Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
116 | Krishna R. Pattipati, Peter Willett 0001, Jefferey Allanach, Haiying Tu, Satnam Singh |
Hidden Markov Models and Bayesian Networks for Counter-Terrorism. |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism |
2006 |
DBLP BibTeX RDF |
|
116 | Mark Lazaroff, David Snowden |
Anticipatory Models for Counter-Terrorism. |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism |
2006 |
DBLP BibTeX RDF |
|
116 | Paul A. Kogut, Yui Leung, Kathleen Ryan, Linda Gohari, Mieczyslaw M. Kokar, Jerzy Letkowski |
Applying Semantic Web Reasoning to Counter-Terrorism. |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism |
2006 |
DBLP BibTeX RDF |
|
116 | Aaron B. Frank, Desmond Saunders-Newton |
Journey from Analysis to Inquiry: Technology and Transformation of Counter-Terrorism Analysis. |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism |
2006 |
DBLP BibTeX RDF |
|
116 | Paul Rosenzweig |
Privacy and Consequences: Legal and Policy Structures for Implementing New Counter-Terrorism Technologies and Protecting Civil Liberty. |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism |
2006 |
DBLP BibTeX RDF |
|
105 | Avishag Gordon |
Homeland security literature in relation to terrorism publications: The source and the response. |
Scientometrics |
2005 |
DBLP DOI BibTeX RDF |
|
97 | JinKyu Lee 0003, H. Raghav Rao |
Understanding Socio-Technical Environments for Acceptance of Inter-Agency Anti/Counter-Terrorism Information Sharing Systems. |
HICSS |
2007 |
DBLP DOI BibTeX RDF |
|
87 | Brian P. Kettler, Gary Edwards, Mark Hoffman |
Facilitating Information Sharing Across Intelligence Community Boundaries Using Knowledge Management and Semantic Web Technologies. |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism |
2006 |
DBLP BibTeX RDF |
|
87 | Jennifer Golbeck, Aaron Mannes, James A. Hendler |
Semantic Web Technologies for Terrorist Network Analysis. |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism |
2006 |
DBLP BibTeX RDF |
|
87 | |
Legal Standards for Data Mining. |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism |
2006 |
DBLP BibTeX RDF |
|
87 | Janusz Marecki, Nathan Schurr, Milind Tambe |
Agent-Based Simulations for Disaster Rescue Using the DEFACTO Coordination System. |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism |
2006 |
DBLP BibTeX RDF |
|
87 | Reda A. Ammar, Steven A. Demurjian, Ian R. Greenshields, Krishna R. Pattipati, Sanguthevar Rajasekaran |
Analysis of Heterogeneous Data in Ultrahigh Dimensions. |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism |
2006 |
DBLP BibTeX RDF |
|
87 | Michael D. McNeese, Isaac Brewer, Rashaad E. T. Jones, Erik S. Connors |
Supporting Knowledge Management In Emergency Crisis Management Domains: Envisioned Designs for Collaborative Work. |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism |
2006 |
DBLP BibTeX RDF |
|
87 | Seth Greenblatt, Thayne Coffman, Sherry Marcus |
Behavioral Network Analysis for Terrorist Detection. |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism |
2006 |
DBLP BibTeX RDF |
|
87 | J. Brian Sharkey, Doyle Weishar, John W. Lockwood, Ron Loui, Richard Rohwer, John Byrnes, Krishna R. Pattipati, Stephen G. Eick, David Cousins, Michael Nicoletti |
Information Processing at Very High Speed Data Ingestion Rates. |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism |
2006 |
DBLP BibTeX RDF |
|
87 | Kim A. Taipale |
Designing Technical Systems to Support Policy: Enterprise Architecture, Policy Appliances, and Civil Liberties. |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism |
2006 |
DBLP BibTeX RDF |
|
87 | Shuang Sun, Xiaocong Fan, John Yen |
Sharing Intelligence Using Information Supply Chains. |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism |
2006 |
DBLP BibTeX RDF |
|
87 | Douglas W. Oard |
Transcending the Tower of Babel: Supporting Access to Multilingual Information with Cross-Language Information Retrieval. |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism |
2006 |
DBLP BibTeX RDF |
|
87 | Jeff Jonas, John Karat |
Anonymized Semantic Directories and a Privacy-Enhancing Architecture for Enterprise Discovery. |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism |
2006 |
DBLP BibTeX RDF |
|
87 | Tom Mifflin, Chris Boner, Greg Godfrey, Michael Greenblatt |
Detecting Terrorist Activities in the Twenty-First Century: A Theory of Detection for Transactional Networks. |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism |
2006 |
DBLP BibTeX RDF |
|
87 | Clifford Behrens, Hyong Sop Shim, Devasis Bassu |
Schemer: Consensus-Based Knowledge Validation and Collaboration Services for Virtual Teams of Intelligence Experts. |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism |
2006 |
DBLP BibTeX RDF |
|
87 | David B. Skillicorn |
Social Network Analysis Via Matrix Decompositions. |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism |
2006 |
DBLP BibTeX RDF |
|
87 | Nazli Choucri, Stuart E. Madnick, Michael D. Siegel |
Improving National and Homeland Security Through Context Knowledge Representation and Reasoning Technologies. |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism |
2006 |
DBLP BibTeX RDF |
|
87 | Robert L. Popp, David Allen, Claudio Cioffi-Revilla |
Utilizing Information and Social Science Technology to Understand and Counter the Twenty-First Century Strategic Threat 1. |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism |
2006 |
DBLP BibTeX RDF |
|
84 | JinKyu Lee 0003, H. Raghav Rao |
Exploring the causes and effects of inter-agency information sharing systems adoption in the anti/counter-terrorism and disaster management domains. |
DG.O |
2007 |
DBLP BibTeX RDF |
anti/counter-terrorism, information sharing, disaster management, inter-organizational systems |
65 | H. Raghav Rao, JinKyu Lee 0003 |
Citizen centric analysis of anti/counter-terrorism e-government services. |
DG.O |
2006 |
DBLP DOI BibTeX RDF |
anti-/counter-terrorism (ACT), channel choice, source choice, e-government, user acceptance, public safety |
49 | Hsinchun Chen |
Exploring Extremism and Terrorism on the Web: The Dark Web Project. |
PAISI |
2007 |
DBLP DOI BibTeX RDF |
terrorism informatics, dark web, intelligence and security informatics |
48 | JinKyu Lee 0003, H. Raghav Rao |
Citizen centric analysis of anti/counter-terrorism e-government services. |
DG.O |
2007 |
DBLP BibTeX RDF |
|
48 | Richard M. Adler |
A Dynamic Social Network Software Platform for Counter-Terrorism Decision Support. |
ISI |
2007 |
DBLP DOI BibTeX RDF |
|
48 | Paul Andrew Watters |
e-Learning for policing, intelligence and counter-terrorism: Performance. |
ICN/ICONS/MCL |
2006 |
DBLP DOI BibTeX RDF |
|
48 | Don Radlauer |
Rational Choice Deterrence and Israeli Counter-Terrorism. |
ISI |
2006 |
DBLP DOI BibTeX RDF |
|
47 | Chris Arney, Zachary Silvis, Matthew Thielen, Jeff Yao |
Modeling the Complexity of the Terrorism/Counter-Terrorism Struggle: Mathematics of the "Hearts and Minds". |
Int. J. Oper. Res. Inf. Syst. |
2013 |
DBLP DOI BibTeX RDF |
|
47 | Alvin M. Saperstein |
Mathematical modeling of the interaction between terrorism and counter-terrorism and its policy implications. |
Complex. |
2008 |
DBLP DOI BibTeX RDF |
|
47 | Robert J. Latino |
The Application of PROACT® RCA to Terrorism/Counter Terrorism Related Events. |
ISI |
2005 |
DBLP DOI BibTeX RDF |
|
41 | JinKyu Lee 0003, H. Raghav Rao |
Perceived risks, counter-beliefs, and intentions to use anti-/counter-terrorism websites: An exploratory study of government-citizens online interactions in a turbulent environment. |
Decis. Support Syst. |
2007 |
DBLP DOI BibTeX RDF |
|
36 | Mariusz Chmielewski, Andrzej Galka, Piotr Jarema, Kamil Krasowski, Artur Kosinski |
Semantic Knowledge Representation in Terrorist Threat Analysis for Crisis Management Systems. |
ICCCI |
2009 |
DBLP DOI BibTeX RDF |
counter-terrorism, GTD, ontology, GIS, decision support, crisis management |
36 | Bhavani Thuraisingham |
Data Mining, National Security, Privacy and Civil Liberties. |
SIGKDD Explor. |
2002 |
DBLP DOI BibTeX RDF |
counter-terrorism, privacy constraints, privacy problem, privacy sensitive data mining, security constraints, data mining, privacy, World Wide Web, national security, inference problem, civil liberties |
31 | Peter S. Probst |
Measuring Success in Countering Terrorism: Problems and Pitfalls. |
ISI |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Jaspal Kaur Saini, Divya Bansal |
Computational techniques to counter terrorism: a systematic survey. |
Multim. Tools Appl. |
2024 |
DBLP DOI BibTeX RDF |
|
29 | Fahad Ali Khan, Gang Li, Anam Nawaz Khan, Qazi Waqas Khan, Myriam Hadjouni, Hela Elmannai |
AI-Driven Counter-Terrorism: Enhancing Global Security Through Advanced Predictive Analytics. |
IEEE Access |
2023 |
DBLP DOI BibTeX RDF |
|
29 | Marguerite Borelli |
Social media corporations as actors of counter-terrorism. |
New Media Soc. |
2023 |
DBLP DOI BibTeX RDF |
|
29 | Giuseppe Cascavilla, Damian A. Tamburri, Francesco Leotta, Massimo Mecella, Willem-Jan van den Heuvel |
Counter-terrorism in cyber-physical spaces: Best practices and technologies from the state of the art. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
29 | Giuseppe Cascavilla, Damian A. Tamburri, Francesco Leotta, Massimo Mecella, Willem-Jan van den Heuvel |
Counter-terrorism in cyber-physical spaces: Best practices and technologies from the state of the art. |
Inf. Softw. Technol. |
2023 |
DBLP DOI BibTeX RDF |
|
29 | Alicia Schmidt |
Virtual assets: compelling a new anti-money laundering and counter-terrorism financing regulatory model. |
Int. J. Law Inf. Technol. |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Vadim Azhmyakov, Erik I. Verriest, Moisés E. Bonilla, Stefan Pickl |
Optimal control methodology for the Counter-Terrorism strategies: The relaxation based approach. |
J. Frankl. Inst. |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Sung-Chan Choi |
Counter-terrorism analysis using cooperative game theory. |
CoRR |
2021 |
DBLP BibTeX RDF |
|
29 | Wenting Xue, Zeshui Xu, Xiao-Jun Zeng |
Solving matrix games based on Ambika method with hesitant fuzzy information and its application in the counter-terrorism issue. |
Appl. Intell. |
2021 |
DBLP DOI BibTeX RDF |
|
29 | Jiaqi Hou, Xin Li 0088, Rongchen Zhu, Chongqiang Zhu, Zeyu Wei, Chao Zhang |
A Neural Relation Extraction Model for Distant Supervision in Counter-Terrorism Scenario. |
IEEE Access |
2020 |
DBLP DOI BibTeX RDF |
|
29 | Antonio Badia |
Conceptual Models for Counter-Terrorism and Intelligence Knowledge Bases. |
ISI |
2020 |
DBLP DOI BibTeX RDF |
|
29 | L. Bayón, Pedro Fortuny Ayuso 0001, P. J. García Nieto, J. M. Grau, M. M. Ruiz |
Optimal control of counter-terrorism tactics. |
Appl. Math. Comput. |
2019 |
DBLP DOI BibTeX RDF |
|
29 | Téwodros W. Workneh |
Counter-terrorism in Ethiopia: manufacturing insecurity, monopolizing speech. |
Internet Policy Rev. |
2019 |
DBLP DOI BibTeX RDF |
|
29 | David García-Retuerta, Álvaro Bartolomé, Pablo Chamoso, Juan Manuel Corchado |
Counter-Terrorism Video Analysis Using Hash-Based Algorithms. |
Algorithms |
2019 |
DBLP DOI BibTeX RDF |
|
29 | Yanfei Liu, Zhenhua Wang, Guangyu Zhang |
Application of Multi-domain Stereo Prevention and Control Technology in Counter-terrorism. |
ISI |
2019 |
DBLP DOI BibTeX RDF |
|
29 | Fawad Ali, Farhan Hassan Khan, Saba Bashir, Uzair Ahmad |
Counter Terrorism on Online Social Networks Using Web Mining Techniques. |
INTAP |
2018 |
DBLP DOI BibTeX RDF |
|
29 | Krisztina Huszti-Orban |
Internet intermediaries and counter-terrorism: Between self-regulation and outsourcing law enforcement1. |
CyCon |
2018 |
DBLP DOI BibTeX RDF |
|
29 | Daniel Drewer, Jan Ellermann |
May the (well-balanced) force be with us! The launch of the European Counter Terrorism Centre (ECTC). |
Comput. Law Secur. Rev. |
2016 |
DBLP DOI BibTeX RDF |
|
29 | Roger Clarke |
Privacy impact assessments as a control mechanism for Australian counter-terrorism initiatives. |
Comput. Law Secur. Rev. |
2016 |
DBLP DOI BibTeX RDF |
|
29 | Akash Anil, Sanasam Ranbir Singh, Ranjan Sarmah |
Personalised PageRank as a Method of Exploiting Heterogeneous Network for Counter Terrorism and Homeland Security. |
WI |
2016 |
DBLP DOI BibTeX RDF |
|
29 | Zi-Han Lin, Duoyong Sun, Bo Li 0030, Ze Li |
Game Analysis on the Counter-Terrorism Cooperation of Shanghai Cooperation Organization. |
EISIC |
2015 |
DBLP DOI BibTeX RDF |
|
29 | Xue Liu, Xiaojun Jing, Songlin Sun, Hai Huang 0001 |
A novel network based on TD-LTE for counter-terrorism emergency communication in urban area. |
CCIS |
2014 |
DBLP DOI BibTeX RDF |
|
29 | Horst A. Eiselt, Joy Bhadury, Mark L. Burkey |
An optimization-based framework for modelling counter-terrorism strategies. |
OR Insight |
2013 |
DBLP DOI BibTeX RDF |
|
29 | Leslie Ball, Matthew J. Craven |
Automated Counter-Terrorism. |
EISIC |
2013 |
DBLP DOI BibTeX RDF |
|
29 | Andrew J. Park, Herbert H. Tsang, Mengting Sun, Uwe Glässer |
An agent-based model and computational framework for counter-terrorism and public safety based on swarm intelligence. |
Secur. Informatics |
2012 |
DBLP DOI BibTeX RDF |
|
29 | JinKyu Lee 0003, H. Raghav Rao |
Service source and channel choice in G2C service environments: a model comparison in the anti/counter-terrorism domain. |
Inf. Syst. J. |
2012 |
DBLP DOI BibTeX RDF |
|
29 | Joshua Sinai |
Research note: Concept to develop a software-based counter-terrorism campaign decision support tool. |
ISI |
2012 |
DBLP DOI BibTeX RDF |
|
29 | V. Alan Spiker, Joan Hall Johnston |
Using Behavioral Measures to Assess Counter-Terrorism Training in the Field. |
HCI (21) |
2011 |
DBLP DOI BibTeX RDF |
|
29 | Sam J. Dixon, Mark B. Dixon, John Elliott, Elizabeth Guest, Duncan J. Mullier |
A Neural Network for Counter-Terrorism. |
SGAI Conf. |
2011 |
DBLP DOI BibTeX RDF |
|
29 | Mark G. Stewart |
Risk-informed decision support for assessing the costs and benefits of counter-terrorism protective measures for infrastructure. |
Int. J. Crit. Infrastructure Prot. |
2010 |
DBLP DOI BibTeX RDF |
|
29 | Herbert H. Tsang, Andrew J. Park, Mengting Sun, Uwe Glässer |
GENIUS: A computational modeling framework for counter-terrorism planning and response. |
ISI |
2010 |
DBLP DOI BibTeX RDF |
|
29 | Kiyana Zolfaghar, Arash Barfar, Shahriar Mohammadi |
A framework for online counter terrorism. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Brandy Linn Maistros |
Robert L. Popp and John Yen, Editors, Emergent Information Technologies and Enabling Policies for Counter-Terrorism, John Wiley and Sons, New Jersey (2006) ISBN 978-0-471-78655-9. |
Inf. Process. Manag. |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Gail Ridley, Jacky Hartnett, Wilumpa Jarern-Imakul |
Mapping Information Security Standards: A Counter-Terrorism Example. |
ECIS |
2008 |
DBLP BibTeX RDF |
|
29 | Syed Ahsan |
IT enabled counter terrorism infrastructure: issues and challenges. |
Int. J. Electron. Secur. Digit. Forensics |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Philip Michael Romero |
An Immunological Approach to Counter-Terrorism and Infrastructure Defense Law in Electronic Domains. |
Int. J. Law Inf. Technol. |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Robert L. Popp, John Yen (eds.) |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism |
|
2006 |
DBLP BibTeX RDF |
|
29 | Stuart Harvey Rubin, Wei Dai 0009 |
An Integrated Knowledge Management Environment: a Study of Counter Terrorism Technologies. |
J. Inf. Knowl. Manag. |
2003 |
DBLP DOI BibTeX RDF |
|
18 | Alexander Gutfraind, Aric A. Hagberg, Feng Pan 0005 |
Optimal Interdiction of Unreactive Markovian Evaders. |
CPAIOR |
2009 |
DBLP DOI BibTeX RDF |
|
18 | James Cheng, Yiping Ke, Wilfred Ng, Jeffrey Xu Yu |
Context-Aware Object Connection Discovery in Large Graphs. |
ICDE |
2009 |
DBLP DOI BibTeX RDF |
|
18 | Xiaoyun He, Jaideep Vaidya, Basit Shafiq, Nabil R. Adam, Evimaria Terzi, Tyrone Grandison |
Efficient Privacy-Preserving Link Discovery. |
PAKDD |
2009 |
DBLP DOI BibTeX RDF |
Privacy, Efficiency, Link Discovery |
18 | Xiaoyun He, Basit Shafiq, Jaideep Vaidya, Nabil R. Adam |
Privacy-preserving link discovery. |
SAC |
2008 |
DBLP DOI BibTeX RDF |
privacy, link discovery |
18 | Adam Perer, Ben Shneiderman |
Integrating statistics and visualization: case studies of gaining clarity during exploratory data analysis. |
CHI |
2008 |
DBLP DOI BibTeX RDF |
evaluation, social networks, information visualization, case studies, statistics, exploratory data analysis |
18 | Zeeshan-ul-hassan Usmani, Daniel Kirk |
Extreme Conditions for Intelligent Agents. |
Web Intelligence/IAT Workshops |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Paul K. Davis, Andreas Tolk |
Observations on new developments in composability and multi-resolution modeling. |
WSC |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Hong-Wei Sun, Kwok-Yan Lam, Ming Gu 0001, Jia-Guang Sun 0001 |
An Efficient Algorithm for Fingercode-Based Biometric Identification. |
OTM Workshops (1) |
2006 |
DBLP DOI BibTeX RDF |
Biometric security, fingercode, vector quantization, fingerprint matching |
18 | Tao Qian, Xiaokun Li, Bulent Ayhan, Roger Xu, Chiman Kwan, Tim Griffin |
Application of Support Vector Machines to Vapor Detection and Classification for Environmental Monitoring of Spacecraft. |
ISNN (2) |
2006 |
DBLP DOI BibTeX RDF |
|
18 | Shyam Varan Nath |
Crime Pattern Detection Using Data Mining. |
IAT Workshops |
2006 |
DBLP DOI BibTeX RDF |
Crime-patterns, data mining, clustering, semi-supervised learning, k-means, law-enforcement |
18 | William Eberle, Lawrence B. Holder |
Detecting Anomalies in Cargo Using Graph Properties. |
ISI |
2006 |
DBLP DOI BibTeX RDF |
|
18 | Yael Shahar |
Connections in the World of International Terrorism. |
ISI |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Nilesh N. Dalvi, Pedro M. Domingos, Mausam, Sumit K. Sanghai, Deepak Verma |
Adversarial classification. |
KDD |
2004 |
DBLP DOI BibTeX RDF |
game theory, integer linear programming, naive Bayes, cost-sensitive learning, spam detection |
18 | Satnam Singh, Jefferey Allanach, Haiying Tu, Krishna R. Pattipati, Peter Willett 0001 |
Stochastic modeling of a terrorist event via the ASAM system. |
SMC (6) |
2004 |
DBLP DOI BibTeX RDF |
|
18 | Bhavani Thuraisingham |
Dependable Computing for National Security. |
ISADS |
2003 |
DBLP DOI BibTeX RDF |
|
18 | Hillol Kargupta, Kun Liu 0001, Jessica Ryan |
Privacy Sensitive Distributed Data Mining from Multi-party Data. |
ISI |
2003 |
DBLP DOI BibTeX RDF |
|
18 | Mark Dombrowski, Jagmohan Bajaj, Paul D. Willson |
Video-rate Visible to LWIR Hyperspectral Imaging and Image Exploitation. |
AIPR |
2002 |
DBLP DOI BibTeX RDF |
spectral, real-time, processing, correlation, visible, infrared, Hyperspectral-imaging |