| 
Citations
 | 
   web
Asa Weinholt, & Tobias Andersson Granberg. (2013). Evaluation of enhanced collaboration between fire and rescue services and security officers. In J. Geldermann and T. Müller S. Fortier F. F. T. Comes (Ed.), ISCRAM 2013 Conference Proceedings – 10th International Conference on Information Systems for Crisis Response and Management (pp. 735–740). KIT; Baden-Baden: Karlsruher Institut fur Technologie.
toggle visibility
Matt Wolff. (2010). Unsupervised methods for detecting a malicious insider. In C. Zobel B. T. S. French (Ed.), ISCRAM 2010 – 7th International Conference on Information Systems for Crisis Response and Management: Defining Crisis Management 3.0, Proceedings. Seattle, WA: Information Systems for Crisis Response and Management, ISCRAM.
toggle visibility
Ying Zhao, Mengqi Yuan, Guofeng Su, & Tao Chen. (2015). Crowd Security Detection based on Entropy Model. In L. Palen, M. Buscher, T. Comes, & A. Hughes (Eds.), ISCRAM 2015 Conference Proceedings ? 12th International Conference on Information Systems for Crisis Response and Management. Kristiansand, Norway: University of Agder (UiA).
toggle visibility
Zeno Franco, Nina Zumel, & Larry E. Beutler. (2007). A ghost in the system: Integrating conceptual and methodology considerations from the behavioral sciences into disaster technology research. In K. Nieuwenhuis P. B. B. Van de Walle (Ed.), Intelligent Human Computer Systems for Crisis Response and Management, ISCRAM 2007 Academic Proceedings Papers (pp. 115–124). Delft: Information Systems for Crisis Response and Management, ISCRAM.
toggle visibility