ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
2014 IEEE Joint Intelligence and Security Informatics Conference
Latest Publications
TOTAL DOCUMENTS
82
(FIVE YEARS 0)
H-INDEX
9
(FIVE YEARS 0)
Published By IEEE
9781479963645, 9781479963638
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Recommending Documents for Complex Question Exploration by Analyzing Browsing Behavior
2014 IEEE Joint Intelligence and Security Informatics Conference
◽
10.1109/jisic.2014.66
◽
2014
◽
Author(s):
Alya Abbott
◽
Olga Simek
Keyword(s):
Browsing Behavior
◽
Complex Question
Download Full-text
Military Geospatial Profiling Analysis
2014 IEEE Joint Intelligence and Security Informatics Conference
◽
10.1109/jisic.2014.74
◽
2014
◽
Author(s):
Herman-Dick Giok Tjiang Oey
Keyword(s):
Profiling Analysis
Download Full-text
Mining the Web for Sympathy: The Pussy Riot Case
2014 IEEE Joint Intelligence and Security Informatics Conference
◽
10.1109/jisic.2014.27
◽
2014
◽
Cited By ~ 2
Author(s):
Anders Westling
◽
Joel Brynielsson
◽
Tove Gustavi
Keyword(s):
Pussy Riot
◽
The Web
Download Full-text
Understanding the Factors Affecting UX and Technology Acceptance in the Context of Automated Border Controls
2014 IEEE Joint Intelligence and Security Informatics Conference
◽
10.1109/jisic.2014.33
◽
2014
◽
Cited By ~ 2
Author(s):
Mari Ylikauppila
◽
Sirra Toivonen
◽
Minna Kulju
◽
Minna Jokela
Keyword(s):
Technology Acceptance
◽
Factors Affecting
◽
Border Controls
Download Full-text
Message from Program Chairs
2014 IEEE Joint Intelligence and Security Informatics Conference
◽
10.1109/jisic.2014.6
◽
2014
◽
Download Full-text
When Counting is Not Enough: Limitations of NSA's Effectiveness Assessment of Surveillance Technology
2014 IEEE Joint Intelligence and Security Informatics Conference
◽
10.1109/jisic.2014.80
◽
2014
◽
Author(s):
Michelle Cayford
◽
Coen Van Gulijk
◽
P. H. A. J. M. Gelder
Keyword(s):
Surveillance Technology
◽
Effectiveness Assessment
Download Full-text
Adaptive Change Detection for Relay-Like Behaviour
2014 IEEE Joint Intelligence and Security Informatics Conference
◽
10.1109/jisic.2014.48
◽
2014
◽
Cited By ~ 2
Author(s):
Dean Adam Bodenham
◽
Niall M. Adams
Keyword(s):
Change Detection
◽
Adaptive Change
Download Full-text
Overcoming Limited Collaboration Channels in Distributed Intelligence Analysis: Visualization Tools and Design Seeds
2014 IEEE Joint Intelligence and Security Informatics Conference
◽
10.1109/jisic.2014.13
◽
2014
◽
Cited By ~ 2
Author(s):
Brian Prue
◽
Michael Jenkins
◽
Lauren D. Stern
◽
Jonathan Pfautz
Keyword(s):
Intelligence Analysis
◽
Distributed Intelligence
◽
Visualization Tools
Download Full-text
Maritime Situation Analysis: A Multi-vessel Interaction and Anomaly Detection Framework
2014 IEEE Joint Intelligence and Security Informatics Conference
◽
10.1109/jisic.2014.36
◽
2014
◽
Cited By ~ 4
Author(s):
Hamed Yaghoubi Shahir
◽
Uwe Glasser
◽
Narek Nalbandyan
◽
Hans Wehn
Keyword(s):
Anomaly Detection
◽
Situation Analysis
Download Full-text
Sensemaking and Cognitive Bias Mitigation in Visual Analytics
2014 IEEE Joint Intelligence and Security Informatics Conference
◽
10.1109/jisic.2014.68
◽
2014
◽
Cited By ~ 3
Author(s):
Margit Pohl
◽
Lisa-Christina Winter
◽
Chris Pallaris
◽
Simon Attfield
◽
B. L. William Wong
Keyword(s):
Cognitive Bias
◽
Visual Analytics
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close