×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [security informatics]
Emergent Vulnerabilities And Attacks: A complex threat landscape NATHANIEL HUSTED
[email protected]
@INDIANA.EDU INDIANA UNIVERSITY
217 views
Lone wolf terrorism – a brief bibliography
233 views
Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage Hierarchical Clustering
143 views
Intelligence and Security Informatics_Techniques and Applications
764 views
Monday Keynote: Librarians in the Wild - Thinking About Security, Privacy, and Digital Information - Lance Hayden
663 views
Signals for detecting lone wolf terrorists
282 views
Analyzing the Social Media Footprint of Street Gangs
46 views
Analyzing the Social Media Footprint of Street Gangs
123 views
036
2 views
Validating EMR Audit Automation Carl A. Gunter University of Illinois Accountable Systems Workshop
215 views
Dark Web Collection, Search, and Analysis Dr. Hsinchun Chen Director, Artificial Intelligence Lab University of Arizona
[email protected]
221 views
Analyzing the Social Media Footprint of Street Gangs 1 Ohio Center of Excellence in Knowledge-enabled Computing (Kno.e.sis)Kno.e.sis 2 Center for Urban
217 views
Next >