![](https://dblp.dagstuhl.de/img/logo.320x120.png)
![search dblp search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
![search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
default search action
Security Informatics, Volume 3
Volume 3, Number 1, December 2014
- Uffe Kock Wiil
:
Criminal network investigation. 1 - Philippe J. Giabbanelli:
Modelling the spatial and social dynamics of insurgency. 2 - Anna Vartapetiance, Lee Gillam:
"Our Little Secret": pinpointing potential predators. 3 - Ryan Compton, Craig Lee, Jiejun Xu, Luis Artieda-Moncada, Tsai-Ching Lu, Lalindra De Silva, Michael Macy:
Using publicly visible social media to build detailed forecasts of civil unrest. 4 - Jacob R. Scanlon, Matthew S. Gerber:
Automatic detection of cyber-recruitment by violent extremists. 5 - Zhenyu Cheryl Qian
, Yingjie Victor Chen:
Fluency of visualizations: linking spatiotemporal visualizations to improve cybersecurity visual analytics. 6 - Joel Brynielsson, Fredrik Johansson, Carl Jonsson, Anders Westling:
Emotion classification of social media posts for estimating people's reactions to communicated alert messages during crises. 7 - Mary B. Burns, Kevin C. Moffitt:
Automated deception detection of 911 call transcripts. 8 - David B. Skillicorn, Edna F. Reid:
Language use in the Jihadist magazines inspire and Azan. 9 - Victor A. Benjamin, Wingyan Chung, Ahmed Abbasi
, Joshua Chuang, Catherine A. Larson, Hsinchun Chen:
Evaluating text visualization for authorship analysis. 10 - Hafiz Malik
, Hasan Mahmood:
Acoustic environment identification using unsupervised learning. 11 - Joseph Bruce, Jean Scholtz, Duncan Hodges
, Lia R. Emanuel, Danaë Stanton Fraser
, Sadie Creese, Oriana Love:
Pathways to identity: using visualization to aid law enforcement in identification tasks. 12 - Thomas E. Carroll, Frank L. Greitzer, Adam D. Roberts:
Security informatics research challenges for mitigating cyber friendly fire. 13 - Valerie Spicer, Justin Song, Patricia L. Brantingham:
Bridging the perceptual gap: variations in crime perception of businesses at the neighborhood level. 14 - Aaron Hunter:
Belief manipulation and message meaning for protocol analysis. 15
![](https://dblp.dagstuhl.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.