×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [security informatics]
Semantic Hacking and Information Infrastructure Protection Paul Thompson 27 August 2009
218 views
Keystroke Biometric Identification and Authentication on Long-Text Input Summary of eight years of research in this area Charles Tappert Seidenberg School
226 views
MAPPING AND ANALYTICAL APPLICATIONS OF GIS IN CRIME AND SECURITY ANALYSIS by Dr. Yuri Gorokhovich, Assistant Professor, SUNY Purchase College Dr. Victor
215 views
Developing a Learning Progression for Scientific Modeling: Making Scientific Modeling Accessible and Meaningful for Learners Christina V. Schwarz, Brian
224 views
Information Operation across Infospheres: Assured Information Sharing Prof. Bhavani Thuraisingham Prof. Latifur Khan Prof. Murat Kantarcioglu Prof. Kevin
224 views
1 Intelligence and Security Informatics for International Security: Information Sharing and Data Mining Hsinchun Chen, Ph.D. McClelland Professor of MIS
218 views
A Framework for Managing the Assured Information Sharing Lifecycle
32 views
MINFS544: Network-based Business Intelligence (BI)
45 views
Charles Tappert Seidenberg School of CSIS, Pace University
67 views
Validating EMR Audit Automation
59 views
Emergent Vulnerabilities And Attacks: A complex threat landscape
62 views
IST Graduate Brochure 2014
221 views
< Prev