Skip to content

Advertisement

Articles

Sort by
Page 1 of 3
  1. Content type: Research

    Human trafficking is one of the most atrocious crimes and among the challenging problems facing law enforcement which demands attention of global magnitude. In this study, we leverage textual data from the we...

    Authors: Hamidreza Alvari, Paulo Shakarian and J. E. Kelly Snyder

    Citation: Security Informatics 2017 6:1

    Published on:

  2. Content type: Case study

    Currently 40 % of the world’s population, around 3 billion users, are online using cyberspace for everything from work to pleasure. While there are numerous benefits accompanying this medium, the Internet is n...

    Authors: Jason R. C. Nurse, Arnau Erola, Thomas Gibson-Robinson, Michael Goldsmith and Sadie Creese

    Citation: Security Informatics 2016 5:3

    Published on:

  3. Content type: Research

    Attackers increasingly take advantage of naive users who tend to treat non-executable files casually, as if they are benign. Such users often open non-executable files although they can conceal and perform mal...

    Authors: Nir Nissim, Aviad Cohen, Robert Moskovitch, Asaf Shabtai, Matan Edri, Oren BarAd and Yuval Elovici

    Citation: Security Informatics 2016 5:1

    Published on:

  4. Content type: Research

    DNSSEC offers protection against spoofing of DNS data by providing origin authentication, ensuring data integrity and authentication of non-existence by using public-key cryptography. Although the relevance of...

    Authors: Niels L. M. van Adrichem, Norbert Blenn, Antonio Reyes Lúa, Xin Wang, Muhammad Wasif, Ficky Fatturrahman and Fernando A. Kuipers

    Citation: Security Informatics 2015 4:8

    Published on:

  5. Content type: Research

    Popular network scan detection algorithms operate through evaluating external sources for unusual connection patterns and traffic rates. Research has revealed evasive tactics that enable full circumvention of ...

    Authors: Richard E Harang and Peter Mell

    Citation: Security Informatics 2015 4:4

    Published on:

  6. Content type: Research

    Wildlife trafficking, a focus of organized transnational crime syndicates, is a threat to biodiversity. Such crime networks span beyond protected areas holding strongholds of species of interest such as Africa...

    Authors: Timothy C Haas and Sam M Ferreira

    Citation: Security Informatics 2015 4:2

    Published on:

  7. Content type: Research

    Effectively assessing and configuring security controls to minimize network risks requires human judgment. Little is known about what factors network professionals perceive to make judgments of network risk. T...

    Authors: Jennifer Cowley, Frank L. Greitzer and Bronwyn Woods

    Citation: Security Informatics 2015 4:1

    Published on:

    The Erratum to this article has been published in Security Informatics 2015 4:5

  8. Content type: Research

    The language of influence or propaganda has been studied for a century but its predictions (simplification, deceptiveness, manipulation) can now be examined empirically using corpus analytics. Semantic models ...

    Authors: David B Skillicorn and Edna F Reid

    Citation: Security Informatics 2014 3:9

    Published on:

  9. Content type: Research

    The nature of identity has changed dramatically in recent years and has grown in complexity. Identities are defined in multiple domains: biological and psychological elements strongly contribute, but biographi...

    Authors: Joe Bruce, Jean Scholtz, Duncan Hodges, Lia Emanuel, Danaë Stanton Fraser, Sadie Creese and Oriana J Love

    Citation: Security Informatics 2014 3:12

    Published on:

  10. Content type: Research

    The word “Paedophilia” has come a long way from its Greek origin of child-companionship to a Mental Disorder, Social Taboo and Criminal Offence. Various laws are in place to help control such behaviour, protec...

    Authors: Anna Vartapetiance and Lee Gillam

    Citation: Security Informatics 2014 3:3

    Published on:

  11. Content type: Research

    Methods and tools to conduct authorship analysis of web contents is of growing interest to researchers and practitioners in various security-focused disciplines, including cybersecurity, counter-terrorism, and...

    Authors: Victor Benjamin, Wingyan Chung, Ahmed Abbasi, Joshua Chuang, Catherine A Larson and Hsinchun Chen

    Citation: Security Informatics 2014 3:10

    Published on:

  12. Content type: Research

    We demonstrate how one can generate predictions for several thousand incidents of Latin American civil unrest, often many days in advance, by surfacing informative public posts available on Twitter and Tumblr.

    Authors: Ryan Compton, Craig Lee, Jiejun Xu, Luis Artieda-Moncada, Tsai-Ching Lu, Lalindra De Silva and Michael Macy

    Citation: Security Informatics 2014 3:4

    Published on:

  13. Content type: Research

    One of the key factors influencing how people react to and behave during a crisis is their digital or non-digital social network, and the information they receive through this network. Publicly available onlin...

    Authors: Joel Brynielsson, Fredrik Johansson, Carl Jonsson and Anders Westling

    Citation: Security Informatics 2014 3:7

    Published on:

Page 1 of 3

2016 Journal Metrics

  • Speed
    24 days from submission to first decision
    14 days from acceptance to publication

    Usage 
    46,792 downloads
    1912.0 Usage Factor

    Social Media Impact
    12 mentions

Advertisement