|
|
Security Informatics
Framing Social Movement Identity with Cyber-Artifacts.- Patterns of Word Use for Deception in Testimony.- Information Integration for Terrorist or Criminal Social Networks.- Processing Constrained K-C... |
 |
|
|
Download PDF |
Security Informatics |
|