Journals in DBLP
JASIST 2005, volume: 56, number: 3
Hsinchun Chen Introduction to the special topic issue: Intelligence and security informatics. [Citation Graph (0, 0)][DBLP ] JASIST, 2005, v:56, n:3, pp:217-220 [Journal ] Lee S. Strickland , Laura E. Hunt Technology, security, and individual privacy: New tools, new threats, and new public perceptions. [Citation Graph (0, 0)][DBLP ] JASIST, 2005, v:56, n:3, pp:221-234 [Journal ] Paul Jen-Hwa Hu , Chienting Lin , Hsinchun Chen User acceptance of Intelligence and Security Informatics technology: A study of COPLINK. [Citation Graph (0, 0)][DBLP ] JASIST, 2005, v:56, n:3, pp:235-244 [Journal ] E. Dale Thompson , Michelle L. Kaarst-Brown Sensitive information: A review and research agenda. [Citation Graph (0, 0)][DBLP ] JASIST, 2005, v:56, n:3, pp:245-257 [Journal ] Tianhao Wu , William M. Pottenger A semi-supervised active learning algorithm for information extraction from textual data. [Citation Graph (0, 0)][DBLP ] JASIST, 2005, v:56, n:3, pp:258-271 [Journal ] Kar Wing Li , Christopher C. Yang Automatic crosslingual thesaurus generated from the Hong Kong SAR Police Department Web corpus for crime analysis. [Citation Graph (0, 0)][DBLP ] JASIST, 2005, v:56, n:3, pp:272-282 [Journal ] Peng Liu , Amit Chetal Trust-based secure information sharing between federal government agencies. [Citation Graph (0, 0)][DBLP ] JASIST, 2005, v:56, n:3, pp:283-298 [Journal ] Steven R. Haynes , Thomas George Kannampallil , Lawrence L. Larson , Nitesh Garg Optimizing anti-terrorism resource allocation. [Citation Graph (0, 0)][DBLP ] JASIST, 2005, v:56, n:3, pp:299-309 [Journal ] T. S. Raghu , Ram Ramesh , Andrew B. Whinston Addressing the homeland security problem: A collaborative decision-making framework. [Citation Graph (0, 0)][DBLP ] JASIST, 2005, v:56, n:3, pp:310-324 [Journal ]