The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for criminals with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1968-2002 (16) 2003-2004 (20) 2005-2006 (23) 2007-2008 (37) 2009 (16) 2010-2013 (15) 2014-2019 (21) 2020-2022 (15) 2023 (3)
Publication types (Num. hits)
article(43) incollection(3) inproceedings(119) phdthesis(1)
Venues (Conferences, Journals, ...)
ISI(11) HICSS(6) IEEE Secur. Priv.(5) SAC(5) ACISP(3) Commun. ACM(3) Financial Cryptography(3) Netw. Secur.(3) AAMAS(2) AMCIS(2) ARES(2) AVSS(2) e-Forensics(2) EUROCRYPT(2) Games(2) ICDCS Workshops(2) More (+10 of total 121)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 135 occurrences of 121 keywords

Results
Found 166 publication records. Showing 166 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
53Leonard Kwan, Pradeep Ray, Greg Stephens Towards a Methodology for Profiling Cyber Criminals. Search on Bibsonomy HICSS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
50Jim A. M. Schiks, Steve G. A. van de Weijer, Eric Rutger Leukfeldt High tech crime, high intellectual crime? Comparing the intellectual capabilities of cybercriminals, traditional criminals and non-criminals. Search on Bibsonomy Comput. Hum. Behav. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
50Chao Zhang 0049, Shahrzad Gholami, Debarun Kar, Arunesh Sinha, Manish Jain, Ripple Goyal, Milind Tambe Keeping Pace with Criminals: An Extended Study of Designing Patrol Allocation against Adaptive Opportunistic Criminals. Search on Bibsonomy Games The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
50Chao Zhang 0049, Arunesh Sinha, Milind Tambe Keeping Pace with Criminals: Designing Patrol Allocation Against Adaptive Opportunistic Criminals. Search on Bibsonomy AAMAS The full citation details ... 2015 DBLP  BibTeX  RDF
42Abdul Nasir Use of ICT: a step towards good governance in developing countries. Search on Bibsonomy ICEGOV The full citation details ... 2007 DBLP  DOI  BibTeX  RDF courts, prisoner, video trial, ICT, good governance
42Jeroen S. de Bruin, Tim K. Cocx, Walter A. Kosters, Jeroen F. J. Laros, Joost N. Kok Data Mining Approaches to Criminal Career Analysis. Search on Bibsonomy ICDM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
39Elias Levy Criminals Become Tech Savvy. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
36John F. Banzhaf When your computer needs a lawyer. Search on Bibsonomy Commun. ACM The full citation details ... 1968 DBLP  DOI  BibTeX  RDF constacts, criminals, evidence copying, income tax, lawyer, liabilty, negligence, record keeping records, slander of credit, standard of care, torts, warrantees, simulation, accounting, regulations, copyrights, evidence, law, patents, legal, copying, guarantees, crime, trade secrets
28Ayaz Khan, Uffe Kock Wiil, Nasrullah Memon Digital Forensics and Crime Investigation: Legal Issues in Prosecution at National Level. Search on Bibsonomy SADFE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Cyber Laws, Electronic Devices, Digital Forensics, Digital Evidence, Forensic Analysis
28Heum Park, SunHo Cho, Hyuk-Chul Kwon Cyber Forensics Ontology for Cyber Criminal Investigation. Search on Bibsonomy e-Forensics The full citation details ... 2009 DBLP  DOI  BibTeX  RDF criminal investigation, cyber forensics, ontology, digital evidence, cyber crime
28Chetan Parampalli, R. Sekar 0001, Rob Johnson A practical mimicry attack against powerful system-call monitors. Search on Bibsonomy AsiaCCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF system-call monitor, intrusion-detection, buffer overflow, memory error, mimicry attack
28Greg Aaron, Katharine A. Bostik, Rod Rasmussen, Edmon Chung Protecting the web: phishing, malware, and other security threats. Search on Bibsonomy WWW The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, dns
28Vasco Furtado, Adriano Melo, André L. V. Coelho, Ronaldo Menezes A crime simulation model based on social networks and swarm intelligence. Search on Bibsonomy SAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF application for law enforcement, social networks, swarm intelligence, multiagent simulation
28Rong Zheng, Yi Qin, Zan Huang, Hsinchun Chen Authorship Analysis in Cybercrime Investigation. Search on Bibsonomy ISI The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
28Jau-Hwang Wang, Bill T. Lin, Ching-Chin Shieh, Peter S. Deng Criminal Record Matching Based on the Vector Space Model. Search on Bibsonomy ISI The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
28Yifei Xue, Donald E. Brown Decision Based Spatial Analysis of Crime. Search on Bibsonomy ISI The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Spatial choice, preference specification, feature selection, model-based clustering
28Anil K. Jain 0001, Sharath Pankanti, Salil Prabhakar, Arun Ross Recent Advances in Fingerprint Verification. Search on Bibsonomy AVBPA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
28Eric R. Verheul, Henk C. A. van Tilborg Binding ElGamal: A Fraud-Detectable Alternative to Key-Escrow Proposals. Search on Bibsonomy EUROCRYPT The full citation details ... 1997 DBLP  DOI  BibTeX  RDF Traceable ElGamal, Key Recovery, Key Escrow, ElGamal
25Joanna Sooknanan, Terence A. R. Seemungal Criminals and their models - a review of epidemiological models describing criminal behaviour. Search on Bibsonomy Appl. Math. Comput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
25Mohamed Fazil Mohamed Firdhous, Walid Elbreiki, Ibrahim Abdullahi, B. H. Sudantha, Rahmat Budiarto WormGPT: A Large Language Model Chatbot for Criminals. Search on Bibsonomy ACIT The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
25Jeongheun Yeon, Jong Ho Jhee, Hyunjung Shin Latent Inter-relation Augment between Crimes and Criminals using Factorization Machines. Search on Bibsonomy BigComp The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
25Olumide Malomo, Shanzhen Gao, Adeyemi A. Adekoya, Ephrem Eyob, Weizheng Gao Cyber-Criminals Metrics Engine for Attack Determination on Web Technologies Platforms. Search on Bibsonomy CSCI The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
25Md. Atiqur Rahman, A. B. M. Alim Al Islam Cri-Astrologer: Predicting Demography of Involved Criminals based on Historical Data. Search on Bibsonomy NSysS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
25Richard Hughes Smart plugs invite cyber criminals into the home. Search on Bibsonomy Netw. Secur. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
25Friedel Bolle Deterrence by Collective Punishment May Work against Criminals but Never against Freedom Fighters. Search on Bibsonomy Games The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
25David B. Skillicorn, Christian Leuprecht Copresence networks: criminals in their environment. Search on Bibsonomy Soc. Netw. Anal. Min. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
25Ninni Ylönen, Matti Rissanen, Antti Ylä-Kujala, Tiina Sinkkonen, Salla Marttonen-Arola, David Baglee, Timo Kärri A web of clues: can ecosystems be profiled similarly to criminals? Search on Bibsonomy Int. J. Netw. Virtual Organisations The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
25Muharman Lubis, Afrizal Rizky Putra Pamungkas, Deden Witarsyah Jacob, Al-Khowarizmi, Arif Ridho Lubis User Experience Design in E-Consultation on General Legal Criminals: The Utilization of Alternative Design. Search on Bibsonomy ICECC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
25Nicksson Ckayo Arrais de Freitas, Ticiana L. Coelho da Silva, José Antônio Fernandes de Macêdo, Luís César M. de Vasconcelos, Francisco C. F. Nunes Junior Crime Monitor: Monitoring Criminals from Trajectory Data. Search on Bibsonomy MDM The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
25Shuyi Wei, Lailong Yang, Xiuxia Zhang Design of the Face Recognition System for Criminals in Taxi Based on Cloud Platform. Search on Bibsonomy ICAIIS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
25Yu-Jun Zheng 0001, Yi-Chen Du, Hai-Feng Ling, Weiguo Sheng, Sheng-Yong Chen Evolutionary Collaborative Human-UAV Search for Escaped Criminals. Search on Bibsonomy IEEE Trans. Evol. Comput. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
25Andrea Tundis, Leon Böck, Victoria Stanilescu, Max Mühlhäuser Experiencing the Detection of Radicalized Criminals on Facebook Social Network and Data-related Issues. Search on Bibsonomy J. Cyber Secur. Mobil. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
25Andrea Tundis, Humayun Kaleem, Max Mühlhäuser Detecting and Tracking Criminals in the Real World through an IoT-Based System. Search on Bibsonomy Sensors The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
25Aleksandra Pawlicka, Michal Choras, Marek Pawlicki Cyberspace threats: not only hackers and criminals. Raising the awareness of selected unusual cyberspace actors - cybersecurity researchers' perspective. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
25Jieun Dokko, Michael Shin, Soo Young Park An Intelligence Criminal Tracker for Industrial Espionage - Applying Digital Data Acquired Onsite to Target Criminals. Search on Bibsonomy ICDF2C The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
25Danish Wadood, Azhar Rauf, Shah Khusro, Shaukat Ali 0002 Identifying key influential parameters of high profile criminals through statistical correlation. Search on Bibsonomy Clust. Comput. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
25Andrea Tundis, Leon Böck, Victoria Stanilescu, Max Mühlhäuser Limits in the data for detecting criminals on social media. Search on Bibsonomy ARES The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
25Hugo L. J. Bijmans, Tim M. Booij, Christian Doerr Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2019 DBLP  BibTeX  RDF
25Youzhi Zhang 0001, Qingyu Guo, Bo An 0001, Long Tran-Thanh, Nicholas R. Jennings Optimal Interdiction of Urban Criminals with the Aid of Real-Time Information. Search on Bibsonomy AAAI The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
25Yajie Su, Hao Lu, Hongzhou Zhang Qualitative Mapping Modeling of Criminals' Sense of Security in Theft Cases. Search on Bibsonomy IEEE BigData The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
25Andrea Tundis, Archit Jain, Gaurav Bhatia, Max Mühlhäuser Similarity Analysis of Criminals on Social Networks: An Example on Twitter. Search on Bibsonomy ICCCN The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
25Yanan Zhao, Mingchu Li, Cheng Guo 0001 Developing Patrol Strategies for the Cooperative Opportunistic Criminals. Search on Bibsonomy ICA3PP (1) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
25Erik Van De Sandt Deviant security: the technical computer security practices of cyber criminals. Search on Bibsonomy 2019   RDF
25Jason R. C. Nurse Cybercrime and You: How Criminals Attack and the Human Factors That They Seek to Exploit. Search on Bibsonomy CoRR The full citation details ... 2018 DBLP  BibTeX  RDF
25Adriana Baltaretu, Craig G. Chambers When criminals blow up... balloons. Associative and combinatorial information in the generation of on-line predictions in language. Search on Bibsonomy CogSci The full citation details ... 2018 DBLP  BibTeX  RDF
25Worawut Yimyam, Thidarat Pinthong, Narumol Chumuang, Mahasak Ketcham Face Detection Criminals through CCTV Cameras. Search on Bibsonomy SITIS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
25Pablo Moriano, Soumya Achar, L. Jean Camp Incompetents, criminals, or spies: Macroeconomic analysis of routing anomalies. Search on Bibsonomy Comput. Secur. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
25Christian Janze Are Cryptocurrencies Criminals Best Friends? Examining the Co-Evolution of Bitcoin and Darknet Markets. Search on Bibsonomy AMCIS The full citation details ... 2017 DBLP  BibTeX  RDF
25Mohammed Alzaabi, Kamal Taha, Thomas Anthony Martin CISRI: A Crime Investigation System Using the Relative Importance of Information Spreaders in Networks Depicting Criminals Communications. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
25Alan Brill The Use of Internet Technology by Cyber Terrorists & Cyber Criminals: The 2014 Report. Search on Bibsonomy Terrorist Use of Cyberspace and Cyber Terrorism The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
25Chao Zhang Modeling, Learning and Defending against Opportunistic Criminals in Urban Areas: (Doctoral Consortium). Search on Bibsonomy AAMAS The full citation details ... 2015 DBLP  BibTeX  RDF
25Mark Lowe Defending against cyber-criminals targeting business websites. Search on Bibsonomy Netw. Secur. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
25Chao Zhang 0049, Albert Xin Jiang, Martin B. Short, P. Jeffrey Brantingham, Milind Tambe Defending Against Opportunistic Criminals: New Game-Theoretic Frameworks and Algorithms. Search on Bibsonomy GameSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
25Changjun Fan, Kaiming Xiao, Bao-Xin Xiu, Guodong Lv A fuzzy clustering algorithm to detect criminals without prior information. Search on Bibsonomy ASONAM The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
25Edwin M. Agwu Cyber Criminals on the Internet Super Highways: A Technical Investigation of Different Shades and Colours within the Nigerian Cyber Space. Search on Bibsonomy Int. J. Online Mark. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
25Gabi Kedma, Mordechai Guri, Tom Sela, Yuval Elovici Analyzing users' web surfing patterns to trace terrorists and criminals. Search on Bibsonomy ISI The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
25Michael A. Zarro, Catherine Hall, Andrea Forte Wedding Dresses and Wanted Criminals: Pinterest.com as an Infrastructure for Repository Building. Search on Bibsonomy ICWSM The full citation details ... 2013 DBLP  BibTeX  RDF
25Roman Beck Interview with Peter Tauber on "Internet Anonymity: Human Right or Protection for Criminals?". Search on Bibsonomy Bus. Inf. Syst. Eng. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
25Kim Barker Cyber Criminals on Trial, by Russell G Smith, Peter Grabosky and Gregor Urbas. Search on Bibsonomy Int. J. Law Inf. Technol. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
25Shah Mahmood, Yvo Desmedt Online Social Networks, a Criminals Multipurpose Toolbox (Poster Abstract). Search on Bibsonomy RAID The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
25Paul Elzinga Can Concepts Reveal Criminals? Search on Bibsonomy ICFCA The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
25Shui Yu 0001, Wanlei Zhou 0001, Wanchun Dou, S. Kami Makki Why it is Hard to Fight against Cyber Criminals? Search on Bibsonomy ICDCS Workshops The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
25Jeff Hudson Weaponised malware: how criminals use digital certificates to cripple your organisation. Search on Bibsonomy Netw. Secur. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
25Anil K. Jain 0001, Brendan Klare Matching Forensic Sketches and Mug Shots to Apprehend Criminals. Search on Bibsonomy Computer The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
25Yaniv Altshuler, Nadav Aharony, Alex Pentland, Yuval Elovici, Manuel Cebrián Stealing Reality: When Criminals Become Data Scientists (or Vice Versa). Search on Bibsonomy IEEE Intell. Syst. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
25Jason Bennett Thatcher, Terry Leap, Ryan T. Wright Old Wine in New Bottles: Investigating how Information Technology is Enabling "Old Criminals" to access "New Venues". Search on Bibsonomy AMCIS The full citation details ... 2010 DBLP  BibTeX  RDF
25Charlie D. Frowd, Peter J. B. Hancock, Vicki Bruce, Alex H. McIntyre, Melanie Pitchford, Rebecca Atkins, Andrew Webster, John Pollard, Beverley Hunt, Emma Price, Sandra Morgan, Adrian Stoica, Romeo Dughila, Sergiu Maftei, Gabriel Sendrea Giving Crime the 'evo': Catching Criminals Using EvoFIT Facial Composites. Search on Bibsonomy EST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
25ZhengYou Xia Fighting criminals: Adaptive inferring and choosing the next investigative objects in the criminal network. Search on Bibsonomy Knowl. Based Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
25Ellen Belcher, Ellen Sexton Digitizing criminals: web delivery of a century on the cheap. Search on Bibsonomy OCLC Syst. Serv. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
25K. S. Kong, E. Y. K. Ng An integrated software tool for detecting criminals using DNA databases. Search on Bibsonomy J. Comput. Methods Sci. Eng. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
25Richard Bache, Fabio Crestani Estimating real-valued characteristics of criminals from their recorded crimes. Search on Bibsonomy CIKM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF crime data, offender profiling, data mining, language modelling, bayesian analysis
25Kamal Dahbur, Thomas Muscarello Systematic Identification of Potential Patterns for Serial Criminals. Search on Bibsonomy Int. J. Comput. Their Appl. The full citation details ... 2004 DBLP  BibTeX  RDF
25Yifei Xue, Donald E. Brown A decision model for spatial site selection by criminals: a foundation for law enforcement decision support. Search on Bibsonomy IEEE Trans. Syst. Man Cybern. Part C The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
25Donald E. Brown, Louise F. Gunderson Using Data Mining to Discover the Preferences of Computer Criminals. Search on Bibsonomy Adv. Comput. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
25Donald E. Brown, Louise F. Gunderson Using clustering to discover the preferences of computer criminals . Search on Bibsonomy IEEE Trans. Syst. Man Cybern. Part A The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
25Donald E. Brown The Regional Crime Analysis Program (ReCAP): a framework for mining data to catch criminals. Search on Bibsonomy SMC The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
25Donn B. Parker Security as the Target of Criminals. Search on Bibsonomy Inf. Secur. J. A Glob. Perspect. The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
25Lawrence F. Young Utopians, Cyberpunks, Players, and Other Computer Criminals: Deterrence and the Law. Search on Bibsonomy Security and Control of Information Technology in Society The full citation details ... 1993 DBLP  BibTeX  RDF
25David Bellin High school hackers: heroes or criminals? Search on Bibsonomy SIGCAS Comput. Soc. The full citation details ... 1985 DBLP  DOI  BibTeX  RDF
25Jay Bloom Becker Who are the computer criminals? Search on Bibsonomy SIGCAS Comput. Soc. The full citation details ... 1982 DBLP  DOI  BibTeX  RDF
14Farkhund Iqbal, Liaquat A. Khan, Benjamin C. M. Fung, Mourad Debbabi e-mail authorship verification for forensic investigation. Search on Bibsonomy SAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF e-mail forensics, stylometric features, classification, regression, cyber crimes
14Robert Willison, Mikko T. Siponen Overcoming the insider: reducing employee computer crime through Situational Crime Prevention. Search on Bibsonomy Commun. ACM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Alexander Gutfraind, Aric A. Hagberg, Feng Pan 0005 Optimal Interdiction of Unreactive Markovian Evaders. Search on Bibsonomy CPAIOR The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14M. Eric Johnson Data Hemorrhages in the Health-Care Sector. Search on Bibsonomy Financial Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Health-care information, data leaks, security, identity theft
14Barbara Endicott-Popovsky, Julia Narvaez, Christian Seifert, Deborah A. Frincke, Lori Ross O'Neil, Chiraag Uday Aval Use of Deception to Improve Client Honeypot Detection of Drive-by-Download Attacks. Search on Bibsonomy HCI (16) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF counter-deception, honeypots, deception, drive-by-downloads, cyber-attacks
14Patrick Perrot, Mathieu Morel, Joseph Razik, Gérard Chollet Vocal Forgery in Forensic Sciences. Search on Bibsonomy e-Forensics The full citation details ... 2009 DBLP  DOI  BibTeX  RDF disguised voices, identification, SVM classifier, voice conversion
14Tossapon Boongoen, Qiang Shen 0001 Intelligent hybrid approach to false identity detection. Search on Bibsonomy ICAIL The full citation details ... 2009 DBLP  DOI  BibTeX  RDF false identity detection, terrorist data, link analysis, hybrid algorithm
14Weider D. Yu, Shruti Nargundkar, Nagapriya Tiruthani PhishCatch - A Phishing Detection Tool. Search on Bibsonomy COMPSAC (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Ali Saglam, Alptekin Temizel Real-Time Adaptive Camera Tamper Detection for Video Surveillance. Search on Bibsonomy AVSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Mazleena Salleh, Teoh Chin Yew Application of 2D Barcode in Hardcopy Document Verification System. Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF hardcopy document, verification, integrity
14Amin Milani Fard, Martin Ester Collaborative Mining in Multiple Social Networks Data for Criminal Group Discovery. Search on Bibsonomy CSE (4) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Robert Koch 0002, Gabi Dreo Fast Learning Neural Network Intrusion Detection System. (PDF / PS) Search on Bibsonomy AIMS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Christian Seifert, Vipul Delwadia, Peter Komisarczuk, David Stirling, Ian Welch Measurement Study on Malicious Web Servers in the .nz Domain. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Svend Rothmann Bonde, Lise Vestergaard Jensen, Emil Sellström, Stephan Suesmann Draw poker. Search on Bibsonomy SIGGRAPH ASIA Animations The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Peter Phillips 0001, Ickjai Lee Criminal Cross Correlation Mining and Visualization. Search on Bibsonomy PAISI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Claude Castelluccia, Mohamed Ali Kâafar, Pere Manils, Daniele Perito Geolocalization of proxied services and its application to fast-flux hidden servers. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2009 DBLP  DOI  BibTeX  RDF fast-flux, hidden servers, geolocalization
14Xiaozheng Zhang 0002, Yongsheng Gao 0001, Maylor K. H. Leung Recognizing Rotated Faces From Frontal and Side Views: An Approach Toward Effective Use of Mugshot Databases. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Jau-Hwang Wang, Tianjun Fu, Hong-Ming Lin, Hsinchun Chen Exploring Gray Web Forums: Analysis and Investigation of Forum-Based Communities in Taiwan. Search on Bibsonomy Intelligence and Security Informatics The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Forum-based Community, Gray Web Forum, Forum Analysis & Investigation, Crime Lead Discovering, Content Analysis
14Zbigniew Gomolka, Tomasz Lewandowski The Biometric Signals Processing. Search on Bibsonomy Computer Recognition Systems 2 The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Chun Wei, Alan P. Sprague, Gary Warner, Anthony Skjellum Mining spam email to identify common origins for forensic application. Search on Bibsonomy SAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF data mining, spam, electronic mail, forensic analysis, cyber crime
Displaying result #1 - #100 of 166 (100 per page; Change: )
Pages: [1][2][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license