K. Mitre, Adriano B. Huguet, Arnaldo de Albuquerque Araújo, N. S. Andrade An Object-Relational Database Containing Multimedia Data. Search on Bibsonomy SIBGRAPI The full citation details ... 2000 DBLP  DOI  BibTeX  RDF criminal expert reports, multimedia data management, multimedia data storage, security techniques, cryptography, information system, digital signatures, database management system, digital watermarking, multimedia databases, multimedia database, object-relational database
32Yung-Cheng Lee, Chi-Sung Laih On the Key Recovery of the Key Escrow System. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF Key Escrow System, social needs, criminal behavior, public cryptographic functions, encryption standard, cryptography, public key cryptography, protection, key recovery, user privacy
30Monika Simmler, Simone Brunner, Giulia Canova, Kuno Schedler Smart criminal justice: exploring the use of algorithms in the Swiss criminal justice system. Search on Bibsonomy Artif. Intell. Law The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
30Yuanzhe Yang, Li Yang 0015, Lingwei Li, Xiaoxiao Ma 0005, Lei Yu, Chun Zuo DccGraph: Detecting Criminal Communities with Augmented Criminal Network Construction and Graph Neural Network. Search on Bibsonomy IJCNN The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
30Hiroaki Togashi, Yasuaki Koga, Hiroshi Furukawa Criminal Fishing System Based on Wireless Local Area Network Access Points - Can Media Access Control address assist criminal investigation? Search on Bibsonomy CoRR The full citation details ... 2018 DBLP  BibTeX  RDF
30Raúl Silvestre Castillo A Software to Extract Criminal Networks from Unstructured Text in Spanish; the Case of Peruvian Criminal Networks. Search on Bibsonomy COMPLEX NETWORKS (2) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
30Quist-Aphetsi Kester Using Formal Concepts Analysis Techniques in Mining Data from Criminal Databases and Profiling Events Based on Factors to Understand Criminal Environments. Search on Bibsonomy ICCSA (5) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
30Marcelo Damasceno, Jerffeson Teixeira, Gustavo A. L. de Campos A prediction model for criminal levels using socio-criminal data. Search on Bibsonomy Int. J. Electron. Secur. Digit. Forensics The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
30Matthias Bäcker, Gerrit Hornung Data processing by police and criminal justice authorities in Europe - The influence of the Commission's draft on the national police laws and laws of criminal procedure. Search on Bibsonomy Comput. Law Secur. Rev. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
30Bert-Jaap Koops, Anton Vedder Privacy in Criminal Investigations - A Survey: Criminal investigation and privacy: Opinions of citizens. Search on Bibsonomy Comput. Law Secur. Rev. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
26Peter Phillips 0001, Ickjai Lee Criminal Cross Correlation Mining and Visualization. Search on Bibsonomy PAISI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
26Tibor Bosse, Charlotte Gerritsen A Model for Criminal Decision Making Based on Hypothetical Reasoning about the Future. Search on Bibsonomy IEA/AIE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
26Richard Bache, Fabio Crestani, David Canter, Donna Youngs A Language Modelling Approach to Linking Criminal Styles with Offender Characteristics. Search on Bibsonomy NLDB The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Crime Data, Investigative Psychology, Offender Profiling, Language Models, Text Data Mining
26Theresa A. Pardo, J. Ramón Gil-García, G. Brian Burke Governance Structures in Cross-Boundary Information Sharing: Lessons from State and Local Criminal Justice Initiatives. Search on Bibsonomy HICSS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Hamid Tabatabaee Yazdi, Amin Milani Fard, Mohammad R. Akbarzadeh-Totonchi Cooperative criminal face recognition in distributed web environment. Search on Bibsonomy AICCSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Maurício Paletta, Pilar Herrero Cognitive Simulation of Criminal Behaviour in Banking Frauds. Search on Bibsonomy Web Intelligence/IAT Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Yunhua Chen, Yongquan Yu, Bi Zeng, Minghui Wang Application of Granular Computing in Extension Criminal Reconnaissance System. Search on Bibsonomy GrC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Extension logic, Extenics, Extension reasoning, Granular computing
26Tim K. Cocx, Walter A. Kosters A Distance Measure for Determining Similarity Between Criminal Investigations. Search on Bibsonomy ICDM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Byron Marshall, Hsinchun Chen Using Importance Flooding to Identify Interesting Networks of Criminal Activity. Search on Bibsonomy ISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26J. Ramón Gil-García, Carrie A. Schneider, Theresa A. Pardo, Anthony M. Cresswell Interorganizational Information Integration in the Criminal Justice Enterprise: Preliminary Lessons from State and County Initiatives. Search on Bibsonomy HICSS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Gang Wang, Hsinchun Chen, Homa Atabakhsh Automatically detecting deceptive criminal identities. Search on Bibsonomy Commun. ACM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
26Chao-Lin Liu, Tseng-Chung Chang Some Case-Refinement Strategies for Case-Based Criminal Summary Judgments. Search on Bibsonomy ISMIS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
26Mathew Neville Smith, Peter J. H. King Database Support for Exploring Criminal Networks. Search on Bibsonomy ISI The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
26Jau-Hwang Wang, Bill T. Lin, Ching-Chin Shieh, Peter S. Deng Criminal Record Matching Based on the Vector Space Model. Search on Bibsonomy ISI The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
26Roslin V. Hauck, Homa Atabakhsh, Pichai Ongvasith, Harsh Gupta, Hsinchun Chen Using Coplink to Analyze Criminal-Justice Data. Search on Bibsonomy Computer The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
26Mathew Neville Smith, Peter J. H. King Incrementally Visualising Criminal Networks. Search on Bibsonomy IV The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
22Tim K. Cocx, Walter A. Kosters, Jeroen F. J. Laros Temporal Extrapolation within a Static Clustering. Search on Bibsonomy ISMIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Jooyoung Lee Proposal for Efficient Searching and Presentation in Digital Forensics. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Digital Forensics, Presentation, Searching Technique
22Joshua Broadway, Benjamin P. Turnbull, Jill Slay Improving the Analysis of Lawfully Intercepted Network Packet Data Captured for Forensic Analysis. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF lawful interception, packet analysis, network, forensic computing
22Michal Choras Human Lips as Emerging Biometrics Modality. Search on Bibsonomy ICIAR The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Robert S. Gable Electronic Monitoring of Offenders: Can a Wayward Technology Be Redeemed? Search on Bibsonomy PERSUASIVE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Electronic monitoring, offenders, Bluetooth, WiFi, transceivers
22Tibor Bosse, Charlotte Gerritsen, Jan Treur Integration of Biological, Psychological, and Social Aspects in Agent-Based Simulation of a Violent Psychopath. Search on Bibsonomy International Conference on Computational Science (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF violent behaviour, integration of biological, psychological and social aspects, simulation, BDI-models
22Anthony M. Cresswell, Theresa A. Pardo, Shahidul Hassan Assessing capability for justice information sharing. Search on Bibsonomy DG.O The full citation details ... 2007 DBLP  BibTeX  RDF capability assessment, justice information sharing, organizational routines, collaboration, digital government, institutions
22Luis F. Luna-Reyes, David F. Andersen, George P. Richardson, Theresa A. Pardo, Anthony M. Cresswell Emergence of the governance structure for information integration across governmental agencies: a system dynamics approach. Search on Bibsonomy DG.O The full citation details ... 2007 DBLP  BibTeX  RDF simulation, governance, system dynamics
22Rayford B. Vaughn, David A. Dampier Digital Forensics--State of the Science and Foundational Research Activity. Search on Bibsonomy HICSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22David B. Skillicorn Detecting Anomalies in Graphs. Search on Bibsonomy ISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22WenYuan Jen, Weiping Chang, Shihchieh Chou Cybercrime in Taiwan - An Analysis of Suspect Records. Search on Bibsonomy WISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Mark Jyn-Huey Lim, Michael Negnevitsky, Jacky Hartnett E-mail Traffic Analysis Using Visualisation and Decision Trees. Search on Bibsonomy ISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Syed A. Saleem Ethical hacking as a risk management technique. Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF ethical hacker, white hat hacker, network security, information security, computer security, system security
22Hsinchun Chen, Homa Atabakhsh, Jennifer Jie Xu 0001, Alan Gang Wang, Byron Marshall, Siddharth Kaza, Chunju Tseng, Shauna Eggers, Hemanth Gowda, Tim Petersen, Chuck Violette Coplink center: social network analysis and identity deception detection for law enforcement and homeland security intelligence and security informatics: a crime data mining approach to developing border safe research. Search on Bibsonomy DG.O The full citation details ... 2005 DBLP  BibTeX  RDF identity matching, data mining, social network analysis, law enforcement, homeland security
22Lorie M. Liebrock Empirical sensitivity analysis for computational procedures. Search on Bibsonomy Richard Tapia Celebration of Diversity in Computing Conference The full citation details ... 2005 DBLP  DOI  BibTeX  RDF computational sensitivity analysis, stability analysis
22Hsinchun Chen, Wingyan Chung, Jennifer Jie Xu 0001, Gang Wang, Yi Qin, Michael Chau Crime Data Mining: A General Framework and Some Examples. Search on Bibsonomy Computer The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
22Yifei Xue, Donald E. Brown Decision Based Spatial Analysis of Crime. Search on Bibsonomy ISI The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Spatial choice, preference specification, feature selection, model-based clustering
22Michael Roe, Ross J. Anderson, William S. Harbison, T. Mark A. Lomas Government Access to Keys - Panel Discussion. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
22Ian Brown, B. Laurie Security Against Compelled Disclosure. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF compelled disclosure, confidential information, government agencies, national economic security, organised crime, information assets, ethics, security of data, data security, data privacy, telecommunication security, legislation, legislation, organisations, computer crime, communication security
22Laurent Siklóssy, Marc Ayel Datum Discovery. Search on Bibsonomy IDA The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
22Irving J. Chasen Philadelphia justice information system. Search on Bibsonomy AFIPS National Computer Conference The full citation details ... 1976 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 1087 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license