Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Conference Paper
%1 mjlim2005
%A Lim, Mark Jyn-Huey
%A Negnevitsky, Michael
%A Hartnett, Jacky
%B Proceedings of the 6th Australian Information Warfare & Security Conference
%D 2005
%K email homeland_security monitoring stasi2.0 terrorism tracking traffic_analysis
%P 112-124
%T Tracking and Monitoring E-mail Traffic Activities of Criminal and Terrorist Organisations Using Visualisation Tools
%U http://eprints.utas.edu.au/239/1/mjlimAIWAR2005.pdf
@inproceedings{mjlim2005,
added-at = {2008-08-12T17:26:13.000+0200},
author = {Lim, Mark Jyn-Huey and Negnevitsky, Michael and Hartnett, Jacky},
biburl = {https://www.bibsonomy.org/bibtex/29e334e8e4caa299d74cf885a63a4c6cd/edna_foobar},
booktitle = {Proceedings of the 6th Australian Information Warfare & Security Conference},
date = {2005},
institution = {School of Information Systems, Deakin University},
interhash = {8586aa3e55c4e2225eafdb03c2bc4d5c},
intrahash = {9e334e8e4caa299d74cf885a63a4c6cd},
keywords = {email homeland_security monitoring stasi2.0 terrorism tracking traffic_analysis},
location = {Victoria, Australia:},
pages = {112-124},
timestamp = {2008-08-12T17:26:14.000+0200},
title = {Tracking and Monitoring E-mail Traffic Activities of Criminal and Terrorist Organisations Using Visualisation Tools},
url = {http://eprints.utas.edu.au/239/1/mjlimAIWAR2005.pdf },
year = 2005
}