Search dblp for Publications

export results for "stream:streams/conf/eisic:"

 download as .bib file

@inproceedings{DBLP:conf/eisic/BastasKTVK19,
  author       = {Nikolaos Bastas and
                  George Kalpakis and
                  Theodora Tsikrika and
                  Stefanos Vrochidis and
                  Ioannis Kompatsiaris},
  title        = {A comparative study of clustering methods using word embeddings},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2019, Oulu, Finland, November 26-27, 2019},
  pages        = {54--61},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/EISIC49498.2019.9108898},
  doi          = {10.1109/EISIC49498.2019.9108898},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/BastasKTVK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Bemer19,
  author       = {Fabrizia Bemer},
  title        = {The Directive 2014/41/UE - The European Investigation Order},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2019, Oulu, Finland, November 26-27, 2019},
  pages        = {138},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/EISIC49498.2019.9108881},
  doi          = {10.1109/EISIC49498.2019.9108881},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/Bemer19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/ChenZB19,
  author       = {Chia{-}Ju Chen and
                  Razieh Nokhbeh Zaeem and
                  K. Suzanne Barber},
  title        = {Statistical Analysis of Identity Risk of Exposure and Cost Using the
                  Ecosystem of Identity Attributes},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2019, Oulu, Finland, November 26-27, 2019},
  pages        = {32--39},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/EISIC49498.2019.9108859},
  doi          = {10.1109/EISIC49498.2019.9108859},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/ChenZB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/EgiazarovMZV19,
  author       = {Alexander Egiazarov and
                  Vasileios Mavroeidis and
                  Fabio Massimo Zennaro and
                  Kamer Vishi},
  title        = {Firearm Detection and Segmentation Using an Ensemble of Semantic Neural
                  Networks},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2019, Oulu, Finland, November 26-27, 2019},
  pages        = {70--77},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/EISIC49498.2019.9108871},
  doi          = {10.1109/EISIC49498.2019.9108871},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/EgiazarovMZV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/El-NaggarB19,
  author       = {Susan El{-}Naggar and
                  Thirimachos Bourlai},
  title        = {Evaluation of Deep Learning Models for Ear Recognition Against Image
                  Distortions},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2019, Oulu, Finland, November 26-27, 2019},
  pages        = {85--93},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/EISIC49498.2019.9108870},
  doi          = {10.1109/EISIC49498.2019.9108870},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/El-NaggarB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/ElitzurPZ19,
  author       = {Aviad Elitzur and
                  Rami Puzis and
                  Polina Zilberman},
  title        = {Attack Hypothesis Generation},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2019, Oulu, Finland, November 26-27, 2019},
  pages        = {40--47},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/EISIC49498.2019.9108886},
  doi          = {10.1109/EISIC49498.2019.9108886},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/ElitzurPZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/EpishkinaFKY19,
  author       = {Anna Epishkina and
                  Mikhail Finoshin and
                  Konstantin Kogos and
                  Aleksandra Yazykova},
  title        = {Timing Covert Channels Detection Cases via Machine Learning},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2019, Oulu, Finland, November 26-27, 2019},
  pages        = {139},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/EISIC49498.2019.9108873},
  doi          = {10.1109/EISIC49498.2019.9108873},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/EpishkinaFKY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/FernquistSKJ19,
  author       = {Johan Fernquist and
                  Ola Svenonius and
                  Lisa Kaati and
                  Fredrik Johansson},
  title        = {Extracting Account Attributes for Analyzing Influence on Twitter},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2019, Oulu, Finland, November 26-27, 2019},
  pages        = {62--69},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/EISIC49498.2019.9108896},
  doi          = {10.1109/EISIC49498.2019.9108896},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/FernquistSKJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/FrolovaEK19,
  author       = {Daria Frolova and
                  Anna Epishkina and
                  Konstantin Kogos},
  title        = {Mobile User Authentication Using Keystroke Dynamics},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2019, Oulu, Finland, November 26-27, 2019},
  pages        = {140},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/EISIC49498.2019.9108890},
  doi          = {10.1109/EISIC49498.2019.9108890},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/FrolovaEK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/GarbuzEK19,
  author       = {Alina Garbuz and
                  Anna Epishkina and
                  Konstantin Kogos},
  title        = {Continuous Authentication of Smartphone Users via Swipes and Taps
                  Analysis},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2019, Oulu, Finland, November 26-27, 2019},
  pages        = {48--53},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/EISIC49498.2019.9108780},
  doi          = {10.1109/EISIC49498.2019.9108780},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/GarbuzEK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Guri19,
  author       = {Mordechai Guri},
  title        = {{HOTSPOT:} Crossing the Air-Gap Between Isolated PCs and Nearby Smartphones
                  Using Temperature},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2019, Oulu, Finland, November 26-27, 2019},
  pages        = {94--100},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/EISIC49498.2019.9108874},
  doi          = {10.1109/EISIC49498.2019.9108874},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/Guri19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/HaapamakiMHO19,
  author       = {Eetu Haapam{\"{a}}ki and
                  Juho Mikkola and
                  Markus Hirsim{\"{a}}ki and
                  Mourad Oussalah},
  title        = {Mining Security discussions in Suomi24},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2019, Oulu, Finland, November 26-27, 2019},
  pages        = {101--108},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/EISIC49498.2019.9108877},
  doi          = {10.1109/EISIC49498.2019.9108877},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/HaapamakiMHO19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/KostakosRLO19,
  author       = {Panos Kostakos and
                  Somkiadcharoen Robroo and
                  Bofan Lin and
                  Mourad Oussalah},
  title        = {Crime Prediction Using Hotel Reviews?},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2019, Oulu, Finland, November 26-27, 2019},
  pages        = {134--137},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/EISIC49498.2019.9108861},
  doi          = {10.1109/EISIC49498.2019.9108861},
  timestamp    = {Fri, 12 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/KostakosRLO19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/LozanoF19,
  author       = {Marianela Garc{\'{\i}}a Lozano and
                  Johan Fernquist},
  title        = {Identifying Deceptive Reviews: Feature Exploration, Model Transferability
                  and Classification Attack},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2019, Oulu, Finland, November 26-27, 2019},
  pages        = {109--116},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/EISIC49498.2019.9108852},
  doi          = {10.1109/EISIC49498.2019.9108852},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/LozanoF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/PandyaKMCG0P19,
  author       = {Abhinay Pandya and
                  Panos Kostakos and
                  Hassan Mehmood and
                  Marta Cort{\'{e}}s and
                  Ekaterina Gilman and
                  Mourad Oussalah and
                  Susanna Pirttikangas},
  title        = {Privacy preserving sentiment analysis on multiple edge data streams
                  with Apache NiFi},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2019, Oulu, Finland, November 26-27, 2019},
  pages        = {130--133},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/EISIC49498.2019.9108851},
  doi          = {10.1109/EISIC49498.2019.9108851},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/PandyaKMCG0P19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/ParkPTFSS19,
  author       = {Andrew J. Park and
                  Lee D. Patterson and
                  Herbert H. Tsang and
                  Ryan Ficocelli and
                  Valerie Spicer and
                  Justin Song},
  title        = {Devising and Optimizing Crowd Control Strategies Using Agent-Based
                  Modeling and Simulation},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2019, Oulu, Finland, November 26-27, 2019},
  pages        = {78--84},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/EISIC49498.2019.9108875},
  doi          = {10.1109/EISIC49498.2019.9108875},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/ParkPTFSS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/PicMT19,
  author       = {Marc Pic and
                  Ga{\"{e}}l Mahfoudi and
                  Anis Trabelsi},
  title        = {Remote {KYC:} Attacks and Counter-Measures},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2019, Oulu, Finland, November 26-27, 2019},
  pages        = {126--129},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/EISIC49498.2019.9108787},
  doi          = {10.1109/EISIC49498.2019.9108787},
  timestamp    = {Tue, 25 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/PicMT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/RomeoB19,
  author       = {Justin Romeo and
                  Thirimachos Bourlai},
  title        = {Semi-Automatic Geometric Normalization of Profile Faces},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2019, Oulu, Finland, November 26-27, 2019},
  pages        = {121--125},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/EISIC49498.2019.9108897},
  doi          = {10.1109/EISIC49498.2019.9108897},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/RomeoB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Sariola19,
  author       = {Disa Sariola},
  title        = {A model of quantifying social relationships},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2019, Oulu, Finland, November 26-27, 2019},
  pages        = {17--23},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/EISIC49498.2019.9108853},
  doi          = {10.1109/EISIC49498.2019.9108853},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/Sariola19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/SimekMLD19,
  author       = {Olga Simek and
                  Alyssa C. Mensch and
                  Lin Li and
                  Charlie K. Dagli},
  title        = {Characterization of Disinformation Networks Using Graph Embeddings
                  and Opinion Mining},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2019, Oulu, Finland, November 26-27, 2019},
  pages        = {117--120},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/EISIC49498.2019.9108876},
  doi          = {10.1109/EISIC49498.2019.9108876},
  timestamp    = {Mon, 10 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/SimekMLD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/SimekSH19,
  author       = {Olga Simek and
                  Danelle C. Shah and
                  Andrew Heier},
  title        = {Prototype and Analytics for Discovery and Exploitation of Threat Networks
                  on Social Media},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2019, Oulu, Finland, November 26-27, 2019},
  pages        = {9--16},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/EISIC49498.2019.9108895},
  doi          = {10.1109/EISIC49498.2019.9108895},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/SimekSH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/SutmullerHBVNG19,
  author       = {August Daniel Sutmuller and
                  Mari{\"{e}}lle den Hengst and
                  Ana Isabel Barros and
                  Bob van der Vecht and
                  Wouter Noordkamp and
                  Pieter H. A. J. M. van Gelder},
  title        = {Predicting the Offender: Frequency versus Bayes},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2019, Oulu, Finland, November 26-27, 2019},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/EISIC49498.2019.9108891},
  doi          = {10.1109/EISIC49498.2019.9108891},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/SutmullerHBVNG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/ZhuLJ19,
  author       = {Jessica Zhu and
                  Lin Li and
                  Cara Jones},
  title        = {Identification and Detection of Human Trafficking Using Language Models},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2019, Oulu, Finland, November 26-27, 2019},
  pages        = {24--31},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/EISIC49498.2019.9108860},
  doi          = {10.1109/EISIC49498.2019.9108860},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/ZhuLJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eisic/2019,
  title        = {European Intelligence and Security Informatics Conference, {EISIC}
                  2019, Oulu, Finland, November 26-27, 2019},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/9102321/proceeding},
  isbn         = {978-1-7281-6735-0},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/0001HSG18,
  author       = {Ignacio Mart{\'{\i}}n and
                  Jos{\'{e}} Alberto Hern{\'{a}}ndez and
                  Sergio de los Santos and
                  Antonio Guzm{\'{a}}n},
  editor       = {Joel Brynielsson},
  title        = {Analysis and Evaluation of Antivirus Engines in Detecting Android
                  Malware: {A} Data Analytics Approach},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2018, Karlskrona, Sweden, October 24-25, 2018},
  pages        = {7--14},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/EISIC.2018.00010},
  doi          = {10.1109/EISIC.2018.00010},
  timestamp    = {Mon, 22 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/0001HSG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Akhmedov18,
  author       = {Umid Akhmedov},
  editor       = {Joel Brynielsson},
  title        = {On Wash Trade Detection in Energy Markets},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2018, Karlskrona, Sweden, October 24-25, 2018},
  pages        = {65--68},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/EISIC.2018.00018},
  doi          = {10.1109/EISIC.2018.00018},
  timestamp    = {Wed, 10 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/Akhmedov18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/AlsalehZ18,
  author       = {Hamad Alsaleh and
                  Lina Zhou},
  editor       = {Joel Brynielsson},
  title        = {A Heuristic Method for Identifying Scam Ads on Craigslist},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2018, Karlskrona, Sweden, October 24-25, 2018},
  pages        = {69--72},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/EISIC.2018.00019},
  doi          = {10.1109/EISIC.2018.00019},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/AlsalehZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/BoldtBB18,
  author       = {Martin Boldt and
                  Veselka Boeva and
                  Anton Borg},
  editor       = {Joel Brynielsson},
  title        = {Multi-Expert Estimations of Burglars' Risk Exposure and Level of Pre-Crime
                  Preparation Using Coded Crime Scene Data: Work in Progress},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2018, Karlskrona, Sweden, October 24-25, 2018},
  pages        = {77--80},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/EISIC.2018.00021},
  doi          = {10.1109/EISIC.2018.00021},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/BoldtBB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/FernquistK18,
  author       = {Johan Fernquist and
                  Lisa Kaati},
  editor       = {Joel Brynielsson},
  title        = {Online Monitoring of Large Events},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2018, Karlskrona, Sweden, October 24-25, 2018},
  pages        = {47--53},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/EISIC.2018.00015},
  doi          = {10.1109/EISIC.2018.00015},
  timestamp    = {Wed, 10 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/FernquistK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Guri18,
  author       = {Mordechai Guri},
  editor       = {Joel Brynielsson},
  title        = {Optical Covert Channel from Air-Gapped Networks via Remote Orchestration
                  of Router/Switch LEDs},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2018, Karlskrona, Sweden, October 24-25, 2018},
  pages        = {54--60},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/EISIC.2018.00016},
  doi          = {10.1109/EISIC.2018.00016},
  timestamp    = {Wed, 10 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/Guri18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/HullES18,
  author       = {Matthew Hull and
                  Thaddeus Eze and
                  Lee Speakman},
  editor       = {Joel Brynielsson},
  title        = {Policing The Cyber Threat: Exploring the Threat from Cyber Crime and
                  the Ability of Local Law Enforcement to Respond},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2018, Karlskrona, Sweden, October 24-25, 2018},
  pages        = {15--22},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/EISIC.2018.00011},
  doi          = {10.1109/EISIC.2018.00011},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/HullES18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/HyttinenH18,
  author       = {Tatu Hyttinen and
                  Saila Heinikoski},
  editor       = {Joel Brynielsson},
  title        = {Harmonizing Criminal Law Provisions on Money Laundering - {A} Litmus
                  Test of European Integration},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2018, Karlskrona, Sweden, October 24-25, 2018},
  pages        = {31--38},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/EISIC.2018.00013},
  doi          = {10.1109/EISIC.2018.00013},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/HyttinenH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/KostakosPK018,
  author       = {Panos Kostakos and
                  Abhinay Pandya and
                  Olga Kyriakouli and
                  Mourad Oussalah},
  editor       = {Joel Brynielsson},
  title        = {Inferring Demographic Data of Marginalized Users in Twitter with Computer
                  Vision APIs},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2018, Karlskrona, Sweden, October 24-25, 2018},
  pages        = {81--84},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/EISIC.2018.00022},
  doi          = {10.1109/EISIC.2018.00022},
  timestamp    = {Fri, 12 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/KostakosPK018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/McNaryH18,
  author       = {Sarah McNary and
                  Aaron Hunter},
  editor       = {Joel Brynielsson},
  title        = {Using Wearable Device Data in a Criminal Investigation: {A} Preliminary
                  Study},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2018, Karlskrona, Sweden, October 24-25, 2018},
  pages        = {85},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/EISIC.2018.00023},
  doi          = {10.1109/EISIC.2018.00023},
  timestamp    = {Fri, 15 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/McNaryH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Price-WilliamsT18,
  author       = {Matthew Price{-}Williams and
                  Melissa J. Turcotte and
                  Nick Heard},
  editor       = {Joel Brynielsson},
  title        = {Time of Day Anomaly Detection},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2018, Karlskrona, Sweden, October 24-25, 2018},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/EISIC.2018.00009},
  doi          = {10.1109/EISIC.2018.00009},
  timestamp    = {Wed, 10 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/Price-WilliamsT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/SalmelaTKY18,
  author       = {Laura Salmela and
                  Sirra Toivonen and
                  Minna Kulju and
                  Mari Ylikauppila},
  editor       = {Joel Brynielsson},
  title        = {Digital Transformation in Border Checks: Mapping Border Guard Training
                  in Automated Processes},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2018, Karlskrona, Sweden, October 24-25, 2018},
  pages        = {61--64},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/EISIC.2018.00017},
  doi          = {10.1109/EISIC.2018.00017},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/SalmelaTKY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/SchreiberBBOV18,
  author       = {David Schreiber and
                  Martin Boyer and
                  Elisabeth Broneder and
                  Andreas Opitz and
                  Stephan Veigl},
  editor       = {Joel Brynielsson},
  title        = {Generic Object and Motion Analytics for Accelerating Video Analysis
                  within {VICTORIA}},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2018, Karlskrona, Sweden, October 24-25, 2018},
  pages        = {86},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/EISIC.2018.00024},
  doi          = {10.1109/EISIC.2018.00024},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/SchreiberBBOV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/SuehrV18,
  author       = {Sean Suehr and
                  Chrysafis Vogiatzis},
  editor       = {Joel Brynielsson},
  title        = {Now You See Me: Identifying Duplicate Network Personas},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2018, Karlskrona, Sweden, October 24-25, 2018},
  pages        = {23--30},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/EISIC.2018.00012},
  doi          = {10.1109/EISIC.2018.00012},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/SuehrV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/WeissenfeldZWSD18,
  author       = {Axel Weissenfeld and
                  Andreas Zoufal and
                  Christoph Weiss and
                  Bernhard Strobl and
                  Gustavo Fern{\'{a}}ndez Dom{\'{\i}}nguez},
  editor       = {Joel Brynielsson},
  title        = {Towards Mobile Contactless 4-Fingerprint Authentication for Border
                  Control},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2018, Karlskrona, Sweden, October 24-25, 2018},
  pages        = {73--76},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/EISIC.2018.00020},
  doi          = {10.1109/EISIC.2018.00020},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/WeissenfeldZWSD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eisic/2018,
  editor       = {Joel Brynielsson},
  title        = {European Intelligence and Security Informatics Conference, {EISIC}
                  2018, Karlskrona, Sweden, October 24-25, 2018},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/8746037/proceeding},
  isbn         = {978-1-5386-9400-8},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/0004DB17,
  author       = {Michael Martin and
                  Jeremy M. Dawson and
                  Thirimachos Bourlai},
  editor       = {Joel Brynielsson},
  title        = {Large Scale Data Collection of Tattoo-Based Biometric Data from Social-Media
                  Websites},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2017, Athens, Greece, September 11-13, 2017},
  pages        = {135--138},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/EISIC.2017.27},
  doi          = {10.1109/EISIC.2017.27},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/0004DB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/AndreadisGKTPVK17,
  author       = {Stelios Andreadis and
                  Ilias Gialampoukidis and
                  George Kalpakis and
                  Theodora Tsikrika and
                  Symeon Papadopoulos and
                  Stefanos Vrochidis and
                  Ioannis Kompatsiaris},
  editor       = {Joel Brynielsson},
  title        = {A Monitoring Tool for Terrorism-Related Key-Players and Key-Communities
                  in Social Media Networks},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2017, Athens, Greece, September 11-13, 2017},
  pages        = {166},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/EISIC.2017.41},
  doi          = {10.1109/EISIC.2017.41},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/AndreadisGKTPVK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/BedekNHA17,
  author       = {Michael A. Bedek and
                  Alexander Nussbaumer and
                  Eva{-}Catherine Hillemann and
                  Dietrich Albert},
  editor       = {Joel Brynielsson},
  title        = {A Framework for Measuring Imagination in Visual Analytics Systems},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2017, Athens, Greece, September 11-13, 2017},
  pages        = {151--154},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/EISIC.2017.31},
  doi          = {10.1109/EISIC.2017.31},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/BedekNHA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/BoldtB17,
  author       = {Martin Boldt and
                  Anton Borg},
  editor       = {Joel Brynielsson},
  title        = {A Statistical Method for Detecting Significant Temporal Hotspots Using
                  {LISA} Statistics},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2017, Athens, Greece, September 11-13, 2017},
  pages        = {123--126},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/EISIC.2017.24},
  doi          = {10.1109/EISIC.2017.24},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/BoldtB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/BorgBE17,
  author       = {Anton Borg and
                  Martin Boldt and
                  Johan Eliasson},
  editor       = {Joel Brynielsson},
  title        = {Detecting Crime Series Based on Route Estimation and Behavioral Similarity},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2017, Athens, Greece, September 11-13, 2017},
  pages        = {1--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/EISIC.2017.10},
  doi          = {10.1109/EISIC.2017.10},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/BorgBE17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/BorrionDL17,
  author       = {Herv{\'{e}} Borrion and
                  Hashem Dehghanniri and
                  Yuanxi Li},
  editor       = {Joel Brynielsson},
  title        = {Comparative Analysis of Crime Scripts: One {CCTV} Footage - Twenty-One
                  Scripts},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2017, Athens, Greece, September 11-13, 2017},
  pages        = {115--122},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/EISIC.2017.23},
  doi          = {10.1109/EISIC.2017.23},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/BorrionDL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/ChenYB17,
  author       = {Lingwei Chen and
                  Yanfang Ye and
                  Thirimachos Bourlai},
  editor       = {Joel Brynielsson},
  title        = {Adversarial Machine Learning in Malware Detection: Arms Race between
                  Evasion Attack and Defense},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2017, Athens, Greece, September 11-13, 2017},
  pages        = {99--106},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/EISIC.2017.21},
  doi          = {10.1109/EISIC.2017.21},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/ChenYB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Dhami17,
  author       = {Mandeep K. Dhami},
  editor       = {Joel Brynielsson},
  title        = {A Survey of Intelligence Analysts' Perceptions of Analytic Tools},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2017, Athens, Greece, September 11-13, 2017},
  pages        = {131--134},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/EISIC.2017.26},
  doi          = {10.1109/EISIC.2017.26},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/Dhami17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/DimitriouKSSTZL17,
  author       = {Nikolaos Dimitriou and
                  George Kioumourtzis and
                  Anargyros Sideris and
                  Georgios Stavropoulos and
                  Evdoxia Taka and
                  Nikolaos Zotos and
                  George Leventakis and
                  Dimitrios Tzovaras},
  editor       = {Joel Brynielsson},
  title        = {An Integrated Framework for the Timely Detection of Petty Crimes},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2017, Athens, Greece, September 11-13, 2017},
  pages        = {24--31},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/EISIC.2017.13},
  doi          = {10.1109/EISIC.2017.13},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/DimitriouKSSTZL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/FernquistFK17,
  author       = {Johan Fernquist and
                  Torbjorn Fangstrom and
                  Lisa Kaati},
  editor       = {Joel Brynielsson},
  title        = {IoT Data Profiles: The Routines of Your Life Reveals Who You Are},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2017, Athens, Greece, September 11-13, 2017},
  pages        = {61--67},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/EISIC.2017.17},
  doi          = {10.1109/EISIC.2017.17},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/FernquistFK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/FoongO17,
  author       = {Yee Jang Foong and
                  Mourad Oussalah},
  editor       = {Joel Brynielsson},
  title        = {Cyberbullying System Detection and Analysis},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2017, Athens, Greece, September 11-13, 2017},
  pages        = {40--46},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/EISIC.2017.43},
  doi          = {10.1109/EISIC.2017.43},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/FoongO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/GroenewaldWAPK17,
  author       = {Celeste Groenewald and
                  B. L. William Wong and
                  Simon Attfield and
                  Peter J. Passmore and
                  Neesha Kodagoda},
  editor       = {Joel Brynielsson},
  title        = {How Analysts Think: How Do Criminal Intelligence Analysts Recognise
                  and Manage Significant Information?},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2017, Athens, Greece, September 11-13, 2017},
  pages        = {47--53},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/EISIC.2017.15},
  doi          = {10.1109/EISIC.2017.15},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/GroenewaldWAPK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/IsbisterKC17,
  author       = {Tim Isbister and
                  Lisa Kaati and
                  Katie Cohen},
  editor       = {Joel Brynielsson},
  title        = {Gender Classification with Data Independent Features in Multiple Languages},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2017, Athens, Greece, September 11-13, 2017},
  pages        = {54--60},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/EISIC.2017.16},
  doi          = {10.1109/EISIC.2017.16},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/IsbisterKC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/IslamW17,
  author       = {Junayed Islam and
                  B. L. William Wong},
  editor       = {Joel Brynielsson},
  title        = {Behavioural Markers: Bridging the Gap between Art of Analysis and
                  Science of Analytics in Criminal Intelligence},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2017, Athens, Greece, September 11-13, 2017},
  pages        = {147--150},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/EISIC.2017.30},
  doi          = {10.1109/EISIC.2017.30},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/IslamW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/KaatiLSS17,
  author       = {Lisa Kaati and
                  Elias Lundeqvist and
                  Amendra Shrestha and
                  Maria Svensson},
  editor       = {Joel Brynielsson},
  title        = {Author Profiling in the Wild},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2017, Athens, Greece, September 11-13, 2017},
  pages        = {155--158},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/EISIC.2017.32},
  doi          = {10.1109/EISIC.2017.32},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/KaatiLSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/KaatiR17,
  author       = {Lisa Kaati and
                  Adam Ruul},
  editor       = {Joel Brynielsson},
  title        = {Interpretable Probabilistic Divisive Clustering of Large Node-Attributed
                  Networks},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2017, Athens, Greece, September 11-13, 2017},
  pages        = {68--75},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/EISIC.2017.18},
  doi          = {10.1109/EISIC.2017.18},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/KaatiR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/KhelifMBSSMMKHC17,
  author       = {Khaled Khelif and
                  Yann Mombrun and
                  Gerhard Backfried and
                  Farhan Sahito and
                  Luca Scarpato and
                  Petr Motl{\'{\i}}cek and
                  Srikanth R. Madikeri and
                  Damien Kelly and
                  Gideon Hazzani and
                  Emmanouil Chatzigavriil},
  editor       = {Joel Brynielsson},
  title        = {Towards a Breakthrough Speaker Identification Approach for Law Enforcement
                  Agencies: {SIIP}},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2017, Athens, Greece, September 11-13, 2017},
  pages        = {32--39},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/EISIC.2017.14},
  doi          = {10.1109/EISIC.2017.14},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/KhelifMBSSMMKHC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/KostakosMNO17,
  author       = {Panos Kostakos and
                  Miika Moilanen and
                  Arttu Niemel{\"{a}} and
                  Mourad Oussalah},
  editor       = {Joel Brynielsson},
  title        = {Catchem: {A} Browser Plugin for the Panama Papers Using Approximate
                  String Matching},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2017, Athens, Greece, September 11-13, 2017},
  pages        = {139--142},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/EISIC.2017.28},
  doi          = {10.1109/EISIC.2017.28},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/KostakosMNO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/LekeaK17,
  author       = {Ioanna K. Lekea and
                  Panagiotis Karampelas},
  editor       = {Joel Brynielsson},
  title        = {Are We Really That Close Together? Tracing and Discussing Similarities
                  and Differences between Greek Terrorist Groups Using Cluster Analysis},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2017, Athens, Greece, September 11-13, 2017},
  pages        = {159--162},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/EISIC.2017.33},
  doi          = {10.1109/EISIC.2017.33},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/LekeaK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/MavroeidisB17,
  author       = {Vasileios Mavroeidis and
                  Siri Bromander},
  editor       = {Joel Brynielsson},
  title        = {Cyber Threat Intelligence Model: An Evaluation of Taxonomies, Sharing
                  Standards, and Ontologies within Cyber Threat Intelligence},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2017, Athens, Greece, September 11-13, 2017},
  pages        = {91--98},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/EISIC.2017.20},
  doi          = {10.1109/EISIC.2017.20},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/MavroeidisB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/PaudyalRKWDQ17,
  author       = {Pragya Paudyal and
                  Chris Rooney and
                  Neesha Kodagoda and
                  B. L. William Wong and
                  Penny Duquenoy and
                  Nadeem Qazi},
  editor       = {Joel Brynielsson},
  title        = {How the Use of Ethically Sensitive Information Helps to Identify Co-Offenders
                  via a Purposed Privacy Scale: {A} Pilot Study},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2017, Athens, Greece, September 11-13, 2017},
  pages        = {164},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/EISIC.2017.35},
  doi          = {10.1109/EISIC.2017.35},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/PaudyalRKWDQ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/PicO17,
  author       = {Marc Michel Pic and
                  Amine Ouddan},
  editor       = {Joel Brynielsson},
  title        = {Photometrix {(TM):} {A} Digital Seal for Offline Identity Picture
                  Authentication},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2017, Athens, Greece, September 11-13, 2017},
  pages        = {163},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/EISIC.2017.34},
  doi          = {10.1109/EISIC.2017.34},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/PicO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Poulymenopoulou17,
  author       = {Mikaela Poulymenopoulou and
                  Aris Tsois},
  editor       = {Joel Brynielsson},
  title        = {Customs Risk Analysis through the ConTraffic Visual Analytics Tool},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2017, Athens, Greece, September 11-13, 2017},
  pages        = {107--114},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/EISIC.2017.22},
  doi          = {10.1109/EISIC.2017.22},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/Poulymenopoulou17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Price-WilliamsH17,
  author       = {Matthew Price{-}Williams and
                  Nick Heard and
                  Melissa J. Turcotte},
  editor       = {Joel Brynielsson},
  title        = {Detecting Periodic Subsequences in Cyber Security Data},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2017, Athens, Greece, September 11-13, 2017},
  pages        = {84--90},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/EISIC.2017.40},
  doi          = {10.1109/EISIC.2017.40},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/Price-WilliamsH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/QaziW17,
  author       = {Nadeem Qazi and
                  B. L. William Wong},
  editor       = {Joel Brynielsson},
  title        = {Behavioural {\&} Tempo-Spatial Knowledge Graph for Crime Matching
                  through Graph Theory},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2017, Athens, Greece, September 11-13, 2017},
  pages        = {143--146},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/EISIC.2017.29},
  doi          = {10.1109/EISIC.2017.29},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/QaziW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/RuohonenL17,
  author       = {Jukka Ruohonen and
                  Ville Lepp{\"{a}}nen},
  editor       = {Joel Brynielsson},
  title        = {Whose Hands Are in the Finnish Cookie Jar?},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2017, Athens, Greece, September 11-13, 2017},
  pages        = {127--130},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/EISIC.2017.25},
  doi          = {10.1109/EISIC.2017.25},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/RuohonenL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/TorregrosaGLGC17,
  author       = {Javier Torregrosa and
                  Irene Gilp{\'{e}}rez{-}L{\'{o}}pez and
                  Ra{\'{u}}l Lara{-}Cabrera and
                  David Garriga and
                  David Camacho},
  editor       = {Joel Brynielsson},
  title        = {Can an Automatic Tool Assess Risk of Radicalization Online? {A} Case
                  Study on Facebook},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2017, Athens, Greece, September 11-13, 2017},
  pages        = {165},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/EISIC.2017.36},
  doi          = {10.1109/EISIC.2017.36},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/TorregrosaGLGC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Xylogiannopoulos17,
  author       = {Konstantinos F. Xylogiannopoulos and
                  Panagiotis Karampelas and
                  Reda Alhajj},
  editor       = {Joel Brynielsson},
  title        = {Text Mining in Unclean, Noisy or Scrambled Datasets for Digital Forensics
                  Analytics},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2017, Athens, Greece, September 11-13, 2017},
  pages        = {76--83},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/EISIC.2017.19},
  doi          = {10.1109/EISIC.2017.19},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/Xylogiannopoulos17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/ZouaveM17,
  author       = {Erik T. Zouave and
                  Thomas Marquenie},
  editor       = {Joel Brynielsson},
  title        = {An Inconvenient Truth: Algorithmic Transparency {\&} Accountability
                  in Criminal Intelligence Profiling},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2017, Athens, Greece, September 11-13, 2017},
  pages        = {17--23},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/EISIC.2017.12},
  doi          = {10.1109/EISIC.2017.12},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/ZouaveM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eisic/2017,
  editor       = {Joel Brynielsson},
  title        = {European Intelligence and Security Informatics Conference, {EISIC}
                  2017, Athens, Greece, September 11-13, 2017},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/8234922/proceeding},
  isbn         = {978-1-5386-2385-5},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/0001H16,
  author       = {Haibo Li and
                  Anders Hedman},
  editor       = {Joel Brynielsson and
                  Fredrik Johansson},
  title        = {Harnessing Crowds to Avert or Mitigate Acts Terrorism: {A} Collective
                  Intelligence Call for Action},
  booktitle    = {2016 European Intelligence and Security Informatics Conference, {EISIC}
                  2016, Uppsala, Sweden, August 17-19, 2016},
  pages        = {203},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/EISIC.2016.057},
  doi          = {10.1109/EISIC.2016.057},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/0001H16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/0001S16,
  author       = {Swati Agarwal and
                  Ashish Sureka},
  editor       = {Joel Brynielsson and
                  Fredrik Johansson},
  title        = {But {I} did not Mean It! - Intent Classification of Racist Posts on
                  Tumblr},
  booktitle    = {2016 European Intelligence and Security Informatics Conference, {EISIC}
                  2016, Uppsala, Sweden, August 17-19, 2016},
  pages        = {124--127},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/EISIC.2016.032},
  doi          = {10.1109/EISIC.2016.032},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/0001S16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/0001S16a,
  author       = {Swati Agarwal and
                  Ashish Sureka},
  editor       = {Joel Brynielsson and
                  Fredrik Johansson},
  title        = {Role of Author Personality Traits for Identifying Intent Based Racist
                  Posts},
  booktitle    = {2016 European Intelligence and Security Informatics Conference, {EISIC}
                  2016, Uppsala, Sweden, August 17-19, 2016},
  pages        = {197},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/EISIC.2016.051},
  doi          = {10.1109/EISIC.2016.051},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/0001S16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/AlsadhanP16,
  author       = {Tina Alsadhan and
                  Joon S. Park},
  editor       = {Joel Brynielsson and
                  Fredrik Johansson},
  title        = {Enhancing Risk-Based Decisions by Leveraging Cyber Security Automation},
  booktitle    = {2016 European Intelligence and Security Informatics Conference, {EISIC}
                  2016, Uppsala, Sweden, August 17-19, 2016},
  pages        = {164--167},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/EISIC.2016.042},
  doi          = {10.1109/EISIC.2016.042},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/AlsadhanP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/AnderssonJSFCTP16,
  author       = {Maria Andersson and
                  Ronnie Johansson and
                  Karl{-}G{\"{o}}ran Stenborg and
                  Robert Forsgren and
                  Thomas Cane and
                  Grzegorz Taberski and
                  Jose Luis Patino and
                  James M. Ferryman},
  editor       = {Joel Brynielsson and
                  Fredrik Johansson},
  title        = {The {IPATCH} System for Maritime Surveillance and Piracy Threat Classification},
  booktitle    = {2016 European Intelligence and Security Informatics Conference, {EISIC}
                  2016, Uppsala, Sweden, August 17-19, 2016},
  pages        = {200},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/EISIC.2016.054},
  doi          = {10.1109/EISIC.2016.054},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/AnderssonJSFCTP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/AshcroftMVM016,
  author       = {Michael Ashcroft and
                  Matteo Magnani and
                  Davide Vega and
                  Danilo Montesi and
                  Luca Rossi},
  editor       = {Joel Brynielsson and
                  Fredrik Johansson},
  title        = {Multilayer Analysis of Online Illicit Marketplaces},
  booktitle    = {2016 European Intelligence and Security Informatics Conference, {EISIC}
                  2016, Uppsala, Sweden, August 17-19, 2016},
  pages        = {199},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/EISIC.2016.053},
  doi          = {10.1109/EISIC.2016.053},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/AshcroftMVM016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/AydinJ16,
  author       = {Mustafa Aydin and
                  Jeremy L. Jacob},
  editor       = {Joel Brynielsson and
                  Fredrik Johansson},
  title        = {Providing Extensibility to Threat Modelling in Cloud-COVER's Underlying
                  Analysis Model},
  booktitle    = {2016 European Intelligence and Security Informatics Conference, {EISIC}
                  2016, Uppsala, Sweden, August 17-19, 2016},
  pages        = {45--51},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/EISIC.2016.016},
  doi          = {10.1109/EISIC.2016.016},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/AydinJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/BelozubovaEK16,
  author       = {Anna Belozubova and
                  Anna Epishkina and
                  Konstantin Kogos},
  editor       = {Joel Brynielsson and
                  Fredrik Johansson},
  title        = {Random Delays to Limit Timing Covert Channel},
  booktitle    = {2016 European Intelligence and Security Informatics Conference, {EISIC}
                  2016, Uppsala, Sweden, August 17-19, 2016},
  pages        = {188--191},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/EISIC.2016.048},
  doi          = {10.1109/EISIC.2016.048},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/BelozubovaEK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/BexH16,
  author       = {Floris Bex and
                  Bas Hovestad},
  editor       = {Joel Brynielsson and
                  Fredrik Johansson},
  title        = {An Argumentative-Narrative Risk Assessment Model},
  booktitle    = {2016 European Intelligence and Security Informatics Conference, {EISIC}
                  2016, Uppsala, Sweden, August 17-19, 2016},
  pages        = {176--179},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/EISIC.2016.045},
  doi          = {10.1109/EISIC.2016.045},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/BexH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/BjorklundZ16,
  author       = {Johanna Bj{\"{o}}rklund and
                  Niklas Zechner},
  editor       = {Joel Brynielsson and
                  Fredrik Johansson},
  title        = {My Name is Legion: Estimating Author Counts Based on Stylistic Diversity},
  booktitle    = {2016 European Intelligence and Security Informatics Conference, {EISIC}
                  2016, Uppsala, Sweden, August 17-19, 2016},
  pages        = {108--111},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/EISIC.2016.028},
  doi          = {10.1109/EISIC.2016.028},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/BjorklundZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/BlazicK16,
  author       = {Borka Jerman Blazic and
                  Tomaz Klobucar},
  editor       = {Joel Brynielsson and
                  Fredrik Johansson},
  title        = {Missing Solutions in the Fight against Cybercrime and Cyberterrorism
                  - The New {EU} Research Agenda},
  booktitle    = {2016 European Intelligence and Security Informatics Conference, {EISIC}
                  2016, Uppsala, Sweden, August 17-19, 2016},
  pages        = {128--131},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/EISIC.2016.033},
  doi          = {10.1109/EISIC.2016.033},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/BlazicK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/BoldtB16,
  author       = {Martin Boldt and
                  Jaswanth Bala},
  editor       = {Joel Brynielsson and
                  Fredrik Johansson},
  title        = {Filtering Estimated Crime Series Based on Route Calculations on Spatio-temporal
                  Data},
  booktitle    = {2016 European Intelligence and Security Informatics Conference, {EISIC}
                  2016, Uppsala, Sweden, August 17-19, 2016},
  pages        = {92--95},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/EISIC.2016.024},
  doi          = {10.1109/EISIC.2016.024},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/BoldtB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/BugejaJD16,
  author       = {Joseph Bugeja and
                  Andreas Jacobsson and
                  Paul Davidsson},
  editor       = {Joel Brynielsson and
                  Fredrik Johansson},
  title        = {On Privacy and Security Challenges in Smart Connected Homes},
  booktitle    = {2016 European Intelligence and Security Informatics Conference, {EISIC}
                  2016, Uppsala, Sweden, August 17-19, 2016},
  pages        = {172--175},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/EISIC.2016.044},
  doi          = {10.1109/EISIC.2016.044},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/BugejaJD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Clarke16,
  author       = {Roger Clarke},
  editor       = {Joel Brynielsson and
                  Fredrik Johansson},
  title        = {Quality Assurance for Security Applications of Big Data},
  booktitle    = {2016 European Intelligence and Security Informatics Conference, {EISIC}
                  2016, Uppsala, Sweden, August 17-19, 2016},
  pages        = {1--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/EISIC.2016.010},
  doi          = {10.1109/EISIC.2016.010},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/Clarke16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/DhamiBC16,
  author       = {Mandeep K. Dhami and
                  Ian K. Belton and
                  Kathryn E. Careless},
  editor       = {Joel Brynielsson and
                  Fredrik Johansson},
  title        = {Critical Review of Analytic Techniques},
  booktitle    = {2016 European Intelligence and Security Informatics Conference, {EISIC}
                  2016, Uppsala, Sweden, August 17-19, 2016},
  pages        = {152--155},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/EISIC.2016.039},
  doi          = {10.1109/EISIC.2016.039},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/DhamiBC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/FrankMM16,
  author       = {Richard Frank and
                  Mitch Macdonald and
                  Bryan Monk},
  editor       = {Joel Brynielsson and
                  Fredrik Johansson},
  title        = {Location, Location, Location: Mapping Potential Canadian Targets in
                  Online Hacker Discussion Forums},
  booktitle    = {2016 European Intelligence and Security Informatics Conference, {EISIC}
                  2016, Uppsala, Sweden, August 17-19, 2016},
  pages        = {16--23},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/EISIC.2016.012},
  doi          = {10.1109/EISIC.2016.012},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/FrankMM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/GerberWK16,
  author       = {Matylda Gerber and
                  B. L. William Wong and
                  Neesha Kodagoda},
  editor       = {Joel Brynielsson and
                  Fredrik Johansson},
  title        = {How Analysts Think: Decision Making in the Absence of Clear Facts},
  booktitle    = {2016 European Intelligence and Security Informatics Conference, {EISIC}
                  2016, Uppsala, Sweden, August 17-19, 2016},
  pages        = {132--135},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/EISIC.2016.034},
  doi          = {10.1109/EISIC.2016.034},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/GerberWK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/GialampoukidisK16,
  author       = {Ilias Gialampoukidis and
                  George Kalpakis and
                  Theodora Tsikrika and
                  Stefanos Vrochidis and
                  Ioannis Kompatsiaris},
  editor       = {Joel Brynielsson and
                  Fredrik Johansson},
  title        = {Key Player Identification in Terrorism-Related Social Media Networks
                  Using Centrality Measures},
  booktitle    = {2016 European Intelligence and Security Informatics Conference, {EISIC}
                  2016, Uppsala, Sweden, August 17-19, 2016},
  pages        = {112--115},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/EISIC.2016.029},
  doi          = {10.1109/EISIC.2016.029},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/GialampoukidisK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/GisslenH16,
  author       = {Linus Gissl{\'{e}}n and
                  Andreas Horndahl},
  editor       = {Joel Brynielsson and
                  Fredrik Johansson},
  title        = {A Quantitative Approach to Risk and Cost Assessment in Supply Chain
                  Management},
  booktitle    = {2016 European Intelligence and Security Informatics Conference, {EISIC}
                  2016, Uppsala, Sweden, August 17-19, 2016},
  pages        = {180--183},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/EISIC.2016.046},
  doi          = {10.1109/EISIC.2016.046},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/GisslenH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Goujon16,
  author       = {B{\'{e}}n{\'{e}}dicte Goujon},
  editor       = {Joel Brynielsson and
                  Fredrik Johansson},
  title        = {How to Support the Decision Making in Crisis Context?},
  booktitle    = {2016 European Intelligence and Security Informatics Conference, {EISIC}
                  2016, Uppsala, Sweden, August 17-19, 2016},
  pages        = {39--44},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/EISIC.2016.015},
  doi          = {10.1109/EISIC.2016.015},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/Goujon16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/GranasenK16,
  author       = {Magdalena Gran{\aa}sen and
                  Maja Karasalo},
  editor       = {Joel Brynielsson and
                  Fredrik Johansson},
  title        = {Methodology and Tool to Facilitate Structured Analysis of Multiple
                  Hypotheses},
  booktitle    = {2016 European Intelligence and Security Informatics Conference, {EISIC}
                  2016, Uppsala, Sweden, August 17-19, 2016},
  pages        = {52--59},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/EISIC.2016.017},
  doi          = {10.1109/EISIC.2016.017},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/GranasenK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/GuriSSE16,
  author       = {Mordechai Guri and
                  Eyal Shemer and
                  Dov Shirtz and
                  Yuval Elovici},
  editor       = {Joel Brynielsson and
                  Fredrik Johansson},
  title        = {Personal Information Leakage During Password Recovery of Internet
                  Services},
  booktitle    = {2016 European Intelligence and Security Informatics Conference, {EISIC}
                  2016, Uppsala, Sweden, August 17-19, 2016},
  pages        = {136--139},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/EISIC.2016.035},
  doi          = {10.1109/EISIC.2016.035},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/GuriSSE16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Hageback16,
  author       = {Niklas Hageback},
  editor       = {Joel Brynielsson and
                  Fredrik Johansson},
  title        = {Forecasting the Underlying Psychological Forces to Political Violence
                  through Big Data Symbol Mining},
  booktitle    = {2016 European Intelligence and Security Informatics Conference, {EISIC}
                  2016, Uppsala, Sweden, August 17-19, 2016},
  pages        = {196},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/EISIC.2016.050},
  doi          = {10.1109/EISIC.2016.050},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/Hageback16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/IvancB16,
  author       = {Blaz Ivanc and
                  Borka Jerman Blazic},
  editor       = {Joel Brynielsson and
                  Fredrik Johansson},
  title        = {Information Security Aspects of the Public Safety Data Interoperability
                  Network},
  booktitle    = {2016 European Intelligence and Security Informatics Conference, {EISIC}
                  2016, Uppsala, Sweden, August 17-19, 2016},
  pages        = {88--91},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/EISIC.2016.023},
  doi          = {10.1109/EISIC.2016.023},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/IvancB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/JawaleP16,
  author       = {Ashay S. Jawale and
                  Joon S. Park},
  editor       = {Joel Brynielsson and
                  Fredrik Johansson},
  title        = {A Security Analysis on Apple Pay},
  booktitle    = {2016 European Intelligence and Security Informatics Conference, {EISIC}
                  2016, Uppsala, Sweden, August 17-19, 2016},
  pages        = {160--163},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/EISIC.2016.041},
  doi          = {10.1109/EISIC.2016.041},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/JawaleP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/LeventakisPKCK16,
  author       = {George Leventakis and
                  George Papalexandratos and
                  George Kokkinis and
                  Elisavet Charalambous and
                  Nikolaos Koutras},
  editor       = {Joel Brynielsson and
                  Fredrik Johansson},
  title        = {Towards Efficient Law Enforcement Decision Support Systems in the
                  Area of Community Policing: The Use of Mobile Applications},
  booktitle    = {2016 European Intelligence and Security Informatics Conference, {EISIC}
                  2016, Uppsala, Sweden, August 17-19, 2016},
  pages        = {198},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/EISIC.2016.052},
  doi          = {10.1109/EISIC.2016.052},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/LeventakisPKCK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/MaghsoudiT16,
  author       = {Javid Maghsoudi and
                  Charles C. Tappert},
  editor       = {Joel Brynielsson and
                  Fredrik Johansson},
  title        = {A Behavioral Biometrics User Authentication Study Using Motion Data
                  from Android Smartphones},
  booktitle    = {2016 European Intelligence and Security Informatics Conference, {EISIC}
                  2016, Uppsala, Sweden, August 17-19, 2016},
  pages        = {184--187},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/EISIC.2016.047},
  doi          = {10.1109/EISIC.2016.047},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/MaghsoudiT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/MikhaylovF16,
  author       = {Alexander Mikhaylov and
                  Richard Frank},
  editor       = {Joel Brynielsson and
                  Fredrik Johansson},
  title        = {Cards, Money and Two Hacking Forums: An Analysis of Online Money Laundering
                  Schemes},
  booktitle    = {2016 European Intelligence and Security Informatics Conference, {EISIC}
                  2016, Uppsala, Sweden, August 17-19, 2016},
  pages        = {80--83},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/EISIC.2016.021},
  doi          = {10.1109/EISIC.2016.021},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/MikhaylovF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/NaserZAA16,
  author       = {Aws Naser and
                  Mohamed Fadli Bin Zolkipli and
                  Shahid Anwar and
                  Muna Sulieman Al{-}Hawawreh},
  editor       = {Joel Brynielsson and
                  Fredrik Johansson},
  title        = {Present Status and Challenges in Cloud Monitoring Framework: {A} Survey},
  booktitle    = {2016 European Intelligence and Security Informatics Conference, {EISIC}
                  2016, Uppsala, Sweden, August 17-19, 2016},
  pages        = {201},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/EISIC.2016.055},
  doi          = {10.1109/EISIC.2016.055},
  timestamp    = {Sat, 19 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/NaserZAA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/NouhNG16,
  author       = {Mariam Nouh and
                  Jason R. C. Nurse and
                  Michael Goldsmith},
  editor       = {Joel Brynielsson and
                  Fredrik Johansson},
  title        = {Towards Designing a Multipurpose Cybercrime Intelligence Framework},
  booktitle    = {2016 European Intelligence and Security Informatics Conference, {EISIC}
                  2016, Uppsala, Sweden, August 17-19, 2016},
  pages        = {60--67},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/EISIC.2016.018},
  doi          = {10.1109/EISIC.2016.018},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/NouhNG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/NussbaumerVHBA16,
  author       = {Alexander Nussbaumer and
                  Katrien Verbert and
                  Eva{-}Catherine Hillemann and
                  Michael A. Bedek and
                  Dietrich Albert},
  editor       = {Joel Brynielsson and
                  Fredrik Johansson},
  title        = {A Framework for Cognitive Bias Detection and Feedback in a Visual
                  Analytics Environment},
  booktitle    = {2016 European Intelligence and Security Informatics Conference, {EISIC}
                  2016, Uppsala, Sweden, August 17-19, 2016},
  pages        = {148--151},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/EISIC.2016.038},
  doi          = {10.1109/EISIC.2016.038},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/NussbaumerVHBA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/OrphanidesAB16,
  author       = {Constantinos Orphanides and
                  Babak Akhgar and
                  Petra Saskia Bayerl},
  editor       = {Joel Brynielsson and
                  Fredrik Johansson},
  title        = {Discovering Knowledge in Online Drug Transactions Using Conceptual
                  Graphs and Formal Concept Analysis},
  booktitle    = {2016 European Intelligence and Security Informatics Conference, {EISIC}
                  2016, Uppsala, Sweden, August 17-19, 2016},
  pages        = {100--103},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/EISIC.2016.026},
  doi          = {10.1109/EISIC.2016.026},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/OrphanidesAB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Pic16,
  author       = {Marc Michel Pic},
  editor       = {Joel Brynielsson and
                  Fredrik Johansson},
  title        = {A Dedicated Crawling Engine to Reduce Apps Distribution Risks},
  booktitle    = {2016 European Intelligence and Security Informatics Conference, {EISIC}
                  2016, Uppsala, Sweden, August 17-19, 2016},
  pages        = {202},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/EISIC.2016.056},
  doi          = {10.1109/EISIC.2016.056},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/Pic16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/PijpkerV16,
  author       = {Jeroen Pijpker and
                  Harald P. E. Vranken},
  editor       = {Joel Brynielsson and
                  Fredrik Johansson},
  title        = {The Role of Internet Service Providers in Botnet Mitigation},
  booktitle    = {2016 European Intelligence and Security Informatics Conference, {EISIC}
                  2016, Uppsala, Sweden, August 17-19, 2016},
  pages        = {24--31},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/EISIC.2016.013},
  doi          = {10.1109/EISIC.2016.013},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/PijpkerV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/RizzoBM16,
  author       = {Stefano Giovanni Rizzo and
                  Flavio Bertini and
                  Danilo Montesi},
  editor       = {Joel Brynielsson and
                  Fredrik Johansson},
  title        = {Text Authorship Verification through Watermarking},
  booktitle    = {2016 European Intelligence and Security Informatics Conference, {EISIC}
                  2016, Uppsala, Sweden, August 17-19, 2016},
  pages        = {168--171},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/EISIC.2016.043},
  doi          = {10.1109/EISIC.2016.043},
  timestamp    = {Thu, 20 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/RizzoBM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/RuohonenSHMAL16,
  author       = {Jukka Ruohonen and
                  Sanja Scepanovic and
                  Sami Hyrynsalmi and
                  Igor Mishkovski and
                  Tuomas Aura and
                  Ville Lepp{\"{a}}nen},
  editor       = {Joel Brynielsson and
                  Fredrik Johansson},
  title        = {A Post-Mortem Empirical Investigation of the Popularity and Distribution
                  of Malware Files in the Contemporary Web-Facing Internet},
  booktitle    = {2016 European Intelligence and Security Informatics Conference, {EISIC}
                  2016, Uppsala, Sweden, August 17-19, 2016},
  pages        = {144--147},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/EISIC.2016.037},
  doi          = {10.1109/EISIC.2016.037},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/RuohonenSHMAL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/SabbaghK16,
  author       = {Bilal Al Sabbagh and
                  Stewart Kowalski},
  editor       = {Joel Brynielsson and
                  Fredrik Johansson},
  title        = {A Framework and Prototype for {A} Socio-Technical Security Information
                  and Event Management System {(ST-SIEM)}},
  booktitle    = {2016 European Intelligence and Security Informatics Conference, {EISIC}
                  2016, Uppsala, Sweden, August 17-19, 2016},
  pages        = {192--195},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/EISIC.2016.049},
  doi          = {10.1109/EISIC.2016.049},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/SabbaghK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/SariB16,
  author       = {Aprianti Nanda Sari and
                  Ari Moesriami Barmawi},
  editor       = {Joel Brynielsson and
                  Fredrik Johansson},
  title        = {Modified Graphstega Based on Chart Scale Modification},
  booktitle    = {2016 European Intelligence and Security Informatics Conference, {EISIC}
                  2016, Uppsala, Sweden, August 17-19, 2016},
  pages        = {156--159},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/EISIC.2016.040},
  doi          = {10.1109/EISIC.2016.040},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/SariB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/ScrivensF16,
  author       = {Ryan Scrivens and
                  Richard Frank},
  editor       = {Joel Brynielsson and
                  Fredrik Johansson},
  title        = {Sentiment-based Classification of Radical Text on the Web},
  booktitle    = {2016 European Intelligence and Security Informatics Conference, {EISIC}
                  2016, Uppsala, Sweden, August 17-19, 2016},
  pages        = {104--107},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/EISIC.2016.027},
  doi          = {10.1109/EISIC.2016.027},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/ScrivensF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/SeidlerHKWPA16,
  author       = {Patrick Seidler and
                  Johanna Haider and
                  Neesha Kodagoda and
                  B. L. William Wong and
                  Margit Pohl and
                  Richard Adderley},
  editor       = {Joel Brynielsson and
                  Fredrik Johansson},
  title        = {Design for Intelligence Analysis of Complex Systems: Evolution of
                  Criminal Networks},
  booktitle    = {2016 European Intelligence and Security Informatics Conference, {EISIC}
                  2016, Uppsala, Sweden, August 17-19, 2016},
  pages        = {140--143},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/EISIC.2016.036},
  doi          = {10.1109/EISIC.2016.036},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/SeidlerHKWPA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/SelvarajAPW16,
  author       = {Nallini Selvaraj and
                  Simon Attfield and
                  Peter J. Passmore and
                  B. L. William Wong},
  editor       = {Joel Brynielsson and
                  Fredrik Johansson},
  title        = {How Analysts Think: Think-steps as a Tool for Structuring Sensemaking
                  in Criminal Intelligence Analysis},
  booktitle    = {2016 European Intelligence and Security Informatics Conference, {EISIC}
                  2016, Uppsala, Sweden, August 17-19, 2016},
  pages        = {68--75},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/EISIC.2016.019},
  doi          = {10.1109/EISIC.2016.019},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/SelvarajAPW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/SmitVWS16,
  author       = {Selmar Smit and
                  Bob van der Vecht and
                  Freek van Wermeskerken and
                  Jan Willem Streefkerk},
  editor       = {Joel Brynielsson and
                  Fredrik Johansson},
  title        = {{QUIN:} Providing Integrated Analysis Support to Crime Investigators},
  booktitle    = {2016 European Intelligence and Security Informatics Conference, {EISIC}
                  2016, Uppsala, Sweden, August 17-19, 2016},
  pages        = {120--123},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/EISIC.2016.031},
  doi          = {10.1109/EISIC.2016.031},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/SmitVWS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/StolcWVDC16,
  author       = {Svorad Stolc and
                  Peter Wild and
                  Kristi{\'{a}}n Valent{\'{\i}}n and
                  Franz Daubner and
                  Markus Clabian},
  editor       = {Joel Brynielsson and
                  Fredrik Johansson},
  title        = {On Interoperability of Security Document Reading Devices},
  booktitle    = {2016 European Intelligence and Security Informatics Conference, {EISIC}
                  2016, Uppsala, Sweden, August 17-19, 2016},
  pages        = {9--15},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/EISIC.2016.011},
  doi          = {10.1109/EISIC.2016.011},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/StolcWVDC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Usugami16,
  author       = {Jiro Usugami},
  editor       = {Joel Brynielsson and
                  Fredrik Johansson},
  title        = {Disaster Risk Reduction for International Residents in Japan: Barriers
                  and Facilitators to Knowledge Sharing in Times of Disaster},
  booktitle    = {2016 European Intelligence and Security Informatics Conference, {EISIC}
                  2016, Uppsala, Sweden, August 17-19, 2016},
  pages        = {96--99},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/EISIC.2016.025},
  doi          = {10.1109/EISIC.2016.025},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/Usugami16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/WildSVDC16,
  author       = {Peter Wild and
                  Svorad Stolc and
                  Kristi{\'{a}}n Valent{\'{\i}}n and
                  Franz Daubner and
                  Markus Clabian},
  editor       = {Joel Brynielsson and
                  Fredrik Johansson},
  title        = {Compression Effects on Security Document Images},
  booktitle    = {2016 European Intelligence and Security Informatics Conference, {EISIC}
                  2016, Uppsala, Sweden, August 17-19, 2016},
  pages        = {76--79},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/EISIC.2016.020},
  doi          = {10.1109/EISIC.2016.020},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/WildSVDC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/ZaeemMB16,
  author       = {Razieh Nokhbeh Zaeem and
                  Monisha Manoharan and
                  K. Suzanne Barber},
  editor       = {Joel Brynielsson and
                  Fredrik Johansson},
  title        = {Risk Kit: Highlighting Vulnerable Identity Assets for Specific Age
                  Groups},
  booktitle    = {2016 European Intelligence and Security Informatics Conference, {EISIC}
                  2016, Uppsala, Sweden, August 17-19, 2016},
  pages        = {32--38},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/EISIC.2016.014},
  doi          = {10.1109/EISIC.2016.014},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/ZaeemMB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eisic/2016,
  editor       = {Joel Brynielsson and
                  Fredrik Johansson},
  title        = {2016 European Intelligence and Security Informatics Conference, {EISIC}
                  2016, Uppsala, Sweden, August 17-19, 2016},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/7869493/proceeding},
  isbn         = {978-1-5090-2857-3},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Abuarqoub15,
  author       = {Abdelrahman Abuarqoub},
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {Optimal Mobile Sink Selection Scheme for Multiple Sink Mobile Wireless
                  Sensor Networks},
  booktitle    = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  pages        = {169--172},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EISIC.2015.19},
  doi          = {10.1109/EISIC.2015.19},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/Abuarqoub15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Al-NooriAL15,
  author       = {Ahmed H. Al{-}Noori and
                  Khamis A. Al{-}Karawi and
                  Francis F. Li},
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {Improving Robustness of Speaker Recognition in Noisy and Reverberant
                  Conditions via Training},
  booktitle    = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  pages        = {180},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EISIC.2015.20},
  doi          = {10.1109/EISIC.2015.20},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/Al-NooriAL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/AlanaziJ15,
  author       = {Fahad Alanazi and
                  Andrew Jones},
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {The Value of Metadata in Digital Forensics},
  booktitle    = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  pages        = {182},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EISIC.2015.26},
  doi          = {10.1109/EISIC.2015.26},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/AlanaziJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/AlfayezN15,
  author       = {Fayez Alfayez and
                  Ian Neill},
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {Topology-based Optimization of Linear Wireless Sensor Networks},
  booktitle    = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  pages        = {183},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EISIC.2015.18},
  doi          = {10.1109/EISIC.2015.18},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/AlfayezN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/AlsumaytHL15,
  author       = {Albandari Alsumayt and
                  John Haggerty and
                  Ahmad Lotfi},
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {Performance, Analysis, and Comparison of MrDR Method to Detect DoS
                  Attacks in {MANET}},
  booktitle    = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  pages        = {121--124},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EISIC.2015.30},
  doi          = {10.1109/EISIC.2015.30},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/AlsumaytHL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/AshcroftFKOP15,
  author       = {Michael Ashcroft and
                  Ali Fisher and
                  Lisa Kaati and
                  Enghin Omer and
                  Nico Prucha},
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {Detecting Jihadist Messages on Twitter},
  booktitle    = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  pages        = {161--164},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EISIC.2015.27},
  doi          = {10.1109/EISIC.2015.27},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/AshcroftFKOP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/AshcroftKM15,
  author       = {Michael Ashcroft and
                  Lisa Kaati and
                  Maxime Meyer},
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {A Step Towards Detecting Online Grooming - Identifying Adults Pretending
                  to be Children},
  booktitle    = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  pages        = {98--104},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EISIC.2015.41},
  doi          = {10.1109/EISIC.2015.41},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/AshcroftKM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/AydinJ15,
  author       = {Mustafa Aydin and
                  Jeremy L. Jacob},
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {Cloud-COVER: Using User Security Attribute Preferences and Propagation
                  Analysis to Prioritise Threats to Systems},
  booktitle    = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  pages        = {53--60},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EISIC.2015.11},
  doi          = {10.1109/EISIC.2015.11},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/AydinJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/CarvalhoGC15,
  author       = {Rodrigo Carvalho and
                  Michael Goldsmith and
                  Sadie Creese},
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {Applying Semantic Technologies to Fight Online Banking Fraud},
  booktitle    = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  pages        = {61--68},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EISIC.2015.42},
  doi          = {10.1109/EISIC.2015.42},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/CarvalhoGC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Cayford15,
  author       = {Michelle Cayford},
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {Measures of Success: Developing a Method for Evaluating the Effectiveness
                  of Surveillance Technology},
  booktitle    = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  pages        = {187},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EISIC.2015.33},
  doi          = {10.1109/EISIC.2015.33},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/Cayford15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/ChanK15,
  author       = {Frodo Kin{-}Sun Chan and
                  Adams Wai{-}Kin Kong},
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {Using Hair Follicles with Leg Geometry to Align Androgenic Hair Patterns},
  booktitle    = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  pages        = {137--140},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EISIC.2015.17},
  doi          = {10.1109/EISIC.2015.17},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/ChanK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/DhamiC15,
  author       = {Mandeep K. Dhami and
                  Kathryn E. Careless},
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {Ordinal Structure of the Generic Analytic Workflow: {A} Survey of
                  Intelligence Analysts},
  booktitle    = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  pages        = {141--144},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EISIC.2015.37},
  doi          = {10.1109/EISIC.2015.37},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/DhamiC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/EleyanE15,
  author       = {Amna Eleyan and
                  Derar Eleyan},
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {Forensic Process as a Service (FPaaS) for Cloud Computing},
  booktitle    = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  pages        = {157--160},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EISIC.2015.14},
  doi          = {10.1109/EISIC.2015.14},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/EleyanE15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/EskridgeCNTP15,
  author       = {Thomas C. Eskridge and
                  Marco M. Carvalho and
                  Fitzroy Nembhard and
                  Hari Thotempudi and
                  Peter J. Polack},
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {Interactive Visualization of Netflow Traffic},
  booktitle    = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  pages        = {188},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EISIC.2015.51},
  doi          = {10.1109/EISIC.2015.51},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/EskridgeCNTP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/GenzelS15,
  author       = {Carl{-}Heinz Genzel and
                  Richard Sethmann},
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {Custom Transport Interface for the Integration of Trusted Network
                  Connect in German Smart Metering Systems},
  booktitle    = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  pages        = {45--52},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EISIC.2015.25},
  doi          = {10.1109/EISIC.2015.25},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/GenzelS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/GisslenT15,
  author       = {Linus Gissl{\'{e}}n and
                  Anders T{\"{o}}rne},
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {A Semantic Approach to Information Management and Decision Support:
                  An Application to Humanitarian Demining Operations},
  booktitle    = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  pages        = {75--82},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EISIC.2015.34},
  doi          = {10.1109/EISIC.2015.34},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/GisslenT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/GuSLL15,
  author       = {Ning Gu and
                  Duoyong Sun and
                  Bo Li and
                  Ze Li},
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {Sentiment Analysis for Topics based on Interaction Chain Model},
  booktitle    = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  pages        = {133--136},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EISIC.2015.23},
  doi          = {10.1109/EISIC.2015.23},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/GuSLL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/GuanLXSW15,
  author       = {Lei Guan and
                  Zan Li and
                  Song Xiao and
                  Jiangbo Si and
                  Jiajun Wan},
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {A Family of Adaptive Frequency Slot Number {FH} Sequences for High
                  Security and Reliability Communication},
  booktitle    = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  pages        = {30--36},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EISIC.2015.12},
  doi          = {10.1109/EISIC.2015.12},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/GuanLXSW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/HamadZMT15,
  author       = {Fadi Hamad and
                  Jamal Zraqou and
                  Adi Maaita and
                  Anas Abu Taleb},
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {A Secure Authentication System for ePassport Detection and Verification},
  booktitle    = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  pages        = {173--176},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EISIC.2015.21},
  doi          = {10.1109/EISIC.2015.21},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/HamadZMT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/HassanMS15,
  author       = {Hatem Hassan and
                  Ahmad Mostafa and
                  Ahmed Shawish},
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {{S-SAC:} Towards a Scalable Secure Access Control Framework for Cloud
                  Storage},
  booktitle    = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  pages        = {165--168},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EISIC.2015.43},
  doi          = {10.1109/EISIC.2015.43},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/HassanMS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/HegartyH15,
  author       = {Robert Hegarty and
                  John Haggerty},
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {SlackStick: Signature-Based File Identification for Live Digital Forensics
                  Examinations},
  booktitle    = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  pages        = {24--29},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EISIC.2015.28},
  doi          = {10.1109/EISIC.2015.28},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/HegartyH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/HillemannNA15,
  author       = {Eva{-}Catherine Hillemann and
                  Alexander Nussbaumer and
                  Dietrich Albert},
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {The Role of Cognitive Biases in Criminal Intelligence Analysis and
                  Approaches for their Mitigation},
  booktitle    = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  pages        = {125--128},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EISIC.2015.9},
  doi          = {10.1109/EISIC.2015.9},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/HillemannNA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/JohanssonGB15,
  author       = {Erik Johansson and
                  Christoffer Gahlin and
                  Anton Borg},
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {Crime Hotspots: An Evaluation of the {KDE} Spatial Mapping Technique},
  booktitle    = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  pages        = {69--74},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EISIC.2015.22},
  doi          = {10.1109/EISIC.2015.22},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/JohanssonGB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/KashifH15,
  author       = {Mhair Kashif and
                  Zahoor ul Haq},
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {An Optimal Use of Intrusion Detection and Prevention System {(IDPS)}},
  booktitle    = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  pages        = {190},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EISIC.2015.40},
  doi          = {10.1109/EISIC.2015.40},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/KashifH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Lapayese15,
  author       = {Manuel Jose Gazapo Lapayese},
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {Terrorism and its Transition to Cyberspace},
  booktitle    = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  pages        = {178},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EISIC.2015.46},
  doi          = {10.1109/EISIC.2015.46},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/Lapayese15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/LiSLLT15,
  author       = {Ze Li and
                  Duoyong Sun and
                  Bo Li and
                  Zi{-}Han Lin and
                  Min Tang},
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {Detecting Changes in Terrorism Networks: {A} Perspective of Multi-Meta-Network
                  Modeling},
  booktitle    = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  pages        = {179},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EISIC.2015.52},
  doi          = {10.1109/EISIC.2015.52},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/LiSLLT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/LiSLOZ15,
  author       = {Bo Li and
                  Duoyong Sun and
                  Ze Li and
                  Chaomin Ou and
                  Renqi Zhu},
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {Understanding the Dynamic of Covert Organization with Multilayer Networks
                  Model},
  booktitle    = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  pages        = {37--44},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EISIC.2015.10},
  doi          = {10.1109/EISIC.2015.10},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/LiSLOZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/LinSLL15,
  author       = {Zi{-}Han Lin and
                  Duoyong Sun and
                  Bo Li and
                  Ze Li},
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {Game Analysis on the Counter-Terrorism Cooperation of Shanghai Cooperation
                  Organization},
  booktitle    = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  pages        = {185},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EISIC.2015.24},
  doi          = {10.1109/EISIC.2015.24},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/LinSLL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/MalatrasFB15,
  author       = {Apostolos Malatras and
                  {\'{E}}ric Freyssinet and
                  Laurent Beslay},
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {Mobile Botnets Taxonomy and Challenges},
  booktitle    = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  pages        = {149--152},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EISIC.2015.13},
  doi          = {10.1109/EISIC.2015.13},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/MalatrasFB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/MountN15,
  author       = {Sarah Mount and
                  Robert M. Newman},
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {Energy-Efficient Brute Force Password Cracking},
  booktitle    = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  pages        = {189},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EISIC.2015.50},
  doi          = {10.1109/EISIC.2015.50},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/MountN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Papi15,
  author       = {Francesco Papi},
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {Multi-Sensor d-GLMB Filter for Multi-Target Tracking using Doppler
                  only Measurements},
  booktitle    = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  pages        = {83--89},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EISIC.2015.48},
  doi          = {10.1109/EISIC.2015.48},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/Papi15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Papi15a,
  author       = {Francesco Papi},
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {Constrained d-GLMB Filter for Multi-Target Track-Before-Detect using
                  Radar Measurements},
  booktitle    = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  pages        = {90--97},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EISIC.2015.49},
  doi          = {10.1109/EISIC.2015.49},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/Papi15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/ParkB15,
  author       = {Andrew J. Park and
                  Shawn Buckley},
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {Three-Dimensional Agent-Based Model and Simulation of a Burglar's
                  Target Selection},
  booktitle    = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  pages        = {105--112},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EISIC.2015.39},
  doi          = {10.1109/EISIC.2015.39},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/ParkB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/PassmoreAKGW15,
  author       = {Peter J. Passmore and
                  Simon Attfield and
                  Neesha Kodagoda and
                  Celeste Groenewald and
                  B. L. William Wong},
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {Supporting the Externalisation of Thinking in Criminal Intelligence
                  Analysis},
  booktitle    = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  pages        = {16--23},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EISIC.2015.35},
  doi          = {10.1109/EISIC.2015.35},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/PassmoreAKGW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/PohlHPW15,
  author       = {Margit Pohl and
                  Johanna Haider and
                  Chris Pallaris and
                  B. L. William Wong},
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {Guidelines for Sensemaking in Intelligence Analysis},
  booktitle    = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  pages        = {177},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EISIC.2015.45},
  doi          = {10.1109/EISIC.2015.45},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/PohlHPW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/RajamakiKRVP15,
  author       = {Jyri Rajam{\"{a}}ki and
                  Juha S. Knuuttila and
                  Harri Ruoslahti and
                  Jouni Viitanen and
                  Pasi Patama},
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {Transparent Surveillance of Suspects for Building Trust between Citizens
                  and Their Governments},
  booktitle    = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  pages        = {181},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EISIC.2015.31},
  doi          = {10.1109/EISIC.2015.31},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/RajamakiKRVP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/RajamakiP15,
  author       = {Jyri Rajam{\"{a}}ki and
                  Rauno Pirinen},
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {Critical Infrastructure Protection: Towards a Design Theory for Resilient
                  Software-Intensive Systems},
  booktitle    = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  pages        = {184},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EISIC.2015.32},
  doi          = {10.1109/EISIC.2015.32},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/RajamakiP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/RodheBHK15,
  author       = {Ioana Rodhe and
                  Johan E. Bengtsson and
                  Amund Hunstad and
                  Henrik Karlz{\'{e}}n},
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {Future Schemes for Stronger Verification of the Access Rights of Border
                  Control Inspection Systems},
  booktitle    = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  pages        = {9--15},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EISIC.2015.16},
  doi          = {10.1109/EISIC.2015.16},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/RodheBHK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/SarlatiHM15,
  author       = {Yasaman Sarlati and
                  Sattar Hashemi and
                  Niloofar Mozafari},
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {Adopting Community Features to Detect Social Spammers},
  booktitle    = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  pages        = {153--156},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EISIC.2015.44},
  doi          = {10.1109/EISIC.2015.44},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/SarlatiHM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/SchlehahnAMSLSW15,
  author       = {Eva Schlehahn and
                  Patrick Aichroth and
                  Sebastian Mann and
                  Rudolf Schreiner and
                  Ulrich Lang and
                  Ifan D. H. Shepherd and
                  B. L. William Wong},
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {Benefits and Pitfalls of Predictive Policing},
  booktitle    = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  pages        = {145--148},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EISIC.2015.29},
  doi          = {10.1109/EISIC.2015.29},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/SchlehahnAMSLSW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/SpittersKKS15,
  author       = {Martijn Spitters and
                  Femke Klaver and
                  Gijs Koot and
                  Mark van Staalduinen},
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {Authorship Analysis on Dark Marketplace Forums},
  booktitle    = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  pages        = {1--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EISIC.2015.47},
  doi          = {10.1109/EISIC.2015.47},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/SpittersKKS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/StembertPBCJ15,
  author       = {Nathalie Stembert and
                  Arne Padmos and
                  Mortaza S. Bargh and
                  Sunil Choenni and
                  Frans Jansen},
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {A Study of Preventing Email (Spear) Phishing by Enabling Human Intelligence},
  booktitle    = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  pages        = {113--120},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EISIC.2015.38},
  doi          = {10.1109/EISIC.2015.38},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/StembertPBCJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/TangSLOLL15,
  author       = {Min Tang and
                  Duoyong Sun and
                  Bo Li and
                  Chaomin Ou and
                  Zi{-}Han Lin and
                  Ze Li},
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {Research on the Evaluation Method of National Military Development
                  Based on Net Assessment},
  booktitle    = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  pages        = {129--132},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EISIC.2015.15},
  doi          = {10.1109/EISIC.2015.15},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/TangSLOLL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/VolpettiRMB15,
  author       = {Vito Volpetti and
                  Valentino Ricci and
                  Francesco F. Monai and
                  Francesco Barcio},
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {CBRNe Threat Detection and Monitoring System: Advanced Prototype},
  booktitle    = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  pages        = {186},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EISIC.2015.36},
  doi          = {10.1109/EISIC.2015.36},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/VolpettiRMB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eisic/2015,
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/7366895/proceeding},
  isbn         = {978-1-4799-8657-6},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/AbbasiLBHC14,
  author       = {Ahmed Abbasi and
                  Weifeng Li and
                  Victor A. Benjamin and
                  Shiyu Hu and
                  Hsinchun Chen},
  title        = {Descriptive Analytics: Examining Expert Hackers in Web Forums},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {56--63},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.18},
  doi          = {10.1109/JISIC.2014.18},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/AbbasiLBHC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/AbbottS14,
  author       = {Alya Abbott and
                  Olga Simek},
  title        = {Recommending Documents for Complex Question Exploration by Analyzing
                  Browsing Behavior},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {321},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.66},
  doi          = {10.1109/JISIC.2014.66},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/AbbottS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/AdamsL14,
  author       = {Niall M. Adams and
                  Daniel J. Lawson},
  title        = {An Approximate Framework for Flexible Network Flow Screening},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {256--259},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.49},
  doi          = {10.1109/JISIC.2014.49},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/AdamsL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/AdrichemLWWFK14,
  author       = {Niels L. M. van Adrichem and
                  Antonio Reyes Lua and
                  Xin Wang and
                  Muhammad Wasif and
                  Ficky Fatturrahman and
                  Fernando A. Kuipers},
  title        = {{DNSSEC} Misconfigurations: How Incorrectly Configured Security Leads
                  to Unreachability},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {9--16},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.12},
  doi          = {10.1109/JISIC.2014.12},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/AdrichemLWWFK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/Al-khateebA14,
  author       = {Samer Al{-}khateeb and
                  Nitin Agarwal},
  title        = {Modeling Flash Mobs in Cybernetic Space: Evaluating Threats of Emerging
                  Socio-Technical Behaviors to Human Security},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {328},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.73},
  doi          = {10.1109/JISIC.2014.73},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isi/Al-khateebA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/AlguliyevRR14,
  author       = {Rasim M. Alguliyev and
                  Davud Rustamov and
                  Mirza Rzayev},
  title        = {Computational Approach for Detection of Illegal Activity over the
                  Internet},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {326},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.71},
  doi          = {10.1109/JISIC.2014.71},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/AlguliyevRR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/Bachmann14,
  author       = {Michael Bachmann},
  title        = {Passwords are Dead: Alternative Authentication Methods},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {322},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.67},
  doi          = {10.1109/JISIC.2014.67},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/Bachmann14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/BanaszakBDS14,
  author       = {Steven Banaszak and
                  Elizabeth K. Bowman and
                  John P. Dickerson and
                  V. S. Subrahmanian},
  title        = {Forecasting Country Stability in North Africa},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {304--307},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.60},
  doi          = {10.1109/JISIC.2014.60},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/BanaszakBDS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/BenjaminC14,
  author       = {Victor A. Benjamin and
                  Hsinchun Chen},
  title        = {Time-to-Event Modeling for Predicting Hacker {IRC} Community Participant
                  Trajectory},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {25--32},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.14},
  doi          = {10.1109/JISIC.2014.14},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/BenjaminC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/BodenhamA14,
  author       = {Dean Adam Bodenham and
                  Niall M. Adams},
  title        = {Adaptive Change Detection for Relay-Like Behaviour},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {252--255},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.48},
  doi          = {10.1109/JISIC.2014.48},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/BodenhamA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/BoltonH14,
  author       = {Alexander Bolton and
                  Nicholas A. Heard},
  title        = {Application of a Linear Time Method for Change Point Detection to
                  the Classification of Software},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {292--295},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.58},
  doi          = {10.1109/JISIC.2014.58},
  timestamp    = {Wed, 26 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/BoltonH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/BradyOK14,
  author       = {Owen Brady and
                  Richard E. Overill and
                  Jeroen Keppens},
  title        = {Addressing the Increasing Volume and Variety of Digital Evidence Using
                  an Ontology},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {176--183},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.34},
  doi          = {10.1109/JISIC.2014.34},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/BradyOK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/BroekSD14,
  author       = {A. C. van den Broek and
                  R. M. Schoemaker and
                  Rob J. Dekker},
  title        = {Land Border Permeability and Irregular Migration Using Geospatial
                  Intelligence from Satellite Data},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {208--211},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.38},
  doi          = {10.1109/JISIC.2014.38},
  timestamp    = {Fri, 17 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/BroekSD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/CayfordGG14,
  author       = {Michelle Cayford and
                  Coen van Gulijk and
                  Pieter H. A. J. M. van Gelder},
  title        = {When Counting is Not Enough: Limitations of NSA's Effectiveness Assessment
                  of Surveillance Technology},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {333},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.80},
  doi          = {10.1109/JISIC.2014.80},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isi/CayfordGG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/ChabotBNK14,
  author       = {Yoan Chabot and
                  Aur{\'{e}}lie Bertaux and
                  Christophe Nicolle and
                  M. Tahar Kechadi},
  title        = {Automatic Timeline Construction and Analysis for Computer Forensics
                  Purposes},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {276--279},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.54},
  doi          = {10.1109/JISIC.2014.54},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/ChabotBNK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/ChahuaraMMSTP14,
  author       = {Pedro Chahuara and
                  Luca Mazzola and
                  Michail Makridis and
                  Claudio Schifanella and
                  Aris Tsois and
                  Mauro Pedone},
  title        = {Inferring itineraries of containerized cargo through the application
                  of Conditional Random Fields},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {137--144},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.29},
  doi          = {10.1109/JISIC.2014.29},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isi/ChahuaraMMSTP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/CoiselS14,
  author       = {Iwen Coisel and
                  Ignacio Sanchez},
  title        = {Practical Interception of {DECT} Encrypted Voice Communication in
                  Unified Communications Environments},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {115--122},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.26},
  doi          = {10.1109/JISIC.2014.26},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/CoiselS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/DaniilidisFVDZLKSTKCGPRDZBGAS14,
  author       = {Ioannis Daniilidis and
                  J.{-}J. Filippi and
                  Wolfgang Vautz and
                  Enrico Dalcanale and
                  Stefano Zampolli and
                  George Leventakis and
                  I. Kauppinen and
                  S. Sinisalo and
                  Vasilis Tsoulkas and
                  V. Kassouras and
                  Mathieu Carras and
                  B. Gerard and
                  R. Pinalli and
                  A. Ragnoni and
                  L. Dujourdy and
                  D. Zavali and
                  Mickael Brun and
                  Vasileios Grizis and
                  Apostolos Argyris and
                  Dimitris Syvridis},
  title        = {Detection of Olfactory Traces by Orthogonal Gas Identification Technologies
                  - {DOGGIES}},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {332},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.76},
  doi          = {10.1109/JISIC.2014.76},
  timestamp    = {Tue, 15 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isi/DaniilidisFVDZLKSTKCGPRDZBGAS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/DantasNF14,
  author       = {Yuri Gil Dantas and
                  Vivek Nigam and
                  Iguatemi E. Fonseca},
  title        = {A Selective Defense for Application Layer DDoS Attacks},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {75--82},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.21},
  doi          = {10.1109/JISIC.2014.21},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/DantasNF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/DatcuCLL14,
  author       = {Dragos Datcu and
                  Marina{-}Anca Cidot{\~{a}} and
                  Heide K. Lukosch and
                  Stephan G. Lukosch},
  title        = {On the Usability of Augmented Reality for Information Exchange in
                  Teams from the Security Domain},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {160--167},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.32},
  doi          = {10.1109/JISIC.2014.32},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/DatcuCLL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/EdwardsRR14,
  author       = {Matthew John Edwards and
                  Awais Rashid and
                  Paul Rayson},
  title        = {A Service-Indepenent Model for Linking Online User Profile Information},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {280--283},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.55},
  doi          = {10.1109/JISIC.2014.55},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/EdwardsRR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/GschwandtnerSD14,
  author       = {Michael Gschwandtner and
                  Svorad Stolc and
                  Franz Daubner},
  title        = {Optical Security Document Simulator for Black-Box Testing of {ABC}
                  Systems},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {300--303},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.78},
  doi          = {10.1109/JISIC.2014.78},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/GschwandtnerSD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/GuedesFP14,
  author       = {Ricardo Guedes and
                  Vasco Furtado and
                  Tarcisio H. C. Pequeno},
  title        = {Multiagent Models for Police Resource Allocation and Dispatch},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {288--291},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.57},
  doi          = {10.1109/JISIC.2014.57},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/GuedesFP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/GuriKKE14,
  author       = {Mordechai Guri and
                  Gabi Kedma and
                  Assaf Kachlon and
                  Yuval Elovici},
  title        = {Resilience of Anti-malware Programs to Na{\"{\i}}ve Modifications
                  of Malicious Binaries},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {152--159},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.31},
  doi          = {10.1109/JISIC.2014.31},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/GuriKKE14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/GuriKZE14,
  author       = {Mordechai Guri and
                  Gabi Kedma and
                  Boris Zadov and
                  Yuval Elovici},
  title        = {Trusted Detection of Sensitive Activities on Mobile Phones Using Power
                  Consumption Measurements},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {145--151},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.30},
  doi          = {10.1109/JISIC.2014.30},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/GuriKZE14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/Hammer14,
  author       = {Hugo Lewi Hammer},
  title        = {Detecting Threats of Violence in Online Discussions Using Bigrams
                  of Important Words},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {319},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.64},
  doi          = {10.1109/JISIC.2014.64},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/Hammer14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/HeZBMZXTH14,
  author       = {Saike He and
                  Xiaolong Zheng and
                  Xiuguo Bao and
                  Hongyuan Ma and
                  Daniel Dajun Zeng and
                  Bo Xu and
                  Guanhua Tian and
                  Hongwei Hao},
  title        = {Ranking Online Memes in Emergency Events Based on Transfer Entropy},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {236--239},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.44},
  doi          = {10.1109/JISIC.2014.44},
  timestamp    = {Tue, 25 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/HeZBMZXTH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/HeardRL14,
  author       = {Nick Heard and
                  Patrick Rubin{-}Delanchy and
                  Daniel J. Lawson},
  title        = {Filtering Automated Polling Traffic in Computer Network Flow Data},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {268--271},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.52},
  doi          = {10.1109/JISIC.2014.52},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isi/HeardRL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/JohanssonKS14,
  author       = {Fredrik Johansson and
                  Lisa Kaati and
                  Amendra Shrestha},
  title        = {Time Profiles for Identifying Users in Online Environments},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {83--90},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.22},
  doi          = {10.1109/JISIC.2014.22},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/JohanssonKS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/JurekBM14,
  author       = {Anna Jurek and
                  Yaxin Bi and
                  Maurice D. Mulvenna},
  title        = {Twitter Sentiment Analysis for Security-Related Information Gathering},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {48--55},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.17},
  doi          = {10.1109/JISIC.2014.17},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/JurekBM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/KodagodaANZXWWPBMB14,
  author       = {Neesha Kodagoda and
                  Simon Attfield and
                  Phong Hai Nguyen and
                  Leishi Zhang and
                  Kai Xu and
                  B. L. William Wong and
                  Adrian Wagstaff and
                  Graham Phillips and
                  James Bullock and
                  John Marshall and
                  Stewart Bertram},
  title        = {POLAR-An Interactive Patterns of Life Visualisation Tool for Intelligence
                  Analysis},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {327},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.72},
  doi          = {10.1109/JISIC.2014.72},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isi/KodagodaANZXWWPBMB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/KongMZW14,
  author       = {Qingchao Kong and
                  Wenji Mao and
                  Daniel Dajun Zeng and
                  Lei Wang},
  title        = {Predicting Popularity of Forum Threads for Public Events Security},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {99--106},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.24},
  doi          = {10.1109/JISIC.2014.24},
  timestamp    = {Wed, 17 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isi/KongMZW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/KootVHKVB14,
  author       = {Gijs Koot and
                  Mirjam A. A. Huis in 't Veld and
                  Joost Hendricksen and
                  Rianne Kaptein and
                  Arnout de Vries and
                  Egon L. van den Broek},
  title        = {Foraging Online Social Networks},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {312--315},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.62},
  doi          = {10.1109/JISIC.2014.62},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/KootVHKVB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/LathropO14,
  author       = {Joel Lathrop and
                  James B. O'Kane},
  title        = {A Case Study in Opportunity Reduction: Mitigating the Dirt Jumper
                  Drive-Smart Attack},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {224--227},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.41},
  doi          = {10.1109/JISIC.2014.41},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/LathropO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/LawsonRHA14,
  author       = {Daniel J. Lawson and
                  Patrick Rubin{-}Delanchy and
                  Nicholas A. Heard and
                  Niall M. Adams},
  title        = {Statistical Frameworks for Detecting Tunnelling in Cyber Defence Using
                  Big Data},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {248--251},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.47},
  doi          = {10.1109/JISIC.2014.47},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isi/LawsonRHA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/LiC14,
  author       = {Weifeng Li and
                  Hsinchun Chen},
  title        = {Identifying Top Sellers In Underground Economy Using Deep Learning-Based
                  Sentiment Analysis},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {64--67},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.19},
  doi          = {10.1109/JISIC.2014.19},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/LiC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/LiaoL14,
  author       = {Yi{-}Ching Liao and
                  Hanno Langweg},
  title        = {Resource-Based Event Reconstruction of Digital Crime Scenes},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {129--136},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.28},
  doi          = {10.1109/JISIC.2014.28},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/LiaoL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/LuoCZZ14,
  author       = {Chuan Luo and
                  Kainan Cui and
                  Xiaolong Zheng and
                  Daniel Dajun Zeng},
  title        = {Time Critical Disinformation Influence Minimization in Online Social
                  Networks},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {68--74},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.20},
  doi          = {10.1109/JISIC.2014.20},
  timestamp    = {Thu, 21 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isi/LuoCZZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/LuoZZ14,
  author       = {Chuan Luo and
                  Xiaolong Zheng and
                  Daniel Dajun Zeng},
  title        = {Causal Inference in Social Media Using Convergent Cross Mapping},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {260--263},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.50},
  doi          = {10.1109/JISIC.2014.50},
  timestamp    = {Thu, 21 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isi/LuoZZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/MemonW14,
  author       = {Bisharat Rasool Memon and
                  Uffe Kock Wiil},
  title        = {Predicting Links in Multi-relational Networks},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {107--114},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.25},
  doi          = {10.1109/JISIC.2014.25},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isi/MemonW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/MetelliH14,
  author       = {Silvia Metelli and
                  Nicholas A. Heard},
  title        = {Modelling New Edge Formation in a Computer Network through Bayesian
                  Variable Selection},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {272--275},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.53},
  doi          = {10.1109/JISIC.2014.53},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/MetelliH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/MolchoMMA14,
  author       = {Gila Molcho and
                  Sebastian Maier and
                  Felipe Melero and
                  Carlo Aliprandi},
  title        = {{CAPER:} Collaborative Information, Acquisition, Processing, Exploitation
                  and Reporting for the Prevention of Organised Crime},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {316},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.63},
  doi          = {10.1109/JISIC.2014.63},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/MolchoMMA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/MusgroveCC14,
  author       = {Jesse Musgrove and
                  Bojan Cukic and
                  Vittorio Cortellessa},
  title        = {On the Adequacy of Performance Models in an Adaptive Border Inspection
                  Management System},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {200--207},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.37},
  doi          = {10.1109/JISIC.2014.37},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/MusgroveCC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/NissimCMSEBE14,
  author       = {Nir Nissim and
                  Aviad Cohen and
                  Robert Moskovitch and
                  Asaf Shabtai and
                  Mattan Edry and
                  Oren Bar{-}Ad and
                  Yuval Elovici},
  title        = {{ALPD:} Active Learning Framework for Enhancing the Detection of Malicious
                  {PDF} Files},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {91--98},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.23},
  doi          = {10.1109/JISIC.2014.23},
  timestamp    = {Fri, 26 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isi/NissimCMSEBE14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/NordvikLL14,
  author       = {Rune Nordvik and
                  Yi{-}Ching Liao and
                  Hanno Langweg},
  title        = {AccountabilityFS: {A} File System Monitor for Forensic Readiness},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {308--311},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.61},
  doi          = {10.1109/JISIC.2014.61},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/NordvikLL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/Oey14,
  author       = {Herman{-}Dick Giok Tjiang Oey},
  title        = {Military Geospatial Profiling Analysis},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {329--330},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.74},
  doi          = {10.1109/JISIC.2014.74},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/Oey14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/PattonGCFWC14,
  author       = {Mark W. Patton and
                  Eric Gross and
                  Ryan Chinn and
                  Samantha Forbis and
                  Leon Walker and
                  Hsinchun Chen},
  title        = {Uninvited Connections: {A} Study of Vulnerable Devices on the Internet
                  of Things (IoT)},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {232--235},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.43},
  doi          = {10.1109/JISIC.2014.43},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/PattonGCFWC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/PicMHW14,
  author       = {Marc Michel Pic and
                  Clarisse Mandridake and
                  Mathieu Hoarau and
                  Kevin Win{-}Lime},
  title        = {{DOCSCOPE:} {ID} Printing Techniques Signatures},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {334},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.77},
  doi          = {10.1109/JISIC.2014.77},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/PicMHW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/PiniPVBLS14,
  author       = {Marco Pini and
                  Luca Pilosu and
                  Lene Vesterlund and
                  David Blanco and
                  Fredrik Lindstr{\"{o}}m and
                  Emiliano Spaltro},
  title        = {Robust Navigation and Communication in the Maritime Domain: The {TRITON}
                  Project},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {331},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.75},
  doi          = {10.1109/JISIC.2014.75},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/PiniPVBLS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/Pirinen14,
  author       = {Rauno Pirinen},
  title        = {Studies of Integration Readiness Levels: Case Shared Maritime Situational
                  Awareness System},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {212--215},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.79},
  doi          = {10.1109/JISIC.2014.79},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/Pirinen14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/PohlWPAW14,
  author       = {Margit Pohl and
                  Lisa{-}Christina Winter and
                  Chris Pallaris and
                  Simon Attfield and
                  B. L. William Wong},
  title        = {Sensemaking and Cognitive Bias Mitigation in Visual Analytics},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {323},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.68},
  doi          = {10.1109/JISIC.2014.68},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/PohlWPAW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/PonzoniZCCS14,
  author       = {Andrea Ponzoni and
                  Dario Zappa and
                  Cristina Cerqui and
                  Elisabetta Comini and
                  Giorgio Sberveglieri},
  title        = {Metal Oxide Gas Sensors Technologies for Hidden People Detection},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {324},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.69},
  doi          = {10.1109/JISIC.2014.69},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/PonzoniZCCS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/PrueJSP14,
  author       = {Brian Prue and
                  Michael Jenkins and
                  Lauren D. Stern and
                  Jonathan D. Pfautz},
  title        = {Overcoming Limited Collaboration Channels in Distributed Intelligence
                  Analysis: Visualization Tools and Design Seeds},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {17--24},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.13},
  doi          = {10.1109/JISIC.2014.13},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/PrueJSP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/Rajamaki14,
  author       = {Jyri Rajam{\"{a}}ki},
  title        = {Challenges to a Smooth-Running Data Security Audits. Case: {A} Finnish
                  National Security Auditing Criteria {KATAKRI}},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {240--243},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.45},
  doi          = {10.1109/JISIC.2014.45},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/Rajamaki14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/Rubin-DelanchyLTHA14,
  author       = {Patrick Rubin{-}Delanchy and
                  Daniel J. Lawson and
                  Melissa J. Turcotte and
                  Nicholas A. Heard and
                  Niall M. Adams},
  title        = {Three Statistical Approaches to Sessionizing Network Flow Data},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {244--247},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.46},
  doi          = {10.1109/JISIC.2014.46},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isi/Rubin-DelanchyLTHA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/SepetnitskyGE14,
  author       = {Vitali Sepetnitsky and
                  Mordechai Guri and
                  Yuval Elovici},
  title        = {Exfiltration of Information from Air-Gapped Machines Using Monitor's
                  {LED} Indicator},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {264--267},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.51},
  doi          = {10.1109/JISIC.2014.51},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isi/SepetnitskyGE14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/ShahirGNW14,
  author       = {Hamed Yaghoubi Shahir and
                  Uwe Gl{\"{a}}sser and
                  Narek Nalbandyan and
                  Hans Wehn},
  title        = {Maritime Situation Analysis: {A} Multi-vessel Interaction and Anomaly
                  Detection Framework},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {192--199},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.36},
  doi          = {10.1109/JISIC.2014.36},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/ShahirGNW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/SikosDHF14,
  author       = {Jennifer Sikos and
                  Peter David and
                  Nizar Habash and
                  Reem Faraj},
  title        = {Authorship Analysis of Inspire Magazine through Stylometric and Psychological
                  Features},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {33--40},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.15},
  doi          = {10.1109/JISIC.2014.15},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/SikosDHF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/SilvaSAG14,
  author       = {Carlo Marcelo Revoredo da Silva and
                  Jose Lutiano Costa da Silva and
                  Rodrigo Elia Assad and
                  Ruy Jose Guerra Barretto Garcia},
  title        = {Aegis: {A} Lightweight Tool for Prevent Frauds in Web Browsers},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.11},
  doi          = {10.1109/JISIC.2014.11},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/SilvaSAG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/SpittersEWB14,
  author       = {Martijn Spitters and
                  Pieter T. Eendebak and
                  Dani{\"{e}}l T. H. Worm and
                  Henri Bouma},
  title        = {Threat Detection in Tweets with Trigger Patterns and Contextual Cues},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {216--219},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.39},
  doi          = {10.1109/JISIC.2014.39},
  timestamp    = {Mon, 21 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isi/SpittersEWB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/SpittersVS14,
  author       = {Martijn Spitters and
                  Stefan Verbruggen and
                  Mark van Staalduinen},
  title        = {Towards a Comprehensive Insight into the Thematic Organization of
                  the Tor Hidden Services},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {220--223},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.40},
  doi          = {10.1109/JISIC.2014.40},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/SpittersVS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/Sureka014,
  author       = {Ashish Sureka and
                  Swati Agarwal},
  title        = {Learning to Classify Hate and Extremism Promoting Tweets},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {320},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.65},
  doi          = {10.1109/JISIC.2014.65},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/Sureka014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/TyshchukWLJK14,
  author       = {Yulia Tyshchuk and
                  William A. Wallace and
                  Hao Li and
                  Heng Ji and
                  Sue E. Kase},
  title        = {The Nature of Communications and Emerging Communities on Twitter Following
                  the 2013 Syria Sarin Gas Attacks},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {41--47},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.16},
  doi          = {10.1109/JISIC.2014.16},
  timestamp    = {Mon, 06 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/TyshchukWLJK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/WeissenfeldKS14,
  author       = {Axel Weissenfeld and
                  Andreas Kriechbaum{-}Zabini and
                  Lukasz Szklarski},
  title        = {Security Components in a One-Stop-Shop Border Control System},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {228--231},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.42},
  doi          = {10.1109/JISIC.2014.42},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/WeissenfeldKS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/WestlingBG14,
  author       = {Anders Westling and
                  Joel Brynielsson and
                  Tove Gustavi},
  title        = {Mining the Web for Sympathy: The Pussy Riot Case},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {123--128},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.27},
  doi          = {10.1109/JISIC.2014.27},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/WestlingBG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/Wong14,
  author       = {B. L. William Wong},
  title        = {How Analysts Think (?): Early Observations},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {296--299},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.59},
  doi          = {10.1109/JISIC.2014.59},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/Wong14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/YangMB14,
  author       = {Yongpeng Yang and
                  Monisha Manoharan and
                  K. Suzanne Barber},
  title        = {Modelling and Analysis of Identity Threat Behaviors through Text Mining
                  of Identity Theft Stories},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {184--191},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.35},
  doi          = {10.1109/JISIC.2014.35},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/YangMB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/YanoBGA14,
  author       = {Edgar Toshiro Yano and
                  Parth Bhatt and
                  Per M. Gustavsson and
                  Rose{-}Mharie {\AA}hlfeldt},
  title        = {Towards a Methodology for Cybersecurity Risk Management Using Agents
                  Paradigm},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {325},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.70},
  doi          = {10.1109/JISIC.2014.70},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/YanoBGA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/YlikauppilaTKJ14,
  author       = {Mari Ylikauppila and
                  Sirra Toivonen and
                  Minna Kulju and
                  Minna Jokela},
  title        = {Understanding the Factors Affecting {UX} and Technology Acceptance
                  in the Context of Automated Border Controls},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {168--175},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.33},
  doi          = {10.1109/JISIC.2014.33},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/YlikauppilaTKJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/ZhangMZZB14,
  author       = {Yuhao Zhang and
                  Wenji Mao and
                  Daniel Dajun Zeng and
                  Ning Zhao and
                  Xiuguo Bao},
  title        = {Exploring Opinion Dynamics in Security-Related Microblog Data},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {284--287},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.56},
  doi          = {10.1109/JISIC.2014.56},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/ZhangMZZB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isi/2014,
  title        = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/6968676/proceeding},
  isbn         = {978-1-4799-6363-8},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/AdamsS13,
  author       = {Bart Adams and
                  Frank Suykens},
  title        = {Astute: Increased Situational Awareness through Proactive Decision
                  Support and Adaptive Map-Centric User Interfaces},
  booktitle    = {2013 European Intelligence and Security Informatics Conference, Uppsala,
                  Sweden, August 12-14, 2013},
  pages        = {289--293},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/EISIC.2013.74},
  doi          = {10.1109/EISIC.2013.74},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/AdamsS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/AlbertettiCGRS13,
  author       = {Fabrizio Albertetti and
                  Paul Cotofrei and
                  Lionel Grossrieder and
                  Olivier Ribaux and
                  Kilian Stoffel},
  title        = {The CriLiM Methodology: Crime Linkage with a Fuzzy {MCDM} Approach},
  booktitle    = {2013 European Intelligence and Security Informatics Conference, Uppsala,
                  Sweden, August 12-14, 2013},
  pages        = {67--74},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/EISIC.2013.17},
  doi          = {10.1109/EISIC.2013.17},
  timestamp    = {Fri, 02 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/AlbertettiCGRS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/AmardeilhKSVY13,
  author       = {Florence Amardeilh and
                  Wessel Kraaij and
                  Martijn Spitters and
                  Corn{\'{e}} Versloot and
                  Sinan Yurtsever},
  title        = {Semi-automatic Ontology Maintenance in the Virtuoso News Monitoring
                  System},
  booktitle    = {2013 European Intelligence and Security Informatics Conference, Uppsala,
                  Sweden, August 12-14, 2013},
  pages        = {135--138},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/EISIC.2013.29},
  doi          = {10.1109/EISIC.2013.29},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/AmardeilhKSVY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/AmorimAGA13,
  author       = {Joni A. Amorim and
                  Rose{-}Mharie {\AA}hlfeldt and
                  Per M. Gustavsson and
                  Sten F. Andler},
  title        = {Privacy and Security in Cyberspace: Training Perspectives on the Personal
                  Data Ecosystem},
  booktitle    = {2013 European Intelligence and Security Informatics Conference, Uppsala,
                  Sweden, August 12-14, 2013},
  pages        = {139--142},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/EISIC.2013.30},
  doi          = {10.1109/EISIC.2013.30},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/AmorimAGA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/AnderssonT13,
  author       = {Dennis Andersson and
                  Mirko Thorstensson},
  title        = {Reconstruction and Exploration: Applications in Criminology},
  booktitle    = {2013 European Intelligence and Security Informatics Conference, Uppsala,
                  Sweden, August 12-14, 2013},
  pages        = {190--193},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/EISIC.2013.42},
  doi          = {10.1109/EISIC.2013.42},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/AnderssonT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/BackfriedGQRKTSP13,
  author       = {Gerhard Backfried and
                  Johannes G{\"{o}}llner and
                  Gerald Quirchmayr and
                  Karin Rainer and
                  Gert Kienast and
                  Georg Thallinger and
                  Christian Schmidt and
                  Andreas Peer},
  title        = {Integration of Media Sources for Situation Analysis in the Different
                  Phases of Disaster Management: The QuOIMA Project},
  booktitle    = {2013 European Intelligence and Security Informatics Conference, Uppsala,
                  Sweden, August 12-14, 2013},
  pages        = {143--146},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/EISIC.2013.31},
  doi          = {10.1109/EISIC.2013.31},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/BackfriedGQRKTSP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/BakelmanMCT13,
  author       = {Ned Bakelman and
                  John V. Monaco and
                  Sung{-}Hyuk Cha and
                  Charles C. Tappert},
  title        = {Keystroke Biometric Studies on Password and Numeric Keypad Input},
  booktitle    = {2013 European Intelligence and Security Informatics Conference, Uppsala,
                  Sweden, August 12-14, 2013},
  pages        = {204--207},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/EISIC.2013.45},
  doi          = {10.1109/EISIC.2013.45},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/BakelmanMCT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/BallC13,
  author       = {Leslie Ball and
                  Matthew J. Craven},
  title        = {Automated Counter-Terrorism},
  booktitle    = {2013 European Intelligence and Security Informatics Conference, Uppsala,
                  Sweden, August 12-14, 2013},
  pages        = {216},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/EISIC.2013.48},
  doi          = {10.1109/EISIC.2013.48},
  timestamp    = {Fri, 11 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/BallC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/BernhardssonF13,
  author       = {Sebastian Bernhardsson and
                  Rickard Forsen},
  title        = {Assessment of Damage and Protective Capacity of Buildings Exposed
                  to Weapon Effects},
  booktitle    = {2013 European Intelligence and Security Informatics Conference, Uppsala,
                  Sweden, August 12-14, 2013},
  pages        = {222},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/EISIC.2013.54},
  doi          = {10.1109/EISIC.2013.54},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/BernhardssonF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/BerzinjiAK13,
  author       = {Ala Berzinji and
                  Frzand Sherko Abdullah and
                  Ali Hayder Kakei},
  title        = {Analysis of Terrorist Groups on Facebook},
  booktitle    = {2013 European Intelligence and Security Informatics Conference, Uppsala,
                  Sweden, August 12-14, 2013},
  pages        = {221},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/EISIC.2013.53},
  doi          = {10.1109/EISIC.2013.53},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/BerzinjiAK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/BilstrupR13,
  author       = {Urban Bilstrup and
                  Magdalena Rosenberg},
  title        = {A Pilot Study of Using Honeypots as Cyber Intelligence Sources},
  booktitle    = {2013 European Intelligence and Security Informatics Conference, Uppsala,
                  Sweden, August 12-14, 2013},
  pages        = {224},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/EISIC.2013.56},
  doi          = {10.1109/EISIC.2013.56},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/BilstrupR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/BroekS13,
  author       = {Egon L. van den Broek and
                  Martijn Spitters},
  title        = {Physiological Signals: The Next Generation Authentication and Identification
                  Methods!?},
  booktitle    = {2013 European Intelligence and Security Informatics Conference, Uppsala,
                  Sweden, August 12-14, 2013},
  pages        = {159--162},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/EISIC.2013.35},
  doi          = {10.1109/EISIC.2013.35},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/BroekS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/ButtMNKRL13,
  author       = {Moazzam Butt and
                  Sandra Marti and
                  Alexander Nouak and
                  J{\"{o}}rg K{\"{o}}plin and
                  Ramachandra Raghavendra and
                  Guoqiang Li},
  title        = {Towards e-Passport Duplicate Enrollment Check in the European Union},
  booktitle    = {2013 European Intelligence and Security Informatics Conference, Uppsala,
                  Sweden, August 12-14, 2013},
  pages        = {247--251},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/EISIC.2013.64},
  doi          = {10.1109/EISIC.2013.64},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/ButtMNKRL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/CantareroHM13,
  author       = {Daniel Cuesta Cantarero and
                  David Antonio Perez Herrero and
                  Fernando Martin Mendez},
  title        = {A Multi-modal Biometric Fusion Implementation for {ABC} Systems},
  booktitle    = {2013 European Intelligence and Security Informatics Conference, Uppsala,
                  Sweden, August 12-14, 2013},
  pages        = {277--280},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/EISIC.2013.71},
  doi          = {10.1109/EISIC.2013.71},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/CantareroHM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/ColbaughG13,
  author       = {Richard Colbaugh and
                  Kristin Glass},
  title        = {Analyzing Social Media Content for Security Informatics},
  booktitle    = {2013 European Intelligence and Security Informatics Conference, Uppsala,
                  Sweden, August 12-14, 2013},
  pages        = {45--51},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/EISIC.2013.14},
  doi          = {10.1109/EISIC.2013.14},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/ColbaughG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/DibbH13,
  author       = {Patrick Dibb and
                  Mohammad Hammoudeh},
  title        = {Forensic Data Recovery from Android {OS} Devices: An Open Source Toolkit},
  booktitle    = {2013 European Intelligence and Security Informatics Conference, Uppsala,
                  Sweden, August 12-14, 2013},
  pages        = {226},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/EISIC.2013.58},
  doi          = {10.1109/EISIC.2013.58},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/DibbH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/DimitrovaTC13,
  author       = {Tatyana Velikova Dimitrova and
                  Aris Tsois and
                  Elena Camossi},
  title        = {Visualization of Container Movements through a Web-Based Geographical
                  Information System},
  booktitle    = {2013 European Intelligence and Security Informatics Conference, Uppsala,
                  Sweden, August 12-14, 2013},
  pages        = {182--185},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/EISIC.2013.40},
  doi          = {10.1109/EISIC.2013.40},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/DimitrovaTC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Dragos13,
  author       = {Valentina Dragos},
  title        = {Browse and Search in Maritime Document Collections},
  booktitle    = {2013 European Intelligence and Security Informatics Conference, Uppsala,
                  Sweden, August 12-14, 2013},
  pages        = {225},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/EISIC.2013.57},
  doi          = {10.1109/EISIC.2013.57},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/Dragos13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/DuckworthOWS13,
  author       = {Gregory Duckworth and
                  Archibald Owen and
                  Jerry Worsley and
                  Henry Stephenson},
  title        = {OptaSense{\textregistered} Distributed Acoustic and Seismic Sensing
                  Performance for Multi-threat, Multi-environment Border Monitoring},
  booktitle    = {2013 European Intelligence and Security Informatics Conference, Uppsala,
                  Sweden, August 12-14, 2013},
  pages        = {273--276},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/EISIC.2013.70},
  doi          = {10.1109/EISIC.2013.70},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/DuckworthOWS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/DudorovSN13,
  author       = {Dmitry Dudorov and
                  David Stupples and
                  Martin Newby},
  title        = {Probability Analysis of Cyber Attack Paths against Business and Commercial
                  Enterprise Systems},
  booktitle    = {2013 European Intelligence and Security Informatics Conference, Uppsala,
                  Sweden, August 12-14, 2013},
  pages        = {38--44},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/EISIC.2013.13},
  doi          = {10.1109/EISIC.2013.13},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/DudorovSN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/FenselRGHM13,
  author       = {Anna Fensel and
                  Michael Rogger and
                  Tove Gustavi and
                  Andreas Horndahl and
                  Christian M{\aa}rtenson},
  title        = {Semantic Data Management: Sensor-Based Port Security Use Case},
  booktitle    = {2013 European Intelligence and Security Informatics Conference, Uppsala,
                  Sweden, August 12-14, 2013},
  pages        = {155--158},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/EISIC.2013.34},
  doi          = {10.1109/EISIC.2013.34},
  timestamp    = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/FenselRGHM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/FornaciariCP13,
  author       = {Tommaso Fornaciari and
                  Fabio Celli and
                  Massimo Poesio},
  title        = {The Effect of Personality Type on Deceptive Communication Style},
  booktitle    = {2013 European Intelligence and Security Informatics Conference, Uppsala,
                  Sweden, August 12-14, 2013},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/EISIC.2013.8},
  doi          = {10.1109/EISIC.2013.8},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/FornaciariCP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/GariupS13,
  author       = {Monica Gariup and
                  Gustav Soederlind},
  title        = {Document Fraud Detection at the Border: Preliminary Observations on
                  Human and Machine Performance},
  booktitle    = {2013 European Intelligence and Security Informatics Conference, Uppsala,
                  Sweden, August 12-14, 2013},
  pages        = {231--238},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/EISIC.2013.62},
  doi          = {10.1109/EISIC.2013.62},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/GariupS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/GhaniDIS13,
  author       = {Kamaruddin Abdul Ghani and
                  Kaharudin Dimyati and
                  Khadijah Ismail and
                  Latifah Sarah Supian},
  title        = {Radiated Emission from Handheld Devices with Touch-Screen LCDs},
  booktitle    = {2013 European Intelligence and Security Informatics Conference, Uppsala,
                  Sweden, August 12-14, 2013},
  pages        = {219},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/EISIC.2013.51},
  doi          = {10.1109/EISIC.2013.51},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/GhaniDIS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/GoslinH13,
  author       = {Kyle Goslin and
                  Markus Hofmann},
  title        = {Cross Domain Assessment of Document to {HTML} Conversion Tools to
                  Quantify Text and Structural Loss during Document Analysis},
  booktitle    = {2013 European Intelligence and Security Informatics Conference, Uppsala,
                  Sweden, August 12-14, 2013},
  pages        = {100--105},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/EISIC.2013.22},
  doi          = {10.1109/EISIC.2013.22},
  timestamp    = {Thu, 08 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/GoslinH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/GustaviKM13,
  author       = {Tove Gustavi and
                  Maja Karasalo and
                  Christian M{\aa}rtenson},
  title        = {A Tool for Generating, Structuring, and Analyzing Multiple Hypotheses
                  in Intelligence Work},
  booktitle    = {2013 European Intelligence and Security Informatics Conference, Uppsala,
                  Sweden, August 12-14, 2013},
  pages        = {23--30},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/EISIC.2013.11},
  doi          = {10.1109/EISIC.2013.11},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/GustaviKM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/HengstW13,
  author       = {Mari{\"{e}}lle den Hengst and
                  Martijn Warnier},
  title        = {Cyber Crime in Privately Held Information Systems: Personal Data at
                  Stake},
  booktitle    = {2013 European Intelligence and Security Informatics Conference, Uppsala,
                  Sweden, August 12-14, 2013},
  pages        = {117--120},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/EISIC.2013.25},
  doi          = {10.1109/EISIC.2013.25},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/HengstW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/HenselerHK13,
  author       = {Hans Henseler and
                  Jop Hofste and
                  Maurice van Keulen},
  title        = {Digital-Forensics Based Pattern Recognition for Discovering Identities
                  in Electronic Evidence},
  booktitle    = {2013 European Intelligence and Security Informatics Conference, Uppsala,
                  Sweden, August 12-14, 2013},
  pages        = {112--116},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/EISIC.2013.24},
  doi          = {10.1109/EISIC.2013.24},
  timestamp    = {Fri, 02 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/HenselerHK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/HolstB13,
  author       = {Anders Holst and
                  Bj{\"{o}}rn Bjurling},
  title        = {A Bayesian Parametric Statistical Anomaly Detection Method for Finding
                  Trends and Patterns in Criminal Behavior},
  booktitle    = {2013 European Intelligence and Security Informatics Conference, Uppsala,
                  Sweden, August 12-14, 2013},
  pages        = {83--88},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/EISIC.2013.19},
  doi          = {10.1109/EISIC.2013.19},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/HolstB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/HoltH13,
  author       = {Louis Antani Holt and
                  Mohammad Hammoudeh},
  title        = {Cloud Forensics: {A} Technical Approach to Virtual Machine Acquisition},
  booktitle    = {2013 European Intelligence and Security Informatics Conference, Uppsala,
                  Sweden, August 12-14, 2013},
  pages        = {227},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/EISIC.2013.59},
  doi          = {10.1109/EISIC.2013.59},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/HoltH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Hurrey13,
  author       = {Chris Hurrey},
  title        = {The 'Swiss Army Knife' Approach to Border Control: Multitasking in
                  a Multi-threat World},
  booktitle    = {2013 European Intelligence and Security Informatics Conference, Uppsala,
                  Sweden, August 12-14, 2013},
  pages        = {285--288},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/EISIC.2013.73},
  doi          = {10.1109/EISIC.2013.73},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/Hurrey13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/JenkinsMPVGN13,
  author       = {Jeffrey L. Jenkins and
                  Jim Marquardson and
                  Jeffrey Gainer Proudfoot and
                  Joseph S. Valacich and
                  Elyse Golob and
                  Jay F. Nunamaker Jr.},
  title        = {The Checkpoint Simulation: {A} Tool for Informing Border Patrol Checkpoint
                  Design and Resource Allocation},
  booktitle    = {2013 European Intelligence and Security Informatics Conference, Uppsala,
                  Sweden, August 12-14, 2013},
  pages        = {252--255},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/EISIC.2013.65},
  doi          = {10.1109/EISIC.2013.65},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/JenkinsMPVGN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/KallbergTL13,
  author       = {Jan Kallberg and
                  Bhavani Thuraisingham and
                  Erik Lakomaa},
  title        = {Societal Cyberwar Theory Applied: The Disruptive Power of State Actor
                  Aggression for Public Sector Information Security},
  booktitle    = {2013 European Intelligence and Security Informatics Conference, Uppsala,
                  Sweden, August 12-14, 2013},
  pages        = {212--215},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/EISIC.2013.47},
  doi          = {10.1109/EISIC.2013.47},
  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/KallbergTL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/KavathatzopoulosAL13,
  author       = {Iordanis Kavathatzopoulos and
                  Ryoko Asai and
                  Mikael Laaksoharju},
  title        = {Tools and Methods for Security: Stimulating the Skill to Philosophize},
  booktitle    = {2013 European Intelligence and Security Informatics Conference, Uppsala,
                  Sweden, August 12-14, 2013},
  pages        = {163--165},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/EISIC.2013.36},
  doi          = {10.1109/EISIC.2013.36},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/KavathatzopoulosAL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/KuperusVK13,
  author       = {Jasper Kuperus and
                  Cor J. Veenman and
                  Maurice van Keulen},
  title        = {Increasing {NER} Recall with Minimal Precision Loss},
  booktitle    = {2013 European Intelligence and Security Informatics Conference, Uppsala,
                  Sweden, August 12-14, 2013},
  pages        = {106--111},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/EISIC.2013.23},
  doi          = {10.1109/EISIC.2013.23},
  timestamp    = {Fri, 02 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/KuperusVK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/LiJ13,
  author       = {Xingan Li and
                  Martti Juhola},
  title        = {Crime and Its Social Context: Analysis Using the Self-Organizing Map},
  booktitle    = {2013 European Intelligence and Security Informatics Conference, Uppsala,
                  Sweden, August 12-14, 2013},
  pages        = {121--124},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/EISIC.2013.26},
  doi          = {10.1109/EISIC.2013.26},
  timestamp    = {Fri, 02 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/LiJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/LiSFL13,
  author       = {Bo Li and
                  Duo{-}Yong Sun and
                  Julei Fu and
                  Zi{-}Han Lin},
  title        = {Organization Network Construction and Understanding Based on Photo
                  Face Recognition},
  booktitle    = {2013 European Intelligence and Security Informatics Conference, Uppsala,
                  Sweden, August 12-14, 2013},
  pages        = {220},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/EISIC.2013.52},
  doi          = {10.1109/EISIC.2013.52},
  timestamp    = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/LiSFL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Llinas13,
  author       = {James Llinas},
  title        = {Challenges in Information Fusion Technology Capabilities for Modern
                  Intelligence and Security Problems},
  booktitle    = {2013 European Intelligence and Security Informatics Conference, Uppsala,
                  Sweden, August 12-14, 2013},
  pages        = {89--95},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/EISIC.2013.20},
  doi          = {10.1109/EISIC.2013.20},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/Llinas13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Lozano13,
  author       = {Marianela Garc{\'{\i}}a Lozano},
  title        = {Trusting Open Source Information},
  booktitle    = {2013 European Intelligence and Security Informatics Conference, Uppsala,
                  Sweden, August 12-14, 2013},
  pages        = {228},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/EISIC.2013.77},
  doi          = {10.1109/EISIC.2013.77},
  timestamp    = {Wed, 23 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/Lozano13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/MazzolaTDC13,
  author       = {Luca Mazzola and
                  Aris Tsois and
                  Tatyana Dimitrova and
                  Elena Camossi},
  title        = {Contextualisation of Geographical Scraped Data to Support Human Judgment
                  and Classification},
  booktitle    = {2013 European Intelligence and Security Informatics Conference, Uppsala,
                  Sweden, August 12-14, 2013},
  pages        = {151--154},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/EISIC.2013.33},
  doi          = {10.1109/EISIC.2013.33},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/MazzolaTDC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/MemonW13,
  author       = {Bisharat Rasool Memon and
                  Uffe Kock Wiil},
  title        = {Visual Analysis of Heterogeneous Networks},
  booktitle    = {2013 European Intelligence and Security Informatics Conference, Uppsala,
                  Sweden, August 12-14, 2013},
  pages        = {129--134},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/EISIC.2013.28},
  doi          = {10.1109/EISIC.2013.28},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/MemonW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/MonacoBCT13,
  author       = {John V. Monaco and
                  Ned Bakelman and
                  Sung{-}Hyuk Cha and
                  Charles C. Tappert},
  title        = {Recent Advances in the Development of a Long-Text-Input Keystroke
                  Biometric Authentication System for Arbitrary Text Input},
  booktitle    = {2013 European Intelligence and Security Informatics Conference, Uppsala,
                  Sweden, August 12-14, 2013},
  pages        = {60--66},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/EISIC.2013.16},
  doi          = {10.1109/EISIC.2013.16},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/MonacoBCT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/MontoyaJH13,
  author       = {Lorena Montoya and
                  Marianne Junger and
                  Pieter H. Hartel},
  title        = {How "Digital" is Traditional Crime?},
  booktitle    = {2013 European Intelligence and Security Informatics Conference, Uppsala,
                  Sweden, August 12-14, 2013},
  pages        = {31--37},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/EISIC.2013.12},
  doi          = {10.1109/EISIC.2013.12},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/MontoyaJH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/PaisC13,
  author       = {Vasile Florian Pais and
                  Dan S. Ciobanu},
  title        = {Fast Name Searching on {GPU}},
  booktitle    = {2013 European Intelligence and Security Informatics Conference, Uppsala,
                  Sweden, August 12-14, 2013},
  pages        = {217},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/EISIC.2013.49},
  doi          = {10.1109/EISIC.2013.49},
  timestamp    = {Tue, 07 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/PaisC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/ParkT13,
  author       = {Andrew J. Park and
                  Herbert H. Tsang},
  title        = {Detecting Key Players in Criminal Networks Using Dynalink},
  booktitle    = {2013 European Intelligence and Security Informatics Conference, Uppsala,
                  Sweden, August 12-14, 2013},
  pages        = {208--211},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/EISIC.2013.46},
  doi          = {10.1109/EISIC.2013.46},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/ParkT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/PiskorskiTB13,
  author       = {Jakub Piskorski and
                  Hristo Tanev and
                  Alexandra Balahur},
  title        = {Exploiting Twitter for Border Security-Related Intelligence Gathering},
  booktitle    = {2013 European Intelligence and Security Informatics Conference, Uppsala,
                  Sweden, August 12-14, 2013},
  pages        = {239--246},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/EISIC.2013.63},
  doi          = {10.1109/EISIC.2013.63},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/PiskorskiTB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Proudfoot13,
  author       = {Jeffrey Gainer Proudfoot},
  title        = {Evaluating the Feasibility of Using Noncontact Sensors to Conduct
                  a Targetless Concealed Information Test},
  booktitle    = {2013 European Intelligence and Security Informatics Conference, Uppsala,
                  Sweden, August 12-14, 2013},
  pages        = {269--272},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/EISIC.2013.69},
  doi          = {10.1109/EISIC.2013.69},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/Proudfoot13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Rajamaki13,
  author       = {Jyri Rajam{\"{a}}ki},
  title        = {Mobile Digital Services for Border Protection: Standardization of
                  Emergency Response Vehicles},
  booktitle    = {2013 European Intelligence and Security Informatics Conference, Uppsala,
                  Sweden, August 12-14, 2013},
  pages        = {256--261},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/EISIC.2013.66},
  doi          = {10.1109/EISIC.2013.66},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/Rajamaki13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/RajamakiK13,
  author       = {Jyri Rajam{\"{a}}ki and
                  Juha S. Knuuttila},
  title        = {Law Enforcement Authorities' Legal Digital Evidence Gathering: Legal,
                  Integrity and Chain-of-Custody Requirement},
  booktitle    = {2013 European Intelligence and Security Informatics Conference, Uppsala,
                  Sweden, August 12-14, 2013},
  pages        = {198--203},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/EISIC.2013.44},
  doi          = {10.1109/EISIC.2013.44},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/RajamakiK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/RajamakiR13,
  author       = {Jyri Rajam{\"{a}}ki and
                  Paresh Rathod},
  title        = {Service Standardization with Utility Computing and Service Oriented
                  Architecture as a Tool for Public Protection and Disaster Relief},
  booktitle    = {2013 European Intelligence and Security Informatics Conference, Uppsala,
                  Sweden, August 12-14, 2013},
  pages        = {223},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/EISIC.2013.55},
  doi          = {10.1109/EISIC.2013.55},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/RajamakiR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/RajamakiRH13,
  author       = {Jyri Rajam{\"{a}}ki and
                  Paresh Rathod and
                  John Holmstr{\"{o}}m},
  title        = {Decentralized Fully Redundant Cyber Secure Governmental Communications
                  Concept},
  booktitle    = {2013 European Intelligence and Security Informatics Conference, Uppsala,
                  Sweden, August 12-14, 2013},
  pages        = {176--181},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/EISIC.2013.39},
  doi          = {10.1109/EISIC.2013.39},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/RajamakiRH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/RajamakiRK13,
  author       = {Jyri Rajam{\"{a}}ki and
                  Paresh Rathod and
                  Pasi Kamppi},
  title        = {A New Redundant Tracking System for Emergency Response},
  booktitle    = {2013 European Intelligence and Security Informatics Conference, Uppsala,
                  Sweden, August 12-14, 2013},
  pages        = {218},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/EISIC.2013.50},
  doi          = {10.1109/EISIC.2013.50},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/RajamakiRK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Rajbhandari13,
  author       = {Lisa Rajbhandari},
  title        = {Consideration of Opportunity and Human Factor: Required Paradigm Shift
                  for Information Security Risk Management},
  booktitle    = {2013 European Intelligence and Security Informatics Conference, Uppsala,
                  Sweden, August 12-14, 2013},
  pages        = {147--150},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/EISIC.2013.32},
  doi          = {10.1109/EISIC.2013.32},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/Rajbhandari13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/RenDGKHR13,
  author       = {Zhaochun Ren and
                  David van Dijk and
                  David Graus and
                  Nina van der Knaap and
                  Hans Henseler and
                  Maarten de Rijke},
  title        = {Semantic Linking and Contextualization for Social Forensic Text Analysis},
  booktitle    = {2013 European Intelligence and Security Informatics Conference, Uppsala,
                  Sweden, August 12-14, 2013},
  pages        = {96--99},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/EISIC.2013.21},
  doi          = {10.1109/EISIC.2013.21},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/RenDGKHR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Resendez13,
  author       = {Carlos Francisco Lerma Resendez},
  title        = {The Intelligence Cycle as a Tool for Effective Information Security
                  Infrastructure Design},
  booktitle    = {2013 European Intelligence and Security Informatics Conference, Uppsala,
                  Sweden, August 12-14, 2013},
  pages        = {194--197},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/EISIC.2013.43},
  doi          = {10.1109/EISIC.2013.43},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/Resendez13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/SaravananTN13,
  author       = {M. Saravanan and
                  Rakhi Thayyil and
                  Shwetha Narayanan},
  title        = {Enabling Real Time Crime Intelligence Using Mobile {GIS} and Prediction
                  Methods},
  booktitle    = {2013 European Intelligence and Security Informatics Conference, Uppsala,
                  Sweden, August 12-14, 2013},
  pages        = {125--128},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/EISIC.2013.27},
  doi          = {10.1109/EISIC.2013.27},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/SaravananTN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/SeiO13,
  author       = {Yuichi Sei and
                  Akihiko Ohsuga},
  title        = {False Event Detection for Mobile Sinks in Wireless Sensor Networks},
  booktitle    = {2013 European Intelligence and Security Informatics Conference, Uppsala,
                  Sweden, August 12-14, 2013},
  pages        = {52--59},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/EISIC.2013.15},
  doi          = {10.1109/EISIC.2013.15},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/SeiO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Shrestha13,
  author       = {Amendra Shrestha},
  title        = {A Tool for Visualizing and Analyzing Users on Discussion Boards},
  booktitle    = {2013 European Intelligence and Security Informatics Conference, Uppsala,
                  Sweden, August 12-14, 2013},
  pages        = {229},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/EISIC.2013.60},
  doi          = {10.1109/EISIC.2013.60},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/Shrestha13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/SigholmB13,
  author       = {Johan Sigholm and
                  Martin Bang},
  title        = {Towards Offensive Cyber Counterintelligence: Adopting a Target-Centric
                  View on Advanced Persistent Threats},
  booktitle    = {2013 European Intelligence and Security Informatics Conference, Uppsala,
                  Sweden, August 12-14, 2013},
  pages        = {166--171},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/EISIC.2013.37},
  doi          = {10.1109/EISIC.2013.37},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/SigholmB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/SlivaMPL13,
  author       = {Amy Sliva and
                  Mikhail Malyutov and
                  Glenn Pierce and
                  Xin Li},
  title        = {Threats to Peace: Threat Perception and the Persistence or Desistance
                  of Violent Conflict},
  booktitle    = {2013 European Intelligence and Security Informatics Conference, Uppsala,
                  Sweden, August 12-14, 2013},
  pages        = {186--189},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/EISIC.2013.41},
  doi          = {10.1109/EISIC.2013.41},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/SlivaMPL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/SongSBF13,
  author       = {Justin Song and
                  Valerie Spicer and
                  Patricia L. Brantingham and
                  Richard Frank},
  title        = {Crime Ridges: Exploring the Relationship between Crime Attractors
                  and Offender Movement},
  booktitle    = {2013 European Intelligence and Security Informatics Conference, Uppsala,
                  Sweden, August 12-14, 2013},
  pages        = {75--82},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/EISIC.2013.18},
  doi          = {10.1109/EISIC.2013.18},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/SongSBF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/SykoraJOE13,
  author       = {Martin D. Sykora and
                  Thomas W. Jackson and
                  Ann O'Brien and
                  Suzanne Elayan},
  title        = {National Security and Social Media Monitoring: {A} Presentation of
                  the {EMOTIVE} and Related Systems},
  booktitle    = {2013 European Intelligence and Security Informatics Conference, Uppsala,
                  Sweden, August 12-14, 2013},
  pages        = {172--175},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/EISIC.2013.38},
  doi          = {10.1109/EISIC.2013.38},
  timestamp    = {Mon, 19 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/SykoraJOE13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/TowerJDE13,
  author       = {Debra L. Tower and
                  Matthew L. Jensen and
                  Norah E. Dunbar and
                  Aaron C. Elkins},
  title        = {Don't Lie to Me: The Impact of Deception on Vocalic and Linguistic
                  Synchrony},
  booktitle    = {2013 European Intelligence and Security Informatics Conference, Uppsala,
                  Sweden, August 12-14, 2013},
  pages        = {262--265},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/EISIC.2013.67},
  doi          = {10.1109/EISIC.2013.67},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/TowerJDE13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/TrochuT13,
  author       = {Sandrine Trochu and
                  Olivier Touret},
  title        = {Managing the Border, Smartly},
  booktitle    = {2013 European Intelligence and Security Informatics Conference, Uppsala,
                  Sweden, August 12-14, 2013},
  pages        = {281--284},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/EISIC.2013.72},
  doi          = {10.1109/EISIC.2013.72},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/TrochuT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/TschuggnallS13,
  author       = {Michael Tschuggnall and
                  G{\"{u}}nther Specht},
  title        = {Countering Plagiarism by Exposing Irregularities in Authors' Grammar},
  booktitle    = {2013 European Intelligence and Security Informatics Conference, Uppsala,
                  Sweden, August 12-14, 2013},
  pages        = {15--22},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/EISIC.2013.10},
  doi          = {10.1109/EISIC.2013.10},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/TschuggnallS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/ValacichWNG13,
  author       = {Joe S. Valacich and
                  David W. Wilson and
                  Jay F. Nunamaker Jr. and
                  Elyse Golob},
  title        = {Modeling Border Traffic Flow Using Cell Phone Header Packets},
  booktitle    = {2013 European Intelligence and Security Informatics Conference, Uppsala,
                  Sweden, August 12-14, 2013},
  pages        = {266--268},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/EISIC.2013.68},
  doi          = {10.1109/EISIC.2013.68},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/ValacichWNG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Wiil13,
  author       = {Uffe Kock Wiil},
  title        = {Issues for the Next Generation of Criminal Network Investigation Tools},
  booktitle    = {2013 European Intelligence and Security Informatics Conference, Uppsala,
                  Sweden, August 12-14, 2013},
  pages        = {7--14},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/EISIC.2013.9},
  doi          = {10.1109/EISIC.2013.9},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/Wiil13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Zechner13,
  author       = {Niklas Zechner},
  title        = {The Past, Present and Future of Text Classification},
  booktitle    = {2013 European Intelligence and Security Informatics Conference, Uppsala,
                  Sweden, August 12-14, 2013},
  pages        = {230},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/EISIC.2013.61},
  doi          = {10.1109/EISIC.2013.61},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/Zechner13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eisic/2013,
  title        = {2013 European Intelligence and Security Informatics Conference, Uppsala,
                  Sweden, August 12-14, 2013},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/6656130/proceeding},
  isbn         = {978-0-7695-5062-6},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/AkivaK12,
  author       = {Navot Akiva and
                  Moshe Koppel},
  editor       = {Nasrullah Memon and
                  Daniel Zeng},
  title        = {Identifying Distinct Components of a Multi-author Document},
  booktitle    = {2012 European Intelligence and Security Informatics Conference, {EISIC}
                  2012, Odense, Denmark, August 22-24, 2012},
  pages        = {205--209},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/EISIC.2012.16},
  doi          = {10.1109/EISIC.2012.16},
  timestamp    = {Tue, 16 May 2023 16:54:39 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/AkivaK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/AmeyugoAEP12,
  author       = {Gregorio Ameyugo and
                  Michal Art and
                  Ana Sofia Esteves and
                  Jakub Piskorski},
  editor       = {Nasrullah Memon and
                  Daniel Zeng},
  title        = {Creation of an EU-Level Information Exchange Network in the Domain
                  of Border Security},
  booktitle    = {2012 European Intelligence and Security Informatics Conference, {EISIC}
                  2012, Odense, Denmark, August 22-24, 2012},
  pages        = {356--358},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/EISIC.2012.55},
  doi          = {10.1109/EISIC.2012.55},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/AmeyugoAEP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/AntoniouS12,
  author       = {Alex Antoniou and
                  Gauri Sinha},
  editor       = {Nasrullah Memon and
                  Daniel Zeng},
  title        = {Laundering Sexual Deviance: Targeting Online Pornography through Anti-money
                  Laundering},
  booktitle    = {2012 European Intelligence and Security Informatics Conference, {EISIC}
                  2012, Odense, Denmark, August 22-24, 2012},
  pages        = {91--98},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/EISIC.2012.29},
  doi          = {10.1109/EISIC.2012.29},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/AntoniouS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/AsadiMSS12,
  author       = {Hirad Asadi and
                  Christian M{\aa}rtenson and
                  Pontus Svenson and
                  Magnus Sk{\"{o}}ld},
  editor       = {Nasrullah Memon and
                  Daniel Zeng},
  title        = {The HiTS/ISAC Social Network Analysis Tool},
  booktitle    = {2012 European Intelligence and Security Informatics Conference, {EISIC}
                  2012, Odense, Denmark, August 22-24, 2012},
  pages        = {291--296},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/EISIC.2012.37},
  doi          = {10.1109/EISIC.2012.37},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/AsadiMSS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/BackfriedSPQGR12,
  author       = {Gerhard Backfried and
                  Christian Schmidt and
                  Mark Pfeiffer and
                  Gerald Quirchmayr and
                  Markus Glanzer and
                  Karin Rainer},
  editor       = {Nasrullah Memon and
                  Daniel Zeng},
  title        = {Open Source Intelligence in Disaster Management},
  booktitle    = {2012 European Intelligence and Security Informatics Conference, {EISIC}
                  2012, Odense, Denmark, August 22-24, 2012},
  pages        = {254--258},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/EISIC.2012.42},
  doi          = {10.1109/EISIC.2012.42},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/BackfriedSPQGR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/BarghCMP12,
  author       = {Mortaza S. Bargh and
                  Sunil Choenni and
                  Ingrid Mulder and
                  Roland Pastoor},
  editor       = {Nasrullah Memon and
                  Daniel Zeng},
  title        = {Exploring a Warrior Paradigm to Design Out Cybercrime},
  booktitle    = {2012 European Intelligence and Security Informatics Conference, {EISIC}
                  2012, Odense, Denmark, August 22-24, 2012},
  pages        = {84--90},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/EISIC.2012.40},
  doi          = {10.1109/EISIC.2012.40},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/BarghCMP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/BerzinjiKR12,
  author       = {Ala Berzinji and
                  Lisa Kaati and
                  Ahmed Rezine},
  editor       = {Nasrullah Memon and
                  Daniel Zeng},
  title        = {Detecting Key Players in Terrorist Networks},
  booktitle    = {2012 European Intelligence and Security Informatics Conference, {EISIC}
                  2012, Odense, Denmark, August 22-24, 2012},
  pages        = {297--302},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/EISIC.2012.13},
  doi          = {10.1109/EISIC.2012.13},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/BerzinjiKR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Best12,
  author       = {Clive Best},
  editor       = {Nasrullah Memon and
                  Daniel Zeng},
  title        = {OSINT, the Internet and Privacy},
  booktitle    = {2012 European Intelligence and Security Informatics Conference, {EISIC}
                  2012, Odense, Denmark, August 22-24, 2012},
  pages        = {4},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/EISIC.2012.71},
  doi          = {10.1109/EISIC.2012.71},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/Best12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/BorrionB12,
  author       = {Herv{\'{e}} Borrion and
                  No{\'{e}}mie Bouhana},
  editor       = {Nasrullah Memon and
                  Daniel Zeng},
  title        = {iCARE: {A} Scenario-Based Method for the {RIBS} Project},
  booktitle    = {2012 European Intelligence and Security Informatics Conference, {EISIC}
                  2012, Odense, Denmark, August 22-24, 2012},
  pages        = {284},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/EISIC.2012.56},
  doi          = {10.1109/EISIC.2012.56},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/BorrionB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/BorrionMTL12,
  author       = {Herv{\'{e}} Borrion and
                  Timothy Mitchener{-}Nissen and
                  Jonathon Taylor and
                  Ka{-}Man Lai},
  editor       = {Nasrullah Memon and
                  Daniel Zeng},
  title        = {Countering Bioterrorism: Why Smart Buildings Should Have a Code of
                  Ethics},
  booktitle    = {2012 European Intelligence and Security Informatics Conference, {EISIC}
                  2012, Odense, Denmark, August 22-24, 2012},
  pages        = {68--75},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/EISIC.2012.45},
  doi          = {10.1109/EISIC.2012.45},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/BorrionMTL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/BrynielssonHJKMS12,
  author       = {Joel Brynielsson and
                  Andreas Horndahl and
                  Fredrik Johansson and
                  Lisa Kaati and
                  Christian M{\aa}rtenson and
                  Pontus Svenson},
  editor       = {Nasrullah Memon and
                  Daniel Zeng},
  title        = {Analysis of Weak Signals for Detecting Lone Wolf Terrorists},
  booktitle    = {2012 European Intelligence and Security Informatics Conference, {EISIC}
                  2012, Odense, Denmark, August 22-24, 2012},
  pages        = {197--204},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/EISIC.2012.20},
  doi          = {10.1109/EISIC.2012.20},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/BrynielssonHJKMS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/BurgoonHQ12,
  author       = {Judee K. Burgoon and
                  Lauren Hamel and
                  Tiantian Qin},
  editor       = {Nasrullah Memon and
                  Daniel Zeng},
  title        = {Predicting Veracity from Linguistic Indicators},
  booktitle    = {2012 European Intelligence and Security Informatics Conference, {EISIC}
                  2012, Odense, Denmark, August 22-24, 2012},
  pages        = {323--328},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/EISIC.2012.21},
  doi          = {10.1109/EISIC.2012.21},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/BurgoonHQ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/CamossiDT12,
  author       = {Elena Camossi and
                  Tatyana Dimitrova and
                  Aris Tsois},
  editor       = {Nasrullah Memon and
                  Daniel Zeng},
  title        = {Detecting Anomalous Maritime Container Itineraries for Anti-fraud
                  and Supply Chain Security},
  booktitle    = {2012 European Intelligence and Security Informatics Conference, {EISIC}
                  2012, Odense, Denmark, August 22-24, 2012},
  pages        = {76--83},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/EISIC.2012.39},
  doi          = {10.1109/EISIC.2012.39},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/CamossiDT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/CanoPTZG12,
  author       = {Mar{\'{\i}}a Victoria Moreno Cano and
                  Carolina Pi{\~{n}}ana{-}D{\'{\i}}az and
                  Rafael Toledo{-}Moreo and
                  Miguel A. Zamora and
                  Antonio Fernandez G{\'{o}}mez{-}Skarmeta},
  editor       = {Nasrullah Memon and
                  Daniel Zeng},
  title        = {Multi-sensor Multi-target Tracking for Infrastructure Protection},
  booktitle    = {2012 European Intelligence and Security Informatics Conference, {EISIC}
                  2012, Odense, Denmark, August 22-24, 2012},
  pages        = {317--322},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/EISIC.2012.22},
  doi          = {10.1109/EISIC.2012.22},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/CanoPTZG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Celso12,
  author       = {Anthony Celso},
  editor       = {Nasrullah Memon and
                  Daniel Zeng},
  title        = {Al Qaeda Affiliates Operating in Failed States: The Next Front in
                  the War on Terror},
  booktitle    = {2012 European Intelligence and Security Informatics Conference, {EISIC}
                  2012, Odense, Denmark, August 22-24, 2012},
  pages        = {263--267},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/EISIC.2012.32},
  doi          = {10.1109/EISIC.2012.32},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/Celso12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Chen12,
  author       = {Hsinchun Chen},
  editor       = {Nasrullah Memon and
                  Daniel Zeng},
  title        = {From Dark Web to GeoPolitical Web: Exploring the Value of Social Media
                  Informatics},
  booktitle    = {2012 European Intelligence and Security Informatics Conference, {EISIC}
                  2012, Odense, Denmark, August 22-24, 2012},
  pages        = {3},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/EISIC.2012.70},
  doi          = {10.1109/EISIC.2012.70},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/Chen12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/DArminioICDEPOKN12,
  author       = {Paolo D'Arminio and
                  Ricardo Buendia Iglesias and
                  Janusz Cichowski and
                  Piotr Dalka and
                  Damian Ellwart and
                  Sateesh Pedagadi and
                  James Orwell and
                  Inga Kroener and
                  Daniel Neyland},
  editor       = {Nasrullah Memon and
                  Daniel Zeng},
  title        = {Technologies for Granting Balance between Security and Privacy in
                  Video-Surveillance},
  booktitle    = {2012 European Intelligence and Security Informatics Conference, {EISIC}
                  2012, Odense, Denmark, August 22-24, 2012},
  pages        = {278--283},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/EISIC.2012.38},
  doi          = {10.1109/EISIC.2012.38},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/DArminioICDEPOKN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/DanilovaS12,
  author       = {Natalia Danilova and
                  David Stupples},
  editor       = {Nasrullah Memon and
                  Daniel Zeng},
  title        = {Application of Natural Language Processing and Evidential Analysis
                  to Web-Based Intelligence Information Acquisition},
  booktitle    = {2012 European Intelligence and Security Informatics Conference, {EISIC}
                  2012, Odense, Denmark, August 22-24, 2012},
  pages        = {268--273},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/EISIC.2012.41},
  doi          = {10.1109/EISIC.2012.41},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/DanilovaS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Danowski12,
  author       = {James A. Danowski},
  editor       = {Nasrullah Memon and
                  Daniel Zeng},
  title        = {Semantic Network Analysis of Islamist Sources Using Time Slices as
                  Nodes and Semantic Similarity as Link Strengths: Some Implications
                  for Propaganda Analysis about Jihad},
  booktitle    = {2012 European Intelligence and Security Informatics Conference, {EISIC}
                  2012, Odense, Denmark, August 22-24, 2012},
  pages        = {164--171},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/EISIC.2012.53},
  doi          = {10.1109/EISIC.2012.53},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/Danowski12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Danowski12a,
  author       = {James A. Danowski},
  editor       = {Nasrullah Memon and
                  Daniel Zeng},
  title        = {Sentiment Network Analysis of Taleban and {RFE/RL} Open-Source Content
                  about Afghanistan},
  booktitle    = {2012 European Intelligence and Security Informatics Conference, {EISIC}
                  2012, Odense, Denmark, August 22-24, 2012},
  pages        = {303--310},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/EISIC.2012.54},
  doi          = {10.1109/EISIC.2012.54},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/Danowski12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/DigioiaFPF12,
  author       = {Giusj Digioia and
                  Chiara Foglietta and
                  Stefano Panzieri and
                  Alessandro Falleni},
  editor       = {Nasrullah Memon and
                  Daniel Zeng},
  title        = {Mixed Holistic Reductionistic Approach for Impact Assessment of Cyber
                  Attacks},
  booktitle    = {2012 European Intelligence and Security Informatics Conference, {EISIC}
                  2012, Odense, Denmark, August 22-24, 2012},
  pages        = {123--130},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/EISIC.2012.30},
  doi          = {10.1109/EISIC.2012.30},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/DigioiaFPF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/ElzingaWP12,
  author       = {Paul Elzinga and
                  Karl Erich Wolff and
                  Jonas Poelmans},
  editor       = {Nasrullah Memon and
                  Daniel Zeng},
  title        = {Analyzing Chat Conversations of Pedophiles with Temporal Relational
                  Semantic Systems},
  booktitle    = {2012 European Intelligence and Security Informatics Conference, {EISIC}
                  2012, Odense, Denmark, August 22-24, 2012},
  pages        = {242--249},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/EISIC.2012.12},
  doi          = {10.1109/EISIC.2012.12},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/ElzingaWP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/EskandariKH12,
  author       = {Mojtaba Eskandari and
                  Zeinab Khorshidpour and
                  Sattar Hashemi},
  editor       = {Nasrullah Memon and
                  Daniel Zeng},
  title        = {To Incorporate Sequential Dynamic Features in Malware Detection Engines},
  booktitle    = {2012 European Intelligence and Security Informatics Conference, {EISIC}
                  2012, Odense, Denmark, August 22-24, 2012},
  pages        = {46--52},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/EISIC.2012.57},
  doi          = {10.1109/EISIC.2012.57},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/EskandariKH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Frank12,
  author       = {Richard Frank},
  editor       = {Nasrullah Memon and
                  Daniel Zeng},
  title        = {{SPORS:} {A} Suspect Recommendation System Based on Offenders' Reconstructed
                  Spatial Profile},
  booktitle    = {2012 European Intelligence and Security Informatics Conference, {EISIC}
                  2012, Odense, Denmark, August 22-24, 2012},
  pages        = {38--45},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/EISIC.2012.26},
  doi          = {10.1109/EISIC.2012.26},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/Frank12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/FrankK12,
  author       = {Richard Frank and
                  Bryan Kinney},
  editor       = {Nasrullah Memon and
                  Daniel Zeng},
  title        = {How Many Ways Do Offenders Travel - Evaluating the Activity Paths
                  of Offenders},
  booktitle    = {2012 European Intelligence and Security Informatics Conference, {EISIC}
                  2012, Odense, Denmark, August 22-24, 2012},
  pages        = {99--106},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/EISIC.2012.18},
  doi          = {10.1109/EISIC.2012.18},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/FrankK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/GolmohammadiZ12,
  author       = {Koosha Golmohammadi and
                  Osmar R. Za{\"{\i}}ane},
  editor       = {Nasrullah Memon and
                  Daniel Zeng},
  title        = {Data Mining Applications for Fraud Detection in Securities Market},
  booktitle    = {2012 European Intelligence and Security Informatics Conference, {EISIC}
                  2012, Odense, Denmark, August 22-24, 2012},
  pages        = {107--114},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/EISIC.2012.51},
  doi          = {10.1109/EISIC.2012.51},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/GolmohammadiZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/GustaviS12,
  author       = {Tove Gustavi and
                  Pontus Svenson},
  editor       = {Nasrullah Memon and
                  Daniel Zeng},
  title        = {Pattern Theory in Intelligence Analysis},
  booktitle    = {2012 European Intelligence and Security Informatics Conference, {EISIC}
                  2012, Odense, Denmark, August 22-24, 2012},
  pages        = {290},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/EISIC.2012.28},
  doi          = {10.1109/EISIC.2012.28},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/GustaviS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/HengstM12,
  author       = {Mari{\"{e}}lle den Hengst and
                  Jan ter Mors},
  editor       = {Nasrullah Memon and
                  Daniel Zeng},
  title        = {Community of Intelligence: The Secret Behind Intelligence-Led Policing},
  booktitle    = {2012 European Intelligence and Security Informatics Conference, {EISIC}
                  2012, Odense, Denmark, August 22-24, 2012},
  pages        = {22--29},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/EISIC.2012.15},
  doi          = {10.1109/EISIC.2012.15},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/HengstM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/HodgesCG12,
  author       = {Duncan Hodges and
                  Sadie Creese and
                  Michael Goldsmith},
  editor       = {Nasrullah Memon and
                  Daniel Zeng},
  title        = {A Model for Identity in the Cyber and Natural Universes},
  booktitle    = {2012 European Intelligence and Security Informatics Conference, {EISIC}
                  2012, Odense, Denmark, August 22-24, 2012},
  pages        = {115--122},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/EISIC.2012.43},
  doi          = {10.1109/EISIC.2012.43},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/HodgesCG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Howard12,
  author       = {Newton Howard},
  editor       = {Nasrullah Memon and
                  Daniel Zeng},
  title        = {Perception in International Conflict: An Agent-Based Approach},
  booktitle    = {2012 European Intelligence and Security Informatics Conference, {EISIC}
                  2012, Odense, Denmark, August 22-24, 2012},
  pages        = {259--262},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/EISIC.2012.61},
  doi          = {10.1109/EISIC.2012.61},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/Howard12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Hunter12,
  author       = {Aaron Hunter},
  editor       = {Nasrullah Memon and
                  Daniel Zeng},
  title        = {Structured Documents: Signatures and Deception},
  booktitle    = {2012 European Intelligence and Security Informatics Conference, {EISIC}
                  2012, Odense, Denmark, August 22-24, 2012},
  pages        = {274--277},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/EISIC.2012.17},
  doi          = {10.1109/EISIC.2012.17},
  timestamp    = {Fri, 15 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/Hunter12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/IwanskiFRD12,
  author       = {Natalia Iwanski and
                  Richard Frank and
                  Andrew A. Reid and
                  Vahid Dabbaghian},
  editor       = {Nasrullah Memon and
                  Daniel Zeng},
  title        = {A Computational Model for Predicting the Location of Crime Attractors
                  on a Road Network},
  booktitle    = {2012 European Intelligence and Security Informatics Conference, {EISIC}
                  2012, Odense, Denmark, August 22-24, 2012},
  pages        = {60--67},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/EISIC.2012.14},
  doi          = {10.1109/EISIC.2012.14},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/IwanskiFRD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/JohanssonBQ12,
  author       = {Fredrik Johansson and
                  Joel Brynielsson and
                  Maribel Narganes Quijano},
  editor       = {Nasrullah Memon and
                  Daniel Zeng},
  title        = {Estimating Citizen Alertness in Crises Using Social Media Monitoring
                  and Analysis},
  booktitle    = {2012 European Intelligence and Security Informatics Conference, {EISIC}
                  2012, Odense, Denmark, August 22-24, 2012},
  pages        = {189--196},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/EISIC.2012.23},
  doi          = {10.1109/EISIC.2012.23},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/JohanssonBQ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Johnson12,
  author       = {James R. (Bob) Johnson},
  editor       = {Nasrullah Memon and
                  Daniel Zeng},
  title        = {Detecting Emergent Terrorism Events: Finding Needles in Information
                  Haystacks},
  booktitle    = {2012 European Intelligence and Security Informatics Conference, {EISIC}
                  2012, Odense, Denmark, August 22-24, 2012},
  pages        = {5--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/EISIC.2012.72},
  doi          = {10.1109/EISIC.2012.72},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/Johnson12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/JohnsonH12,
  author       = {David E. A. Johnson and
                  Newton Howard},
  editor       = {Nasrullah Memon and
                  Daniel Zeng},
  title        = {Network Intelligence: An Emerging Discipline},
  booktitle    = {2012 European Intelligence and Security Informatics Conference, {EISIC}
                  2012, Odense, Denmark, August 22-24, 2012},
  pages        = {287--288},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/EISIC.2012.52},
  doi          = {10.1109/EISIC.2012.52},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/JohnsonH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/JohnsonMKT12,
  author       = {James R. (Bob) Johnson and
                  Anita Miller and
                  Latifur Khan and
                  Bhavani Thuraisingham},
  editor       = {Nasrullah Memon and
                  Daniel Zeng},
  title        = {Measuring Relatedness and Augmentation of Information of Interest
                  within Free Text Law Enforcement Documents},
  booktitle    = {2012 European Intelligence and Security Informatics Conference, {EISIC}
                  2012, Odense, Denmark, August 22-24, 2012},
  pages        = {148--155},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/EISIC.2012.49},
  doi          = {10.1109/EISIC.2012.49},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/JohnsonMKT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/KadirOA12,
  author       = {Andi Fitriah Abdul Kadir and
                  Raja Azrina Raja Othman and
                  Normaziah Abdul Aziz},
  editor       = {Nasrullah Memon and
                  Daniel Zeng},
  title        = {Behavioral Analysis and Visualization of Fast-Flux {DNS}},
  booktitle    = {2012 European Intelligence and Security Informatics Conference, {EISIC}
                  2012, Odense, Denmark, August 22-24, 2012},
  pages        = {250--253},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/EISIC.2012.36},
  doi          = {10.1109/EISIC.2012.36},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/KadirOA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/KengpolN12,
  author       = {Athakorn Kengpol and
                  Pakorn Neungrit},
  editor       = {Nasrullah Memon and
                  Daniel Zeng},
  title        = {A Prediction of Terrorist Distribution Range Radius and Elapsing Time:
                  {A} Case Study in Southern Parts of Thailand},
  booktitle    = {2012 European Intelligence and Security Informatics Conference, {EISIC}
                  2012, Odense, Denmark, August 22-24, 2012},
  pages        = {180--188},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/EISIC.2012.19},
  doi          = {10.1109/EISIC.2012.19},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/KengpolN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Langweg12,
  author       = {Hanno Langweg},
  editor       = {Nasrullah Memon and
                  Daniel Zeng},
  title        = {Information Security Aspects of the 22/7 Attacks},
  booktitle    = {2012 European Intelligence and Security Informatics Conference, {EISIC}
                  2012, Odense, Denmark, August 22-24, 2012},
  pages        = {286},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/EISIC.2012.9},
  doi          = {10.1109/EISIC.2012.9},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/Langweg12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/LatekRCF12,
  author       = {Maciej M. Latek and
                  Seyed M. Mussavi Rizi and
                  Andrew T. Crooks and
                  Mark Fraser},
  editor       = {Nasrullah Memon and
                  Daniel Zeng},
  title        = {Social Simulations for Border Security},
  booktitle    = {2012 European Intelligence and Security Informatics Conference, {EISIC}
                  2012, Odense, Denmark, August 22-24, 2012},
  pages        = {340--345},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/EISIC.2012.50},
  doi          = {10.1109/EISIC.2012.50},
  timestamp    = {Thu, 28 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/LatekRCF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Lee12,
  author       = {Henry C. Lee},
  editor       = {Nasrullah Memon and
                  Daniel Zeng},
  title        = {The Utilization of Forensic Evidence in {IED} Incidents},
  booktitle    = {2012 European Intelligence and Security Informatics Conference, {EISIC}
                  2012, Odense, Denmark, August 22-24, 2012},
  pages        = {1--2},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/EISIC.2012.69},
  doi          = {10.1109/EISIC.2012.69},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/Lee12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/LivshitzHN12,
  author       = {Danny Livshitz and
                  Newton Howard and
                  Yair Neuman},
  editor       = {Nasrullah Memon and
                  Daniel Zeng},
  title        = {Can Computers Help Us to Better Understand Different Cultures? Toward
                  a Computer-Based {CULINT}},
  booktitle    = {2012 European Intelligence and Security Informatics Conference, {EISIC}
                  2012, Odense, Denmark, August 22-24, 2012},
  pages        = {172--179},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/EISIC.2012.46},
  doi          = {10.1109/EISIC.2012.46},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/LivshitzHN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Memon12,
  author       = {Bisharat Rasool Memon},
  editor       = {Nasrullah Memon and
                  Daniel Zeng},
  title        = {Identifying Important Nodes in Weighted Covert Networks Using Generalized
                  Centrality Measures},
  booktitle    = {2012 European Intelligence and Security Informatics Conference, {EISIC}
                  2012, Odense, Denmark, August 22-24, 2012},
  pages        = {131--140},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/EISIC.2012.65},
  doi          = {10.1109/EISIC.2012.65},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/Memon12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/MonacoBCT12,
  author       = {John V. Monaco and
                  Ned Bakelman and
                  Sung{-}Hyuk Cha and
                  Charles C. Tappert},
  editor       = {Nasrullah Memon and
                  Daniel Zeng},
  title        = {Developing a Keystroke Biometric System for Continual Authentication
                  of Computer Users},
  booktitle    = {2012 European Intelligence and Security Informatics Conference, {EISIC}
                  2012, Odense, Denmark, August 22-24, 2012},
  pages        = {210--216},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/EISIC.2012.58},
  doi          = {10.1109/EISIC.2012.58},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/MonacoBCT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Morris12,
  author       = {Travis Morris},
  editor       = {Nasrullah Memon and
                  Daniel Zeng},
  title        = {Extracting and Networking Emotions in Extremist Propaganda},
  booktitle    = {2012 European Intelligence and Security Informatics Conference, {EISIC}
                  2012, Odense, Denmark, August 22-24, 2012},
  pages        = {53--59},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/EISIC.2012.33},
  doi          = {10.1109/EISIC.2012.33},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/Morris12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/MouhtaropoulosLG12,
  author       = {Antonis Mouhtaropoulos and
                  Chang{-}Tsun Li and
                  Marthie Grobler},
  editor       = {Nasrullah Memon and
                  Daniel Zeng},
  title        = {Proactive Digital Forensics: The Ever-Increasing Need for Standardization},
  booktitle    = {2012 European Intelligence and Security Informatics Conference, {EISIC}
                  2012, Odense, Denmark, August 22-24, 2012},
  pages        = {289},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/EISIC.2012.66},
  doi          = {10.1109/EISIC.2012.66},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/MouhtaropoulosLG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/OwenDW12,
  author       = {Archibald Owen and
                  Gregory Duckworth and
                  Jerry Worsley},
  editor       = {Nasrullah Memon and
                  Daniel Zeng},
  title        = {OptaSense: Fibre Optic Distributed Acoustic Sensing for Border Monitoring},
  booktitle    = {2012 European Intelligence and Security Informatics Conference, {EISIC}
                  2012, Odense, Denmark, August 22-24, 2012},
  pages        = {362--364},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/EISIC.2012.59},
  doi          = {10.1109/EISIC.2012.59},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/OwenDW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/PalmerH12,
  author       = {Anthony J. Palmer and
                  Chris Hurrey},
  editor       = {Nasrullah Memon and
                  Daniel Zeng},
  title        = {Ten Reasons Why {IRIS} Needed 20: 20 Foresight: Some Lessons for Introducing
                  Biometric Border Control Systems},
  booktitle    = {2012 European Intelligence and Security Informatics Conference, {EISIC}
                  2012, Odense, Denmark, August 22-24, 2012},
  pages        = {311--316},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/EISIC.2012.31},
  doi          = {10.1109/EISIC.2012.31},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/PalmerH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/ParkTB12,
  author       = {Andrew J. Park and
                  Herbert H. Tsang and
                  Patricia L. Brantingham},
  editor       = {Nasrullah Memon and
                  Daniel Zeng},
  title        = {Dynalink: {A} Framework for Dynamic Criminal Network Visualization},
  booktitle    = {2012 European Intelligence and Security Informatics Conference, {EISIC}
                  2012, Odense, Denmark, August 22-24, 2012},
  pages        = {217--224},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/EISIC.2012.24},
  doi          = {10.1109/EISIC.2012.24},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/ParkTB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Petersen12,
  author       = {Rasmus Rosenqvist Petersen},
  editor       = {Nasrullah Memon and
                  Daniel Zeng},
  title        = {Association and Centrality in Criminal Networks},
  booktitle    = {2012 European Intelligence and Security Informatics Conference, {EISIC}
                  2012, Odense, Denmark, August 22-24, 2012},
  pages        = {232--241},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/EISIC.2012.63},
  doi          = {10.1109/EISIC.2012.63},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/Petersen12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/PolikovskyQKOB12,
  author       = {Senya Polikovsky and
                  Maria Alejandra Quiros{-}Ramirez and
                  Yoshinari Kameda and
                  Yuichi Ohta and
                  Judee K. Burgoon},
  editor       = {Nasrullah Memon and
                  Daniel Zeng},
  title        = {Benchmark Driven Framework for Development of Emotion Sensing Support
                  Systems},
  booktitle    = {2012 European Intelligence and Security Informatics Conference, {EISIC}
                  2012, Odense, Denmark, August 22-24, 2012},
  pages        = {353--355},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/EISIC.2012.27},
  doi          = {10.1109/EISIC.2012.27},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/PolikovskyQKOB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/ProudfootTB12,
  author       = {Jeffrey Gainer Proudfoot and
                  Nathan W. Twyman and
                  Judee K. Burgoon},
  editor       = {Nasrullah Memon and
                  Daniel Zeng},
  title        = {A Comparison of Invasive and Noninvasive Sensors in the Concealed
                  Information Test},
  booktitle    = {2012 European Intelligence and Security Informatics Conference, {EISIC}
                  2012, Odense, Denmark, August 22-24, 2012},
  pages        = {346--349},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/EISIC.2012.11},
  doi          = {10.1109/EISIC.2012.11},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/ProudfootTB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/RajamakiRAATA12,
  author       = {Jyri Rajam{\"{a}}ki and
                  Paresh Rathod and
                  Anu Ahlgren and
                  Johanna Aho and
                  Mari Takari and
                  Sami Ahlgren},
  editor       = {Nasrullah Memon and
                  Daniel Zeng},
  title        = {Resilience of Cyber-Physical System: {A} Case Study of Safe School
                  Environment},
  booktitle    = {2012 European Intelligence and Security Informatics Conference, {EISIC}
                  2012, Odense, Denmark, August 22-24, 2012},
  pages        = {285},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/EISIC.2012.10},
  doi          = {10.1109/EISIC.2012.10},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/RajamakiRAATA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/RajamakiTTJOR12,
  author       = {Jyri Rajam{\"{a}}ki and
                  Jutta Tervahartiala and
                  Sofia Tervola and
                  Sari Johansson and
                  Leila Ovaska and
                  Paresh Rathod},
  editor       = {Nasrullah Memon and
                  Daniel Zeng},
  title        = {How Transparency Improves the Control of Law Enforcement Authorities'
                  Activities?},
  booktitle    = {2012 European Intelligence and Security Informatics Conference, {EISIC}
                  2012, Odense, Denmark, August 22-24, 2012},
  pages        = {14--21},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/EISIC.2012.35},
  doi          = {10.1109/EISIC.2012.35},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/RajamakiTTJOR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/RuizH12,
  author       = {Erick E. Ruiz and
                  K. Larry Head},
  editor       = {Nasrullah Memon and
                  Daniel Zeng},
  title        = {Use of an Automatic Under-Vehicle Inspection System as a Tool to Streamline
                  Vehicle Screening at Ports of Entry and Security Checkpoints},
  booktitle    = {2012 European Intelligence and Security Informatics Conference, {EISIC}
                  2012, Odense, Denmark, August 22-24, 2012},
  pages        = {329--333},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/EISIC.2012.64},
  doi          = {10.1109/EISIC.2012.64},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/RuizH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/SacanamboyCC12,
  author       = {Mayra Sacanamboy and
                  Bojan Cukic and
                  Vittorio Cortellessa},
  editor       = {Nasrullah Memon and
                  Daniel Zeng},
  title        = {Performance and Risk Analysis for Border Management Applications:
                  {A} Model-Driven Approach and a Perspective View},
  booktitle    = {2012 European Intelligence and Security Informatics Conference, {EISIC}
                  2012, Odense, Denmark, August 22-24, 2012},
  pages        = {350--352},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/EISIC.2012.47},
  doi          = {10.1109/EISIC.2012.47},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/SacanamboyCC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/SahsK12,
  author       = {Justin Sahs and
                  Latifur Khan},
  editor       = {Nasrullah Memon and
                  Daniel Zeng},
  title        = {A Machine Learning Approach to Android Malware Detection},
  booktitle    = {2012 European Intelligence and Security Informatics Conference, {EISIC}
                  2012, Odense, Denmark, August 22-24, 2012},
  pages        = {141--147},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/EISIC.2012.34},
  doi          = {10.1109/EISIC.2012.34},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/SahsK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/SkillicornP12,
  author       = {David B. Skillicorn and
                  Lynnette D. Purda},
  editor       = {Nasrullah Memon and
                  Daniel Zeng},
  title        = {Detecting Fraud in Financial Reports},
  booktitle    = {2012 European Intelligence and Security Informatics Conference, {EISIC}
                  2012, Odense, Denmark, August 22-24, 2012},
  pages        = {7--13},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/EISIC.2012.8},
  doi          = {10.1109/EISIC.2012.8},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/SkillicornP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/TanasTHSSGM12,
  author       = {Michal Tanas and
                  Grzegorz Taberski and
                  Witold Holubowicz and
                  Krzysztof Samp and
                  Agnieszka Spronska and
                  Jakub Gl{\'{o}}wka and
                  Mateusz Macias},
  editor       = {Nasrullah Memon and
                  Daniel Zeng},
  title        = {The {TALOS} Project - Autonomous Robotic Patrol Vehicles},
  booktitle    = {2012 European Intelligence and Security Informatics Conference, {EISIC}
                  2012, Odense, Denmark, August 22-24, 2012},
  pages        = {359--361},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/EISIC.2012.60},
  doi          = {10.1109/EISIC.2012.60},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/TanasTHSSGM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/TariqBA12,
  author       = {Muhammad Adnan Tariq and
                  Joel Brynielsson and
                  Henrik Artman},
  editor       = {Nasrullah Memon and
                  Daniel Zeng},
  title        = {Framing the Attacker in Organized Cybercrime},
  booktitle    = {2012 European Intelligence and Security Informatics Conference, {EISIC}
                  2012, Odense, Denmark, August 22-24, 2012},
  pages        = {30--37},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/EISIC.2012.48},
  doi          = {10.1109/EISIC.2012.48},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/TariqBA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Veenman12,
  author       = {Cor J. Veenman},
  editor       = {Nasrullah Memon and
                  Daniel Zeng},
  title        = {Data Base Investigation as a Ranking Problem},
  booktitle    = {2012 European Intelligence and Security Informatics Conference, {EISIC}
                  2012, Odense, Denmark, August 22-24, 2012},
  pages        = {225--231},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/EISIC.2012.44},
  doi          = {10.1109/EISIC.2012.44},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/Veenman12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/WestlakeBF12,
  author       = {Bryce Westlake and
                  Martin Bouchard and
                  Richard Frank},
  editor       = {Nasrullah Memon and
                  Daniel Zeng},
  title        = {Comparing Methods for Detecting Child Exploitation Content Online},
  booktitle    = {2012 European Intelligence and Security Informatics Conference, {EISIC}
                  2012, Odense, Denmark, August 22-24, 2012},
  pages        = {156--163},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/EISIC.2012.25},
  doi          = {10.1109/EISIC.2012.25},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/WestlakeBF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/ZavarellaPEB12,
  author       = {Vanni Zavarella and
                  Jakub Piskorski and
                  Ana Sofia Esteves and
                  Stefano Bucci},
  editor       = {Nasrullah Memon and
                  Daniel Zeng},
  title        = {Refining Border Security News Event Geotagging through Deployment
                  of Lexico-Semantic Patterns},
  booktitle    = {2012 European Intelligence and Security Informatics Conference, {EISIC}
                  2012, Odense, Denmark, August 22-24, 2012},
  pages        = {334--339},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/EISIC.2012.62},
  doi          = {10.1109/EISIC.2012.62},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/ZavarellaPEB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eisic/2012,
  editor       = {Nasrullah Memon and
                  Daniel Zeng},
  title        = {2012 European Intelligence and Security Informatics Conference, {EISIC}
                  2012, Odense, Denmark, August 22-24, 2012},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/6298753/proceeding},
  isbn         = {978-1-4673-2358-1},
  timestamp    = {Tue, 16 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/AgrawalGJ11,
  author       = {P. K. Agrawal and
                  Brij B. Gupta and
                  Satbir Jain},
  title        = {{SVM} Based Scheme for Predicting Number of Zombies in a DDoS Attack},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {178--182},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.19},
  doi          = {10.1109/EISIC.2011.19},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/AgrawalGJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/AlrubanE11,
  author       = {Abdulrahman Alruban and
                  Emlyn Everitt},
  title        = {Two Novel 802.1x Denial of Service Attacks},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {183--190},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.49},
  doi          = {10.1109/EISIC.2011.49},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/AlrubanE11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/AnastopoulosKKA11,
  author       = {Vasileios Anastopoulos and
                  Panagiotis Karampelas and
                  Panagiotis Kalagiakos and
                  Reda Alhajj},
  title        = {A Hybrid Framework for Building a Web-Page Recommender System},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {385--390},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.40},
  doi          = {10.1109/EISIC.2011.40},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/AnastopoulosKKA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/ArgioluB11,
  author       = {Massimiliano Argiolu and
                  Fabio Bisogni},
  title        = {Video Analytics: Opportunity or Spoof Story? The State of the Art
                  of Intelligent Video Surveillance},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {294},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.46},
  doi          = {10.1109/EISIC.2011.46},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/ArgioluB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Barbian11,
  author       = {Guido Barbian},
  title        = {Detecting Hidden Friendship in Online Social Network},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {269--272},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.14},
  doi          = {10.1109/EISIC.2011.14},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/Barbian11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Barbian11a,
  author       = {Guido Barbian},
  title        = {Trust Centrality in Online Social Networks},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {372--377},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.17},
  doi          = {10.1109/EISIC.2011.17},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/Barbian11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Best11,
  author       = {Clive Best},
  title        = {Challenges in Open Source Intelligence},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {58--62},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.41},
  doi          = {10.1109/EISIC.2011.41},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/Best11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/BestH11,
  author       = {Clive Best and
                  David Horby},
  title        = {{IQ} - {A} Web Mining Tool},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {382--384},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.42},
  doi          = {10.1109/EISIC.2011.42},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/BestH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/BourassaFS11,
  author       = {M. A. J. Bourassa and
                  J. Fug{\`{e}}re and
                  David B. Skillicorn},
  title        = {Interestingness - Directing Analyst Focus to Significant Data},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {300--307},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.53},
  doi          = {10.1109/EISIC.2011.53},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/BourassaFS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Bowman-Grieve11,
  author       = {Lorraine Bowman{-}Grieve},
  title        = {A Psychological Perspective on Virtual Communities Supporting Terrorist
                  and Extremist Ideologies as a Tool for Recruitment},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {244--247},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.11},
  doi          = {10.1109/EISIC.2011.11},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/Bowman-Grieve11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Brantingham11,
  author       = {Patricia L. Brantingham},
  title        = {Computational Criminology},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {3},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.79},
  doi          = {10.1109/EISIC.2011.79},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/Brantingham11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/BrantinghamGB11,
  author       = {Paul J. Brantingham and
                  Amir H. Ghaseminejad and
                  Patricia L. Brantingham},
  title        = {The Distribution of Event Complexity in the British Columbia Court
                  System: An Analysis Based on the CourBC Analytical System},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {94--99},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.51},
  doi          = {10.1109/EISIC.2011.51},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/BrantinghamGB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Chen11,
  author       = {Hsinchun Chen},
  title        = {Dark Web: Exploring and Mining the Dark Side of the Web},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {1--2},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.78},
  doi          = {10.1109/EISIC.2011.78},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/Chen11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/ColbaughG11,
  author       = {Richard Colbaugh and
                  Kristin Glass},
  title        = {Agile Sentiment Analysis of Social Media Content for Security Informatics
                  Applications},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {327--331},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.65},
  doi          = {10.1109/EISIC.2011.65},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/ColbaughG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/DahlinS11,
  author       = {Johan Dahlin and
                  Pontus Svenson},
  title        = {A Method for Community Detection in Uncertain Networks},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {155--162},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.58},
  doi          = {10.1109/EISIC.2011.58},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/DahlinS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Danowski11,
  author       = {James A. Danowski},
  title        = {Changes in Muslim Nations' Centrality Mined from Open-Source World
                  Jihad News: {A} Comparison of Networks in Late 2010, Early 2011, and
                  Post-Bin Laden},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {314--321},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.69},
  doi          = {10.1109/EISIC.2011.69},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/Danowski11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/DanowskiP11,
  author       = {James A. Danowski and
                  Han Woo Park},
  title        = {Web Network and Content Changes Associated with the 2011 Muslim Middle-East
                  and North African Early Uprisings: {A} Naturalistic Field Experiment},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {100--107},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.67},
  doi          = {10.1109/EISIC.2011.67},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/DanowskiP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/DesmaraisC11,
  author       = {Bruce A. Desmarais and
                  Skyler J. Cranmer},
  title        = {Forecasting the Locational Dynamics of Transnational Terrorism: {A}
                  Network Analytic Approach},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {171--177},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.44},
  doi          = {10.1109/EISIC.2011.44},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/DesmaraisC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Diaz11,
  author       = {Alejandro Fern{\'{a}}ndez{-}Cernuda Diaz},
  title        = {Technology vs. Infoxication - The Challenges of Obtaining Intelligence
                  from the Buzz},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {391},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.74},
  doi          = {10.1109/EISIC.2011.74},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/Diaz11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/DickersonMS11,
  author       = {John P. Dickerson and
                  Aaron Mannes and
                  V. S. Subrahmanian},
  title        = {Dealing with Lashkar-e-Taiba: {A} Multi-player Game-Theoretic Perspective},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {354--359},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.33},
  doi          = {10.1109/EISIC.2011.33},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/DickersonMS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/DoulaverakisKKKS11,
  author       = {Charalampos Doulaverakis and
                  Nikolaos Konstantinou and
                  Thomas Knape and
                  Ioannis Kompatsiaris and
                  John Soldatos},
  title        = {An Approach to Intelligent Information Fusion in Sensor Saturated
                  Urban Environments},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {108--115},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.24},
  doi          = {10.1109/EISIC.2011.24},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/DoulaverakisKKKS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/EachusS11,
  author       = {Peter Eachus and
                  Ben Short},
  title        = {Decision Support System for Intelligence Analysts},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {291},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.20},
  doi          = {10.1109/EISIC.2011.20},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/EachusS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Elvy11,
  author       = {Dale Elvy},
  title        = {Terrorism, Threat and Time: The Mediating Effect of Terrorist Threat
                  on Public Willingness to Forego Civil Liberties},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {52--57},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.35},
  doi          = {10.1109/EISIC.2011.35},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/Elvy11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/FarahbodAGG11,
  author       = {Roozbeh Farahbod and
                  Vladimir Avram and
                  Uwe Gl{\"{a}}sser and
                  Adel Guitouni},
  title        = {Engineering Situation Analysis Decision Support Systems},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {10--18},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.64},
  doi          = {10.1109/EISIC.2011.64},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/FarahbodAGG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/ForsgrenHST11,
  author       = {Robert Forsgren and
                  Andreas Horndahl and
                  Pontus Svenson and
                  Edward Tj{\"{o}}rnhammar},
  title        = {Information Fusion for Port Security Decision Support},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {292},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.59},
  doi          = {10.1109/EISIC.2011.59},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/ForsgrenHST11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/FrankACB11,
  author       = {Richard Frank and
                  Martin A. Andresen and
                  Connie Cheng and
                  Patricia L. Brantingham},
  title        = {Finding Criminal Attractors Based on Offenders' Directionality of
                  Crimes},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {86--93},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.34},
  doi          = {10.1109/EISIC.2011.34},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/FrankACB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/GlassC11,
  author       = {Kristin Glass and
                  Richard Colbaugh},
  title        = {Web Analytics for Security Informatics},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {214--219},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.66},
  doi          = {10.1109/EISIC.2011.66},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/GlassC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Goujon11,
  author       = {B{\'{e}}n{\'{e}}dicte Goujon},
  title        = {Text Mining for Opinion Target Detection},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {322--326},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.45},
  doi          = {10.1109/EISIC.2011.45},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/Goujon11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/HoogstrateK11,
  author       = {Andre J. Hoogstrate and
                  Chris A. J. Klaassen},
  title        = {Minimizing the Average Number of Inspections for Detecting Rare Items
                  in Finite Populations},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {203--208},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.22},
  doi          = {10.1109/EISIC.2011.22},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/HoogstrateK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Howard11,
  author       = {Newton Howard},
  title        = {Global Defense Policy System of Laws: Graph Theory Approach to Balance
                  of Power Theory},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {248--258},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.73},
  doi          = {10.1109/EISIC.2011.73},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/Howard11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/HuangL11,
  author       = {Yin{-}Fu Huang and
                  Po{-}Lun Liou},
  title        = {Retrieving Representative Structures from {XML} Documents Using Clustering
                  Techniques},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {332--339},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.16},
  doi          = {10.1109/EISIC.2011.16},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/HuangL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/IwanskiFDRB11,
  author       = {Natalia Iwanski and
                  Richard Frank and
                  Vahid Dabbaghian and
                  Andrew A. Reid and
                  Patricia L. Brantingham},
  title        = {Analyzing an Offender's Journey to Crime: {A} Criminal Movement Model
                  (CriMM)},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {70--77},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.13},
  doi          = {10.1109/EISIC.2011.13},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/IwanskiFDRB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/JoffresBFW11,
  author       = {Kila Joffres and
                  Martin Bouchard and
                  Richard Frank and
                  Bryce Westlake},
  title        = {Strategies to Disrupt Online Child Pornography Networks},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {163--170},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.32},
  doi          = {10.1109/EISIC.2011.32},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/JoffresBFW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/JohanssonBHMMTR11,
  author       = {Fredrik Johansson and
                  Joel Brynielsson and
                  Pontus H{\"{o}}rling and
                  Michael Malm and
                  Christian M{\aa}rtenson and
                  Staffan Truv{\'{e}} and
                  Magnus Rosell},
  title        = {Detecting Emergent Conflicts through Web Mining and Visualization},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {346--353},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.21},
  doi          = {10.1109/EISIC.2011.21},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/JohanssonBHMMTR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/JohnsonMK11,
  author       = {James R. (Bob) Johnson and
                  Anita Miller and
                  Latifur Khan},
  title        = {Law Enforcement Ontology for Identification of Related Information
                  of Interest Across Free Text Dcouments},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {19--27},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.36},
  doi          = {10.1109/EISIC.2011.36},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/JohnsonMK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/KaatiS11,
  author       = {Lisa Kaati and
                  Pontus Svenson},
  title        = {Analysis of Competing Hypothesis for Investigating Lone Wolf Terrorist},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {295--299},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.60},
  doi          = {10.1109/EISIC.2011.60},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/KaatiS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/KasaeiK11,
  author       = {Seyed Hamidreza Mohades Kasaei and
                  Seyed Mohammadreza Mohades Kasaei},
  title        = {Extraction and Recognition of the Vehicle License Plate for Passing
                  under Outside Environment},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {234--237},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.50},
  doi          = {10.1109/EISIC.2011.50},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/KasaeiK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/KiesebergSMHW11,
  author       = {Peter Kieseberg and
                  Sebastian Schrittwieser and
                  Martin Mulazzani and
                  Markus Huber and
                  Edgar R. Weippl},
  title        = {Trees Cannot Lie: Using Data Structures for Forensics Purposes},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {282--285},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.18},
  doi          = {10.1109/EISIC.2011.18},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/KiesebergSMHW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/LiLT11,
  author       = {Xufang Li and
                  Peter K. K. Loh and
                  Freddy Tan},
  title        = {Mechanisms of Polymorphic and Metamorphic Viruses},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {149--154},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.77},
  doi          = {10.1109/EISIC.2011.77},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/LiLT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/MannesSSS11,
  author       = {Aaron Mannes and
                  J. Shakarian and
                  Amy Sliva and
                  V. S. Subrahmanian},
  title        = {A Computationally-Enabled Analysis of Lashkar-e-Taiba Attacks in Jammu
                  and Kashmir},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {224--229},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.61},
  doi          = {10.1109/EISIC.2011.61},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/MannesSSS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/MartinK11,
  author       = {Nicolas Martin and
                  Khaled Khelif},
  title        = {Focused Crawling Using Name Disambiguation on Search Engine Results},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {340--345},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.31},
  doi          = {10.1109/EISIC.2011.31},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/MartinK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Matz11,
  author       = {Soren Matz},
  title        = {Public-Private Resilience: State vs. Private Conceptions of Security
                  Risk Management in Danish Cyber-based Critical Infrastructures},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {135--141},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.52},
  doi          = {10.1109/EISIC.2011.52},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/Matz11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/MeskoB11,
  author       = {Gorazd Mesko and
                  Igor Bernik},
  title        = {Cybercrime: Awareness and Fear: Slovenian Perspectives},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {28--33},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.12},
  doi          = {10.1109/EISIC.2011.12},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/MeskoB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/MishraGJ11,
  author       = {Anupama Mishra and
                  Brij B. Gupta and
                  Ramesh Chandra Joshi},
  title        = {A Comparative Study of Distributed Denial of Service Attacks, Intrusion
                  Tolerance and Mitigation Techniques},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {286--289},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.15},
  doi          = {10.1109/EISIC.2011.15},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/MishraGJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/MontesinoF11,
  author       = {Raydel Montesino and
                  Stefan Fenz},
  title        = {Automation Possibilities in Information Security Management},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {259--262},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.39},
  doi          = {10.1109/EISIC.2011.39},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/MontesinoF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/MorrisAKD11,
  author       = {James F. Morris and
                  Keith Anthony and
                  Kevin T. Kennedy and
                  Richard F. Deckro},
  title        = {Extraction Distractions: {A} Comparison of Social Network Model Construction
                  Methods},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {273--276},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.63},
  doi          = {10.1109/EISIC.2011.63},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/MorrisAKD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/MouhtaropoulosGL11,
  author       = {Antonis Mouhtaropoulos and
                  Marthie Grobler and
                  Chang{-}Tsun Li},
  title        = {Digital Forensic Readiness: An Insight into Governmental and Academic
                  Initiatives},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {191--196},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.30},
  doi          = {10.1109/EISIC.2011.30},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/MouhtaropoulosGL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/MouradOA11,
  author       = {Azzam Mourad and
                  Hadi Otrok and
                  Sara Ayoubi},
  title        = {Toward Systematic Integration of Security Policies into Web Services},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {220--223},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.48},
  doi          = {10.1109/EISIC.2011.48},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/MouradOA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/NizamaniM11,
  author       = {Sarwat Nizamani and
                  Nasrullah Memon},
  title        = {Evolution of Terrorist Network Using Clustered Approach: {A} Case
                  Study},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {116--122},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.10},
  doi          = {10.1109/EISIC.2011.10},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/NizamaniM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/OnnerudWO11,
  author       = {Hans {\"{O}}nnerud and
                  Sara Wallin and
                  Henric {\"{O}}stmark},
  title        = {Localisation of Threat Substances in Urban Society - {LOTUS:} Tomorrow's
                  System for Finding Illicit Manufacturing of Drugs and Home Made Explosives},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {238--243},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.25},
  doi          = {10.1109/EISIC.2011.25},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/OnnerudWO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/ParkHSCBS11,
  author       = {Andrew J. Park and
                  Eunju Hwang and
                  Valerie Spicer and
                  Connie Cheng and
                  Patricia L. Brantingham and
                  Andrew Sixsmith},
  title        = {Testing Elderly People's Fear of Crime Using a Virtual Environment},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {63--69},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.68},
  doi          = {10.1109/EISIC.2011.68},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/ParkHSCBS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Parry11,
  author       = {Joe Parry},
  title        = {Visualisation for Decision-Makers},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {8},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.88},
  doi          = {10.1109/EISIC.2011.88},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/Parry11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/PetersenRW11,
  author       = {Rasmus Rosenqvist Petersen and
                  Christopher J. Rhodes and
                  Uffe Kock Wiil},
  title        = {Node Removal in Criminal Networks},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {360--365},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.57},
  doi          = {10.1109/EISIC.2011.57},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/PetersenRW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/PetersenW11,
  author       = {Rasmus Rosenqvist Petersen and
                  Uffe Kock Wiil},
  title        = {CrimeFighter Investigator: {A} Novel Tool for Criminal Network Investigation},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {197--202},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.55},
  doi          = {10.1109/EISIC.2011.55},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/PetersenW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/PiskorskiBA11,
  author       = {Jakub Piskorski and
                  Jenya Belayeva and
                  Martin Atkinson},
  title        = {On Refining Real-Time Multilingual News Event Extraction through Deployment
                  of Cross-Lingual Information Fusion Techniques},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {38--45},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.72},
  doi          = {10.1109/EISIC.2011.72},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/PiskorskiBA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/PlevnikP11,
  author       = {Mihael Plevnik and
                  Iztok Podbregar},
  title        = {The Need to Introduce a New Tactical Telecommunication System in the
                  Slovenian Army},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {230--233},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.9},
  doi          = {10.1109/EISIC.2011.9},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/PlevnikP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Poulatova11,
  author       = {Chaditsa Poulatova},
  title        = {The Media: {A} Terrorist Tool or a Silent Ally?},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {293},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.47},
  doi          = {10.1109/EISIC.2011.47},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/Poulatova11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/QureshiM11,
  author       = {Pir Abdul Rasool Qureshi and
                  Nasrullah Memon},
  title        = {Statistical Model for Content Extraction},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {129--134},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.75},
  doi          = {10.1109/EISIC.2011.75},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/QureshiM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/QureshiMWKS11,
  author       = {Pir Abdul Rasool Qureshi and
                  Nasrullah Memon and
                  Uffe Kock Wiil and
                  Panagiotis Karampelas and
                  Jose Ignacio Nieto Sancheze},
  title        = {Harvesting Information from Heterogeneous Sources},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {123--128},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.76},
  doi          = {10.1109/EISIC.2011.76},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/QureshiMWKS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Redford11,
  author       = {Mike Redford},
  title        = {{U.S.} and {EU} Legislation on Cybercrime},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {34--37},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.38},
  doi          = {10.1109/EISIC.2011.38},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/Redford11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Sakharova11,
  author       = {Irina Sakharova},
  title        = {Analysis of the Financial Crisis of 2007-2009 and Its Impact on Terrorism},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {290},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.62},
  doi          = {10.1109/EISIC.2011.62},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/Sakharova11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Sensidoni11,
  author       = {Gianluca Sensidoni},
  title        = {Who, What, When, Where and How: Semantics Semantics Help Connect the
                  Dots},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {9},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.89},
  doi          = {10.1109/EISIC.2011.89},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/Sensidoni11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/ShahO11,
  author       = {Mahmood Hussain Shah and
                  Romanus Izuchukwu Okeke},
  title        = {A Framework for Internal Identity Theft Prevention in Retail Industry},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {366--371},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.29},
  doi          = {10.1109/EISIC.2011.29},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/ShahO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/SpakL11,
  author       = {Ulrik Spak and
                  Mats Lind},
  title        = {Change Blindness in Intelligence: Effects of Attention Guidance by
                  Instructions},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {142--148},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.23},
  doi          = {10.1109/EISIC.2011.23},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/SpakL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/SunGLL11,
  author       = {Duo{-}Yong Sun and
                  Shu{-}Quan Guo and
                  Xiao{-}Peng Liu and
                  Jiang Li},
  title        = {Multi-relational Network Analysis for Covert Organizations},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {263--268},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.28},
  doi          = {10.1109/EISIC.2011.28},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/SunGLL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/TemurhanMCOCL11,
  author       = {M. Temurhan and
                  Ronald Meijer and
                  Sunil Choenni and
                  M. van Ooyen{-}Houben and
                  G. Cruts and
                  Margriet van Laar},
  title        = {Capture-Recapture Method for Estimating the Number of Problem Drug
                  Users: The Case of the Netherlands},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {46--51},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.26},
  doi          = {10.1109/EISIC.2011.26},
  timestamp    = {Wed, 10 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/TemurhanMCOCL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Thuraisingham11,
  author       = {Bhavani Thuraisingham},
  title        = {Data Mining for Malicious Code Detection and Security Applications},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {4--5},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.80},
  doi          = {10.1109/EISIC.2011.80},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/Thuraisingham11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/TikvesBTGDSCWRA11,
  author       = {Sukru Tikves and
                  Sujogya Banerjee and
                  Hamy Temkit and
                  Sedat Gokalp and
                  Hasan Davulcu and
                  Arunabha Sen and
                  Steven R. Corman and
                  Mark Woodward and
                  Inayah Rohmaniyah and
                  Ali Amin},
  title        = {A System for Ranking Organizations Using Social Scale Analysis},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {308--313},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.37},
  doi          = {10.1109/EISIC.2011.37},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/TikvesBTGDSCWRA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Torok11,
  author       = {Robyn Torok},
  title        = {The Online Institution: Psychiatric Power as an Explanatory Model
                  for the Normalisation of Radicalisation and Terrorism},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {78--85},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.43},
  doi          = {10.1109/EISIC.2011.43},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/Torok11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/UstunbasO11,
  author       = {Yonca Ustunbas and
                  Sule G{\"{u}}nd{\"{u}}z {\"{O}}g{\"{u}}d{\"{u}}c{\"{u}}},
  title        = {A Recommendation Model for Social Resource Sharing Systems Based on
                  Tripartite Graph Clustering},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {378--381},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.56},
  doi          = {10.1109/EISIC.2011.56},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/UstunbasO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/VybornovaSSKTCKO11,
  author       = {Olga Vybornova and
                  Ivan V. Smirnov and
                  Ilya Sochenkov and
                  Alexander Kiselyov and
                  Ilya Tikhomirov and
                  Natalya V. Chudova and
                  Yulia Kuznetsova and
                  Gennady S. Osipov},
  title        = {Social Tension Detection and Intention Recognition Using Natural Language
                  Semantic Analysis: On the Material of Russian-Speaking Social Networks
                  and Web Forums},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {277--281},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.27},
  doi          = {10.1109/EISIC.2011.27},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/VybornovaSSKTCKO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Wagner11,
  author       = {Gerhard Wagner},
  title        = {Desktop Text Mining for Open Source Intelligence},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {6},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.86},
  doi          = {10.1109/EISIC.2011.86},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/Wagner11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Wehinger11,
  author       = {Frank Wehinger},
  title        = {The Dark Net: Self-Regulation Dynamics of Illegal Online Markets for
                  Identities and Related Services},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {209--213},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.54},
  doi          = {10.1109/EISIC.2011.54},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/Wehinger11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Yangarber11,
  author       = {Roman Yangarber},
  title        = {Discovering Complex Networks of Events and Relations in News Surveillance},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {7},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.87},
  doi          = {10.1109/EISIC.2011.87},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/Yangarber11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eisic/2011,
  title        = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/6059524/proceeding},
  isbn         = {978-1-4577-1464-1},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics