Security Informatics and Law Enforcement最新文献

筛选
英文 中文
Cyber-Trust: Meeting the Needs of Information Sharing Between ISPs and LEAs 网络信任:满足isp与LEAs之间信息共享的需求
Security Informatics and Law Enforcement Pub Date : 2021-06-25 DOI: 10.1007/978-3-030-69460-9_5
Giovana Bilali, D. Kavallieros, G. Kokkinis, P. Kolovos, D. Katsoulis, Theodoros Anatolitis, N. Georgiou, N. Kolokotronis, O. Gkotsopoulou, Clément Pavué, S. Cuomo, Simone Naldini, S. Shiaeles, Gohar Sargsyan
{"title":"Cyber-Trust: Meeting the Needs of Information Sharing Between ISPs and LEAs","authors":"Giovana Bilali, D. Kavallieros, G. Kokkinis, P. Kolovos, D. Katsoulis, Theodoros Anatolitis, N. Georgiou, N. Kolokotronis, O. Gkotsopoulou, Clément Pavué, S. Cuomo, Simone Naldini, S. Shiaeles, Gohar Sargsyan","doi":"10.1007/978-3-030-69460-9_5","DOIUrl":"https://doi.org/10.1007/978-3-030-69460-9_5","url":null,"abstract":"","PeriodicalId":383822,"journal":{"name":"Security Informatics and Law Enforcement","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129666726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Suggesting a Hybrid Approach: Mobile Apps with Big Data Analysis to Report and Prevent Crimes 建议一种混合方法:使用大数据分析的移动应用程序来报告和预防犯罪
Security Informatics and Law Enforcement Pub Date : 2019-10-12 DOI: 10.1007/978-3-030-22002-0_10
Abdi Fidow, A. Hassan, M. Iman, X. Cheng, M. Petridis, Clifford Sule
{"title":"Suggesting a Hybrid Approach: Mobile Apps with Big Data Analysis to Report and Prevent Crimes","authors":"Abdi Fidow, A. Hassan, M. Iman, X. Cheng, M. Petridis, Clifford Sule","doi":"10.1007/978-3-030-22002-0_10","DOIUrl":"https://doi.org/10.1007/978-3-030-22002-0_10","url":null,"abstract":"","PeriodicalId":383822,"journal":{"name":"Security Informatics and Law Enforcement","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131393095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Community Policing: A Case Study from Bavaria Within the Framework of the Unity Project 社区警务:统一项目框架下巴伐利亚州的案例研究
Security Informatics and Law Enforcement Pub Date : 2019-10-12 DOI: 10.1007/978-3-030-22002-0_6
Holger Nitsch, Sebastian Allertseder
{"title":"Community Policing: A Case Study from Bavaria Within the Framework of the Unity Project","authors":"Holger Nitsch, Sebastian Allertseder","doi":"10.1007/978-3-030-22002-0_6","DOIUrl":"https://doi.org/10.1007/978-3-030-22002-0_6","url":null,"abstract":"","PeriodicalId":383822,"journal":{"name":"Security Informatics and Law Enforcement","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122706477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
From Vigilantism to Digilantism? 从治安维持主义到数码主义?
Security Informatics and Law Enforcement Pub Date : 2019-10-12 DOI: 10.1007/978-3-030-22002-0_7
Frauke Reichl
{"title":"From Vigilantism to Digilantism?","authors":"Frauke Reichl","doi":"10.1007/978-3-030-22002-0_7","DOIUrl":"https://doi.org/10.1007/978-3-030-22002-0_7","url":null,"abstract":"","PeriodicalId":383822,"journal":{"name":"Security Informatics and Law Enforcement","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120977387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Contextual Visualization of Crime Matching Through Interactive Clustering and Bayesian Theory 基于交互聚类和贝叶斯理论的犯罪匹配情境可视化
Security Informatics and Law Enforcement Pub Date : 2019-10-12 DOI: 10.1007/978-3-030-22002-0_11
Nadeem Qazi, B. Wong
{"title":"Contextual Visualization of Crime Matching Through Interactive Clustering and Bayesian Theory","authors":"Nadeem Qazi, B. Wong","doi":"10.1007/978-3-030-22002-0_11","DOIUrl":"https://doi.org/10.1007/978-3-030-22002-0_11","url":null,"abstract":"","PeriodicalId":383822,"journal":{"name":"Security Informatics and Law Enforcement","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126878938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multimedia Analysis on User-Generated Content for Safety-Oriented Applications 面向安全应用的用户生成内容多媒体分析
Security Informatics and Law Enforcement Pub Date : 2019-10-12 DOI: 10.1007/978-3-030-22002-0_9
N. Papadakis, Antonios Litke, A. Doulamis, Eftychios E. Protopapadakis, N. Doulamis
{"title":"Multimedia Analysis on User-Generated Content for Safety-Oriented Applications","authors":"N. Papadakis, Antonios Litke, A. Doulamis, Eftychios E. Protopapadakis, N. Doulamis","doi":"10.1007/978-3-030-22002-0_9","DOIUrl":"https://doi.org/10.1007/978-3-030-22002-0_9","url":null,"abstract":"","PeriodicalId":383822,"journal":{"name":"Security Informatics and Law Enforcement","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132399729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Technology Development for Security Practitioners 安全从业人员的技术发展
Security Informatics and Law Enforcement Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-69460-9
{"title":"Technology Development for Security Practitioners","authors":"","doi":"10.1007/978-3-030-69460-9","DOIUrl":"https://doi.org/10.1007/978-3-030-69460-9","url":null,"abstract":"","PeriodicalId":383822,"journal":{"name":"Security Informatics and Law Enforcement","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122018568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
How to Make Community-Oriented Policing Customer Oriented: A Service Design Concept for Policing in Social Media 如何让社区警务以客户为导向——社交媒体警务服务设计理念
Security Informatics and Law Enforcement Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-22002-0_4
Olavi Kujanpää, Kari Pylväs, Pirjo Jukarainen, Jarmo Houtsonen, J. Taponen
{"title":"How to Make Community-Oriented Policing Customer Oriented: A Service Design Concept for Policing in Social Media","authors":"Olavi Kujanpää, Kari Pylväs, Pirjo Jukarainen, Jarmo Houtsonen, J. Taponen","doi":"10.1007/978-3-030-22002-0_4","DOIUrl":"https://doi.org/10.1007/978-3-030-22002-0_4","url":null,"abstract":"","PeriodicalId":383822,"journal":{"name":"Security Informatics and Law Enforcement","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126507743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Building a Bedrock of Trust Between Citizens, Law Enforcement and Other Stakeholders: A Scalable Architecture for Community Policing 在公民、执法部门和其他利益相关者之间建立信任的基础:社区警务的可扩展架构
Security Informatics and Law Enforcement Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-22002-0_8
Laurence Marzell, Benjamin Brewster
{"title":"Building a Bedrock of Trust Between Citizens, Law Enforcement and Other Stakeholders: A Scalable Architecture for Community Policing","authors":"Laurence Marzell, Benjamin Brewster","doi":"10.1007/978-3-030-22002-0_8","DOIUrl":"https://doi.org/10.1007/978-3-030-22002-0_8","url":null,"abstract":"","PeriodicalId":383822,"journal":{"name":"Security Informatics and Law Enforcement","volume":"162 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131918444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection of Irregularities and Abnormal Behaviour in Extreme-Scale Data Streams 极端尺度数据流中不规则和异常行为的检测
Security Informatics and Law Enforcement Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-69460-9_8
K. Demestichas, T. Alexakis, N. Peppes, K. Remoundou, Ioannis V. Loumiotis, W. Müller, Konstantinos Avgerinakis
{"title":"Detection of Irregularities and Abnormal Behaviour in Extreme-Scale Data Streams","authors":"K. Demestichas, T. Alexakis, N. Peppes, K. Remoundou, Ioannis V. Loumiotis, W. Müller, Konstantinos Avgerinakis","doi":"10.1007/978-3-030-69460-9_8","DOIUrl":"https://doi.org/10.1007/978-3-030-69460-9_8","url":null,"abstract":"","PeriodicalId":383822,"journal":{"name":"Security Informatics and Law Enforcement","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116206488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信