![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
EISIC 2015: Manchester, United Kingdom
- Joel Brynielsson, Moi Hoon Yap:
2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015. IEEE Computer Society 2015, ISBN 978-1-4799-8657-6
Long Papers
- Martijn Spitters, Femke Klaver, Gijs Koot, Mark van Staalduinen:
Authorship Analysis on Dark Marketplace Forums. 1-8 - Ioana Rodhe, Johan E. Bengtsson, Amund Hunstad, Henrik Karlzén:
Future Schemes for Stronger Verification of the Access Rights of Border Control Inspection Systems. 9-15 - Peter J. Passmore, Simon Attfield, Neesha Kodagoda, Celeste Groenewald, B. L. William Wong:
Supporting the Externalisation of Thinking in Criminal Intelligence Analysis. 16-23 - Robert Hegarty
, John Haggerty:
SlackStick: Signature-Based File Identification for Live Digital Forensics Examinations. 24-29 - Lei Guan, Zan Li, Song Xiao, Jiangbo Si, Jiajun Wan:
A Family of Adaptive Frequency Slot Number FH Sequences for High Security and Reliability Communication. 30-36 - Bo Li, Duoyong Sun, Ze Li, Chaomin Ou, Renqi Zhu:
Understanding the Dynamic of Covert Organization with Multilayer Networks Model. 37-44 - Carl-Heinz Genzel, Richard Sethmann:
Custom Transport Interface for the Integration of Trusted Network Connect in German Smart Metering Systems. 45-52 - Mustafa Aydin, Jeremy L. Jacob:
Cloud-COVER: Using User Security Attribute Preferences and Propagation Analysis to Prioritise Threats to Systems. 53-60 - Rodrigo Carvalho
, Michael Goldsmith, Sadie Creese:
Applying Semantic Technologies to Fight Online Banking Fraud. 61-68 - Erik Johansson, Christoffer Gahlin, Anton Borg
:
Crime Hotspots: An Evaluation of the KDE Spatial Mapping Technique. 69-74 - Linus Gisslén, Anders Törne:
A Semantic Approach to Information Management and Decision Support: An Application to Humanitarian Demining Operations. 75-82 - Francesco Papi:
Multi-Sensor d-GLMB Filter for Multi-Target Tracking using Doppler only Measurements. 83-89 - Francesco Papi:
Constrained d-GLMB Filter for Multi-Target Track-Before-Detect using Radar Measurements. 90-97 - Michael Ashcroft, Lisa Kaati, Maxime Meyer:
A Step Towards Detecting Online Grooming - Identifying Adults Pretending to be Children. 98-104 - Andrew J. Park, Shawn Buckley:
Three-Dimensional Agent-Based Model and Simulation of a Burglar's Target Selection. 105-112 - Nathalie Stembert, Arne Padmos, Mortaza S. Bargh, Sunil Choenni, Frans Jansen:
A Study of Preventing Email (Spear) Phishing by Enabling Human Intelligence. 113-120
Short Papers
- Albandari Alsumayt
, John Haggerty, Ahmad Lotfi
:
Performance, Analysis, and Comparison of MrDR Method to Detect DoS Attacks in MANET. 121-124 - Eva-Catherine Hillemann, Alexander Nussbaumer
, Dietrich Albert
:
The Role of Cognitive Biases in Criminal Intelligence Analysis and Approaches for their Mitigation. 125-128 - Min Tang, Duoyong Sun, Bo Li, Chaomin Ou, Zi-Han Lin, Ze Li:
Research on the Evaluation Method of National Military Development Based on Net Assessment. 129-132 - Ning Gu, Duoyong Sun, Bo Li, Ze Li:
Sentiment Analysis for Topics based on Interaction Chain Model. 133-136 - Frodo Kin-Sun Chan, Adams Wai-Kin Kong:
Using Hair Follicles with Leg Geometry to Align Androgenic Hair Patterns. 137-140 - Mandeep K. Dhami, Kathryn E. Careless:
Ordinal Structure of the Generic Analytic Workflow: A Survey of Intelligence Analysts. 141-144 - Eva Schlehahn, Patrick Aichroth
, Sebastian Mann, Rudolf Schreiner, Ulrich Lang, Ifan D. H. Shepherd, B. L. William Wong:
Benefits and Pitfalls of Predictive Policing. 145-148 - Apostolos Malatras, Éric Freyssinet, Laurent Beslay:
Mobile Botnets Taxonomy and Challenges. 149-152 - Yasaman Sarlati, Sattar Hashemi
, Niloofar Mozafari:
Adopting Community Features to Detect Social Spammers. 153-156 - Amna Eleyan
, Derar Eleyan
:
Forensic Process as a Service (FPaaS) for Cloud Computing. 157-160 - Michael Ashcroft, Ali Fisher, Lisa Kaati, Enghin Omer, Nico Prucha:
Detecting Jihadist Messages on Twitter. 161-164 - Hatem Hassan, Ahmad Mostafa, Ahmed Shawish:
S-SAC: Towards a Scalable Secure Access Control Framework for Cloud Storage. 165-168 - Abdelrahman Abuarqoub
:
Optimal Mobile Sink Selection Scheme for Multiple Sink Mobile Wireless Sensor Networks. 169-172 - Fadi Hamad, Jamal Zraqou, Adi Maaita, Anas Abu Taleb
:
A Secure Authentication System for ePassport Detection and Verification. 173-176
Poster Papers
- Margit Pohl
, Johanna Haider, Chris Pallaris, B. L. William Wong:
Guidelines for Sensemaking in Intelligence Analysis. 177 - Manuel Jose Gazapo Lapayese:
Terrorism and its Transition to Cyberspace. 178 - Ze Li, Duoyong Sun, Bo Li, Zi-Han Lin, Min Tang:
Detecting Changes in Terrorism Networks: A Perspective of Multi-Meta-Network Modeling. 179 - Ahmed H. Al-Noori
, Khamis A. Al-Karawi
, Francis F. Li:
Improving Robustness of Speaker Recognition in Noisy and Reverberant Conditions via Training. 180 - Jyri Rajamäki, Juha S. Knuuttila, Harri Ruoslahti, Jouni Viitanen, Pasi Patama:
Transparent Surveillance of Suspects for Building Trust between Citizens and Their Governments. 181 - Fahad Alanazi, Andrew Jones
:
The Value of Metadata in Digital Forensics. 182 - Fayez Alfayez, Ian Neill:
Topology-based Optimization of Linear Wireless Sensor Networks. 183 - Jyri Rajamäki, Rauno Pirinen:
Critical Infrastructure Protection: Towards a Design Theory for Resilient Software-Intensive Systems. 184 - Zi-Han Lin, Duoyong Sun, Bo Li, Ze Li:
Game Analysis on the Counter-Terrorism Cooperation of Shanghai Cooperation Organization. 185 - Vito Volpetti, Valentino Ricci, Francesco F. Monai, Francesco Barcio:
CBRNe Threat Detection and Monitoring System: Advanced Prototype. 186 - Michelle Cayford:
Measures of Success: Developing a Method for Evaluating the Effectiveness of Surveillance Technology. 187 - Thomas C. Eskridge
, Marco M. Carvalho
, Fitzroy Nembhard
, Hari Thotempudi, Peter J. Polack:
Interactive Visualization of Netflow Traffic. 188 - Sarah Mount, Robert M. Newman:
Energy-Efficient Brute Force Password Cracking. 189 - Mhair Kashif, Zahoor ul Haq:
An Optimal Use of Intrusion Detection and Prevention System (IDPS). 190
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.