Skip to main content

Articles

Page 2 of 2

  1. One of the main challenges in cross-border disaster management is the development and use of information systems that cater the needs of heterogeneous relief agencies, policies, activities and cultures. Drawin...

    Authors: Nitesh Bharosa, JinKyu Lee, Marijn Janssen and H Raghav Rao
    Citation: Security Informatics 2012 1:15
  2. This paper reports an exploratory research on the distribution of event complexity in the British Columbia court system. Analysis of event distribution shows that the frequency of events sharply decreases with...

    Authors: Amir H Ghaseminejad, Paul Brantingham and Patricia Brantingham
    Citation: Security Informatics 2012 1:13
  3. Our most significant security challenges involve people. While human behavior has long been studied, computational modeling of human behavior is early in its development. An inherent challenge in modeling of h...

    Authors: Roderick M Riensche and Paul D Whitney
    Citation: Security Informatics 2012 1:11
  4. Analysts who use predictive analytics methods need actionable evidence to support their models and simulations. Commonly, this evidence is distilled from large data sets with significant amount of culling and ...

    Authors: Michael C Madison, Andrew J Cowell, R Scott Butner, Keith Fligg, Andrew W Piatt, Liam R McGrath and Peter C Ellis
    Citation: Security Informatics 2012 1:10
  5. Collaborative information systems (CIS) enable users to coordinate efficiently over shared tasks in complex distributed environments. For flexibility, they provide users with broad access privileges, which, as...

    Authors: You Chen, Steve Nyemba, Wen Zhang and Bradley Malin
    Citation: Security Informatics 2012 1:5
  6. In this paper we address the problem of testing complex computer models for infrastructure protection and emergency response based on detailed and realistic application scenarios using advanced computational m...

    Authors: Hamed Yaghoubi Shahir, Uwe Glässer, Roozbeh Farahbod, Piper Jackson and Hans Wehn
    Citation: Security Informatics 2012 1:4
  7. Law enforcement agencies monitor criminal incidents. With additional geographic and demographic data, law enforcement analysts look for spatio-temporal patterns in these incidents in order to predict future cr...

    Authors: Xiaofeng Wang and Donald E Brown
    Citation: Security Informatics 2012 1:2
  8. In previous studies classification algorithms were employed successfully for the detection of unknown malicious code. Most of these studies extracted features based on byte n-gram patterns in order to represent t...

    Authors: Asaf Shabtai, Robert Moskovitch, Clint Feher, Shlomi Dolev and Yuval Elovici
    Citation: Security Informatics 2012 1:1