Search dblp for Publications

export results for "toc:db/series/lnsn/lnsn2.bht:"

 download as .bib file

@incollection{DBLP:series/lnsn/AghakhaniDAR11,
  author       = {Sara Aghakhani and
                  Khaled Dawoud and
                  Reda Alhajj and
                  Jon G. Rokne},
  editor       = {Uffe Kock Wiil},
  title        = {A Global Measure for Estimating the Degree of Organization and Effectiveness
                  of Individual Actors with Application to Terrorist Networks},
  booktitle    = {Counterterrorism and Open Source Intelligence},
  series       = {Lecture Notes in Social Networks},
  volume       = {2},
  pages        = {189--222},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-7091-0388-3\_11},
  doi          = {10.1007/978-3-7091-0388-3\_11},
  timestamp    = {Mon, 15 Jun 2020 16:48:08 +0200},
  biburl       = {https://dblp.org/rec/series/lnsn/AghakhaniDAR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lnsn/AtkinsonPGY11,
  author       = {Martin Atkinson and
                  Jakub Piskorski and
                  Erik Van der Goot and
                  Roman Yangarber},
  editor       = {Uffe Kock Wiil},
  title        = {Multilingual Real-time Event Extraction for Border Security Intelligence
                  Gathering},
  booktitle    = {Counterterrorism and Open Source Intelligence},
  series       = {Lecture Notes in Social Networks},
  volume       = {2},
  pages        = {355--390},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-7091-0388-3\_18},
  doi          = {10.1007/978-3-7091-0388-3\_18},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/lnsn/AtkinsonPGY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lnsn/BrantinghamEFGT11,
  author       = {Patricia L. Brantingham and
                  Martin Ester and
                  Richard Frank and
                  Uwe Gl{\"{a}}sser and
                  Mohammad A. Tayebi},
  editor       = {Uffe Kock Wiil},
  title        = {Co-offending Network Mining},
  booktitle    = {Counterterrorism and Open Source Intelligence},
  series       = {Lecture Notes in Social Networks},
  volume       = {2},
  pages        = {73--102},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-7091-0388-3\_6},
  doi          = {10.1007/978-3-7091-0388-3\_6},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/lnsn/BrantinghamEFGT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lnsn/Chen11,
  author       = {Hsinchun Chen},
  editor       = {Uffe Kock Wiil},
  title        = {From Terrorism Informatics to Dark Web Research},
  booktitle    = {Counterterrorism and Open Source Intelligence},
  series       = {Lecture Notes in Social Networks},
  volume       = {2},
  pages        = {317--341},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-7091-0388-3\_16},
  doi          = {10.1007/978-3-7091-0388-3\_16},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/lnsn/Chen11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lnsn/ChenGKAR11,
  author       = {Alan Chia{-}Lung Chen and
                  Shang Gao and
                  Panagiotis Karampelas and
                  Reda Alhajj and
                  Jon G. Rokne},
  editor       = {Uffe Kock Wiil},
  title        = {Finding Hidden Links in Terrorist Networks by Checking Indirect Links
                  of Different Sub-Networks},
  booktitle    = {Counterterrorism and Open Source Intelligence},
  series       = {Lecture Notes in Social Networks},
  volume       = {2},
  pages        = {143--158},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-7091-0388-3\_8},
  doi          = {10.1007/978-3-7091-0388-3\_8},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/lnsn/ChenGKAR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lnsn/Danowski11,
  author       = {James A. Danowski},
  editor       = {Uffe Kock Wiil},
  title        = {Counterterrorism Mining for Individuals Semantically-Similar to Watchlist
                  Members},
  booktitle    = {Counterterrorism and Open Source Intelligence},
  series       = {Lecture Notes in Social Networks},
  volume       = {2},
  pages        = {223--247},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-7091-0388-3\_12},
  doi          = {10.1007/978-3-7091-0388-3\_12},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/lnsn/Danowski11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lnsn/Gutfraind11,
  author       = {Alexander Gutfraind},
  editor       = {Uffe Kock Wiil},
  title        = {Targeting by Transnational Terrorist Groups},
  booktitle    = {Counterterrorism and Open Source Intelligence},
  series       = {Lecture Notes in Social Networks},
  volume       = {2},
  pages        = {9--32},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-7091-0388-3\_2},
  doi          = {10.1007/978-3-7091-0388-3\_2},
  timestamp    = {Fri, 09 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/lnsn/Gutfraind11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lnsn/LindelaufBH11,
  author       = {Roy Lindelauf and
                  Peter Borm and
                  Herbert Hamers},
  editor       = {Uffe Kock Wiil},
  title        = {Understanding Terrorist Network Topologies and Their Resilience Against
                  Disruption},
  booktitle    = {Counterterrorism and Open Source Intelligence},
  series       = {Lecture Notes in Social Networks},
  volume       = {2},
  pages        = {61--72},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-7091-0388-3\_5},
  doi          = {10.1007/978-3-7091-0388-3\_5},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/lnsn/LindelaufBH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lnsn/NajiNEGKORDRA11,
  author       = {Ghada Naji and
                  Mohamad Nagi and
                  Abdallah M. ElSheikh and
                  Shang Gao and
                  Keivan Kianmehr and
                  Tansel {\"{O}}zyer and
                  Jon G. Rokne and
                  Douglas J. Demetrick and
                  Mick J. Ridley and
                  Reda Alhajj},
  editor       = {Uffe Kock Wiil},
  title        = {Effectiveness of Social Networks for Studying Biological Agents and
                  Identifying Cancer Biomarkers},
  booktitle    = {Counterterrorism and Open Source Intelligence},
  series       = {Lecture Notes in Social Networks},
  volume       = {2},
  pages        = {285--313},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-7091-0388-3\_15},
  doi          = {10.1007/978-3-7091-0388-3\_15},
  timestamp    = {Mon, 16 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/lnsn/NajiNEGKORDRA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lnsn/NeriAC11,
  author       = {Federico Neri and
                  Carlo Aliprandi and
                  Furio Camillo},
  editor       = {Uffe Kock Wiil},
  title        = {Mining the Web to Monitor the Political Consensus},
  booktitle    = {Counterterrorism and Open Source Intelligence},
  series       = {Lecture Notes in Social Networks},
  volume       = {2},
  pages        = {391--412},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-7091-0388-3\_19},
  doi          = {10.1007/978-3-7091-0388-3\_19},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/lnsn/NeriAC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lnsn/NizamaniMW11,
  author       = {Sarwat Nizamani and
                  Nasrullah Memon and
                  Uffe Kock Wiil},
  editor       = {Uffe Kock Wiil},
  title        = {Detection of Illegitimate Emails Using Boosting Algorithm},
  booktitle    = {Counterterrorism and Open Source Intelligence},
  series       = {Lecture Notes in Social Networks},
  volume       = {2},
  pages        = {249--264},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-7091-0388-3\_13},
  doi          = {10.1007/978-3-7091-0388-3\_13},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/lnsn/NizamaniMW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lnsn/NizamaniMW11a,
  author       = {Sarwat Nizamani and
                  Nasrullah Memon and
                  Uffe Kock Wiil},
  editor       = {Uffe Kock Wiil},
  title        = {Cluster Based Text Classification Model},
  booktitle    = {Counterterrorism and Open Source Intelligence},
  series       = {Lecture Notes in Social Networks},
  volume       = {2},
  pages        = {265--283},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-7091-0388-3\_14},
  doi          = {10.1007/978-3-7091-0388-3\_14},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/lnsn/NizamaniMW11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lnsn/OzgulCAG11,
  author       = {Fatih {\"{O}}zg{\"{u}}l and
                  Ahmet {\c{C}}elik and
                  Claus Atzenbeck and
                  Nadir Gergin},
  editor       = {Uffe Kock Wiil},
  title        = {Investigating Terrorist Attacks Using {CDR} Data: {A} Case Study},
  booktitle    = {Counterterrorism and Open Source Intelligence},
  series       = {Lecture Notes in Social Networks},
  volume       = {2},
  pages        = {343--354},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-7091-0388-3\_17},
  doi          = {10.1007/978-3-7091-0388-3\_17},
  timestamp    = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/lnsn/OzgulCAG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lnsn/Rhodes11,
  author       = {Christopher J. Rhodes},
  editor       = {Uffe Kock Wiil},
  title        = {The Use of Open Source Intelligence in the Construction of Covert
                  Social Networks},
  booktitle    = {Counterterrorism and Open Source Intelligence},
  series       = {Lecture Notes in Social Networks},
  volume       = {2},
  pages        = {159--170},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-7091-0388-3\_9},
  doi          = {10.1007/978-3-7091-0388-3\_9},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/lnsn/Rhodes11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lnsn/ShakarianS11,
  author       = {Paulo Shakarian and
                  V. S. Subrahmanian},
  editor       = {Uffe Kock Wiil},
  title        = {Region-Based Geospatial Abduction with Counter-IED Applications},
  booktitle    = {Counterterrorism and Open Source Intelligence},
  series       = {Lecture Notes in Social Networks},
  volume       = {2},
  pages        = {105--142},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-7091-0388-3\_7},
  doi          = {10.1007/978-3-7091-0388-3\_7},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/lnsn/ShakarianS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lnsn/SkillicornB11,
  author       = {David B. Skillicorn and
                  M. A. J. Bourassa},
  editor       = {Uffe Kock Wiil},
  title        = {A Framework for Analyst Focus from Computed Significance},
  booktitle    = {Counterterrorism and Open Source Intelligence},
  series       = {Lecture Notes in Social Networks},
  volume       = {2},
  pages        = {33--47},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-7091-0388-3\_3},
  doi          = {10.1007/978-3-7091-0388-3\_3},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/lnsn/SkillicornB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lnsn/Steele11,
  author       = {Robert David Steele},
  editor       = {Uffe Kock Wiil},
  title        = {The Ultimate Hack: Re-inventing Intelligence to Re-engineer Earth},
  booktitle    = {Counterterrorism and Open Source Intelligence},
  series       = {Lecture Notes in Social Networks},
  volume       = {2},
  pages        = {431--458},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-7091-0388-3\_21},
  doi          = {10.1007/978-3-7091-0388-3\_21},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/lnsn/Steele11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lnsn/Wiil11,
  author       = {Uffe Kock Wiil},
  editor       = {Uffe Kock Wiil},
  title        = {Counterterrorism and Open Source Intelligence: Models, Tools, Techniques,
                  and Case Studies},
  booktitle    = {Counterterrorism and Open Source Intelligence},
  series       = {Lecture Notes in Social Networks},
  volume       = {2},
  pages        = {1--6},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-7091-0388-3\_1},
  doi          = {10.1007/978-3-7091-0388-3\_1},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/lnsn/Wiil11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lnsn/Woo11,
  author       = {Gordon Woo},
  editor       = {Uffe Kock Wiil},
  title        = {Interdiction of Plots with Multiple Operatives},
  booktitle    = {Counterterrorism and Open Source Intelligence},
  series       = {Lecture Notes in Social Networks},
  volume       = {2},
  pages        = {49--59},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-7091-0388-3\_4},
  doi          = {10.1007/978-3-7091-0388-3\_4},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/lnsn/Woo11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/lnsn/2011-2,
  editor       = {Uffe Kock Wiil},
  title        = {Counterterrorism and Open Source Intelligence},
  series       = {Lecture Notes in Social Networks},
  volume       = {2},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-7091-0388-3},
  doi          = {10.1007/978-3-7091-0388-3},
  isbn         = {978-3-7091-0387-6},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/lnsn/2011-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lnsn/MemonWQK11,
  title        = {Exploring the Evolution of Terrorist Networks},
  booktitle    = {Counterterrorism and Open Source Intelligence},
  series       = {Lecture Notes in Social Networks},
  volume       = {2},
  pages        = {413--427},
  publisher    = {Springer},
  year         = {2011},
  note         = {Withdrawn.},
  url          = {https://doi.org/10.1007/978-3-7091-0388-3\_20},
  doi          = {10.1007/978-3-7091-0388-3\_20},
  timestamp    = {Fri, 20 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/lnsn/MemonWQK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lnsn/WiilGM11,
  title        = {A Novel Method to Analyze the Importance of Links in Terrorist Networks},
  booktitle    = {Counterterrorism and Open Source Intelligence},
  series       = {Lecture Notes in Social Networks},
  volume       = {2},
  pages        = {171--187},
  publisher    = {Springer},
  year         = {2011},
  note         = {Withdrawn.},
  url          = {https://doi.org/10.1007/978-3-7091-0388-3\_10},
  doi          = {10.1007/978-3-7091-0388-3\_10},
  timestamp    = {Fri, 20 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/lnsn/WiilGM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}