Search

Your search keyword '"Kantor P"' showing total 100 results

Search Constraints

Start Over You searched for: Author "Kantor P" Remove constraint Author: "Kantor P" Journal intelligence & security informatics Remove constraint Journal: intelligence & security informatics
100 results on '"Kantor P"'

Search Results

1. Filtering, Fusion and Dynamic Information Presentation: Towards a General Information Firewall.

2. The Application of PROACT® RCA to Terrorism/Counter Terrorism Related Events.

3. The Qualitative Challenge of Insurgency Informatics.

4. Forecasting Terrorist Groups' Warfare: ‘Conventional' to CBRN.

5. Forecasting Terrorism: Indicators and Proven Analytic Techniques.

6. A Secured Mobile Phone Based on Embedded Fingerprint Recognition Systems.

7. Connections in the World of International Terrorism.

8. Performance Study of a Compiler/Hardware Approach to Embedded Systems Security.

9. Computational Tool in Infrastructure Emergency Total Evacuation Analysis.

10. CODESSEAL: Compiler/FPGA Approach to Secure Applications.

11. Biomonitoring, Phylogenetics and Anomaly Aggregation Systems.

12. Map-Mediated GeoCollaborative Crisis Management.

13. A Jackson Network-Based Model for Quantitative Analysis of Network Security.

14. Learning Classifiers for Misuse Detection Using a Bag of System Calls Representation.

15. The Multi-fractal Nature of Worm and Normal Traffic at Individual Source Level.

16. Intrusion Detection System Using Sequence and Set Preserving Metric.

17. An Ontological Approach to the Document Access Problem of Insider Threat.

18. Active Automation of the DITSCAP.

19. Detecting Deception in Synchronous Computer-Mediated Communication Using Speech Act Profiling.

20. Deception Across Cultures: Bottom-Up and Top-Down Approaches.

21. Data Distortion for Privacy Protection in a Terrorist Analysis System.

22. A Survey of Software Watermarking.

23. Thematic Indicators Derived from World News Reports.

24. A Novel Watermarking Algorithm Based on SVD and Zernike Moments.

25. How Question Answering Technology Helps to Locate Malevolent Online Content.

26. Information Supply Chain: A Unified Framework for Information-Sharing.

27. Evaluating an Infectious Disease Information Sharing and Analysis System.

28. Collecting and Analyzing the Presence of Terrorists on the Web: A Case Study of Jihad Websites.

29. Some Marginal Learning Algorithms for Unsupervised Problems.

30. LSI-Based Taxonomy Generation: The Taxonomist System.

31. Leveraging One-Class SVM and Semantic Analysis to Detect Anomalous Content.

32. Efficient Discovery of New Information in Large Text Databases.

33. Discovering Identity Problems: A Case Study.

34. Analysis of Three Intrusion Detection System Benchmark Datasets Using Machine Learning Algorithms.

35. Testing a Rational Choice Model of Airline Hijackings.

36. Mapping the Contemporary Terrorism Research Domain: Researchers, Publications, and Institutions Analysis.

37. Measuring Success in Countering Terrorism: Problems and Pitfalls.

38. A Conceptual Model of Counterterrorist Operations.

39. Analyzing Terrorist Networks: A Case Study of the Global Salafi Jihad Network.

40. A New Conceptual Framework to Resolve Terrorism's Root Causes.

41. Selective Fusion for Speaker Verification in Surveillance.

42. Modeling and Multiway Analysis of Chatroom Tensors.

43. Content-Based Detection of Terrorists Browsing the Web Using an Advanced Terror Detection System (ATDS).

44. Beyond Keyword Filtering for Message and Conversation Detection.

45. A Cognitive Model for Alert Correlation in a Distributed Environment.

46. Automatically Determining an Anonymous Author's Native Language.

47. Automatic Extraction of Deceptive Behavioral Cues from Video.

48. Applying Authorship Analysis to Arabic Web Content.

49. Integrating Private Databases for Data Analysis.

50. Incident and Casualty Databases as a Tool for Understanding Low-Intensity Conflicts.

Catalog

Books, media, physical & digital resources