default search action
Search dblp for Publications
export results for "toc:db/series/lnsn/lnsn2.bht:"
@incollection{DBLP:series/lnsn/AghakhaniDAR11, author = {Sara Aghakhani and Khaled Dawoud and Reda Alhajj and Jon G. Rokne}, editor = {Uffe Kock Wiil}, title = {A Global Measure for Estimating the Degree of Organization and Effectiveness of Individual Actors with Application to Terrorist Networks}, booktitle = {Counterterrorism and Open Source Intelligence}, series = {Lecture Notes in Social Networks}, volume = {2}, pages = {189--222}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-7091-0388-3\_11}, doi = {10.1007/978-3-7091-0388-3\_11}, timestamp = {Mon, 15 Jun 2020 16:48:08 +0200}, biburl = {https://dblp.org/rec/series/lnsn/AghakhaniDAR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lnsn/AtkinsonPGY11, author = {Martin Atkinson and Jakub Piskorski and Erik Van der Goot and Roman Yangarber}, editor = {Uffe Kock Wiil}, title = {Multilingual Real-time Event Extraction for Border Security Intelligence Gathering}, booktitle = {Counterterrorism and Open Source Intelligence}, series = {Lecture Notes in Social Networks}, volume = {2}, pages = {355--390}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-7091-0388-3\_18}, doi = {10.1007/978-3-7091-0388-3\_18}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/lnsn/AtkinsonPGY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lnsn/BrantinghamEFGT11, author = {Patricia L. Brantingham and Martin Ester and Richard Frank and Uwe Gl{\"{a}}sser and Mohammad A. Tayebi}, editor = {Uffe Kock Wiil}, title = {Co-offending Network Mining}, booktitle = {Counterterrorism and Open Source Intelligence}, series = {Lecture Notes in Social Networks}, volume = {2}, pages = {73--102}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-7091-0388-3\_6}, doi = {10.1007/978-3-7091-0388-3\_6}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lnsn/BrantinghamEFGT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lnsn/Chen11, author = {Hsinchun Chen}, editor = {Uffe Kock Wiil}, title = {From Terrorism Informatics to Dark Web Research}, booktitle = {Counterterrorism and Open Source Intelligence}, series = {Lecture Notes in Social Networks}, volume = {2}, pages = {317--341}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-7091-0388-3\_16}, doi = {10.1007/978-3-7091-0388-3\_16}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lnsn/Chen11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lnsn/ChenGKAR11, author = {Alan Chia{-}Lung Chen and Shang Gao and Panagiotis Karampelas and Reda Alhajj and Jon G. Rokne}, editor = {Uffe Kock Wiil}, title = {Finding Hidden Links in Terrorist Networks by Checking Indirect Links of Different Sub-Networks}, booktitle = {Counterterrorism and Open Source Intelligence}, series = {Lecture Notes in Social Networks}, volume = {2}, pages = {143--158}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-7091-0388-3\_8}, doi = {10.1007/978-3-7091-0388-3\_8}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lnsn/ChenGKAR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lnsn/Danowski11, author = {James A. Danowski}, editor = {Uffe Kock Wiil}, title = {Counterterrorism Mining for Individuals Semantically-Similar to Watchlist Members}, booktitle = {Counterterrorism and Open Source Intelligence}, series = {Lecture Notes in Social Networks}, volume = {2}, pages = {223--247}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-7091-0388-3\_12}, doi = {10.1007/978-3-7091-0388-3\_12}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lnsn/Danowski11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lnsn/Gutfraind11, author = {Alexander Gutfraind}, editor = {Uffe Kock Wiil}, title = {Targeting by Transnational Terrorist Groups}, booktitle = {Counterterrorism and Open Source Intelligence}, series = {Lecture Notes in Social Networks}, volume = {2}, pages = {9--32}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-7091-0388-3\_2}, doi = {10.1007/978-3-7091-0388-3\_2}, timestamp = {Fri, 09 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lnsn/Gutfraind11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lnsn/LindelaufBH11, author = {Roy Lindelauf and Peter Borm and Herbert Hamers}, editor = {Uffe Kock Wiil}, title = {Understanding Terrorist Network Topologies and Their Resilience Against Disruption}, booktitle = {Counterterrorism and Open Source Intelligence}, series = {Lecture Notes in Social Networks}, volume = {2}, pages = {61--72}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-7091-0388-3\_5}, doi = {10.1007/978-3-7091-0388-3\_5}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lnsn/LindelaufBH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lnsn/NajiNEGKORDRA11, author = {Ghada Naji and Mohamad Nagi and Abdallah M. ElSheikh and Shang Gao and Keivan Kianmehr and Tansel {\"{O}}zyer and Jon G. Rokne and Douglas J. Demetrick and Mick J. Ridley and Reda Alhajj}, editor = {Uffe Kock Wiil}, title = {Effectiveness of Social Networks for Studying Biological Agents and Identifying Cancer Biomarkers}, booktitle = {Counterterrorism and Open Source Intelligence}, series = {Lecture Notes in Social Networks}, volume = {2}, pages = {285--313}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-7091-0388-3\_15}, doi = {10.1007/978-3-7091-0388-3\_15}, timestamp = {Mon, 16 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lnsn/NajiNEGKORDRA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lnsn/NeriAC11, author = {Federico Neri and Carlo Aliprandi and Furio Camillo}, editor = {Uffe Kock Wiil}, title = {Mining the Web to Monitor the Political Consensus}, booktitle = {Counterterrorism and Open Source Intelligence}, series = {Lecture Notes in Social Networks}, volume = {2}, pages = {391--412}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-7091-0388-3\_19}, doi = {10.1007/978-3-7091-0388-3\_19}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lnsn/NeriAC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lnsn/NizamaniMW11, author = {Sarwat Nizamani and Nasrullah Memon and Uffe Kock Wiil}, editor = {Uffe Kock Wiil}, title = {Detection of Illegitimate Emails Using Boosting Algorithm}, booktitle = {Counterterrorism and Open Source Intelligence}, series = {Lecture Notes in Social Networks}, volume = {2}, pages = {249--264}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-7091-0388-3\_13}, doi = {10.1007/978-3-7091-0388-3\_13}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lnsn/NizamaniMW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lnsn/NizamaniMW11a, author = {Sarwat Nizamani and Nasrullah Memon and Uffe Kock Wiil}, editor = {Uffe Kock Wiil}, title = {Cluster Based Text Classification Model}, booktitle = {Counterterrorism and Open Source Intelligence}, series = {Lecture Notes in Social Networks}, volume = {2}, pages = {265--283}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-7091-0388-3\_14}, doi = {10.1007/978-3-7091-0388-3\_14}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lnsn/NizamaniMW11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lnsn/OzgulCAG11, author = {Fatih {\"{O}}zg{\"{u}}l and Ahmet {\c{C}}elik and Claus Atzenbeck and Nadir Gergin}, editor = {Uffe Kock Wiil}, title = {Investigating Terrorist Attacks Using {CDR} Data: {A} Case Study}, booktitle = {Counterterrorism and Open Source Intelligence}, series = {Lecture Notes in Social Networks}, volume = {2}, pages = {343--354}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-7091-0388-3\_17}, doi = {10.1007/978-3-7091-0388-3\_17}, timestamp = {Wed, 14 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lnsn/OzgulCAG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lnsn/Rhodes11, author = {Christopher J. Rhodes}, editor = {Uffe Kock Wiil}, title = {The Use of Open Source Intelligence in the Construction of Covert Social Networks}, booktitle = {Counterterrorism and Open Source Intelligence}, series = {Lecture Notes in Social Networks}, volume = {2}, pages = {159--170}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-7091-0388-3\_9}, doi = {10.1007/978-3-7091-0388-3\_9}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lnsn/Rhodes11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lnsn/ShakarianS11, author = {Paulo Shakarian and V. S. Subrahmanian}, editor = {Uffe Kock Wiil}, title = {Region-Based Geospatial Abduction with Counter-IED Applications}, booktitle = {Counterterrorism and Open Source Intelligence}, series = {Lecture Notes in Social Networks}, volume = {2}, pages = {105--142}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-7091-0388-3\_7}, doi = {10.1007/978-3-7091-0388-3\_7}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lnsn/ShakarianS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lnsn/SkillicornB11, author = {David B. Skillicorn and M. A. J. Bourassa}, editor = {Uffe Kock Wiil}, title = {A Framework for Analyst Focus from Computed Significance}, booktitle = {Counterterrorism and Open Source Intelligence}, series = {Lecture Notes in Social Networks}, volume = {2}, pages = {33--47}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-7091-0388-3\_3}, doi = {10.1007/978-3-7091-0388-3\_3}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lnsn/SkillicornB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lnsn/Steele11, author = {Robert David Steele}, editor = {Uffe Kock Wiil}, title = {The Ultimate Hack: Re-inventing Intelligence to Re-engineer Earth}, booktitle = {Counterterrorism and Open Source Intelligence}, series = {Lecture Notes in Social Networks}, volume = {2}, pages = {431--458}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-7091-0388-3\_21}, doi = {10.1007/978-3-7091-0388-3\_21}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lnsn/Steele11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lnsn/Wiil11, author = {Uffe Kock Wiil}, editor = {Uffe Kock Wiil}, title = {Counterterrorism and Open Source Intelligence: Models, Tools, Techniques, and Case Studies}, booktitle = {Counterterrorism and Open Source Intelligence}, series = {Lecture Notes in Social Networks}, volume = {2}, pages = {1--6}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-7091-0388-3\_1}, doi = {10.1007/978-3-7091-0388-3\_1}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lnsn/Wiil11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lnsn/Woo11, author = {Gordon Woo}, editor = {Uffe Kock Wiil}, title = {Interdiction of Plots with Multiple Operatives}, booktitle = {Counterterrorism and Open Source Intelligence}, series = {Lecture Notes in Social Networks}, volume = {2}, pages = {49--59}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-7091-0388-3\_4}, doi = {10.1007/978-3-7091-0388-3\_4}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lnsn/Woo11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/lnsn/2011-2, editor = {Uffe Kock Wiil}, title = {Counterterrorism and Open Source Intelligence}, series = {Lecture Notes in Social Networks}, volume = {2}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-7091-0388-3}, doi = {10.1007/978-3-7091-0388-3}, isbn = {978-3-7091-0387-6}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lnsn/2011-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lnsn/MemonWQK11, title = {Exploring the Evolution of Terrorist Networks}, booktitle = {Counterterrorism and Open Source Intelligence}, series = {Lecture Notes in Social Networks}, volume = {2}, pages = {413--427}, publisher = {Springer}, year = {2011}, note = {Withdrawn.}, url = {https://doi.org/10.1007/978-3-7091-0388-3\_20}, doi = {10.1007/978-3-7091-0388-3\_20}, timestamp = {Fri, 20 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lnsn/MemonWQK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lnsn/WiilGM11, title = {A Novel Method to Analyze the Importance of Links in Terrorist Networks}, booktitle = {Counterterrorism and Open Source Intelligence}, series = {Lecture Notes in Social Networks}, volume = {2}, pages = {171--187}, publisher = {Springer}, year = {2011}, note = {Withdrawn.}, url = {https://doi.org/10.1007/978-3-7091-0388-3\_10}, doi = {10.1007/978-3-7091-0388-3\_10}, timestamp = {Fri, 20 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lnsn/WiilGM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.