Login / Signup
Secur. Informatics
2012
2015
2018
2012
2018
Keyphrases
Publications
volume 7, number 1, 2018
David Robinson
,
Chris Scogings
The detection of criminal groups in real-world fused data: using the graph-mining algorithm "GraphExtract".
Secur. Informatics
7 (1) (2018)
Román Marchant
,
Sebastian Haan
,
Garner Clancey
,
Sally Cripps
Applying machine learning to criminology: semi-parametric spatial-demographic Bayesian regression.
Secur. Informatics
7 (1) (2018)
Simon Andrews
,
Ben Brewster
,
Tony Day
Organised crime and social media: a system for detecting, corroborating and visualising weak signals of organised crime online.
Secur. Informatics
7 (1) (2018)
volume 6, number 1, 2017
Hamidreza Alvari
,
Paulo Shakarian
,
J. E. Kelly Snyder
Semi-supervised learning for detecting human trafficking.
Secur. Informatics
6 (1) (2017)
volume 5, number 1, 2016
Philip O'Kane
,
Sakir Sezer
,
Kieran McLaughlin
Detecting obfuscated malware using reduced opcode set and optimised runtime trace.
Secur. Informatics
5 (1) (2016)
Jason R. C. Nurse
,
Arnau Erola
,
Thomas Gibson-Robinson
,
Michael Goldsmith
,
Sadie Creese
Analytics for characterising and measuring the naturalness of online personae.
Secur. Informatics
5 (1) (2016)
Nir Nissim
,
Aviad Cohen
,
Robert Moskovitch
,
Asaf Shabtai
,
Matan Edri
,
Oren Bar-Ad
,
Yuval Elovici
Keeping pace with the creation of new malicious PDF files using an active-learning based detection framework.
Secur. Informatics
5 (1) (2016)
volume 4, number 1, 2015
Jiexun Li
,
G. Alan Wang
A framework of identity resolution: evaluating identity attributes and matching algorithms.
Secur. Informatics
4 (1) (2015)
Niels L. M. van Adrichem
,
Norbert Blenn
,
Antonio Reyes Lua
,
Xin Wang
,
Muhammad Wasif
,
Ficky Fatturrahman
,
Fernando A. Kuipers
A measurement study of DNSSEC misconfigurations.
Secur. Informatics
4 (1) (2015)
Anna Jurek
,
Maurice D. Mulvenna
,
Yaxin Bi
Improved lexicon-based sentiment analysis for social media analytics.
Secur. Informatics
4 (1) (2015)
Shuai Yuan
,
H. Raghav Rao
,
Shambhu J. Upadhyaya
Emerging issues for education in E-discovery for electronic health records.
Secur. Informatics
4 (1) (2015)
Jennifer Cowley
,
Frank L. Greitzer
,
Bronwyn Woods
Erratum to: Factors influencing network risk judgments: a conceptual inquiry and exploratory analysis.
Secur. Informatics
4 (1) (2015)
Timothy C. Haas
,
Sam M. Ferreira
Federated databases and actionable intelligence: using social network analysis to disrupt transnational wildlife trafficking criminal networks.
Secur. Informatics
4 (1) (2015)
Dragos Datcu
,
Stephan G. Lukosch
,
Heide K. Lukosch
,
Marina Cidotã
Using augmented reality for supporting information exchange in teams from the security domain.
Secur. Informatics
4 (1) (2015)
Richard E. Harang
,
Peter Mell
Evasion-resistant network scan detection.
Secur. Informatics
4 (1) (2015)
Fredrik Johansson
,
Lisa Kaati
,
Amendra Shrestha
Timeprints for identifying social media users with multiple aliases.
Secur. Informatics
4 (1) (2015)
Jennifer Cowley
,
Frank L. Greitzer
,
Bronwyn Woods
Factors influencing network risk judgments: a conceptual inquiry and exploratory analysis.
Secur. Informatics
4 (1) (2015)
volume 3, number 1, 2014
Joel Brynielsson
,
Fredrik Johansson
,
Carl Jonsson
,
Anders Westling
Emotion classification of social media posts for estimating people's reactions to communicated alert messages during crises.
Secur. Informatics
3 (1) (2014)
David B. Skillicorn
,
Edna F. Reid
Language use in the Jihadist magazines inspire and Azan.
Secur. Informatics
3 (1) (2014)
Victor A. Benjamin
,
Wingyan Chung
,
Ahmed Abbasi
,
Joshua Chuang
,
Catherine A. Larson
,
Hsinchun Chen
Evaluating text visualization for authorship analysis.
Secur. Informatics
3 (1) (2014)
Anna Vartapetiance
,
Lee Gillam
"Our Little Secret": pinpointing potential predators.
Secur. Informatics
3 (1) (2014)
Zhenyu Cheryl Qian
,
Yingjie Victor Chen
Fluency of visualizations: linking spatiotemporal visualizations to improve cybersecurity visual analytics.
Secur. Informatics
3 (1) (2014)
Joseph Bruce
,
Jean Scholtz
,
Duncan Hodges
,
Lia R. Emanuel
,
Danaë Stanton Fraser
,
Sadie Creese
,
Oriana Love
Pathways to identity: using visualization to aid law enforcement in identification tasks.
Secur. Informatics
3 (1) (2014)
Mary B. Burns
,
Kevin C. Moffitt
Automated deception detection of 911 call transcripts.
Secur. Informatics
3 (1) (2014)
Hafiz Malik
,
Hasan Mahmood
Acoustic environment identification using unsupervised learning.
Secur. Informatics
3 (1) (2014)
Philippe J. Giabbanelli
Modelling the spatial and social dynamics of insurgency.
Secur. Informatics
3 (1) (2014)
Uffe Kock Wiil
Criminal network investigation.
Secur. Informatics
3 (1) (2014)
Jacob R. Scanlon
,
Matthew S. Gerber
Automatic detection of cyber-recruitment by violent extremists.
Secur. Informatics
3 (1) (2014)
Thomas E. Carroll
,
Frank L. Greitzer
,
Adam D. Roberts
Security informatics research challenges for mitigating cyber friendly fire.
Secur. Informatics
3 (1) (2014)
Valerie Spicer
,
Justin Song
,
Patricia L. Brantingham
Bridging the perceptual gap: variations in crime perception of businesses at the neighborhood level.
Secur. Informatics
3 (1) (2014)
Aaron Hunter
Belief manipulation and message meaning for protocol analysis.
Secur. Informatics
3 (1) (2014)
Ryan Compton
,
Craig Lee
,
Jiejun Xu
,
Luis Artieda-Moncada
,
Tsai-Ching Lu
,
Lalindra De Silva
,
Michael Macy
Using publicly visible social media to build detailed forecasts of civil unrest.
Secur. Informatics
3 (1) (2014)
volume 2, number 1, 2013
Lorraine Bowman-Grieve
A psychological perspective on virtual communities supporting terrorist & extremist ideologies as a tool for recruitment.
Secur. Informatics
2 (1) (2013)
Yue Zhang
,
Donald E. Brown
Police patrol districting method and simulation evaluation using agent-based model & GIS.
Secur. Informatics
2 (1) (2013)
Joel Brynielsson
,
Andreas Horndahl
,
Fredrik Johansson
,
Lisa Kaati
,
Christian Mårtenson
,
Pontus Svenson
Harvesting and analysis of weak signals for detecting lone wolf terrorists.
Secur. Informatics
2 (1) (2013)
Colby L. Valentine
,
Carter Hay
,
Kevin M. Beaver
,
Thomas G. Blomberg
Through a computational lens: using dual computer-criminology degree programs to advance the study of criminology and criminal justice practice.
Secur. Informatics
2 (1) (2013)
Carlo Morselli
,
Victor Hugo Masias
,
Fernando A. Crespo
,
Sigifredo Laengle
Predicting sentencing outcomes with centrality measures.
Secur. Informatics
2 (1) (2013)
Arvind K. Verma
,
Ramyaa Ramyaa
,
Suresh Marru
Validating distance decay through agent based modeling.
Secur. Informatics
2 (1) (2013)
Robyn Torok
Developing an explanatory model for the process of online radicalisation and terrorism.
Secur. Informatics
2 (1) (2013)
Richard Berk
Algorithmic criminology.
Secur. Informatics
2 (1) (2013)
Rachel A. Hegemann
,
Erik A. Lewis
,
Andrea L. Bertozzi
An "Estimate & Score Algorithm" for simultaneous parameter estimation and reconstruction of incomplete data on social networks.
Secur. Informatics
2 (1) (2013)
Bruce A. Desmarais
,
Skyler J. Cranmer
Forecasting the locational dynamics of transnational terrorism: a network analytic approach.
Secur. Informatics
2 (1) (2013)
Rasmus Rosenqvist Petersen
,
Uffe Kock Wiil
CrimeFighter Investigator: Integrating synthesis and sense-making for criminal network investigation.
Secur. Informatics
2 (1) (2013)
volume 1, number 1, 2012
Michael C. Madison
,
Andrew J. Cowell
,
R. Scott Butner
,
Keith Fligg
,
Andrew W. Piatt
,
Liam R. McGrath
,
Peter C. Ellis
Knowledge encapsulation framework for technosocial predictive modeling.
Secur. Informatics
1 (1) (2012)
You Chen
,
Steve Nyemba
,
Wen Zhang
,
Bradley A. Malin
Specializing network analysis to detect anomalous insider actions.
Secur. Informatics
1 (1) (2012)
Laura A. McNamara
Biologically-inspired analysis in the real world: computing, informatics, and ecologies of use.
Secur. Informatics
1 (1) (2012)
Hamed Yaghoubi Shahir
,
Uwe Glässer
,
Roozbeh Farahbod
,
Piper J. Jackson
,
Hans Wehn
Generating test cases for marine safety and security scenarios: a composition framework.
Secur. Informatics
1 (1) (2012)
Paul Ormerod
Terrorist networks and the lethality of attacks: an illustrative agent based model on evolutionary principles.
Secur. Informatics
1 (1) (2012)
Xiaofeng Wang
,
Donald E. Brown
The spatio-temporal modeling for criminal incidents.
Secur. Informatics
1 (1) (2012)
Paul T. Bartone
Social and organizational influences on psychological hardiness: How leaders can increase stress resilience.
Secur. Informatics
1 (1) (2012)