Street profile analysis: A new method for mapping crime on major roadways V Spicer, J Song, P Brantingham, A Park, MA Andresen Applied Geography 69, 65-74, 2016 | 54 | 2016 |
Examining context-specific perceptions of risk: exploring the utility of “human-in-the-loop” simulation models for criminology A Park, J Clare, V Spicer, PL Brantingham, T Calvert, G Jenion Journal of experimental criminology 8, 29-47, 2012 | 33 | 2012 |
Temporal analysis of radical dark web forum users AJ Park, B Beck, D Fletche, P Lam, HH Tsang 2016 IEEE/ACM International Conference on Advances in Social Networks …, 2016 | 32 | 2016 |
Testing elderly people's fear of crime using a virtual environment AJ Park, E Hwang, V Spicer, C Cheng, PL Brantingham, A Sixsmith 2011 European intelligence and security informatics conference, 63-69, 2011 | 27 | 2011 |
The Use of virtual and mixed reality environments for urban behavioural studies. AJ Park, TW Calvert, PL Brantingham, PJ Brantingham PsychNology Journal 6 (2), 2008 | 26 | 2008 |
Phishing website detection framework through web scraping and data mining AJ Park, RN Quadari, HH Tsang 2017 8th IEEE Annual Information Technology, Electronics and Mobile …, 2017 | 25 | 2017 |
An agent-based model and computational framework for counter-terrorism and public safety based on swarm intelligencea AJ Park, HH Tsang, M Sun, U Glässer Security Informatics 1, 1-9, 2012 | 22 | 2012 |
Testing perception of crime in a virtual environment AJ Park, V Spicer, M Guterres, PL Brantingham, G Jenion 2010 IEEE international conference on intelligence and security informatics …, 2010 | 22 | 2010 |
Dynalink: A framework for dynamic criminal network visualization AJ Park, HH Tsang, PL Brantingham 2012 European intelligence and security informatics conference, 217-224, 2012 | 19 | 2012 |
Modeling the role of fear of crime in pedestrian navigation AJ Park Simon Fraser University, 2008 | 16 | 2008 |
Augmented reality for mining teleoperation AJ Park, RN Kazman Telemanipulator and Telepresence Technologies 2351, 119-129, 1995 | 16 | 1995 |
Security networks and counter-terrorism: a reflection on the limits of adversarial isomorphism B Dupont Social networks, terrorism and counter-terrorism, 155-174, 2015 | 14 | 2015 |
A social agent pedestrian model A Park, T Calvert Computer Animation and Virtual Worlds 19 (3‐4), 331-340, 2008 | 14 | 2008 |
A decision support system for crowd control using agent-based modeling and simulation AJ Park, S Buckley, HCA Ramirez, HH Tsang, V Spicer 2015 IEEE International Conference on Data Mining Workshop (ICDMW), 997-1000, 2015 | 13 | 2015 |
Hackers hedging bets: A cross-community analysis of three online hacking forums AJ Park, R Frank, A Mikhaylov, M Thomson 2018 IEEE/ACM International Conference on Advances in Social Networks …, 2018 | 12 | 2018 |
Devising and optimizing crowd control strategies using agent-based modeling and simulation AJ Park, LD Patterson, HH Tsang, R Ficocelli, V Spicer, J Song 2019 European Intelligence and Security Informatics Conference (EISIC), 78-84, 2019 | 11 | 2019 |
Putting all eggs in a single basket: A cross-community analysis of 12 hacking forums R Frank, M Thomson, A Mikhaylov, AJ Park 2018 IEEE international conference on intelligence and security informatics …, 2018 | 11 | 2018 |
Identifying high risk crime areas using topology R Frank, AJ Park, PL Brantingham, J Clare, K Wuschke, M Vajihollahi 2010 IEEE International Conference on Intelligence and Security Informatics …, 2010 | 11 | 2010 |
GENIUS: A computational modeling framework for counter-terrorism planning and response HH Tsang, AJ Park, M Sun, U Glässer 2010 IEEE International Conference on Intelligence and Security Informatics …, 2010 | 8 | 2010 |
Emotional pathfinding T Donaldson, A Park, IL Lin Advances in Artificial Intelligence: 17th Conference of the Canadian Society …, 2004 | 8 | 2004 |