Techniques and Applications
Studies in Computational Intelligence > Intelligence and Security Informatics > Access Control, Infrastructure Protection and Privacy > 249-273
Studies in Computational Intelligence > Intelligence and Security Informatics > Access Control, Infrastructure Protection and Privacy > 275-303
Studies in Computational Intelligence > Intelligence and Security Informatics > Access Control, Infrastructure Protection and Privacy > 305-318
Studies in Computational Intelligence > Intelligence and Security Informatics > Access Control, Infrastructure Protection and Privacy > 319-335
Studies in Computational Intelligence > Intelligence and Security Informatics > Access Control, Infrastructure Protection and Privacy > 337-355
Studies in Computational Intelligence > Intelligence and Security Informatics > Intelligence and Crime Analysis > 135-150
Studies in Computational Intelligence > Intelligence and Security Informatics > Intelligence and Crime Analysis > 151-172
Studies in Computational Intelligence > Intelligence and Security Informatics > Intelligence and Crime Analysis > 173-198
Studies in Computational Intelligence > Intelligence and Security Informatics > Intelligence and Crime Analysis > 199-213
Studies in Computational Intelligence > Intelligence and Security Informatics > Intelligence and Crime Analysis > 215-226
Studies in Computational Intelligence > Intelligence and Security Informatics > Intelligence and Crime Analysis > 227-247
Studies in Computational Intelligence > Intelligence and Security Informatics > Surveillance and Emergency Response > 357-381
Studies in Computational Intelligence > Intelligence and Security Informatics > Surveillance and Emergency Response > 383-406
Studies in Computational Intelligence > Intelligence and Security Informatics > Surveillance and Emergency Response > 407-424
Studies in Computational Intelligence > Intelligence and Security Informatics > Surveillance and Emergency Response > 425-441
Studies in Computational Intelligence > Intelligence and Security Informatics > Terrorism Informatics and Data Mining > 1-15
Studies in Computational Intelligence > Intelligence and Security Informatics > Terrorism Informatics and Data Mining > 17-43
Studies in Computational Intelligence > Intelligence and Security Informatics > Terrorism Informatics and Data Mining > 45-64
Studies in Computational Intelligence > Intelligence and Security Informatics > Terrorism Informatics and Data Mining > 65-78
Studies in Computational Intelligence > Intelligence and Security Informatics > Terrorism Informatics and Data Mining > 79-96