Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
116 | Avishag Gordon |
Homeland security literature in relation to terrorism publications: The source and the response. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Scientometrics ![In: Scientometrics 65(1), pp. 55-65, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
96 | Steven R. Haynes, Thomas George Kannampallil, Mark A. Cohen, Andrey Soares, Frank E. Ritter |
Rampart: A Service and Agent-Based Architecture for Anti-Terrorism Planning and Resource Allocation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroISI ![In: Intelligence and Security Informatics, First European Conference, EuroISI 2008, Esbjerg, Denmark, December 3-5, 2008. Proceedings, pp. 260-270, 2008, Springer, 978-3-540-89899-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Anti-terrorism planning, anti-terrorism resource allocation, service-oriented architectures, intelligent agents |
92 | Edna Reid, Hsinchun Chen |
Mapping the Contemporary Terrorism Research Domain: Researchers, Publications, and Institutions Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: Intelligence and Security Informatics, IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, GA, USA, May 19-20, 2005, Proceedings, pp. 322-339, 2005, Springer, 3-540-25999-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
79 | Fu Lee Wang, Christopher C. Yang, Xiaodong Shi |
Multi-document Summarization for Terrorism Information Extraction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: Intelligence and Security Informatics, IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006, Proceedings, pp. 602-608, 2006, Springer, 3-540-34478-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
79 | Abu Md. Zafor Alam, Abu Md. Siddique Alam, Mahjabeen Khan |
Terrorist Organizations and Effects of Terrorism in Bangladesh. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: Intelligence and Security Informatics, IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006, Proceedings, pp. 746-747, 2006, Springer, 3-540-34478-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
75 | Hsinchun Chen |
Exploring Extremism and Terrorism on the Web: The Dark Web Project. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAISI ![In: Intelligence and Security Informatics, Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007, Proceedings, pp. 1-20, 2007, Springer, 978-3-540-71548-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
terrorism informatics, dark web, intelligence and security informatics |
67 | Avishag Gordon |
Transient and continuant authors in a research field: The case of terrorism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Scientometrics ![In: Scientometrics 72(2), pp. 213-224, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
67 | JinKyu Lee 0003, H. Raghav Rao |
Understanding Socio-Technical Environments for Acceptance of Inter-Agency Anti/Counter-Terrorism Information Sharing Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), CD-ROM / Abstracts Proceedings, 3-6 January 2007, Waikoloa, Big Island, HI, USA, pp. 98, 2007, IEEE Computer Society, 0-7695-2755-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
67 | Laura Dugan, Gary LaFree, Heather Fogg |
A First Look at Domestic and International Global Terrorism Events, 1970-1997. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: Intelligence and Security Informatics, IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006, Proceedings, pp. 407-419, 2006, Springer, 3-540-34478-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
67 | Avishag Gordon |
The peripheral terrorism literature: Bringing it closer to the core. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Scientometrics ![In: Scientometrics 62(3), pp. 403-414, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
67 | Sundri K. Khalsa |
Forecasting Terrorism: Indicators and Proven Analytic Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: Intelligence and Security Informatics, IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, GA, USA, May 19-20, 2005, Proceedings, pp. 561-566, 2005, Springer, 3-540-25999-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
63 | Aixin Sun, Myo-Myo Naing, Ee-Peng Lim, Wai Lam |
Using Support Vector Machines for Terrorism Information Extraction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: Intelligence and Security Informatics, First NSF/NIJ Symposium, ISI 2003, Tucson, AZ, USA, June 2-3, 2003, Proceedings, pp. 1-12, 2003, Springer, 3-540-40189-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
terrorism-related knowledge discovery, Information extraction |
62 | Mitko Bogdanoski, Aleksandar Risteski, Marjan Bogdanoski |
Steganography in Support of the Global Terrorism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Terrorist Use of Cyberspace and Cyber Terrorism ![In: Terrorist Use of Cyberspace and Cyber Terrorism: New Challenges and Responses, pp. 15-28, 2015, IOS Press, 978-1-61499-527-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
62 | Nancy Houston |
How Human Issues Impact Confronting Cyber Terrorism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Terrorist Use of Cyberspace and Cyber Terrorism ![In: Terrorist Use of Cyberspace and Cyber Terrorism: New Challenges and Responses, pp. 102-115, 2015, IOS Press, 978-1-61499-527-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
62 | Krishna R. Pattipati, Peter Willett 0001, Jefferey Allanach, Haiying Tu, Satnam Singh |
Hidden Markov Models and Bayesian Networks for Counter-Terrorism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism ![In: Emergent Information Technologies and Enabling Policies for Counter-Terrorism, 2006, Wiley-IEEE Press, 978-0-471-77615-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
62 | Mark Lazaroff, David Snowden |
Anticipatory Models for Counter-Terrorism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism ![In: Emergent Information Technologies and Enabling Policies for Counter-Terrorism, 2006, Wiley-IEEE Press, 978-0-471-77615-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
62 | Paul A. Kogut, Yui Leung, Kathleen Ryan, Linda Gohari, Mieczyslaw M. Kokar, Jerzy Letkowski |
Applying Semantic Web Reasoning to Counter-Terrorism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism ![In: Emergent Information Technologies and Enabling Policies for Counter-Terrorism, 2006, Wiley-IEEE Press, 978-0-471-77615-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
62 | Aaron B. Frank, Desmond Saunders-Newton |
Journey from Analysis to Inquiry: Technology and Transformation of Counter-Terrorism Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism ![In: Emergent Information Technologies and Enabling Policies for Counter-Terrorism, 2006, Wiley-IEEE Press, 978-0-471-77615-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
62 | Paul Rosenzweig |
Privacy and Consequences: Legal and Policy Structures for Implementing New Counter-Terrorism Technologies and Protecting Civil Liberty. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism ![In: Emergent Information Technologies and Enabling Policies for Counter-Terrorism, 2006, Wiley-IEEE Press, 978-0-471-77615-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
54 | Dehai Liu |
Terrorism Root Cause Analysis Based on Subjective Game Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WKDD ![In: Proceedings of the International Workshop on Knowledge Discovery and Data Mining, WKDD 2008, Adelaide, Australia, 23-24 January 2008, pp. 612-617, 2008, IEEE Computer Society, 0-7695-3090-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
54 | Yu-Ping Fan, Cheng-Wei Chen |
The performance analysis of anti- terrorism intelligence from Taiwan's Investigation Bureau of the Ministry of Justice. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: IEEE International Conference on Intelligence and Security Informatics, ISI 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings, pp. 259-260, 2008, IEEE, 978-1-4244-2414-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
54 | Zhen Sun, Ee-Peng Lim, Kuiyu Chang, Teng-Kwee Ong, Rohan Kumar Gunaratna |
Event-Driven Document Selection for Terrorism Information Extraction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: Intelligence and Security Informatics, IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, GA, USA, May 19-20, 2005, Proceedings, pp. 37-48, 2005, Springer, 3-540-25999-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
document selection, Information extraction |
51 | JinKyu Lee 0003, H. Raghav Rao |
Exploring the causes and effects of inter-agency information sharing systems adoption in the anti/counter-terrorism and disaster management domains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DG.O ![In: Proceedings of the 8th Annual International Conference on Digital Government Research, Bridging Disciplines & Domains, DG.O 2007, Philadelphia, Pennsylvania, USA, May 20-23, 2007, pp. 155-163, 2007, Digital Government Research Center, 1-59593-599-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
anti/counter-terrorism, information sharing, disaster management, inter-organizational systems |
51 | H. Raghav Rao, JinKyu Lee 0003 |
Citizen centric analysis of anti/counter-terrorism e-government services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DG.O ![In: Proceedings of the 7th Annual International Conference on Digital Government Research, DG.O 2006, San Diego, California, USA, May 21-24, 2006, pp. 425-426, 2006, Digital Government Research Center. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
anti-/counter-terrorism (ACT), channel choice, source choice, e-government, user acceptance, public safety |
51 | Juan M. Estévez-Tapiador |
The Emergence of Cyber-Terrorism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Distributed Syst. Online ![In: IEEE Distributed Syst. Online 5(10), 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
cyber-terrorism, Black Ice, Dan Verton, critical infrastructure |
49 | Zao Liu |
Visualizing the intellectual structure in urban studies: A journal co-citation analysis (1992-2002). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Scientometrics ![In: Scientometrics 62(3), pp. 385-402, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
47 | Robert J. Latino |
The Application of PROACT® RCA to Terrorism/Counter Terrorism Related Events. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: Intelligence and Security Informatics, IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, GA, USA, May 19-20, 2005, Proceedings, pp. 579-589, 2005, Springer, 3-540-25999-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
45 | Flora S. Tsai, Kap Luk Chan |
Detecting Cyber Security Threats in Weblogs Using Probabilistic Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAISI ![In: Intelligence and Security Informatics, Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007, Proceedings, pp. 46-57, 2007, Springer, 978-3-540-71548-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
cyber terrorism, data mining, blog, weblog, probabilistic latent semantic analysis, cyber security, cyber crime |
45 | David Mair |
Conforming to al Qaeda's single narrative - an analysis of al Shabaab's Tweets during the Westgate terrorist attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Terrorist Use of Cyberspace and Cyber Terrorism ![In: Terrorist Use of Cyberspace and Cyber Terrorism: New Challenges and Responses, pp. 73-85, 2015, IOS Press, 978-1-61499-527-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
45 | Metodi Hadji-Janev |
Southeast European(SEE) States' International Legal Rights And Obligations In The Cyberspace. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Terrorist Use of Cyberspace and Cyber Terrorism ![In: Terrorist Use of Cyberspace and Cyber Terrorism: New Challenges and Responses, pp. 149-160, 2015, IOS Press, 978-1-61499-527-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
45 | Nancy Houston |
Cultural Aspects of Information Sharing and Collaboration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Terrorist Use of Cyberspace and Cyber Terrorism ![In: Terrorist Use of Cyberspace and Cyber Terrorism: New Challenges and Responses, pp. 161-172, 2015, IOS Press, 978-1-61499-527-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
45 | Stefano Mele |
The Italian Strategic Response Against Cyber Threats and the Terrorist Use of Cyberspace. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Terrorist Use of Cyberspace and Cyber Terrorism ![In: Terrorist Use of Cyberspace and Cyber Terrorism: New Challenges and Responses, pp. 183-199, 2015, IOS Press, 978-1-61499-527-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
45 | Ronald S. Bearse |
Protecting Critical Information Infrastructure from Terrorist Attacks and Other Threats: Strategic Challenges for NATO and its Partner Countries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Terrorist Use of Cyberspace and Cyber Terrorism ![In: Terrorist Use of Cyberspace and Cyber Terrorism: New Challenges and Responses, pp. 29-44, 2015, IOS Press, 978-1-61499-527-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
45 | Alan Brill |
The Use of Internet Technology by Cyber Terrorists & Cyber Criminals: The 2014 Report. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Terrorist Use of Cyberspace and Cyber Terrorism ![In: Terrorist Use of Cyberspace and Cyber Terrorism: New Challenges and Responses, pp. 1-14, 2015, IOS Press, 978-1-61499-527-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
45 | Stuart MacDonald |
Assessing and Responding to the Cyberterrorism Threat. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Terrorist Use of Cyberspace and Cyber Terrorism ![In: Terrorist Use of Cyberspace and Cyber Terrorism: New Challenges and Responses, pp. 200-209, 2015, IOS Press, 978-1-61499-527-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
45 | Alan Brill |
Virtual Currencies and Terrorist Financing: Basics for Anti-Terrorist Professionals. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Terrorist Use of Cyberspace and Cyber Terrorism ![In: Terrorist Use of Cyberspace and Cyber Terrorism: New Challenges and Responses, pp. 45-56, 2015, IOS Press, 978-1-61499-527-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
45 | Elliot Zweig |
From Al-Qaeda To The Islamic State (ISIS), Jihadi Groups Engage in Cyber Jihad: Beginning with 1980s Promotion Of Use Of 'Electronic Technologies' Up To Today's Embrace Of Social Media to Attract A New Jihadi Generation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Terrorist Use of Cyberspace and Cyber Terrorism ![In: Terrorist Use of Cyberspace and Cyber Terrorism: New Challenges and Responses, pp. 86-101, 2015, IOS Press, 978-1-61499-527-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
45 | Raoul Chiesa |
Cyber-Attacking a Country: What Terrorists Haven't Done So Far (and they could do). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Terrorist Use of Cyberspace and Cyber Terrorism ![In: Terrorist Use of Cyberspace and Cyber Terrorism: New Challenges and Responses, pp. 173-182, 2015, IOS Press, 978-1-61499-527-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
45 | Arthur L. Brocato Jr. |
Tackling Terrorists' Use of the Internet: Propaganda Dispersion & the Threat of Radicalization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Terrorist Use of Cyberspace and Cyber Terrorism ![In: Terrorist Use of Cyberspace and Cyber Terrorism: New Challenges and Responses, pp. 129-148, 2015, IOS Press, 978-1-61499-527-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
45 | Ivica Simonovski |
The Use Of Cyber Space For Terrorist Purposes - With Special Reference To The Financing Terrorist Activity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Terrorist Use of Cyberspace and Cyber Terrorism ![In: Terrorist Use of Cyberspace and Cyber Terrorism: New Challenges and Responses, pp. 57-72, 2015, IOS Press, 978-1-61499-527-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
45 | Zlatogor Minchev |
Human Factor Dual Role in Modern Cyberspace Social Engineering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Terrorist Use of Cyberspace and Cyber Terrorism ![In: Terrorist Use of Cyberspace and Cyber Terrorism: New Challenges and Responses, pp. 116-128, 2015, IOS Press, 978-1-61499-527-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
45 | Brian P. Kettler, Gary Edwards, Mark Hoffman |
Facilitating Information Sharing Across Intelligence Community Boundaries Using Knowledge Management and Semantic Web Technologies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism ![In: Emergent Information Technologies and Enabling Policies for Counter-Terrorism, 2006, Wiley-IEEE Press, 978-0-471-77615-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
45 | Jennifer Golbeck, Aaron Mannes, James A. Hendler |
Semantic Web Technologies for Terrorist Network Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism ![In: Emergent Information Technologies and Enabling Policies for Counter-Terrorism, 2006, Wiley-IEEE Press, 978-0-471-77615-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
45 | |
Legal Standards for Data Mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism ![In: Emergent Information Technologies and Enabling Policies for Counter-Terrorism, 2006, Wiley-IEEE Press, 978-0-471-77615-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
45 | Janusz Marecki, Nathan Schurr, Milind Tambe |
Agent-Based Simulations for Disaster Rescue Using the DEFACTO Coordination System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism ![In: Emergent Information Technologies and Enabling Policies for Counter-Terrorism, 2006, Wiley-IEEE Press, 978-0-471-77615-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
45 | Reda A. Ammar, Steven A. Demurjian, Ian R. Greenshields, Krishna R. Pattipati, Sanguthevar Rajasekaran |
Analysis of Heterogeneous Data in Ultrahigh Dimensions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism ![In: Emergent Information Technologies and Enabling Policies for Counter-Terrorism, 2006, Wiley-IEEE Press, 978-0-471-77615-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
45 | Michael D. McNeese, Isaac Brewer, Rashaad E. T. Jones, Erik S. Connors |
Supporting Knowledge Management In Emergency Crisis Management Domains: Envisioned Designs for Collaborative Work. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism ![In: Emergent Information Technologies and Enabling Policies for Counter-Terrorism, 2006, Wiley-IEEE Press, 978-0-471-77615-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
45 | Seth Greenblatt, Thayne Coffman, Sherry Marcus |
Behavioral Network Analysis for Terrorist Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism ![In: Emergent Information Technologies and Enabling Policies for Counter-Terrorism, 2006, Wiley-IEEE Press, 978-0-471-77615-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
45 | J. Brian Sharkey, Doyle Weishar, John W. Lockwood, Ron Loui, Richard Rohwer, John Byrnes, Krishna R. Pattipati, Stephen G. Eick, David Cousins, Michael Nicoletti |
Information Processing at Very High Speed Data Ingestion Rates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism ![In: Emergent Information Technologies and Enabling Policies for Counter-Terrorism, 2006, Wiley-IEEE Press, 978-0-471-77615-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
45 | Kim A. Taipale |
Designing Technical Systems to Support Policy: Enterprise Architecture, Policy Appliances, and Civil Liberties. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism ![In: Emergent Information Technologies and Enabling Policies for Counter-Terrorism, 2006, Wiley-IEEE Press, 978-0-471-77615-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
45 | Shuang Sun, Xiaocong Fan, John Yen |
Sharing Intelligence Using Information Supply Chains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism ![In: Emergent Information Technologies and Enabling Policies for Counter-Terrorism, 2006, Wiley-IEEE Press, 978-0-471-77615-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
45 | Douglas W. Oard |
Transcending the Tower of Babel: Supporting Access to Multilingual Information with Cross-Language Information Retrieval. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism ![In: Emergent Information Technologies and Enabling Policies for Counter-Terrorism, 2006, Wiley-IEEE Press, 978-0-471-77615-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
45 | Jeff Jonas, John Karat |
Anonymized Semantic Directories and a Privacy-Enhancing Architecture for Enterprise Discovery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism ![In: Emergent Information Technologies and Enabling Policies for Counter-Terrorism, 2006, Wiley-IEEE Press, 978-0-471-77615-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
45 | Tom Mifflin, Chris Boner, Greg Godfrey, Michael Greenblatt |
Detecting Terrorist Activities in the Twenty-First Century: A Theory of Detection for Transactional Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism ![In: Emergent Information Technologies and Enabling Policies for Counter-Terrorism, 2006, Wiley-IEEE Press, 978-0-471-77615-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
45 | Clifford Behrens, Hyong Sop Shim, Devasis Bassu |
Schemer: Consensus-Based Knowledge Validation and Collaboration Services for Virtual Teams of Intelligence Experts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism ![In: Emergent Information Technologies and Enabling Policies for Counter-Terrorism, 2006, Wiley-IEEE Press, 978-0-471-77615-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
45 | David B. Skillicorn |
Social Network Analysis Via Matrix Decompositions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism ![In: Emergent Information Technologies and Enabling Policies for Counter-Terrorism, 2006, Wiley-IEEE Press, 978-0-471-77615-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
45 | Nazli Choucri, Stuart E. Madnick, Michael D. Siegel |
Improving National and Homeland Security Through Context Knowledge Representation and Reasoning Technologies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism ![In: Emergent Information Technologies and Enabling Policies for Counter-Terrorism, 2006, Wiley-IEEE Press, 978-0-471-77615-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
45 | Robert L. Popp, David Allen, Claudio Cioffi-Revilla |
Utilizing Information and Social Science Technology to Understand and Counter the Twenty-First Century Strategic Threat 1. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism ![In: Emergent Information Technologies and Enabling Policies for Counter-Terrorism, 2006, Wiley-IEEE Press, 978-0-471-77615-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
42 | Daniel Zeng 0001, Donghua Wei, Michael Chau, Fei-Yue Wang 0001 |
Chinese Word Segmentation for Terrorism-Related Contents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI Workshops ![In: Intelligence and Security Informatics, IEEE ISI 2008 International Workshops: PAISI, PACCF, and SOCO 2008, Taipei, Taiwan, June 17, 2008. Proceedings, pp. 1-13, 2008, Springer, 978-3-540-69136-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Ukkonen algorithm, Lidstone flatness, Mutual information, suffix tree, N-gram, Heuristic rules |
42 | Timothy William Hackworth, Philip C. Treleaven |
Modelling Terrorism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNSC ![In: Proceedings of the IEEE International Conference on Networking, Sensing and Control, ICNSC 2007, London, UK, 15-17 April 2007, pp. 255-260, 2007, IEEE, 1-4244-1076-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
42 | Daniel Dajun Zeng, Li Zhang, Donghua Wei, Fei-Yue Wang 0001 |
A Web Portal for Terrorism Activities in China. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAISI ![In: Intelligence and Security Informatics, Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007, Proceedings, pp. 307-308, 2007, Springer, 978-3-540-71548-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
42 | Joshua Sinai |
Combating Terrorism Insurgency Resolution Software: A Research Note. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: Intelligence and Security Informatics, IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006, Proceedings, pp. 401-406, 2006, Springer, 3-540-34478-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
42 | Xiaohua Hu 0001, Xiaodan Zhang, Daniel Duanqing Wu, Xiaohua Zhou, Peter Rumm |
Integration of Instance-Based Learning and Text Mining for Identification of Potential Virus/Bacterium as Bio-terrorism Weapons. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: Intelligence and Security Informatics, IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006, Proceedings, pp. 548-553, 2006, Springer, 3-540-34478-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
42 | Peter S. Probst |
Measuring Success in Countering Terrorism: Problems and Pitfalls. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: Intelligence and Security Informatics, IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, GA, USA, May 19-20, 2005, Proceedings, pp. 316-321, 2005, Springer, 3-540-25999-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
42 | Xiaohua Hu 0001, Illhoi Yoo, Peter Rumm, Michael E. Atwood |
Mining Candidate Viruses as Potential Bio-terrorism Weapons from Biomedical Literature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: Intelligence and Security Informatics, IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, GA, USA, May 19-20, 2005, Proceedings, pp. 60-71, 2005, Springer, 3-540-25999-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
42 | Le Gruenwald, Gary McNutt, Adrien Mercier |
Using an Ontology to Improve Search in a Terrorism Database System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA Workshops ![In: 14th International Workshop on Database and Expert Systems Applications (DEXA'03), September 1-5, 2003, Prague, Czech Republic, pp. 753-757, 2003, IEEE Computer Society, 0-7695-1993-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
38 | Uraiwan Inyaem, Phayung Meesad, Choochart Haruechaiyasak, Dat Tran 0001 |
Construction of Fuzzy Ontology-Based Terrorism Event Extraction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WKDD ![In: Third International Conference on Knowledge Discovery and Data Mining, WKDD 2010, Phuket, Thailand, 9-10 January 2010, pp. 391-394, 2010, IEEE Computer Society, 978-0-7695-3923-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
terrorism domain, OWL, ontology construction, fuzzy ontology, event extraction |
38 | Phillip Galjano, Vasily Popovich |
Theoretical Investigation of Terrorism. Ontology Development. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IF&GIS ![In: Information Fusion and Geographic Information Systems, Proceedings of the Fourth International Workshop, IF&GIS 2009, 17-20 May 2009, St. Petersburg, Russia, pp. 227-239, 2009, Springer, 978-3-642-00303-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Security, Ontology, Geographic information system, Monitoring system, Terrorism |
38 | James A. Danowski |
Evaluative Word Locations in Semantic Networks from News Stories about Al Qaeda and Implications for Optimal Communication Messages in Anti-terrorism Campaigns. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroISI ![In: Intelligence and Security Informatics, First European Conference, EuroISI 2008, Esbjerg, Denmark, December 3-5, 2008. Proceedings, pp. 271-273, 2008, Springer, 978-3-540-89899-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Anti-terrorism campaigns, optimal communication messages, emotional words, evaluative words, brain processing, semantic networks, persuasion, fMRI |
38 | In-Jung Kim, Cheol Won Lee, Eul-Gyu Im |
Changes of Cyber-Terrorism: Autonomous Terrors and Counter-Measures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (2) ![In: Computational Science and Its Applications - ICCSA 2007, International Conference, Kuala Lumpur, Malaysia, August 26-29, 2007. Proceedings, Part II, pp. 75-84, 2007, Springer, 978-3-540-74475-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
autogenous terror, cyber terrorism, CERT, ISAC |
38 | Robert P. Schumaker, Hsinchun Chen, Tao Wang, Jerod W. Wilkerson |
Terror tracker system: a web portal for terrorism research. ![Search on Bibsonomy](Pics/bibsonomy.png) |
JCDL ![In: ACM/IEEE Joint Conference on Digital Libraries, JCDL 2005, Denver, CO, USA, June 7-11, 2005, Proceedings, pp. 416, 2005, ACM, 1-58113-876-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
news retrieval, security, terrorism |
35 | Daegeon Kim |
Prediction of terrorism pattern accompanied by cyber-terrorism and the development direction of corresponding legal systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2203.03620, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
35 | Jens Edlund, Daniel Brodén, Mats Fridlund, Cecilia Lindhé, Leif-Jöran Olsson, Magnus P. Ängsal, Patrik Öhberg |
A Multimodal Digital Humanities Study of Terrorism in Swedish Politics: An Interdisciplinary Mixed Methods Project on the Configuration of Terrorism in Parliamentary Debates, Legislation, and Policy Networks 1968-2018. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IntelliSys (2) ![In: Intelligent Systems and Applications - Proceedings of the 2021 Intelligent Systems Conference, IntelliSys 2021, Amsterdam, The Netherlands, 2-3 September, 2021, Volume 2, pp. 435-449, 2021, Springer, 978-3-030-82195-1. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
35 | Linda Markowsky, George Markowsky |
Lattice-Based Technique to Visualize and Compare Regional Terrorism Using the Global Terrorism Database. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDAACS ![In: 2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), Cracow, Poland, September 22-25, 2021, pp. 257-266, 2021, IEEE, 978-1-6654-4209-1. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
35 | Raul Sormani |
Criticality assessment of terrorism related events at different time scales TENSOR clusTEriNg terroriSm actiOn pRediction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2016 |
RDF |
|
35 | Maria Rooijakkers, Abdul-Akeem Sadiq |
Critical infrastructure, terrorism, and the Chemical Facility Anti-Terrorism Standards: the need for collaboration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Crit. Infrastructures ![In: Int. J. Crit. Infrastructures 11(2), pp. 167-182, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
35 | Chris Arney, Zachary Silvis, Matthew Thielen, Jeff Yao |
Modeling the Complexity of the Terrorism/Counter-Terrorism Struggle: Mathematics of the "Hearts and Minds". ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Oper. Res. Inf. Syst. ![In: Int. J. Oper. Res. Inf. Syst. 4(3), pp. 31-46, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
35 | Marc Cheong, Vincent C. S. Lee |
A microblogging-based approach to terrorism informatics: Exploration and chronicling civilian sentiment and response to terrorism events via Twitter. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Syst. Frontiers ![In: Inf. Syst. Frontiers 13(1), pp. 45-59, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
35 | Hai-Cheng Chu, Der-Jiunn Deng, Han-Chieh Chao, Yueh-Min Huang |
Next Generation of Terrorism: Ubiquitous Cyber Terrorism with the Accumulation of all Intangible Fears. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Univers. Comput. Sci. ![In: J. Univers. Comput. Sci. 15(12), pp. 2373-2386, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
35 | Alvin M. Saperstein |
Mathematical modeling of the interaction between terrorism and counter-terrorism and its policy implications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Complex. ![In: Complex. 14(1), pp. 45-49, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
35 | Edna Reid, Jialun Qin, Wingyan Chung, Jennifer Jie Xu 0001, Yilu Zhou, Robert P. Schumaker, Marc Sageman, Hsinchun Chen |
Terrorism Knowledge Discovery Project: A Knowledge Discovery Approach to Addressing the Threats of Terrorism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: Intelligence and Security Informatics, Second Symposium on Intelligence and Security Informatics, ISI 2004, Tucson, AZ, USA, June 10-11, 2004, Proceedings, pp. 125-145, 2004, Springer, 978-3-540-22125-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
35 | Philip Westmacott |
Anti-Terrorism Legislation - UK: Big Brother never Forgets - The Data Retention Provisions of the Anti-Terrorism, Crime and Security Act 2001. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Law Secur. Rev. ![In: Comput. Law Secur. Rev. 18(3), pp. 205-207, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
33 | Mariusz Chmielewski, Andrzej Galka, Piotr Jarema, Kamil Krasowski, Artur Kosinski |
Semantic Knowledge Representation in Terrorist Threat Analysis for Crisis Management Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCI ![In: Computational Collective Intelligence. Semantic Web, Social Networks and Multiagent Systems, First International Conference, ICCCI 2009, Wroclaw, Poland, October 5-7, 2009. Proceedings, pp. 460-471, 2009, Springer, 978-3-642-04440-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
counter-terrorism, GTD, ontology, GIS, decision support, crisis management |
33 | Yilu Zhou, Edna Reid, Jialun Qin, Hsinchun Chen, Guanpi Lai |
US Domestic Extremist Groups on the Web: Link and Content Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Intell. Syst. ![In: IEEE Intell. Syst. 20(5), pp. 44-51, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Dark Web, Web harvesting, Web content analysis, Web link analysis, text mining, decision support systems, Web mining, data visualization, terrorism |
33 | Shenzhi Li, Tianhao Wu 0004, William M. Pottenger |
Distributed higher order association rule mining using information extracted from textual data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGKDD Explor. ![In: SIGKDD Explor. 7(1), pp. 26-35, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
criminal justice, distributed association rule mining, data mining, machine learning, evaluation, artificial intelligence, text mining, knowledge discovery, association rule mining, privacy-preserving, distributed data mining, law enforcement, terrorism |
33 | Michael A. Caloyannides |
Is Privacy Really Constraining Security or Is this a Red Herring? ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 2(4), pp. 86-87, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
security, privacy, spam, terrorism |
33 | Steven R. Johnston |
Development of a Legal Framework for Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 5th International Symposium, RAID 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings, pp. 138-157, 2002, Springer, 3-540-00020-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Anti-terrorism law, criminal law, private communications, privacy, intrusion detection, wiretap, interception |
30 | Yanzhao Li |
National Information Infrastructure Security and Cyber Terrorism in the Process of Industrializations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi'An, China, 18-20 August 2009, pp. 532-535, 2009, IEEE Computer Society, 978-0-7695-3744-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
30 | Robert P. Schumaker, Ying Liu, Mark Ginsburg, Hsinchun Chen |
Evaluating the efficacy of a terrorism question/answer system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Commun. ACM ![In: Commun. ACM 50(7), pp. 74-80, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
30 | JinKyu Lee 0003, H. Raghav Rao |
Citizen centric analysis of anti/counter-terrorism e-government services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DG.O ![In: Proceedings of the 8th Annual International Conference on Digital Government Research, Bridging Disciplines & Domains, DG.O 2007, Philadelphia, Pennsylvania, USA, May 20-23, 2007, pp. 258-259, 2007, Digital Government Research Center, 1-59593-599-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
30 | Richard M. Adler |
A Dynamic Social Network Software Platform for Counter-Terrorism Decision Support. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: IEEE International Conference on Intelligence and Security Informatics, ISI 2007, New Brunswick, New Jersey, USA, May 23-24, 2007, Proceedings, pp. 47-54, 2007, IEEE, 1-4244-1329-X. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
30 | Robert L. Popp, J. C. Poindexter |
Countering Terrorism through Information and Privacy Protection Technologies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 4(6), pp. 18-27, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Paul Andrew Watters |
e-Learning for policing, intelligence and counter-terrorism: Performance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICN/ICONS/MCL ![In: Fifth International Conference on Networking and the International Conference on Systems (ICN / ICONS / MCL 2006), 23-29 April 2006, Mauritius, pp. 215, 2006, IEEE Computer Society, 0-7695-2552-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Robert G. Ross |
Measuring Effectiveness of Anti-terrorism Programs Using Performance Logic Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: Intelligence and Security Informatics, IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006, Proceedings, pp. 355-366, 2006, Springer, 3-540-34478-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Annette Sobel |
The Role of Information Superiority in the Global War on Terrorism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: Intelligence and Security Informatics, IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006, Proceedings, pp. 750-752, 2006, Springer, 3-540-34478-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Don Radlauer |
Rational Choice Deterrence and Israeli Counter-Terrorism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: Intelligence and Security Informatics, IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006, Proceedings, pp. 609-614, 2006, Springer, 3-540-34478-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Yael Shahar |
Connections in the World of International Terrorism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: Intelligence and Security Informatics, IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, GA, USA, May 19-20, 2005, Proceedings, pp. 554-560, 2005, Springer, 3-540-25999-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
30 | Robert P. Schumaker, Hsinchun Chen |
Question Answer TARA: A Terrorism Activity Resource Application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: Intelligence and Security Informatics, IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, GA, USA, May 19-20, 2005, Proceedings, pp. 619-620, 2005, Springer, 3-540-25999-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
30 | W. Neville Holmes |
Terrorism, Technology, and the Profession. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 34(11), pp. 134-136, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
25 | Yi Zhang, Aixin Sun, Anwitaman Datta, Kuiyu Chang, Ee-Peng Lim |
Do Wikipedians follow domain experts?: a domain-specific study on Wikipedia knowledge building. ![Search on Bibsonomy](Pics/bibsonomy.png) |
JCDL ![In: Proceedings of the 2010 Joint International Conference on Digital Libraries, JCDL 2010, Gold Coast, Queensland, Australia, June 21-25, 2010, pp. 119-128, 2010, ACM, 978-1-4503-0085-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
contributing behavior, Wikipedia, knowledge building |