Search dblp for Publications

export results for "toc:db/journals/secinf/secinf2.bht:"

 download as .bib file

@article{DBLP:journals/secinf/Berk13,
  author       = {Richard Berk},
  title        = {Algorithmic criminology},
  journal      = {Secur. Informatics},
  volume       = {2},
  number       = {1},
  pages        = {5},
  year         = {2013},
  url          = {https://doi.org/10.1186/2190-8532-2-5},
  doi          = {10.1186/2190-8532-2-5},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/secinf/Berk13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/secinf/Bowman-Grieve13,
  author       = {Lorraine Bowman{-}Grieve},
  title        = {A psychological perspective on virtual communities supporting terrorist
                  {\&} extremist ideologies as a tool for recruitment},
  journal      = {Secur. Informatics},
  volume       = {2},
  number       = {1},
  pages        = {9},
  year         = {2013},
  url          = {https://doi.org/10.1186/2190-8532-2-9},
  doi          = {10.1186/2190-8532-2-9},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/secinf/Bowman-Grieve13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/secinf/BrynielssonHJKM13,
  author       = {Joel Brynielsson and
                  Andreas Horndahl and
                  Fredrik Johansson and
                  Lisa Kaati and
                  Christian M{\aa}rtenson and
                  Pontus Svenson},
  title        = {Harvesting and analysis of weak signals for detecting lone wolf terrorists},
  journal      = {Secur. Informatics},
  volume       = {2},
  number       = {1},
  pages        = {11},
  year         = {2013},
  url          = {https://doi.org/10.1186/2190-8532-2-11},
  doi          = {10.1186/2190-8532-2-11},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/secinf/BrynielssonHJKM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/secinf/DesmaraisC13,
  author       = {Bruce A. Desmarais and
                  Skyler J. Cranmer},
  title        = {Forecasting the locational dynamics of transnational terrorism: a
                  network analytic approach},
  journal      = {Secur. Informatics},
  volume       = {2},
  number       = {1},
  pages        = {8},
  year         = {2013},
  url          = {https://doi.org/10.1186/2190-8532-2-8},
  doi          = {10.1186/2190-8532-2-8},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/secinf/DesmaraisC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/secinf/HegemannLB13,
  author       = {Rachel A. Hegemann and
                  Erik A. Lewis and
                  Andrea L. Bertozzi},
  title        = {An "Estimate {\&} Score Algorithm" for simultaneous parameter
                  estimation and reconstruction of incomplete data on social networks},
  journal      = {Secur. Informatics},
  volume       = {2},
  number       = {1},
  pages        = {1},
  year         = {2013},
  url          = {https://doi.org/10.1186/2190-8532-2-1},
  doi          = {10.1186/2190-8532-2-1},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/secinf/HegemannLB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/secinf/MorselliMCL13,
  author       = {Carlo Morselli and
                  Victor Hugo Masias and
                  Fernando A. Crespo and
                  Sigifredo Laengle},
  title        = {Predicting sentencing outcomes with centrality measures},
  journal      = {Secur. Informatics},
  volume       = {2},
  number       = {1},
  pages        = {4},
  year         = {2013},
  url          = {https://doi.org/10.1186/2190-8532-2-4},
  doi          = {10.1186/2190-8532-2-4},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/secinf/MorselliMCL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/secinf/PetersenW13,
  author       = {Rasmus Rosenqvist Petersen and
                  Uffe Kock Wiil},
  title        = {CrimeFighter Investigator: Integrating synthesis and sense-making
                  for criminal network investigation},
  journal      = {Secur. Informatics},
  volume       = {2},
  number       = {1},
  pages        = {10},
  year         = {2013},
  url          = {https://doi.org/10.1186/2190-8532-2-10},
  doi          = {10.1186/2190-8532-2-10},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/secinf/PetersenW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/secinf/Torok13,
  author       = {Robyn Torok},
  title        = {Developing an explanatory model for the process of online radicalisation
                  and terrorism},
  journal      = {Secur. Informatics},
  volume       = {2},
  number       = {1},
  pages        = {6},
  year         = {2013},
  url          = {https://doi.org/10.1186/2190-8532-2-6},
  doi          = {10.1186/2190-8532-2-6},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/secinf/Torok13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/secinf/ValentineHBB13,
  author       = {Colby L. Valentine and
                  Carter Hay and
                  Kevin M. Beaver and
                  Thomas G. Blomberg},
  title        = {Through a computational lens: using dual computer-criminology degree
                  programs to advance the study of criminology and criminal justice
                  practice},
  journal      = {Secur. Informatics},
  volume       = {2},
  number       = {1},
  pages        = {2},
  year         = {2013},
  url          = {https://doi.org/10.1186/2190-8532-2-2},
  doi          = {10.1186/2190-8532-2-2},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/secinf/ValentineHBB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/secinf/VermaRM13,
  author       = {Arvind K. Verma and
                  Ramyaa Ramyaa and
                  Suresh Marru},
  title        = {Validating distance decay through agent based modeling},
  journal      = {Secur. Informatics},
  volume       = {2},
  number       = {1},
  pages        = {3},
  year         = {2013},
  url          = {https://doi.org/10.1186/2190-8532-2-3},
  doi          = {10.1186/2190-8532-2-3},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/secinf/VermaRM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/secinf/ZhangB13,
  author       = {Yue Zhang and
                  Donald E. Brown},
  title        = {Police patrol districting method and simulation evaluation using agent-based
                  model {\&} {GIS}},
  journal      = {Secur. Informatics},
  volume       = {2},
  number       = {1},
  pages        = {7},
  year         = {2013},
  url          = {https://doi.org/10.1186/2190-8532-2-7},
  doi          = {10.1186/2190-8532-2-7},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/secinf/ZhangB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics