Sciweavers

60 search results - page 8 / 12
» Aoristic Crime Analysis
Sort
View
ISSA
2004
13 years 10 months ago
An Investigation Into Computer Forensic Tools
Cyber-crime has reached unprecedented proportions in this day and age. In addition, the internet has created a world with seemingly no barriers while making a countless number of ...
K. K. Arthur
RSFDGRC
2009
Springer
14 years 3 months ago
Fuzzy Sets and Rough Sets for Scenario Modelling and Analysis
Abstract. Both fuzzy set theory and rough set theory play an important role in data-driven, systems modelling and analysis. They have been successfully applied to building various ...
Qiang Shen
IEAAIE
2007
Springer
14 years 2 months ago
Case Analysis of Criminal Behaviour
In this paper, it is shown how behavioural properties can be specified for three types of violent criminals. Moreover, it is shown how empirical material in the form of informal de...
Tibor Bosse, Charlotte Gerritsen, Jan Treur
GEOINFO
2003
13 years 10 months ago
An Early Warning System for Space-Time Cluster Detection
A new topic of great relevance and concern has been the design of efficient early warning systems to detect as soon as possible the emergence of spatial clusters. In particular, m...
Renato M. Assunção, Andréa Ia...
ACNS
2011
Springer
244views Cryptology» more  ACNS 2011»
13 years 5 days ago
Quantitatively Analyzing Stealthy Communication Channels
Abstract. Attackers in particular botnet controllers use stealthy messaging systems to set up large-scale command and control. Understanding the capacity of such communication chan...
Patrick Butler, Kui Xu, Danfeng (Daphne) Yao