Yang, Christopher C.
Security Informatics
1. Framing Social Movement Identity with Cyber-Artifacts: A Case Study of the International Falun Gong Movement
Yi-Da Chen, Ahmed Abbasi, Hsinchun Chen
2. Patterns of Word Use for Deception in Testimony
David B. Skillicorn, Ayron Little
3. Information Integration for Terrorist or Criminal Social Networks
Christopher C. Yang, Xuning Tang
4. Processing Constrained
Shaojie Qiao, Changjie Tang, Huidong Jin, Shucheng Dai, Xingshu Chen, Michael Chau, Jian Hu
5. What-If Emergency Response Through Higher Order Voronoi Diagrams
Ickjai Lee, Reece Pershouse, Peter Phillips, Kyungmi Lee, Christopher Torpelund-Bruin
6. Identity Management Architecture
Uwe Glässer, Mona Vajihollahi
7. A Game Theoretic Framework for Multi-agent Deployment in Intrusion Detection Systems
Yi-Ming Chen, Dachrahn Wu, Cheng-Kuang Wu
8. ETKnet: A Distributed Network System for Sharing Event Data and Multi-faceted Knowledge in a Collaboration Federation
Stanley Y.W. Su, Howard W. Beck, Xuelian Xiao, Jeff DePree, Seema Degwekar, Chen Zhou, Minsoo Lee, Carla Thomas, Andrew Coggeshall, Richard Bostock
9. Duplicate Work Reduction in Business Continuity and Risk Management Processes
Shi-Cho Cha, Pei-Wen Juo, Li-Ting Liu, Wei-Ning Chen
Keywords: Computer Science, Systems and Data Security, Business Information Systems, Data Mining and Knowledge Discovery, Operations Research/Decision Theory, Computer Systems Organization and Communication Networks, Artificial Intelligence (incl. Robotics)
- Author(s)
- Yang, Christopher C.
- Chau, Michael
- Wang, Jau-Hwang
- Chen, Hsinchun
- Publisher
- Springer
- Publication year
- 2010
- Language
- en
- Edition
- 1
- Series
- Annals of Information Systems
- Page amount
- 7 pages
- Category
- Information Technology, Telecommunications
- Format
- Ebook
- eISBN (PDF)
- 9781441913258