![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Security Informatics, Volume 1
Volume 1, Number 1, December 2012
- Asaf Shabtai, Robert Moskovitch, Clint Feher, Shlomi Dolev
, Yuval Elovici:
Detecting unknown malicious code by applying classification techniques on OpCode patterns. 1 - Xiaofeng Wang, Donald E. Brown
:
The spatio-temporal modeling for criminal incidents. 2 - Kristin Glass, Richard Colbaugh:
Estimating the sentiment of social media content for security informatics applications. 3 - Hamed Yaghoubi Shahir, Uwe Glässer, Roozbeh Farahbod, Piper J. Jackson, Hans Wehn:
Generating test cases for marine safety and security scenarios: a composition framework. 4 - You Chen, Steve Nyemba, Wen Zhang, Bradley A. Malin:
Specializing network analysis to detect anomalous insider actions. 5 - Kevin W. Hamlen, William Hamlen:
An economic perspective of message-dropping attacks in peer-to-peer overlays. 6 - Xuning Tang, Christopher C. Yang:
Social network integration and analysis using a generalization and probabilistic approach for privacy preservation. 7 - Antonio Sanfilippo
, Nigel Gilbert
, Mark Greaves
:
Technosocial predictive analytics for security informatics. 8 - Richard Colbaugh, Kristin Glass:
Anticipating complex network vulnerabilities through abstraction-based analysis. 9 - Michael C. Madison, Andrew J. Cowell, R. Scott Butner, Keith Fligg, Andrew W. Piatt
, Liam R. McGrath, Peter C. Ellis:
Knowledge encapsulation framework for technosocial predictive modeling. 10 - Roderick M. Riensche, Paul D. Whitney:
Combining modeling and gaming for predictive analytics. 11 - Kshanti A. Greene, Dan Thomsen, Pietro Michelucci
:
Massively collaborative problem solving: new security solutions and new security risks. 12 - Amir H. Ghaseminejad, Paul J. Brantingham, Patricia L. Brantingham:
Distribution of event complexity in the British Columbia court system an analysis based on the CourBC analytical system. 13 - Raphael D. Sagarin, Terence Taylor:
Natural security: how biological systems use information to adapt in an unpredictable world. 14 - Nitesh Bharosa, JinKyu Lee, Marijn Janssen, H. Raghav Rao:
An activity theory analysis of boundary objects in cross-border information systems development for disaster management. 15 - Paul Ormerod:
Terrorist networks and the lethality of attacks: an illustrative agent based model on evolutionary principles. 16 - Laura A. McNamara:
Biologically-inspired analysis in the real world: computing, informatics, and ecologies of use. 17 - Richard Colbaugh, Kristin Glass:
Early warning analysis for social diffusion events. 18 - Neal J. Holtschulte, Melanie Moses:
Diversity and resistance in a model network with adaptive software. 19 - Craig M. Vineyard, Stephen J. Verzi
, Michael L. Bernard, Shawn E. Taylor, Irene Dubicka, Thomas P. Caudell:
A multi-modal network architecture for knowledge discovery. 20 - Paul T. Bartone:
Social and organizational influences on psychological hardiness: How leaders can increase stress resilience. 21 - Victor Asal, Kristin Glass, Richard Colbaugh:
Introduction to a special issue on biologically inspired analysis of social systems: a security informatics perspective. 22 - Andrew J. Park, Herbert H. Tsang
, Mengting Sun, Uwe Glässer:
An agent-based model and computational framework for counter-terrorism and public safety based on swarm intelligence. 23
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.