Security Informatics 2010
Christopher C. Yang, Michael Chau, Jau-Hwang Wang, Hsinchun Chen (Eds.): Security Informatics. Springer 2010 Annals of Information Systems 9 ISBN 978-1-4419-1324-1
Yi-Da Chen, Ahmed Abbasi, Hsinchun Chen: Framing Social Movement Identity with Cyber-Artifacts: A Case Study of the International Falun Gong Movement. 1-23
Christopher C. Yang, Xuning Tang: Information Integration for Terrorist or Criminal Social Networks. 41-57
Shaojie Qiao, Changjie Tang, Huidong Jin, Shucheng Dai, Xingshu Chen, Michael Chau, Jian Hu: Processing Constrained k-Closest Pairs Queries in Crime Databases. 59-75
Ickjai Lee, Reece Pershouse, Peter Phillips, Kyungmi Lee, Christopher Torpelund-Bruin: What-If Emergency Response Through Higher Order Voronoi Diagrams. 77-95
Yi-Ming Chen, Dachrahn Wu, Cheng-Kuang Wu: A Game Theoretic Framework for Multi-agent Deployment in Intrusion Detection Systems. 117-133
Stanley Y. W. Su, Howard W. Beck, Xuelian Xiao, Jeff DePree, Seema Degwekar, Chen Zhou, Minsoo Lee, Carla S. Thomas, Andrew Coggeshall, Richard Bostock: ETKnet: A Distributed Network System for Sharing Event Data and Multi-faceted Knowledge in a Collaboration Federation. 135-153
Shi-Cho Cha, Pei-Wen Juo, Li-Ting Liu, Wei-Ning Chen: Duplicate Work Reduction in Business Continuity and Risk Management Processes. 155-170



