k-anonymity: a model for protecting privacy
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
Countering terrorism through information technology
Communications of the ACM - Homeland security
Data Mining and Data Analysis for Counterterrorism
Data Mining and Data Analysis for Counterterrorism
ICDM '05 Proceedings of the Fifth IEEE International Conference on Data Mining
Emergent Information Technologies and Enabling Policies for Counter-Terrorism (IEEE Press Series on Computational Intelligence)
Detection and surveillance technologies: privacy-related requirements and protection schemes
International Journal of Electronic Security and Digital Forensics
Integrating Data Sources and Network Analysis Tools to Support the Fight Against Organized Crime
PAISI, PACCF and SOCO '08 Proceedings of the IEEE ISI 2008 PAISI, PACCF, and SOCO international workshops on Intelligence and Security Informatics
Rampart: A Service and Agent-Based Architecture for Anti-Terrorism Planning and Resource Allocation
EuroISI '08 Proceedings of the 1st European Conference on Intelligence and Security Informatics
Semantics-enabled policies for information sharing and protection in the cloud
SocInfo'11 Proceedings of the Third international conference on Social informatics
Towards law-aware semantic cloud policies with exceptions for data integration and protection
Proceedings of the 2nd International Conference on Web Intelligence, Mining and Semantics
Extracting socio-cultural networks of the Sudan from open-source, large-scale text data
Computational & Mathematical Organization Theory
Crafting a balance between big data utility and protection in the semantic data cloud
Proceedings of the 3rd International Conference on Web Intelligence, Mining and Semantics
Usability Evaluation of Pakistani Security Agencies Websites
International Journal of E-Politics
Hi-index | 0.00 |
Security and privacy aren't dichotomous or conflicting concerns--the solution lies in developing and integrating advanced information technologies for counterterrorism along with privacy-protection technologies to safeguard civil liberties. Coordinated policies can help bind the two to their intended use.