Skip to content

Advertisement

Articles

Page 1 of 2

  1. Content type: Research

    Human trafficking is one of the most atrocious crimes and among the challenging problems facing law enforcement which demands attention of global magnitude. In this study, we leverage textual data from the we...

    Authors: Hamidreza Alvari, Paulo Shakarian and J. E. Kelly Snyder

    Citation: Security Informatics 2017 6:1

    Published on:

  2. Content type: Case study

    Currently 40 % of the world’s population, around 3 billion users, are online using cyberspace for everything from work to pleasure. While there are numerous benefits accompanying this medium, the Internet is n...

    Authors: Jason R. C. Nurse, Arnau Erola, Thomas Gibson-Robinson, Michael Goldsmith and Sadie Creese

    Citation: Security Informatics 2016 5:3

    Published on:

  3. Content type: Research

    Attackers increasingly take advantage of naive users who tend to treat non-executable files casually, as if they are benign. Such users often open non-executable files although they can conceal and perform mal...

    Authors: Nir Nissim, Aviad Cohen, Robert Moskovitch, Asaf Shabtai, Matan Edri, Oren BarAd and Yuval Elovici

    Citation: Security Informatics 2016 5:1

    Published on:

  4. Content type: Research

    DNSSEC offers protection against spoofing of DNS data by providing origin authentication, ensuring data integrity and authentication of non-existence by using public-key cryptography. Although the relevance of...

    Authors: Niels L. M. van Adrichem, Norbert Blenn, Antonio Reyes Lúa, Xin Wang, Muhammad Wasif, Ficky Fatturrahman and Fernando A. Kuipers

    Citation: Security Informatics 2015 4:8

    Published on:

  5. Content type: Research

    Popular network scan detection algorithms operate through evaluating external sources for unusual connection patterns and traffic rates. Research has revealed evasive tactics that enable full circumvention of ...

    Authors: Richard E Harang and Peter Mell

    Citation: Security Informatics 2015 4:4

    Published on:

  6. Content type: Research

    Wildlife trafficking, a focus of organized transnational crime syndicates, is a threat to biodiversity. Such crime networks span beyond protected areas holding strongholds of species of interest such as Africa...

    Authors: Timothy C Haas and Sam M Ferreira

    Citation: Security Informatics 2015 4:2

    Published on:

  7. Content type: Research

    Effectively assessing and configuring security controls to minimize network risks requires human judgment. Little is known about what factors network professionals perceive to make judgments of network risk. T...

    Authors: Jennifer Cowley, Frank L. Greitzer and Bronwyn Woods

    Citation: Security Informatics 2015 4:1

    Published on:

    The Erratum to this article has been published in Security Informatics 2015 4:5

  8. Content type: Research

    The language of influence or propaganda has been studied for a century but its predictions (simplification, deceptiveness, manipulation) can now be examined empirically using corpus analytics. Semantic models ...

    Authors: David B Skillicorn and Edna F Reid

    Citation: Security Informatics 2014 3:9

    Published on:

  9. Content type: Research

    The nature of identity has changed dramatically in recent years and has grown in complexity. Identities are defined in multiple domains: biological and psychological elements strongly contribute, but biographi...

    Authors: Joe Bruce, Jean Scholtz, Duncan Hodges, Lia Emanuel, Danaë Stanton Fraser, Sadie Creese and Oriana J Love

    Citation: Security Informatics 2014 3:12

    Published on:

  10. Content type: Research

    The word “Paedophilia” has come a long way from its Greek origin of child-companionship to a Mental Disorder, Social Taboo and Criminal Offence. Various laws are in place to help control such behaviour, protec...

    Authors: Anna Vartapetiance and Lee Gillam

    Citation: Security Informatics 2014 3:3

    Published on:

  11. Content type: Research

    Methods and tools to conduct authorship analysis of web contents is of growing interest to researchers and practitioners in various security-focused disciplines, including cybersecurity, counter-terrorism, and...

    Authors: Victor Benjamin, Wingyan Chung, Ahmed Abbasi, Joshua Chuang, Catherine A Larson and Hsinchun Chen

    Citation: Security Informatics 2014 3:10

    Published on:

  12. Content type: Research

    We demonstrate how one can generate predictions for several thousand incidents of Latin American civil unrest, often many days in advance, by surfacing informative public posts available on Twitter and Tumblr.

    Authors: Ryan Compton, Craig Lee, Jiejun Xu, Luis Artieda-Moncada, Tsai-Ching Lu, Lalindra De Silva and Michael Macy

    Citation: Security Informatics 2014 3:4

    Published on:

  13. Content type: Research

    One of the key factors influencing how people react to and behave during a crisis is their digital or non-digital social network, and the information they receive through this network. Publicly available onlin...

    Authors: Joel Brynielsson, Fredrik Johansson, Carl Jonsson and Anders Westling

    Citation: Security Informatics 2014 3:7

    Published on:

  14. Content type: Research

    This study is a successful proof of concept of using automated text analysis to accurately classify transcribed 911 homicide calls according to their veracity. Fifty matched, caller-side transcripts were label...

    Authors: Mary B Burns and Kevin C Moffitt

    Citation: Security Informatics 2014 3:8

    Published on:

  15. Content type: Research

    Insurgency emerges from many interactions between numerous social, economical, and geographical factors. Adequately accounting for the large number of potentially relevant interactions, and the complex ways in...

    Authors: Philippe J Giabbanelli

    Citation: Security Informatics 2014 3:2

    Published on:

  16. Content type: Research

    Lone wolf terrorists pose a large threat to modern society. The current ability to identify and stop these kinds of terrorists before they commit a terror act is limited since they are hard to detect using tra...

    Authors: Joel Brynielsson, Andreas Horndahl, Fredrik Johansson, Lisa Kaati, Christian Mårtenson and Pontus Svenson

    Citation: Security Informatics 2013 2:11

    Published on:

  17. Content type: Research

    Computational criminology has been seen primarily as computer-intensive simulations of criminal wrongdoing. But there is a growing menu of computer-intensive applications in criminology that one might call “co...

    Authors: Richard Berk

    Citation: Security Informatics 2013 2:5

    Published on:

  18. Content type: Research

    Despite their importance for stakeholders in the criminal justice system, few methods have been developed for determining which criminal behavior variables will produce accurate sentence predictions. Some appr...

    Authors: Carlo Morselli, Victor Hugo Masias, Fernando Crespo and Sigifredo Laengle

    Citation: Security Informatics 2013 2:4

    Published on:

  19. Content type: Research

    The objectives of this research are to display the utility of using agent based model and simulated experiments in understanding criminal behavior. In particular, this research focuses upon the distance decay ...

    Authors: Arvind Verma, Ramyaa Ramyaa and Suresh Marru

    Citation: Security Informatics 2013 2:3

    Published on:

  20. Content type: Research

    Computational criminology seeks to address criminological and criminal justice problems through the use of applied mathematics, computer science, and criminology. The development of mathematical and computatio...

    Authors: Colby L Valentine, Carter Hay, Kevin M Beaver and Thomas G Blomberg

    Citation: Security Informatics 2013 2:2

    Published on:

  21. Content type: Research

    Dynamic activity involving social networks often has distinctive temporal patterns that can be exploited in situations involving incomplete information. Gang rivalry networks, in particular, display a high deg...

    Authors: Rachel A Hegemann, Erik A Lewis and Andrea L Bertozzi

    Citation: Security Informatics 2013 2:1

    Published on:

  22. Content type: Research

    Public safety has been a great concern in recent years as terrorism occurs everywhere. When a public event is held in an urban environment like Olympic games or soccer games, it is important to keep the public...

    Authors: Andrew J Park, Herbert H Tsang, Mengting Sun and Uwe Glässer

    Citation: Security Informatics 2012 1:23

    Published on:

  23. Content type: Research

    There is considerable interest in developing predictive capabilities for social diffusion processes, for instance to permit early identification of emerging contentious situations, rapid detection of disease o...

    Authors: Richard Colbaugh and Kristin Glass

    Citation: Security Informatics 2012 1:18

    Published on:

  24. Content type: Research

    The collection and assessment of national security related information often involves an arduous process of detecting relevant associations between people, events, and locations—typically within very large dat...

    Authors: Craig M Vineyard, Stephen J Verzi, Michael L Bernard, Shawn E Taylor, Irene Dubicka and Thomas P Caudell

    Citation: Security Informatics 2012 1:20

    Published on:

2016 Journal Metrics

  • Speed
    24 days from submission to first decision
    14 days from acceptance to publication

    Usage 
    46,792 downloads
    1912.0 Usage Factor

    Social Media Impact
    12 mentions