Search dblp for Publications

export results for "toc:db/series/anis/anis9.bht:"

 download as .bib file

@incollection{DBLP:series/anis/ChaJLC10,
  author       = {Shi{-}Cho Cha and
                  Pei{-}Wen Juo and
                  Li{-}Ting Liu and
                  Wei{-}Ning Chen},
  editor       = {Christopher C. Yang and
                  Michael Chau and
                  Jau{-}Hwang Wang and
                  Hsinchun Chen},
  title        = {Duplicate Work Reduction in Business Continuity and Risk Management
                  Processes},
  booktitle    = {Security Informatics},
  series       = {Annals of Information Systems},
  volume       = {9},
  pages        = {155--170},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-1-4419-1325-8\_9},
  doi          = {10.1007/978-1-4419-1325-8\_9},
  timestamp    = {Thu, 13 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/anis/ChaJLC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/anis/ChenAC10,
  author       = {Yi{-}Da Chen and
                  Ahmed Abbasi and
                  Hsinchun Chen},
  editor       = {Christopher C. Yang and
                  Michael Chau and
                  Jau{-}Hwang Wang and
                  Hsinchun Chen},
  title        = {Framing Social Movement Identity with Cyber-Artifacts: {A} Case Study
                  of the International Falun Gong Movement},
  booktitle    = {Security Informatics},
  series       = {Annals of Information Systems},
  volume       = {9},
  pages        = {1--23},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-1-4419-1325-8\_1},
  doi          = {10.1007/978-1-4419-1325-8\_1},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/anis/ChenAC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/anis/ChenWW10,
  author       = {Yi{-}Ming Chen and
                  Dachrahn Wu and
                  Cheng{-}Kuang Wu},
  editor       = {Christopher C. Yang and
                  Michael Chau and
                  Jau{-}Hwang Wang and
                  Hsinchun Chen},
  title        = {A Game Theoretic Framework for Multi-agent Deployment in Intrusion
                  Detection Systems},
  booktitle    = {Security Informatics},
  series       = {Annals of Information Systems},
  volume       = {9},
  pages        = {117--133},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-1-4419-1325-8\_7},
  doi          = {10.1007/978-1-4419-1325-8\_7},
  timestamp    = {Fri, 11 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/anis/ChenWW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/anis/GlasserV10,
  author       = {Uwe Gl{\"{a}}sser and
                  Mona Vajihollahi},
  editor       = {Christopher C. Yang and
                  Michael Chau and
                  Jau{-}Hwang Wang and
                  Hsinchun Chen},
  title        = {Identity Management Architecture},
  booktitle    = {Security Informatics},
  series       = {Annals of Information Systems},
  volume       = {9},
  pages        = {97--116},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-1-4419-1325-8\_6},
  doi          = {10.1007/978-1-4419-1325-8\_6},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/anis/GlasserV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/anis/LeePPLT10,
  author       = {Ickjai Lee and
                  Reece Pershouse and
                  Peter Phillips and
                  Kyungmi Lee and
                  Christopher Torpelund{-}Bruin},
  editor       = {Christopher C. Yang and
                  Michael Chau and
                  Jau{-}Hwang Wang and
                  Hsinchun Chen},
  title        = {What-If Emergency Response Through Higher Order Voronoi Diagrams},
  booktitle    = {Security Informatics},
  series       = {Annals of Information Systems},
  volume       = {9},
  pages        = {77--95},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-1-4419-1325-8\_5},
  doi          = {10.1007/978-1-4419-1325-8\_5},
  timestamp    = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/anis/LeePPLT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/anis/QiaoTJDCCH10,
  author       = {Shaojie Qiao and
                  Changjie Tang and
                  Huidong Jin and
                  Shucheng Dai and
                  Xingshu Chen and
                  Michael Chau and
                  Jian Hu},
  editor       = {Christopher C. Yang and
                  Michael Chau and
                  Jau{-}Hwang Wang and
                  Hsinchun Chen},
  title        = {Processing Constrained \emph{k}-Closest Pairs Queries in Crime Databases},
  booktitle    = {Security Informatics},
  series       = {Annals of Information Systems},
  volume       = {9},
  pages        = {59--75},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-1-4419-1325-8\_4},
  doi          = {10.1007/978-1-4419-1325-8\_4},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/anis/QiaoTJDCCH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/anis/SkillicornL10,
  author       = {David B. Skillicorn and
                  Ayron Little},
  editor       = {Christopher C. Yang and
                  Michael Chau and
                  Jau{-}Hwang Wang and
                  Hsinchun Chen},
  title        = {Patterns of Word Use for Deception in Testimony},
  booktitle    = {Security Informatics},
  series       = {Annals of Information Systems},
  volume       = {9},
  pages        = {25--39},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-1-4419-1325-8\_2},
  doi          = {10.1007/978-1-4419-1325-8\_2},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/anis/SkillicornL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/anis/SuBXDDZLTCB10,
  author       = {Stanley Y. W. Su and
                  Howard W. Beck and
                  Xuelian Xiao and
                  Jeff DePree and
                  Seema Degwekar and
                  Chen Zhou and
                  Minsoo Lee and
                  Carla S. Thomas and
                  Andrew Coggeshall and
                  Richard Bostock},
  editor       = {Christopher C. Yang and
                  Michael Chau and
                  Jau{-}Hwang Wang and
                  Hsinchun Chen},
  title        = {ETKnet: {A} Distributed Network System for Sharing Event Data and
                  Multi-faceted Knowledge in a Collaboration Federation},
  booktitle    = {Security Informatics},
  series       = {Annals of Information Systems},
  volume       = {9},
  pages        = {135--153},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-1-4419-1325-8\_8},
  doi          = {10.1007/978-1-4419-1325-8\_8},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/anis/SuBXDDZLTCB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/anis/YangT10,
  author       = {Christopher C. Yang and
                  Xuning Tang},
  editor       = {Christopher C. Yang and
                  Michael Chau and
                  Jau{-}Hwang Wang and
                  Hsinchun Chen},
  title        = {Information Integration for Terrorist or Criminal Social Networks},
  booktitle    = {Security Informatics},
  series       = {Annals of Information Systems},
  volume       = {9},
  pages        = {41--57},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-1-4419-1325-8\_3},
  doi          = {10.1007/978-1-4419-1325-8\_3},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/anis/YangT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/anis/2010-9,
  editor       = {Christopher C. Yang and
                  Michael Chau and
                  Jau{-}Hwang Wang and
                  Hsinchun Chen},
  title        = {Security Informatics},
  series       = {Annals of Information Systems},
  volume       = {9},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-1-4419-1325-8},
  doi          = {10.1007/978-1-4419-1325-8},
  isbn         = {978-1-4419-1324-1},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/anis/2010-9.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics