Inductive Discovery of Criminal Group Structure Using Spectral Embedding Author(s): Francesco Calderoni, David Skillicorn, Quan Zheng31 Oct 2014
Legal Considerations of Intelligence Operations in Countering Transnational Organised Crime Author(s): Yavor Dinev31 Oct 2014
Challenge-Response Schemes Using Gap Diffie-Hellman Groups Author(s): Massoud Dehkordi, Reza Alimoradi03 Feb 2014
Intelligent Intrusion Detection Prevention Systems Author(s): Sethu Murugan, Dr .K.Kuppusamy03 Feb 2014
A Copy Attack on Robust Digital Watermarking in Multi Domain for the Stego Images Author(s): Ajay Goel, O .P.Sahu, Aman Soni, Punit Soni03 Feb 2014
Evaluating Wireless Networks Security in Jordan: A Field Study Author(s): Ahmad Mashhour, Zakaria Saleh03 Feb 2014
Cyber Defence after Lisbon and the Implications of NATO’s New Strategic Concept Author(s): Judit Láng03 Feb 2014
A Robust Remote User Authentication Scheme using Smart Card Author(s): Manoj Kumar, Mridul Gupta, Saru Kumari03 Feb 2014
Resource management in an Intelligence and Security Service: a Dutch example Author(s): Joop van Reijn04 Dec 2013
Intelligence Services of the Czech Republic: Current Legal Status and Its Development Author(s): Petr Zeman04 Dec 2013
Nigeria’s Information Security Challenges in the Light of Multi-Ethnicity Author(s): Moses Ikoh04 Dec 2013
Should the Intelligence Agencies ‘Show More Leg’ or Have They Just Been Stripped Naked? Author(s): Peter Gill12 Nov 2013
Challenges in a 2035 Perspective: Roles for the EU as a Global Security Provider? Author(s): Uwe Nelrich04 Jul 2013