1
Published 2008
Springer US
Table of Contents: ...Methodological Issues in Terrorism Research -- Domain Mapping of Contemporary Terrorism Research...

2
by Chen, Hsinchun
Published 2006
Springer US
Table of Contents: ... -- Domestic Counter-Terrorism -- Protecting Critical Infrastructure and Key Assets -- Defending Against...

3
Published 2013
Springer Berlin Heidelberg
Table of Contents: ...Information sharing and data/text mining -- Terrorism informatics -- Network-based data analytics...

4
by Chen, Hsinchun
Published 2012
Springer New York
Table of Contents: ...): Research Framework -- Chapter 3. Terrorism Informatics -- Chapter 4. Forum Spidering -- Chapter 5. Link...

5
Published 2004
Springer Berlin Heidelberg
Table of Contents: ... -- MIPT: Sharing Terrorism Information Resources -- Post-9/11 Evolution of Al Qaeda -- Utilizing...

6
Published 2008
Springer Berlin Heidelberg
Table of Contents: ...Terrorism Informatics and Data Mining -- Assured Information Sharing: Technologies, Challenges...

7
Published 2006
Springer Berlin Heidelberg
... to the established and emerging ISI technical research topics, ISI 2006 included a track on terrorism informatics...

8
Published 2010
Springer US
... applications. With the rise of global terrorism, the field has been given an increasing amount of attention...

9
Published 2009
Springer Berlin Heidelberg
Table of Contents: ... Operations -- Terrorism Informatics and Crime Analysis -- Criminal Cross Correlation Mining and Visualization...

10
Published 2012
Springer Berlin Heidelberg
... and selected from numerous submissions. The papers are organized in topical sections on terrorism informatics...

11
Published 2011
Springer Berlin Heidelberg
... are organized in topical sections on terrorism informatics and crime analysis; intelligence analysis...

12
Published 2003
Springer Berlin Heidelberg
Table of Contents: ... -- “Atrium” — A Knowledge Model for Modern Security Forces in the Information and Terrorism Age -- Untangling...

13
Published 2006
Springer Berlin Heidelberg
Table of Contents: ...Keynote Speech -- Data Mining for Security Applications -- Web and Text Mining for Terrorism...

14
Published 2010
Springer Berlin Heidelberg
Table of Contents: ...Terrorism Informatics and Crime Analysis -- Combined Detection Model for Criminal Network Detection...

15
Published 2015
Springer International Publishing
... and terrorism informatics and analytics, as well as enterprise risk management, IS security, and social media...

16
by Schumaker, Robert P., Solieman, Osama K., Chen, Hsinchun
Published 2010
Springer US
... in business, bioinformatics, counter-terrorism, and, increasingly, in professional sports. First popularized...

17
Published 2008
Springer Berlin Heidelberg
Table of Contents: ... Segmentation for Terrorism-Related Contents -- A Term Association Inference Model for Single Documents: A...