|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 349 occurrences of 278 keywords
|
|
|
Results
Found 1087 publication records. Showing 1087 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
101 | Richard Adderley, Atta Badii, Chaoxin Wu |
The Automatic Identification and Prioritisation of Criminal Networks from Police Crime Data. |
EuroISI |
2008 |
DBLP DOI BibTeX RDF |
Criminal networks, Criminal intelligence |
91 | Song Lin, Donald E. Brown |
Criminal Incident Data Association Using the OLAP Technology. |
ISI |
2003 |
DBLP DOI BibTeX RDF |
Criminal incident association, OLAP, outlier |
81 | Jeroen S. de Bruin, Tim K. Cocx, Walter A. Kosters, Jeroen F. J. Laros, Joost N. Kok |
Data Mining Approaches to Criminal Career Analysis. |
ICDM |
2006 |
DBLP DOI BibTeX RDF |
|
77 | Robert Willison, Mikko T. Siponen |
Overcoming the insider: reducing employee computer crime through Situational Crime Prevention. |
Commun. ACM |
2009 |
DBLP DOI BibTeX RDF |
|
75 | F. C. Smith |
Ethical Responsibilities and Legal Liabilities of Network Security Professionals. |
ACSAC |
1997 |
DBLP DOI BibTeX RDF |
ethical responsibilities, legal liabilities, network security professionals, tort litigation, unregulated economic environment, public law enforcement, criminal abuses, technical solutions, civil wrongs, individual liberty, group liberty, criminal law, civil law, computer literate lawyers, computer security failures, millennium bug, legal liability, social redress, computer networks, computer networking, morality, network vulnerabilities, Year 2000 problem |
70 | Tim K. Cocx, Walter A. Kosters, Jeroen F. J. Laros |
An Early Warning System for the Prediction of Criminal Careers. |
MICAI |
2008 |
DBLP DOI BibTeX RDF |
|
70 | Weiping Chang, Chichao Lu, WenYuan Jen |
A study of integrated criminal justice data base system. |
ISI |
2008 |
DBLP DOI BibTeX RDF |
|
70 | Jennifer Jie Xu 0001, Hsinchun Chen |
CrimeNet explorer: a framework for criminal network knowledge discovery. |
ACM Trans. Inf. Syst. |
2005 |
DBLP DOI BibTeX RDF |
complete-link algorithm, crime investigation, clustering, visualization, knowledge discovery, social network analysis, multidimensional scaling, Law enforcement, concept space, precision and recall |
70 | Jennifer Jie Xu 0001, Hsinchun Chen |
Untangling Criminal Networks: A Case Study. |
ISI |
2003 |
DBLP DOI BibTeX RDF |
|
69 | Patrick S. Chen |
Discovering Investigation Clues through Mining Criminal Databases. |
Intelligence and Security Informatics |
2008 |
DBLP DOI BibTeX RDF |
Criminal Data, Stolen Automobiles, Data Mining, Databases, Data Warehousing |
69 | Tibor Bosse, Charlotte Gerritsen, Jan Treur |
Cognitive and social simulation of criminal behaviour: the intermittent explosive disorder case. |
AAMAS |
2007 |
DBLP DOI BibTeX RDF |
cognitive simulation, criminal, analysis, social simulation |
69 | Fredrik Sundt Breien, Ingerid Rødseth |
Usability factors of 3D criminal archive in an augmented reality environment. |
NordiCHI |
2006 |
DBLP DOI BibTeX RDF |
criminal investigation, usability, augmented reality, computer graphics, tangible user interfaces |
68 | Ray Yeager |
Criminal computer forensics management. |
InfoSecCD |
2006 |
DBLP DOI BibTeX RDF |
criminal computer forensics, criminal computer forensics management, forensic evidence, standard operating procedures, quality assurance |
66 | Yungchang Ku, Ying-Chieh Chen, Kuo-Ching Wu, Chaochang Chiu |
An Empirical Analysis of Online Gaming Crime Characteristics from 2002 to 2004. |
PAISI |
2007 |
DBLP DOI BibTeX RDF |
online gaming crime, virtual property, MMORPG, cybercrime |
64 | Uri J. Schild, Ruth Kannai |
Intelligent Computer Evaluation of Offender'sPrevious Record. |
Artif. Intell. Law |
2005 |
DBLP DOI BibTeX RDF |
criminal sentencing, previous criminal record, decision support systems |
58 | Heum Park, SunHo Cho, Hyuk-Chul Kwon |
Cyber Forensics Ontology for Cyber Criminal Investigation. |
e-Forensics |
2009 |
DBLP DOI BibTeX RDF |
criminal investigation, cyber forensics, ontology, digital evidence, cyber crime |
58 | Steve Sawyer, Michael Tyworth |
Integrated criminal justice systems: designing effective systems for inter-organizational action. |
DG.O |
2005 |
DBLP BibTeX RDF |
integrated criminal justice, design, mobility, systems, governance |
58 | Siddharth Kaza, Jennifer Jie Xu 0001, Byron Marshall, Hsinchun Chen |
Topological analysis of criminal activity networks in multiple jurisdictions. |
DG.O |
2005 |
DBLP BibTeX RDF |
criminal networks, topological analysis |
55 | Christopher C. Yang, Xuning Tang |
Social networks integration and privacy preservation using subgraph generalization. |
KDD Workshop on CyberSecurity and Intelligence Informatics |
2009 |
DBLP DOI BibTeX RDF |
|
55 | Siddharth Kaza, Yuan Wang, Hsinchun Chen |
Suspect Vehicle Identification for Border Safety with Modified Mutual Information. |
ISI |
2006 |
DBLP DOI BibTeX RDF |
|
54 | Steven R. Johnston |
Development of a Legal Framework for Intrusion Detection. |
RAID |
2002 |
DBLP DOI BibTeX RDF |
Anti-terrorism law, criminal law, private communications, privacy, intrusion detection, wiretap, interception |
48 | Travis D. Breaux, Jonathan D. Lewis, Paul N. Otto, Annie I. Antón |
Identifying vulnerabilities and critical requirements using criminal court proceedings. |
SAC |
2009 |
DBLP DOI BibTeX RDF |
|
48 | Byron Marshall |
Identifying Interesting Networks of Criminal Activity. |
Intelligence and Security Informatics |
2008 |
DBLP DOI BibTeX RDF |
|
48 | Christopher C. Yang |
Information sharing and privacy protection of terrorist or criminal social networks. |
ISI |
2008 |
DBLP DOI BibTeX RDF |
|
48 | Patrick S. Chen, K. C. Chang, Tai-Ping Hsing, Shihchieh Chou |
Mining Criminal Databases to Finding Investigation Clues-By Example of Stolen Automobiles Database. |
WISI |
2006 |
DBLP DOI BibTeX RDF |
|
48 | Margaret S. Elliott, John Leslie King |
A Common Information Space in Criminal Courts: Computer-Supported Cooperative Work (CSCW) Case Management Systems. |
HICSS |
2005 |
DBLP DOI BibTeX RDF |
|
48 | Chao-Lin Liu, Ting-Ming Liao |
Classifying Criminal Charges in Chinese for Web-Based Legal Services. |
APWeb |
2005 |
DBLP DOI BibTeX RDF |
|
48 | Kamal Dahbur, Thomas Muscarello |
Classification System for Serial Criminal Patterns. |
Artif. Intell. Law |
2003 |
DBLP DOI BibTeX RDF |
data mining, neural networks, pattern classification |
47 | Florian Kerschbaum, Andreas Schaad |
Privacy-preserving social network analysis for criminal investigations. |
WPES |
2008 |
DBLP DOI BibTeX RDF |
criminal investigations, privacy, social network analysis, data sharing |
47 | Siddharth Kaza, Daning Hu, Homa Atabakhsh, Hsinchun Chen |
Predicting criminal relationships using multivariate survival analysis. |
DG.O |
2007 |
DBLP BibTeX RDF |
criminal networks, social network analysis, intelligence and security informatics |
47 | Steve Sawyer, Michael Tyworth |
Integrated criminal justice: ARJIS case study. |
DG.O |
2006 |
DBLP DOI BibTeX RDF |
integrated criminal justice systems, organic development, architectures, case study, systems design, institutions, social informatics |
44 | Siddharth Kaza, Hsinchun Chen |
Suspect Vehicle Identification for Border Safety. |
Intelligence and Security Informatics |
2008 |
DBLP DOI BibTeX RDF |
|
44 | Subramanian Appavu, Ramasamy Rajaram |
Association Rule Mining for Suspicious Email Detection: A Data Mining Approach. |
ISI |
2007 |
DBLP DOI BibTeX RDF |
|
44 | Siddharth Kaza, Yuan Wang, Hsinchun Chen |
Target vehicle identification for border safety with modified mutual information. |
DG.O |
2006 |
DBLP DOI BibTeX RDF |
mutual information, homeland security, intelligence and security informatics |
44 | Hsinchun Chen, Homa Atabakhsh, Chunju Tseng, Byron Marshall, Siddharth Kaza, Shauna Eggers, Hemanth Gowda, Ankit Shah, Tim Petersen, Chuck Violette |
Visualization in law enforcement. |
DG.O |
2005 |
DBLP BibTeX RDF |
crime analysis, crime network, spatial and temporal visualization, social network analysis, law enforcement, association network |
37 | Amin Milani Fard, Martin Ester |
Collaborative Mining in Multiple Social Networks Data for Criminal Group Discovery. |
CSE (4) |
2009 |
DBLP DOI BibTeX RDF |
|
37 | Uwe Glässer, Mona Vajihollahi |
Computational Modeling of Criminal Activity. |
EuroISI |
2008 |
DBLP DOI BibTeX RDF |
Computational Criminology, Modeling Social Systems, Discrete Event Simulation, Abstract State Machines |
37 | Jörg Preuß, Steven Furnell, Maria Papadaki |
Considering the potential of criminal profiling to combat hacking. |
J. Comput. Virol. |
2007 |
DBLP DOI BibTeX RDF |
|
37 | Richard Bache, Fabio Crestani, David Canter, Donna Youngs |
Mining Police Digital Archives to Link Criminal Styles with Offender Characteristics. |
ICADL |
2007 |
DBLP DOI BibTeX RDF |
Crime Data, Investigative Psychology, Offender Profiling, Language Models, Document Classification, Text Data Mining |
37 | Michal Choras |
Intelligent Computing for Automated Biometrics, Criminal and Forensic Applications. |
ICIC (1) |
2007 |
DBLP DOI BibTeX RDF |
|
37 | Wingyan Chung, G. Alan Wang |
Profiling and Visualizing Cyber-criminal Activities: A General Framework. |
ISI |
2007 |
DBLP DOI BibTeX RDF |
|
37 | Tibor Bosse, Charlotte Gerritsen, Jan Treur |
Case Analysis of Criminal Behaviour. |
IEA/AIE |
2007 |
DBLP DOI BibTeX RDF |
|
37 | G. Alan Wang, Jennifer Jie Xu 0001, Hsinchun Chen |
Using Social Contextual Information to Match Criminal Identities. |
HICSS |
2006 |
DBLP DOI BibTeX RDF |
|
36 | Fatih Özgül, Zeki Erdem, Chris Bowerman, Claus Atzenbeck |
Comparison of Feature-Based Criminal Network Detection Models with k-Core and n-Clique. |
ASONAM |
2010 |
DBLP DOI BibTeX RDF |
criminal networks, k-core, n-clique, detection |
33 | Hsinchun Chen |
Homeland Security Data Mining Using Social Network Analysis. |
EuroISI |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Hsinchun Chen |
Homeland security data mining using social network analysis. |
ISI |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Shiuh-Jeng Wang, Cheng-Hsing Yang |
Gathering Digital Evidence in Response to Information Security Incidents. |
ISI |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Glenn S. Dardick, Linda K. Lau |
Interdisciplinary minor in digital forensics, security and law. |
SIGITE Conference |
2005 |
DBLP DOI BibTeX RDF |
cyberlaw, electronic evidence, curriculum, digital forensics, computer forensics, digital evidence |
33 | Volker Roth 0002, Kai Richter 0002, Rene Freidinger |
A PIN-entry method resilient against shoulder surfing. |
CCS |
2004 |
DBLP DOI BibTeX RDF |
cognitive trapdoor games, ATM, password, PIN, shoulder surfing |
33 | Marius J. A. Duker, Arno R. Lodder |
Sentencing and information management: consistency and the particularities of a case. |
ICAIL |
1999 |
DBLP DOI BibTeX RDF |
procedural legitmatization, sentencing systems, information management, mediating systems |
33 | Eric Simon, Gerry Gaes |
ASSYST - Computer Support for Guideline Sentencing. |
ICAIL |
1989 |
DBLP DOI BibTeX RDF |
|
32 | Teng Long, Shaojie Qiao, Changjie Tang, Liangxu Liu, Taiyong Li, Jiang Wu |
E3TP: A Novel Trajectory Prediction Algorithm in Moving Objects Databases. |
PAISI |
2009 |
DBLP DOI BibTeX RDF |
criminal tracking analysis, hotspot regions, frequent sequential routes, moving objects databases, trajectory prediction |
32 | Michael Tyworth, Steve Sawyer |
Organic development: a top-down and bottom-up approach to design of public sector information systems. |
DG.O |
2006 |
DBLP DOI BibTeX RDF |
emergent design, integrated criminal justice systems, organic design, institutional theory, social informatics |
32 | T. K. Mitre, Adriano B. Huguet, Arnaldo de Albuquerque Araújo, N. S. Andrade |
An Object-Relational Database Containing Multimedia Data. |
SIBGRAPI |
2000 |
DBLP DOI BibTeX RDF |
criminal expert reports, multimedia data management, multimedia data storage, security techniques, cryptography, information system, digital signatures, database management system, digital watermarking, multimedia databases, multimedia database, object-relational database |
32 | Yung-Cheng Lee, Chi-Sung Laih |
On the Key Recovery of the Key Escrow System. |
ACSAC |
1997 |
DBLP DOI BibTeX RDF |
Key Escrow System, social needs, criminal behavior, public cryptographic functions, encryption standard, cryptography, public key cryptography, protection, key recovery, user privacy |
30 | Monika Simmler, Simone Brunner, Giulia Canova, Kuno Schedler |
Smart criminal justice: exploring the use of algorithms in the Swiss criminal justice system. |
Artif. Intell. Law |
2023 |
DBLP DOI BibTeX RDF |
|
30 | Yuanzhe Yang, Li Yang 0015, Lingwei Li, Xiaoxiao Ma 0005, Lei Yu, Chun Zuo |
DccGraph: Detecting Criminal Communities with Augmented Criminal Network Construction and Graph Neural Network. |
IJCNN |
2023 |
DBLP DOI BibTeX RDF |
|
30 | Hiroaki Togashi, Yasuaki Koga, Hiroshi Furukawa |
Criminal Fishing System Based on Wireless Local Area Network Access Points - Can Media Access Control address assist criminal investigation? |
CoRR |
2018 |
DBLP BibTeX RDF |
|
30 | Raúl Silvestre Castillo |
A Software to Extract Criminal Networks from Unstructured Text in Spanish; the Case of Peruvian Criminal Networks. |
COMPLEX NETWORKS (2) |
2018 |
DBLP DOI BibTeX RDF |
|
30 | Quist-Aphetsi Kester |
Using Formal Concepts Analysis Techniques in Mining Data from Criminal Databases and Profiling Events Based on Factors to Understand Criminal Environments. |
ICCSA (5) |
2016 |
DBLP DOI BibTeX RDF |
|
30 | Marcelo Damasceno, Jerffeson Teixeira, Gustavo A. L. de Campos |
A prediction model for criminal levels using socio-criminal data. |
Int. J. Electron. Secur. Digit. Forensics |
2012 |
DBLP DOI BibTeX RDF |
|
30 | Matthias Bäcker, Gerrit Hornung |
Data processing by police and criminal justice authorities in Europe - The influence of the Commission's draft on the national police laws and laws of criminal procedure. |
Comput. Law Secur. Rev. |
2012 |
DBLP DOI BibTeX RDF |
|
30 | Bert-Jaap Koops, Anton Vedder |
Privacy in Criminal Investigations - A Survey: Criminal investigation and privacy: Opinions of citizens. |
Comput. Law Secur. Rev. |
2002 |
DBLP DOI BibTeX RDF |
|
26 | Peter Phillips 0001, Ickjai Lee |
Criminal Cross Correlation Mining and Visualization. |
PAISI |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Tibor Bosse, Charlotte Gerritsen |
A Model for Criminal Decision Making Based on Hypothetical Reasoning about the Future. |
IEA/AIE |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Richard Bache, Fabio Crestani, David Canter, Donna Youngs |
A Language Modelling Approach to Linking Criminal Styles with Offender Characteristics. |
NLDB |
2008 |
DBLP DOI BibTeX RDF |
Crime Data, Investigative Psychology, Offender Profiling, Language Models, Text Data Mining |
26 | Theresa A. Pardo, J. Ramón Gil-García, G. Brian Burke |
Governance Structures in Cross-Boundary Information Sharing: Lessons from State and Local Criminal Justice Initiatives. |
HICSS |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Hamid Tabatabaee Yazdi, Amin Milani Fard, Mohammad R. Akbarzadeh-Totonchi |
Cooperative criminal face recognition in distributed web environment. |
AICCSA |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Maurício Paletta, Pilar Herrero |
Cognitive Simulation of Criminal Behaviour in Banking Frauds. |
Web Intelligence/IAT Workshops |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Yunhua Chen, Yongquan Yu, Bi Zeng, Minghui Wang |
Application of Granular Computing in Extension Criminal Reconnaissance System. |
GrC |
2007 |
DBLP DOI BibTeX RDF |
Extension logic, Extenics, Extension reasoning, Granular computing |
26 | Tim K. Cocx, Walter A. Kosters |
A Distance Measure for Determining Similarity Between Criminal Investigations. |
ICDM |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Byron Marshall, Hsinchun Chen |
Using Importance Flooding to Identify Interesting Networks of Criminal Activity. |
ISI |
2006 |
DBLP DOI BibTeX RDF |
|
26 | J. Ramón Gil-García, Carrie A. Schneider, Theresa A. Pardo, Anthony M. Cresswell |
Interorganizational Information Integration in the Criminal Justice Enterprise: Preliminary Lessons from State and County Initiatives. |
HICSS |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Gang Wang, Hsinchun Chen, Homa Atabakhsh |
Automatically detecting deceptive criminal identities. |
Commun. ACM |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Chao-Lin Liu, Tseng-Chung Chang |
Some Case-Refinement Strategies for Case-Based Criminal Summary Judgments. |
ISMIS |
2003 |
DBLP DOI BibTeX RDF |
|
26 | Mathew Neville Smith, Peter J. H. King |
Database Support for Exploring Criminal Networks. |
ISI |
2003 |
DBLP DOI BibTeX RDF |
|
26 | Jau-Hwang Wang, Bill T. Lin, Ching-Chin Shieh, Peter S. Deng |
Criminal Record Matching Based on the Vector Space Model. |
ISI |
2003 |
DBLP DOI BibTeX RDF |
|
26 | Roslin V. Hauck, Homa Atabakhsh, Pichai Ongvasith, Harsh Gupta, Hsinchun Chen |
Using Coplink to Analyze Criminal-Justice Data. |
Computer |
2002 |
DBLP DOI BibTeX RDF |
|
26 | Mathew Neville Smith, Peter J. H. King |
Incrementally Visualising Criminal Networks. |
IV |
2002 |
DBLP DOI BibTeX RDF |
|
22 | Tim K. Cocx, Walter A. Kosters, Jeroen F. J. Laros |
Temporal Extrapolation within a Static Clustering. |
ISMIS |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Jooyoung Lee |
Proposal for Efficient Searching and Presentation in Digital Forensics. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
Digital Forensics, Presentation, Searching Technique |
22 | Joshua Broadway, Benjamin P. Turnbull, Jill Slay |
Improving the Analysis of Lawfully Intercepted Network Packet Data Captured for Forensic Analysis. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
lawful interception, packet analysis, network, forensic computing |
22 | Michal Choras |
Human Lips as Emerging Biometrics Modality. |
ICIAR |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Robert S. Gable |
Electronic Monitoring of Offenders: Can a Wayward Technology Be Redeemed? |
PERSUASIVE |
2007 |
DBLP DOI BibTeX RDF |
Electronic monitoring, offenders, Bluetooth, WiFi, transceivers |
22 | Tibor Bosse, Charlotte Gerritsen, Jan Treur |
Integration of Biological, Psychological, and Social Aspects in Agent-Based Simulation of a Violent Psychopath. |
International Conference on Computational Science (2) |
2007 |
DBLP DOI BibTeX RDF |
violent behaviour, integration of biological, psychological and social aspects, simulation, BDI-models |
22 | Anthony M. Cresswell, Theresa A. Pardo, Shahidul Hassan |
Assessing capability for justice information sharing. |
DG.O |
2007 |
DBLP BibTeX RDF |
capability assessment, justice information sharing, organizational routines, collaboration, digital government, institutions |
22 | Luis F. Luna-Reyes, David F. Andersen, George P. Richardson, Theresa A. Pardo, Anthony M. Cresswell |
Emergence of the governance structure for information integration across governmental agencies: a system dynamics approach. |
DG.O |
2007 |
DBLP BibTeX RDF |
simulation, governance, system dynamics |
22 | Rayford B. Vaughn, David A. Dampier |
Digital Forensics--State of the Science and Foundational Research Activity. |
HICSS |
2007 |
DBLP DOI BibTeX RDF |
|
22 | David B. Skillicorn |
Detecting Anomalies in Graphs. |
ISI |
2007 |
DBLP DOI BibTeX RDF |
|
22 | WenYuan Jen, Weiping Chang, Shihchieh Chou |
Cybercrime in Taiwan - An Analysis of Suspect Records. |
WISI |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Mark Jyn-Huey Lim, Michael Negnevitsky, Jacky Hartnett |
E-mail Traffic Analysis Using Visualisation and Decision Trees. |
ISI |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Syed A. Saleem |
Ethical hacking as a risk management technique. |
InfoSecCD |
2006 |
DBLP DOI BibTeX RDF |
ethical hacker, white hat hacker, network security, information security, computer security, system security |
22 | Hsinchun Chen, Homa Atabakhsh, Jennifer Jie Xu 0001, Alan Gang Wang, Byron Marshall, Siddharth Kaza, Chunju Tseng, Shauna Eggers, Hemanth Gowda, Tim Petersen, Chuck Violette |
Coplink center: social network analysis and identity deception detection for law enforcement and homeland security intelligence and security informatics: a crime data mining approach to developing border safe research. |
DG.O |
2005 |
DBLP BibTeX RDF |
identity matching, data mining, social network analysis, law enforcement, homeland security |
22 | Lorie M. Liebrock |
Empirical sensitivity analysis for computational procedures. |
Richard Tapia Celebration of Diversity in Computing Conference |
2005 |
DBLP DOI BibTeX RDF |
computational sensitivity analysis, stability analysis |
22 | Hsinchun Chen, Wingyan Chung, Jennifer Jie Xu 0001, Gang Wang, Yi Qin, Michael Chau |
Crime Data Mining: A General Framework and Some Examples. |
Computer |
2004 |
DBLP DOI BibTeX RDF |
|
22 | Yifei Xue, Donald E. Brown |
Decision Based Spatial Analysis of Crime. |
ISI |
2003 |
DBLP DOI BibTeX RDF |
Spatial choice, preference specification, feature selection, model-based clustering |
22 | Michael Roe, Ross J. Anderson, William S. Harbison, T. Mark A. Lomas |
Government Access to Keys - Panel Discussion. |
Security Protocols Workshop |
2000 |
DBLP DOI BibTeX RDF |
|
22 | Ian Brown, B. Laurie |
Security Against Compelled Disclosure. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
compelled disclosure, confidential information, government agencies, national economic security, organised crime, information assets, ethics, security of data, data security, data privacy, telecommunication security, legislation, legislation, organisations, computer crime, communication security |
22 | Laurent Siklóssy, Marc Ayel |
Datum Discovery. |
IDA |
1997 |
DBLP DOI BibTeX RDF |
|
22 | Irving J. Chasen |
Philadelphia justice information system. |
AFIPS National Computer Conference |
1976 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 1087 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|