The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "EISIC"( http://dblp.L3S.de/Venues/EISIC )

URL (DBLP): http://dblp.uni-trier.de/db/conf/eisic

Publication years (Num. hits)
2011 (75) 2012 (64) 2013 (69) 2015 (45) 2016 (47) 2017 (30) 2018 (16) 2019 (24)
Publication types (Num. hits)
inproceedings(362) proceedings(8)
Venues (Conferences, Journals, ...)
EISIC(370)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 370 publication records. Showing 370 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Aws Naser, Mohamed Fadli Bin Zolkipli, Shahid Anwar, Muna Sulieman Al-Hawawreh Present Status and Challenges in Cloud Monitoring Framework: A Survey. Search on Bibsonomy EISIC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Matylda Gerber, B. L. William Wong, Neesha Kodagoda How Analysts Think: Decision Making in the Absence of Clear Facts. Search on Bibsonomy EISIC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Martin Boldt, Jaswanth Bala Filtering Estimated Crime Series Based on Route Calculations on Spatio-temporal Data. Search on Bibsonomy EISIC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Maria Andersson, Ronnie Johansson, Karl-Göran Stenborg, Robert Forsgren, Thomas Cane, Grzegorz Taberski, Jose Luis Patino, James M. Ferryman The IPATCH System for Maritime Surveillance and Piracy Threat Classification. Search on Bibsonomy EISIC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jukka Ruohonen, Sanja Scepanovic, Sami Hyrynsalmi, Igor Mishkovski, Tuomas Aura, Ville Leppänen A Post-Mortem Empirical Investigation of the Popularity and Distribution of Malware Files in the Contemporary Web-Facing Internet. Search on Bibsonomy EISIC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Alexander Nussbaumer, Katrien Verbert, Eva-Catherine Hillemann, Michael A. Bedek, Dietrich Albert A Framework for Cognitive Bias Detection and Feedback in a Visual Analytics Environment. Search on Bibsonomy EISIC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jiro Usugami Disaster Risk Reduction for International Residents in Japan: Barriers and Facilitators to Knowledge Sharing in Times of Disaster. Search on Bibsonomy EISIC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Floris Bex, Bas Hovestad An Argumentative-Narrative Risk Assessment Model. Search on Bibsonomy EISIC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Blaz Ivanc, Borka Jerman Blazic Information Security Aspects of the Public Safety Data Interoperability Network. Search on Bibsonomy EISIC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Joseph Bugeja, Andreas Jacobsson, Paul Davidsson On Privacy and Security Challenges in Smart Connected Homes. Search on Bibsonomy EISIC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Razieh Nokhbeh Zaeem, Monisha Manoharan, K. Suzanne Barber Risk Kit: Highlighting Vulnerable Identity Assets for Specific Age Groups. Search on Bibsonomy EISIC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ashay S. Jawale, Joon S. Park A Security Analysis on Apple Pay. Search on Bibsonomy EISIC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Haibo Li 0001, Anders Hedman Harnessing Crowds to Avert or Mitigate Acts Terrorism: A Collective Intelligence Call for Action. Search on Bibsonomy EISIC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Joel Brynielsson, Fredrik Johansson (eds.) 2016 European Intelligence and Security Informatics Conference, EISIC 2016, Uppsala, Sweden, August 17-19, 2016 Search on Bibsonomy EISIC The full citation details ... 2016 DBLP  BibTeX  RDF
1Svorad Stolc, Peter Wild, Kristián Valentín, Franz Daubner, Markus Clabian On Interoperability of Security Document Reading Devices. Search on Bibsonomy EISIC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Roger Clarke Quality Assurance for Security Applications of Big Data. Search on Bibsonomy EISIC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Nallini Selvaraj, Simon Attfield, Peter J. Passmore, B. L. William Wong How Analysts Think: Think-steps as a Tool for Structuring Sensemaking in Criminal Intelligence Analysis. Search on Bibsonomy EISIC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Andrew J. Park, Shawn Buckley Three-Dimensional Agent-Based Model and Simulation of a Burglar's Target Selection. Search on Bibsonomy EISIC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Michael Ashcroft, Lisa Kaati, Maxime Meyer A Step Towards Detecting Online Grooming - Identifying Adults Pretending to be Children. Search on Bibsonomy EISIC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Lei Guan, Zan Li 0001, Song Xiao, Jiangbo Si, Jiajun Wan A Family of Adaptive Frequency Slot Number FH Sequences for High Security and Reliability Communication. Search on Bibsonomy EISIC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yasaman Sarlati, Sattar Hashemi, Niloofar Mozafari Adopting Community Features to Detect Social Spammers. Search on Bibsonomy EISIC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Frodo Kin-Sun Chan, Adams Wai-Kin Kong Using Hair Follicles with Leg Geometry to Align Androgenic Hair Patterns. Search on Bibsonomy EISIC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Michelle Cayford Measures of Success: Developing a Method for Evaluating the Effectiveness of Surveillance Technology. Search on Bibsonomy EISIC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Nathalie Stembert, Arne Padmos, Mortaza S. Bargh, Sunil Choenni, Frans Jansen A Study of Preventing Email (Spear) Phishing by Enabling Human Intelligence. Search on Bibsonomy EISIC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Sarah Mount, Robert M. Newman Energy-Efficient Brute Force Password Cracking. Search on Bibsonomy EISIC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Francesco Papi Multi-Sensor d-GLMB Filter for Multi-Target Tracking using Doppler only Measurements. Search on Bibsonomy EISIC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Albandari Alsumayt, John Haggerty, Ahmad Lotfi Performance, Analysis, and Comparison of MrDR Method to Detect DoS Attacks in MANET. Search on Bibsonomy EISIC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Apostolos Malatras, Éric Freyssinet, Laurent Beslay Mobile Botnets Taxonomy and Challenges. Search on Bibsonomy EISIC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ioana Rodhe, Johan E. Bengtsson, Amund Hunstad, Henrik Karlzén Future Schemes for Stronger Verification of the Access Rights of Border Control Inspection Systems. Search on Bibsonomy EISIC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Fayez Alfayez, Ian Neill Topology-based Optimization of Linear Wireless Sensor Networks. Search on Bibsonomy EISIC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jyri Rajamäki, Juha S. Knuuttila, Harri Ruoslahti, Jouni Viitanen, Pasi Patama Transparent Surveillance of Suspects for Building Trust between Citizens and Their Governments. Search on Bibsonomy EISIC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Amna Eleyan, Derar Eleyan Forensic Process as a Service (FPaaS) for Cloud Computing. Search on Bibsonomy EISIC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Manuel Jose Gazapo Lapayese Terrorism and its Transition to Cyberspace. Search on Bibsonomy EISIC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Rodrigo Carvalho 0001, Michael Goldsmith, Sadie Creese Applying Semantic Technologies to Fight Online Banking Fraud. Search on Bibsonomy EISIC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Eva Schlehahn, Patrick Aichroth, Sebastian Mann, Rudolf Schreiner, Ulrich Lang 0001, Ifan D. H. Shepherd, B. L. William Wong Benefits and Pitfalls of Predictive Policing. Search on Bibsonomy EISIC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ning Gu, Duoyong Sun, Bo Li 0030, Ze Li Sentiment Analysis for Topics based on Interaction Chain Model. Search on Bibsonomy EISIC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Hatem Hassan, Ahmad Mostafa, Ahmed Shawish S-SAC: Towards a Scalable Secure Access Control Framework for Cloud Storage. Search on Bibsonomy EISIC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Mandeep K. Dhami, Kathryn E. Careless Ordinal Structure of the Generic Analytic Workflow: A Survey of Intelligence Analysts. Search on Bibsonomy EISIC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Francesco Papi Constrained d-GLMB Filter for Multi-Target Track-Before-Detect using Radar Measurements. Search on Bibsonomy EISIC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Carl-Heinz Genzel, Richard Sethmann Custom Transport Interface for the Integration of Trusted Network Connect in German Smart Metering Systems. Search on Bibsonomy EISIC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Fahad Alanazi, Andrew Jones 0002 The Value of Metadata in Digital Forensics. Search on Bibsonomy EISIC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Mustafa Aydin, Jeremy L. Jacob Cloud-COVER: Using User Security Attribute Preferences and Propagation Analysis to Prioritise Threats to Systems. Search on Bibsonomy EISIC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Abdelrahman Abuarqoub Optimal Mobile Sink Selection Scheme for Multiple Sink Mobile Wireless Sensor Networks. Search on Bibsonomy EISIC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Michael Ashcroft, Ali Fisher, Lisa Kaati, Enghin Omer, Nico Prucha Detecting Jihadist Messages on Twitter. Search on Bibsonomy EISIC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Robert Hegarty, John Haggerty SlackStick: Signature-Based File Identification for Live Digital Forensics Examinations. Search on Bibsonomy EISIC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Min Tang, Duoyong Sun, Bo Li 0030, Chaomin Ou, Zi-Han Lin, Ze Li Research on the Evaluation Method of National Military Development Based on Net Assessment. Search on Bibsonomy EISIC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Erik Johansson, Christoffer Gahlin, Anton Borg Crime Hotspots: An Evaluation of the KDE Spatial Mapping Technique. Search on Bibsonomy EISIC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Mhair Kashif, Zahoor ul Haq An Optimal Use of Intrusion Detection and Prevention System (IDPS). Search on Bibsonomy EISIC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Joel Brynielsson, Moi Hoon Yap (eds.) 2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015 Search on Bibsonomy EISIC The full citation details ... 2015 DBLP  BibTeX  RDF
1Martijn Spitters, Femke Klaver, Gijs Koot, Mark van Staalduinen Authorship Analysis on Dark Marketplace Forums. Search on Bibsonomy EISIC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Peter J. Passmore, Simon Attfield, Neesha Kodagoda, Celeste Groenewald, B. L. William Wong Supporting the Externalisation of Thinking in Criminal Intelligence Analysis. Search on Bibsonomy EISIC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Zi-Han Lin, Duoyong Sun, Bo Li 0030, Ze Li Game Analysis on the Counter-Terrorism Cooperation of Shanghai Cooperation Organization. Search on Bibsonomy EISIC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Margit Pohl, Johanna Haider, Chris Pallaris, B. L. William Wong Guidelines for Sensemaking in Intelligence Analysis. Search on Bibsonomy EISIC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Eva-Catherine Hillemann, Alexander Nussbaumer, Dietrich Albert The Role of Cognitive Biases in Criminal Intelligence Analysis and Approaches for their Mitigation. Search on Bibsonomy EISIC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Fadi Hamad, Jamal Zraqou, Adi Maaita, Anas Abu Taleb A Secure Authentication System for ePassport Detection and Verification. Search on Bibsonomy EISIC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jyri Rajamäki, Rauno Pirinen Critical Infrastructure Protection: Towards a Design Theory for Resilient Software-Intensive Systems. Search on Bibsonomy EISIC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Thomas C. Eskridge, Marco M. Carvalho, Fitzroy Nembhard, Hari Thotempudi, Peter J. Polack Interactive Visualization of Netflow Traffic. Search on Bibsonomy EISIC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ahmed H. Al-Noori, Khamis A. Al-Karawi, Francis F. Li Improving Robustness of Speaker Recognition in Noisy and Reverberant Conditions via Training. Search on Bibsonomy EISIC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ze Li, Duoyong Sun, Bo Li 0030, Zi-Han Lin, Min Tang Detecting Changes in Terrorism Networks: A Perspective of Multi-Meta-Network Modeling. Search on Bibsonomy EISIC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Linus Gisslén, Anders Törne A Semantic Approach to Information Management and Decision Support: An Application to Humanitarian Demining Operations. Search on Bibsonomy EISIC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Bo Li 0030, Duoyong Sun, Ze Li, Chaomin Ou, Renqi Zhu Understanding the Dynamic of Covert Organization with Multilayer Networks Model. Search on Bibsonomy EISIC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Vito Volpetti, Valentino Ricci, Francesco F. Monai, Francesco Barcio CBRNe Threat Detection and Monitoring System: Advanced Prototype. Search on Bibsonomy EISIC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Amy Sliva, Mikhail Malyutov, Glenn Pierce, Xin Li Threats to Peace: Threat Perception and the Persistence or Desistance of Violent Conflict. Search on Bibsonomy EISIC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Uffe Kock Wiil Issues for the Next Generation of Criminal Network Investigation Tools. Search on Bibsonomy EISIC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Michael Tschuggnall, Günther Specht Countering Plagiarism by Exposing Irregularities in Authors' Grammar. Search on Bibsonomy EISIC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Carlos Francisco Lerma Resendez The Intelligence Cycle as a Tool for Effective Information Security Infrastructure Design. Search on Bibsonomy EISIC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Bisharat Rasool Memon, Uffe Kock Wiil Visual Analysis of Heterogeneous Networks. Search on Bibsonomy EISIC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Patrick Dibb, Mohammad Hammoudeh Forensic Data Recovery from Android OS Devices: An Open Source Toolkit. Search on Bibsonomy EISIC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Niklas Zechner The Past, Present and Future of Text Classification. Search on Bibsonomy EISIC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jyri Rajamäki, Juha S. Knuuttila Law Enforcement Authorities' Legal Digital Evidence Gathering: Legal, Integrity and Chain-of-Custody Requirement. Search on Bibsonomy EISIC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Yuichi Sei, Akihiko Ohsuga False Event Detection for Mobile Sinks in Wireless Sensor Networks. Search on Bibsonomy EISIC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Sebastian Bernhardsson, Rickard Forsen Assessment of Damage and Protective Capacity of Buildings Exposed to Weapon Effects. Search on Bibsonomy EISIC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Kamaruddin Abdul Ghani, Kaharudin Dimyati, Khadijah Ismail, Latifah Sarah Supian Radiated Emission from Handheld Devices with Touch-Screen LCDs. Search on Bibsonomy EISIC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Louis Antani Holt, Mohammad Hammoudeh Cloud Forensics: A Technical Approach to Virtual Machine Acquisition. Search on Bibsonomy EISIC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jyri Rajamäki, Paresh Rathod, Pasi Kamppi A New Redundant Tracking System for Emergency Response. Search on Bibsonomy EISIC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Zhaochun Ren, David van Dijk, David Graus, Nina van der Knaap, Hans Henseler, Maarten de Rijke Semantic Linking and Contextualization for Social Forensic Text Analysis. Search on Bibsonomy EISIC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jasper Kuperus, Cor J. Veenman, Maurice van Keulen Increasing NER Recall with Minimal Precision Loss. Search on Bibsonomy EISIC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Moazzam Butt, Sandra Marti, Alexander Nouak, Jörg Köplin, Ramachandra Raghavendra, Guoqiang Li 0007 Towards e-Passport Duplicate Enrollment Check in the European Union. Search on Bibsonomy EISIC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Mariëlle den Hengst, Martijn Warnier Cyber Crime in Privately Held Information Systems: Personal Data at Stake. Search on Bibsonomy EISIC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Leslie Ball, Matthew J. Craven Automated Counter-Terrorism. Search on Bibsonomy EISIC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Ned Bakelman, John V. Monaco, Sung-Hyuk Cha, Charles C. Tappert Keystroke Biometric Studies on Password and Numeric Keypad Input. Search on Bibsonomy EISIC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1James Llinas Challenges in Information Fusion Technology Capabilities for Modern Intelligence and Security Problems. Search on Bibsonomy EISIC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Justin Song, Valerie Spicer, Patricia L. Brantingham, Richard Frank Crime Ridges: Exploring the Relationship between Crime Attractors and Offender Movement. Search on Bibsonomy EISIC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Hans Henseler, Jop Hofste, Maurice van Keulen Digital-Forensics Based Pattern Recognition for Discovering Identities in Electronic Evidence. Search on Bibsonomy EISIC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1John V. Monaco, Ned Bakelman, Sung-Hyuk Cha, Charles C. Tappert Recent Advances in the Development of a Long-Text-Input Keystroke Biometric Authentication System for Arbitrary Text Input. Search on Bibsonomy EISIC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Johan Sigholm, Martin Bang Towards Offensive Cyber Counterintelligence: Adopting a Target-Centric View on Advanced Persistent Threats. Search on Bibsonomy EISIC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Joni A. Amorim, Rose-Mharie Åhlfeldt, Per M. Gustavsson, Sten F. Andler Privacy and Security in Cyberspace: Training Perspectives on the Personal Data Ecosystem. Search on Bibsonomy EISIC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Gregory Duckworth, Archibald Owen, Jerry Worsley, Henry Stephenson OptaSense® Distributed Acoustic and Seismic Sensing Performance for Multi-threat, Multi-environment Border Monitoring. Search on Bibsonomy EISIC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Monica Gariup, Gustav Soederlind Document Fraud Detection at the Border: Preliminary Observations on Human and Machine Performance. Search on Bibsonomy EISIC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Joe S. Valacich, David W. Wilson 0002, Jay F. Nunamaker Jr., Elyse Golob Modeling Border Traffic Flow Using Cell Phone Header Packets. Search on Bibsonomy EISIC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Daniel Cuesta Cantarero, David Antonio Perez Herrero, Fernando Martin Mendez A Multi-modal Biometric Fusion Implementation for ABC Systems. Search on Bibsonomy EISIC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Dennis Andersson, Mirko Thorstensson Reconstruction and Exploration: Applications in Criminology. Search on Bibsonomy EISIC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Dmitry Dudorov, David Stupples, Martin Newby Probability Analysis of Cyber Attack Paths against Business and Commercial Enterprise Systems. Search on Bibsonomy EISIC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Tatyana Velikova Dimitrova, Aris Tsois, Elena Camossi Visualization of Container Movements through a Web-Based Geographical Information System. Search on Bibsonomy EISIC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Valentina Dragos Browse and Search in Maritime Document Collections. Search on Bibsonomy EISIC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Urban Bilstrup, Magdalena Rosenberg A Pilot Study of Using Honeypots as Cyber Intelligence Sources. Search on Bibsonomy EISIC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jan Kallberg, Bhavani Thuraisingham, Erik Lakomaa Societal Cyberwar Theory Applied: The Disruptive Power of State Actor Aggression for Public Sector Information Security. Search on Bibsonomy EISIC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Anders Holst, Björn Bjurling A Bayesian Parametric Statistical Anomaly Detection Method for Finding Trends and Patterns in Criminal Behavior. Search on Bibsonomy EISIC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Amendra Shrestha A Tool for Visualizing and Analyzing Users on Discussion Boards. Search on Bibsonomy EISIC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Gerhard Backfried, Johannes Göllner, Gerald Quirchmayr, Karin Rainer, Gert Kienast, Georg Thallinger, Christian Schmidt 0005, Andreas Peer Integration of Media Sources for Situation Analysis in the Different Phases of Disaster Management: The QuOIMA Project. Search on Bibsonomy EISIC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
Displaying result #101 - #200 of 370 (100 per page; Change: )
Pages: [<<][1][2][3][4][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license