default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 69 matches
- 2013
- Bart Adams, Frank Suykens:
Astute: Increased Situational Awareness through Proactive Decision Support and Adaptive Map-Centric User Interfaces. EISIC 2013: 289-293 - Fabrizio Albertetti
, Paul Cotofrei, Lionel Grossrieder, Olivier Ribaux
, Kilian Stoffel:
The CriLiM Methodology: Crime Linkage with a Fuzzy MCDM Approach. EISIC 2013: 67-74 - Florence Amardeilh, Wessel Kraaij
, Martijn Spitters, Corné Versloot, Sinan Yurtsever:
Semi-automatic Ontology Maintenance in the Virtuoso News Monitoring System. EISIC 2013: 135-138 - Joni A. Amorim, Rose-Mharie Åhlfeldt, Per M. Gustavsson
, Sten F. Andler:
Privacy and Security in Cyberspace: Training Perspectives on the Personal Data Ecosystem. EISIC 2013: 139-142 - Dennis Andersson, Mirko Thorstensson:
Reconstruction and Exploration: Applications in Criminology. EISIC 2013: 190-193 - Gerhard Backfried, Johannes Göllner, Gerald Quirchmayr, Karin Rainer, Gert Kienast, Georg Thallinger
, Christian Schmidt, Andreas Peer:
Integration of Media Sources for Situation Analysis in the Different Phases of Disaster Management: The QuOIMA Project. EISIC 2013: 143-146 - Ned Bakelman, John V. Monaco
, Sung-Hyuk Cha, Charles C. Tappert:
Keystroke Biometric Studies on Password and Numeric Keypad Input. EISIC 2013: 204-207 - Leslie Ball, Matthew J. Craven
:
Automated Counter-Terrorism. EISIC 2013: 216 - Sebastian Bernhardsson, Rickard Forsen:
Assessment of Damage and Protective Capacity of Buildings Exposed to Weapon Effects. EISIC 2013: 222 - Ala Berzinji, Frzand Sherko Abdullah, Ali Hayder Kakei:
Analysis of Terrorist Groups on Facebook. EISIC 2013: 221 - Urban Bilstrup, Magdalena Rosenberg:
A Pilot Study of Using Honeypots as Cyber Intelligence Sources. EISIC 2013: 224 - Egon L. van den Broek, Martijn Spitters:
Physiological Signals: The Next Generation Authentication and Identification Methods!? EISIC 2013: 159-162 - Moazzam Butt, Sandra Marti, Alexander Nouak, Jörg Köplin, Ramachandra Raghavendra
, Guoqiang Li:
Towards e-Passport Duplicate Enrollment Check in the European Union. EISIC 2013: 247-251 - Daniel Cuesta Cantarero, David Antonio Perez Herrero, Fernando Martin Mendez:
A Multi-modal Biometric Fusion Implementation for ABC Systems. EISIC 2013: 277-280 - Richard Colbaugh, Kristin Glass:
Analyzing Social Media Content for Security Informatics. EISIC 2013: 45-51 - Patrick Dibb, Mohammad Hammoudeh
:
Forensic Data Recovery from Android OS Devices: An Open Source Toolkit. EISIC 2013: 226 - Tatyana Velikova Dimitrova, Aris Tsois, Elena Camossi:
Visualization of Container Movements through a Web-Based Geographical Information System. EISIC 2013: 182-185 - Valentina Dragos
:
Browse and Search in Maritime Document Collections. EISIC 2013: 225 - Gregory Duckworth, Archibald Owen, Jerry Worsley, Henry Stephenson:
OptaSense® Distributed Acoustic and Seismic Sensing Performance for Multi-threat, Multi-environment Border Monitoring. EISIC 2013: 273-276 - Dmitry Dudorov, David Stupples, Martin Newby:
Probability Analysis of Cyber Attack Paths against Business and Commercial Enterprise Systems. EISIC 2013: 38-44 - Anna Fensel
, Michael Rogger, Tove Gustavi, Andreas Horndahl, Christian Mårtenson:
Semantic Data Management: Sensor-Based Port Security Use Case. EISIC 2013: 155-158 - Tommaso Fornaciari
, Fabio Celli, Massimo Poesio
:
The Effect of Personality Type on Deceptive Communication Style. EISIC 2013: 1-6 - Monica Gariup, Gustav Soederlind:
Document Fraud Detection at the Border: Preliminary Observations on Human and Machine Performance. EISIC 2013: 231-238 - Kamaruddin Abdul Ghani, Kaharudin Dimyati, Khadijah Ismail, Latifah Sarah Supian:
Radiated Emission from Handheld Devices with Touch-Screen LCDs. EISIC 2013: 219 - Kyle Goslin, Markus Hofmann:
Cross Domain Assessment of Document to HTML Conversion Tools to Quantify Text and Structural Loss during Document Analysis. EISIC 2013: 100-105 - Tove Gustavi, Maja Karasalo, Christian Mårtenson:
A Tool for Generating, Structuring, and Analyzing Multiple Hypotheses in Intelligence Work. EISIC 2013: 23-30 - Mariëlle den Hengst, Martijn Warnier
:
Cyber Crime in Privately Held Information Systems: Personal Data at Stake. EISIC 2013: 117-120 - Hans Henseler, Jop Hofste, Maurice van Keulen
:
Digital-Forensics Based Pattern Recognition for Discovering Identities in Electronic Evidence. EISIC 2013: 112-116 - Anders Holst, Björn Bjurling:
A Bayesian Parametric Statistical Anomaly Detection Method for Finding Trends and Patterns in Criminal Behavior. EISIC 2013: 83-88 - Louis Antani Holt, Mohammad Hammoudeh
:
Cloud Forensics: A Technical Approach to Virtual Machine Acquisition. EISIC 2013: 227
skipping 39 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2025-08-18 16:39 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint