Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "stream:streams/conf/eisic:"
@inproceedings{DBLP:conf/eisic/BastasKTVK19, author = {Nikolaos Bastas and George Kalpakis and Theodora Tsikrika and Stefanos Vrochidis and Ioannis Kompatsiaris}, title = {A comparative study of clustering methods using word embeddings}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2019, Oulu, Finland, November 26-27, 2019}, pages = {54--61}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/EISIC49498.2019.9108898}, doi = {10.1109/EISIC49498.2019.9108898}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/BastasKTVK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Bemer19, author = {Fabrizia Bemer}, title = {The Directive 2014/41/UE - The European Investigation Order}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2019, Oulu, Finland, November 26-27, 2019}, pages = {138}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/EISIC49498.2019.9108881}, doi = {10.1109/EISIC49498.2019.9108881}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/Bemer19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/ChenZB19, author = {Chia{-}Ju Chen and Razieh Nokhbeh Zaeem and K. Suzanne Barber}, title = {Statistical Analysis of Identity Risk of Exposure and Cost Using the Ecosystem of Identity Attributes}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2019, Oulu, Finland, November 26-27, 2019}, pages = {32--39}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/EISIC49498.2019.9108859}, doi = {10.1109/EISIC49498.2019.9108859}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/ChenZB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/EgiazarovMZV19, author = {Alexander Egiazarov and Vasileios Mavroeidis and Fabio Massimo Zennaro and Kamer Vishi}, title = {Firearm Detection and Segmentation Using an Ensemble of Semantic Neural Networks}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2019, Oulu, Finland, November 26-27, 2019}, pages = {70--77}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/EISIC49498.2019.9108871}, doi = {10.1109/EISIC49498.2019.9108871}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/EgiazarovMZV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/El-NaggarB19, author = {Susan El{-}Naggar and Thirimachos Bourlai}, title = {Evaluation of Deep Learning Models for Ear Recognition Against Image Distortions}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2019, Oulu, Finland, November 26-27, 2019}, pages = {85--93}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/EISIC49498.2019.9108870}, doi = {10.1109/EISIC49498.2019.9108870}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/El-NaggarB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/ElitzurPZ19, author = {Aviad Elitzur and Rami Puzis and Polina Zilberman}, title = {Attack Hypothesis Generation}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2019, Oulu, Finland, November 26-27, 2019}, pages = {40--47}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/EISIC49498.2019.9108886}, doi = {10.1109/EISIC49498.2019.9108886}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/ElitzurPZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/EpishkinaFKY19, author = {Anna Epishkina and Mikhail Finoshin and Konstantin Kogos and Aleksandra Yazykova}, title = {Timing Covert Channels Detection Cases via Machine Learning}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2019, Oulu, Finland, November 26-27, 2019}, pages = {139}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/EISIC49498.2019.9108873}, doi = {10.1109/EISIC49498.2019.9108873}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/EpishkinaFKY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/FernquistSKJ19, author = {Johan Fernquist and Ola Svenonius and Lisa Kaati and Fredrik Johansson}, title = {Extracting Account Attributes for Analyzing Influence on Twitter}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2019, Oulu, Finland, November 26-27, 2019}, pages = {62--69}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/EISIC49498.2019.9108896}, doi = {10.1109/EISIC49498.2019.9108896}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/FernquistSKJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/FrolovaEK19, author = {Daria Frolova and Anna Epishkina and Konstantin Kogos}, title = {Mobile User Authentication Using Keystroke Dynamics}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2019, Oulu, Finland, November 26-27, 2019}, pages = {140}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/EISIC49498.2019.9108890}, doi = {10.1109/EISIC49498.2019.9108890}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/FrolovaEK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/GarbuzEK19, author = {Alina Garbuz and Anna Epishkina and Konstantin Kogos}, title = {Continuous Authentication of Smartphone Users via Swipes and Taps Analysis}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2019, Oulu, Finland, November 26-27, 2019}, pages = {48--53}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/EISIC49498.2019.9108780}, doi = {10.1109/EISIC49498.2019.9108780}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/GarbuzEK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Guri19, author = {Mordechai Guri}, title = {{HOTSPOT:} Crossing the Air-Gap Between Isolated PCs and Nearby Smartphones Using Temperature}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2019, Oulu, Finland, November 26-27, 2019}, pages = {94--100}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/EISIC49498.2019.9108874}, doi = {10.1109/EISIC49498.2019.9108874}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/Guri19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/HaapamakiMHO19, author = {Eetu Haapam{\"{a}}ki and Juho Mikkola and Markus Hirsim{\"{a}}ki and Mourad Oussalah}, title = {Mining Security discussions in Suomi24}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2019, Oulu, Finland, November 26-27, 2019}, pages = {101--108}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/EISIC49498.2019.9108877}, doi = {10.1109/EISIC49498.2019.9108877}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/HaapamakiMHO19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/KostakosRLO19, author = {Panos Kostakos and Somkiadcharoen Robroo and Bofan Lin and Mourad Oussalah}, title = {Crime Prediction Using Hotel Reviews?}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2019, Oulu, Finland, November 26-27, 2019}, pages = {134--137}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/EISIC49498.2019.9108861}, doi = {10.1109/EISIC49498.2019.9108861}, timestamp = {Fri, 12 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/KostakosRLO19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/LozanoF19, author = {Marianela Garc{\'{\i}}a Lozano and Johan Fernquist}, title = {Identifying Deceptive Reviews: Feature Exploration, Model Transferability and Classification Attack}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2019, Oulu, Finland, November 26-27, 2019}, pages = {109--116}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/EISIC49498.2019.9108852}, doi = {10.1109/EISIC49498.2019.9108852}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/LozanoF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/PandyaKMCG0P19, author = {Abhinay Pandya and Panos Kostakos and Hassan Mehmood and Marta Cort{\'{e}}s and Ekaterina Gilman and Mourad Oussalah and Susanna Pirttikangas}, title = {Privacy preserving sentiment analysis on multiple edge data streams with Apache NiFi}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2019, Oulu, Finland, November 26-27, 2019}, pages = {130--133}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/EISIC49498.2019.9108851}, doi = {10.1109/EISIC49498.2019.9108851}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/PandyaKMCG0P19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/ParkPTFSS19, author = {Andrew J. Park and Lee D. Patterson and Herbert H. Tsang and Ryan Ficocelli and Valerie Spicer and Justin Song}, title = {Devising and Optimizing Crowd Control Strategies Using Agent-Based Modeling and Simulation}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2019, Oulu, Finland, November 26-27, 2019}, pages = {78--84}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/EISIC49498.2019.9108875}, doi = {10.1109/EISIC49498.2019.9108875}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/ParkPTFSS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/PicMT19, author = {Marc Pic and Ga{\"{e}}l Mahfoudi and Anis Trabelsi}, title = {Remote {KYC:} Attacks and Counter-Measures}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2019, Oulu, Finland, November 26-27, 2019}, pages = {126--129}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/EISIC49498.2019.9108787}, doi = {10.1109/EISIC49498.2019.9108787}, timestamp = {Tue, 25 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/PicMT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/RomeoB19, author = {Justin Romeo and Thirimachos Bourlai}, title = {Semi-Automatic Geometric Normalization of Profile Faces}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2019, Oulu, Finland, November 26-27, 2019}, pages = {121--125}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/EISIC49498.2019.9108897}, doi = {10.1109/EISIC49498.2019.9108897}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/RomeoB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Sariola19, author = {Disa Sariola}, title = {A model of quantifying social relationships}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2019, Oulu, Finland, November 26-27, 2019}, pages = {17--23}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/EISIC49498.2019.9108853}, doi = {10.1109/EISIC49498.2019.9108853}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/Sariola19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/SimekMLD19, author = {Olga Simek and Alyssa C. Mensch and Lin Li and Charlie K. Dagli}, title = {Characterization of Disinformation Networks Using Graph Embeddings and Opinion Mining}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2019, Oulu, Finland, November 26-27, 2019}, pages = {117--120}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/EISIC49498.2019.9108876}, doi = {10.1109/EISIC49498.2019.9108876}, timestamp = {Mon, 10 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/SimekMLD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/SimekSH19, author = {Olga Simek and Danelle C. Shah and Andrew Heier}, title = {Prototype and Analytics for Discovery and Exploitation of Threat Networks on Social Media}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2019, Oulu, Finland, November 26-27, 2019}, pages = {9--16}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/EISIC49498.2019.9108895}, doi = {10.1109/EISIC49498.2019.9108895}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/SimekSH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/SutmullerHBVNG19, author = {August Daniel Sutmuller and Mari{\"{e}}lle den Hengst and Ana Isabel Barros and Bob van der Vecht and Wouter Noordkamp and Pieter H. A. J. M. van Gelder}, title = {Predicting the Offender: Frequency versus Bayes}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2019, Oulu, Finland, November 26-27, 2019}, pages = {1--8}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/EISIC49498.2019.9108891}, doi = {10.1109/EISIC49498.2019.9108891}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/SutmullerHBVNG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/ZhuLJ19, author = {Jessica Zhu and Lin Li and Cara Jones}, title = {Identification and Detection of Human Trafficking Using Language Models}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2019, Oulu, Finland, November 26-27, 2019}, pages = {24--31}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/EISIC49498.2019.9108860}, doi = {10.1109/EISIC49498.2019.9108860}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/ZhuLJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eisic/2019, title = {European Intelligence and Security Informatics Conference, {EISIC} 2019, Oulu, Finland, November 26-27, 2019}, publisher = {{IEEE}}, year = {2019}, url = {https://ieeexplore.ieee.org/xpl/conhome/9102321/proceeding}, isbn = {978-1-7281-6735-0}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/0001HSG18, author = {Ignacio Mart{\'{\i}}n and Jos{\'{e}} Alberto Hern{\'{a}}ndez and Sergio de los Santos and Antonio Guzm{\'{a}}n}, editor = {Joel Brynielsson}, title = {Analysis and Evaluation of Antivirus Engines in Detecting Android Malware: {A} Data Analytics Approach}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2018, Karlskrona, Sweden, October 24-25, 2018}, pages = {7--14}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/EISIC.2018.00010}, doi = {10.1109/EISIC.2018.00010}, timestamp = {Mon, 22 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/0001HSG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Akhmedov18, author = {Umid Akhmedov}, editor = {Joel Brynielsson}, title = {On Wash Trade Detection in Energy Markets}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2018, Karlskrona, Sweden, October 24-25, 2018}, pages = {65--68}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/EISIC.2018.00018}, doi = {10.1109/EISIC.2018.00018}, timestamp = {Wed, 10 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/Akhmedov18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/AlsalehZ18, author = {Hamad Alsaleh and Lina Zhou}, editor = {Joel Brynielsson}, title = {A Heuristic Method for Identifying Scam Ads on Craigslist}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2018, Karlskrona, Sweden, October 24-25, 2018}, pages = {69--72}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/EISIC.2018.00019}, doi = {10.1109/EISIC.2018.00019}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/AlsalehZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/BoldtBB18, author = {Martin Boldt and Veselka Boeva and Anton Borg}, editor = {Joel Brynielsson}, title = {Multi-Expert Estimations of Burglars' Risk Exposure and Level of Pre-Crime Preparation Using Coded Crime Scene Data: Work in Progress}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2018, Karlskrona, Sweden, October 24-25, 2018}, pages = {77--80}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/EISIC.2018.00021}, doi = {10.1109/EISIC.2018.00021}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/BoldtBB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/FernquistK18, author = {Johan Fernquist and Lisa Kaati}, editor = {Joel Brynielsson}, title = {Online Monitoring of Large Events}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2018, Karlskrona, Sweden, October 24-25, 2018}, pages = {47--53}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/EISIC.2018.00015}, doi = {10.1109/EISIC.2018.00015}, timestamp = {Wed, 10 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/FernquistK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Guri18, author = {Mordechai Guri}, editor = {Joel Brynielsson}, title = {Optical Covert Channel from Air-Gapped Networks via Remote Orchestration of Router/Switch LEDs}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2018, Karlskrona, Sweden, October 24-25, 2018}, pages = {54--60}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/EISIC.2018.00016}, doi = {10.1109/EISIC.2018.00016}, timestamp = {Wed, 10 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/Guri18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/HullES18, author = {Matthew Hull and Thaddeus Eze and Lee Speakman}, editor = {Joel Brynielsson}, title = {Policing The Cyber Threat: Exploring the Threat from Cyber Crime and the Ability of Local Law Enforcement to Respond}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2018, Karlskrona, Sweden, October 24-25, 2018}, pages = {15--22}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/EISIC.2018.00011}, doi = {10.1109/EISIC.2018.00011}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/HullES18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/HyttinenH18, author = {Tatu Hyttinen and Saila Heinikoski}, editor = {Joel Brynielsson}, title = {Harmonizing Criminal Law Provisions on Money Laundering - {A} Litmus Test of European Integration}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2018, Karlskrona, Sweden, October 24-25, 2018}, pages = {31--38}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/EISIC.2018.00013}, doi = {10.1109/EISIC.2018.00013}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/HyttinenH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/KostakosPK018, author = {Panos Kostakos and Abhinay Pandya and Olga Kyriakouli and Mourad Oussalah}, editor = {Joel Brynielsson}, title = {Inferring Demographic Data of Marginalized Users in Twitter with Computer Vision APIs}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2018, Karlskrona, Sweden, October 24-25, 2018}, pages = {81--84}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/EISIC.2018.00022}, doi = {10.1109/EISIC.2018.00022}, timestamp = {Fri, 12 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/KostakosPK018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/McNaryH18, author = {Sarah McNary and Aaron Hunter}, editor = {Joel Brynielsson}, title = {Using Wearable Device Data in a Criminal Investigation: {A} Preliminary Study}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2018, Karlskrona, Sweden, October 24-25, 2018}, pages = {85}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/EISIC.2018.00023}, doi = {10.1109/EISIC.2018.00023}, timestamp = {Fri, 15 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/McNaryH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Price-WilliamsT18, author = {Matthew Price{-}Williams and Melissa J. Turcotte and Nick Heard}, editor = {Joel Brynielsson}, title = {Time of Day Anomaly Detection}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2018, Karlskrona, Sweden, October 24-25, 2018}, pages = {1--6}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/EISIC.2018.00009}, doi = {10.1109/EISIC.2018.00009}, timestamp = {Wed, 10 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/Price-WilliamsT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/SalmelaTKY18, author = {Laura Salmela and Sirra Toivonen and Minna Kulju and Mari Ylikauppila}, editor = {Joel Brynielsson}, title = {Digital Transformation in Border Checks: Mapping Border Guard Training in Automated Processes}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2018, Karlskrona, Sweden, October 24-25, 2018}, pages = {61--64}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/EISIC.2018.00017}, doi = {10.1109/EISIC.2018.00017}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/SalmelaTKY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/SchreiberBBOV18, author = {David Schreiber and Martin Boyer and Elisabeth Broneder and Andreas Opitz and Stephan Veigl}, editor = {Joel Brynielsson}, title = {Generic Object and Motion Analytics for Accelerating Video Analysis within {VICTORIA}}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2018, Karlskrona, Sweden, October 24-25, 2018}, pages = {86}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/EISIC.2018.00024}, doi = {10.1109/EISIC.2018.00024}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/SchreiberBBOV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/SuehrV18, author = {Sean Suehr and Chrysafis Vogiatzis}, editor = {Joel Brynielsson}, title = {Now You See Me: Identifying Duplicate Network Personas}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2018, Karlskrona, Sweden, October 24-25, 2018}, pages = {23--30}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/EISIC.2018.00012}, doi = {10.1109/EISIC.2018.00012}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/SuehrV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/WeissenfeldZWSD18, author = {Axel Weissenfeld and Andreas Zoufal and Christoph Weiss and Bernhard Strobl and Gustavo Fern{\'{a}}ndez Dom{\'{\i}}nguez}, editor = {Joel Brynielsson}, title = {Towards Mobile Contactless 4-Fingerprint Authentication for Border Control}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2018, Karlskrona, Sweden, October 24-25, 2018}, pages = {73--76}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/EISIC.2018.00020}, doi = {10.1109/EISIC.2018.00020}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/WeissenfeldZWSD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eisic/2018, editor = {Joel Brynielsson}, title = {European Intelligence and Security Informatics Conference, {EISIC} 2018, Karlskrona, Sweden, October 24-25, 2018}, publisher = {{IEEE}}, year = {2018}, url = {https://ieeexplore.ieee.org/xpl/conhome/8746037/proceeding}, isbn = {978-1-5386-9400-8}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/0004DB17, author = {Michael Martin and Jeremy M. Dawson and Thirimachos Bourlai}, editor = {Joel Brynielsson}, title = {Large Scale Data Collection of Tattoo-Based Biometric Data from Social-Media Websites}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2017, Athens, Greece, September 11-13, 2017}, pages = {135--138}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/EISIC.2017.27}, doi = {10.1109/EISIC.2017.27}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/0004DB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/AndreadisGKTPVK17, author = {Stelios Andreadis and Ilias Gialampoukidis and George Kalpakis and Theodora Tsikrika and Symeon Papadopoulos and Stefanos Vrochidis and Ioannis Kompatsiaris}, editor = {Joel Brynielsson}, title = {A Monitoring Tool for Terrorism-Related Key-Players and Key-Communities in Social Media Networks}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2017, Athens, Greece, September 11-13, 2017}, pages = {166}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/EISIC.2017.41}, doi = {10.1109/EISIC.2017.41}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/AndreadisGKTPVK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/BedekNHA17, author = {Michael A. Bedek and Alexander Nussbaumer and Eva{-}Catherine Hillemann and Dietrich Albert}, editor = {Joel Brynielsson}, title = {A Framework for Measuring Imagination in Visual Analytics Systems}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2017, Athens, Greece, September 11-13, 2017}, pages = {151--154}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/EISIC.2017.31}, doi = {10.1109/EISIC.2017.31}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/BedekNHA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/BoldtB17, author = {Martin Boldt and Anton Borg}, editor = {Joel Brynielsson}, title = {A Statistical Method for Detecting Significant Temporal Hotspots Using {LISA} Statistics}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2017, Athens, Greece, September 11-13, 2017}, pages = {123--126}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/EISIC.2017.24}, doi = {10.1109/EISIC.2017.24}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/BoldtB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/BorgBE17, author = {Anton Borg and Martin Boldt and Johan Eliasson}, editor = {Joel Brynielsson}, title = {Detecting Crime Series Based on Route Estimation and Behavioral Similarity}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2017, Athens, Greece, September 11-13, 2017}, pages = {1--8}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/EISIC.2017.10}, doi = {10.1109/EISIC.2017.10}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/BorgBE17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/BorrionDL17, author = {Herv{\'{e}} Borrion and Hashem Dehghanniri and Yuanxi Li}, editor = {Joel Brynielsson}, title = {Comparative Analysis of Crime Scripts: One {CCTV} Footage - Twenty-One Scripts}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2017, Athens, Greece, September 11-13, 2017}, pages = {115--122}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/EISIC.2017.23}, doi = {10.1109/EISIC.2017.23}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/BorrionDL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/ChenYB17, author = {Lingwei Chen and Yanfang Ye and Thirimachos Bourlai}, editor = {Joel Brynielsson}, title = {Adversarial Machine Learning in Malware Detection: Arms Race between Evasion Attack and Defense}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2017, Athens, Greece, September 11-13, 2017}, pages = {99--106}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/EISIC.2017.21}, doi = {10.1109/EISIC.2017.21}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/ChenYB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Dhami17, author = {Mandeep K. Dhami}, editor = {Joel Brynielsson}, title = {A Survey of Intelligence Analysts' Perceptions of Analytic Tools}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2017, Athens, Greece, September 11-13, 2017}, pages = {131--134}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/EISIC.2017.26}, doi = {10.1109/EISIC.2017.26}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/Dhami17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/DimitriouKSSTZL17, author = {Nikolaos Dimitriou and George Kioumourtzis and Anargyros Sideris and Georgios Stavropoulos and Evdoxia Taka and Nikolaos Zotos and George Leventakis and Dimitrios Tzovaras}, editor = {Joel Brynielsson}, title = {An Integrated Framework for the Timely Detection of Petty Crimes}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2017, Athens, Greece, September 11-13, 2017}, pages = {24--31}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/EISIC.2017.13}, doi = {10.1109/EISIC.2017.13}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/DimitriouKSSTZL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/FernquistFK17, author = {Johan Fernquist and Torbjorn Fangstrom and Lisa Kaati}, editor = {Joel Brynielsson}, title = {IoT Data Profiles: The Routines of Your Life Reveals Who You Are}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2017, Athens, Greece, September 11-13, 2017}, pages = {61--67}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/EISIC.2017.17}, doi = {10.1109/EISIC.2017.17}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/FernquistFK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/FoongO17, author = {Yee Jang Foong and Mourad Oussalah}, editor = {Joel Brynielsson}, title = {Cyberbullying System Detection and Analysis}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2017, Athens, Greece, September 11-13, 2017}, pages = {40--46}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/EISIC.2017.43}, doi = {10.1109/EISIC.2017.43}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/FoongO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/GroenewaldWAPK17, author = {Celeste Groenewald and B. L. William Wong and Simon Attfield and Peter J. Passmore and Neesha Kodagoda}, editor = {Joel Brynielsson}, title = {How Analysts Think: How Do Criminal Intelligence Analysts Recognise and Manage Significant Information?}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2017, Athens, Greece, September 11-13, 2017}, pages = {47--53}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/EISIC.2017.15}, doi = {10.1109/EISIC.2017.15}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/GroenewaldWAPK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/IsbisterKC17, author = {Tim Isbister and Lisa Kaati and Katie Cohen}, editor = {Joel Brynielsson}, title = {Gender Classification with Data Independent Features in Multiple Languages}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2017, Athens, Greece, September 11-13, 2017}, pages = {54--60}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/EISIC.2017.16}, doi = {10.1109/EISIC.2017.16}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/IsbisterKC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/IslamW17, author = {Junayed Islam and B. L. William Wong}, editor = {Joel Brynielsson}, title = {Behavioural Markers: Bridging the Gap between Art of Analysis and Science of Analytics in Criminal Intelligence}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2017, Athens, Greece, September 11-13, 2017}, pages = {147--150}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/EISIC.2017.30}, doi = {10.1109/EISIC.2017.30}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/IslamW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/KaatiLSS17, author = {Lisa Kaati and Elias Lundeqvist and Amendra Shrestha and Maria Svensson}, editor = {Joel Brynielsson}, title = {Author Profiling in the Wild}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2017, Athens, Greece, September 11-13, 2017}, pages = {155--158}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/EISIC.2017.32}, doi = {10.1109/EISIC.2017.32}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/KaatiLSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/KaatiR17, author = {Lisa Kaati and Adam Ruul}, editor = {Joel Brynielsson}, title = {Interpretable Probabilistic Divisive Clustering of Large Node-Attributed Networks}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2017, Athens, Greece, September 11-13, 2017}, pages = {68--75}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/EISIC.2017.18}, doi = {10.1109/EISIC.2017.18}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/KaatiR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/KhelifMBSSMMKHC17, author = {Khaled Khelif and Yann Mombrun and Gerhard Backfried and Farhan Sahito and Luca Scarpato and Petr Motl{\'{\i}}cek and Srikanth R. Madikeri and Damien Kelly and Gideon Hazzani and Emmanouil Chatzigavriil}, editor = {Joel Brynielsson}, title = {Towards a Breakthrough Speaker Identification Approach for Law Enforcement Agencies: {SIIP}}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2017, Athens, Greece, September 11-13, 2017}, pages = {32--39}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/EISIC.2017.14}, doi = {10.1109/EISIC.2017.14}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/KhelifMBSSMMKHC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/KostakosMNO17, author = {Panos Kostakos and Miika Moilanen and Arttu Niemel{\"{a}} and Mourad Oussalah}, editor = {Joel Brynielsson}, title = {Catchem: {A} Browser Plugin for the Panama Papers Using Approximate String Matching}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2017, Athens, Greece, September 11-13, 2017}, pages = {139--142}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/EISIC.2017.28}, doi = {10.1109/EISIC.2017.28}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/KostakosMNO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/LekeaK17, author = {Ioanna K. Lekea and Panagiotis Karampelas}, editor = {Joel Brynielsson}, title = {Are We Really That Close Together? Tracing and Discussing Similarities and Differences between Greek Terrorist Groups Using Cluster Analysis}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2017, Athens, Greece, September 11-13, 2017}, pages = {159--162}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/EISIC.2017.33}, doi = {10.1109/EISIC.2017.33}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/LekeaK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/MavroeidisB17, author = {Vasileios Mavroeidis and Siri Bromander}, editor = {Joel Brynielsson}, title = {Cyber Threat Intelligence Model: An Evaluation of Taxonomies, Sharing Standards, and Ontologies within Cyber Threat Intelligence}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2017, Athens, Greece, September 11-13, 2017}, pages = {91--98}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/EISIC.2017.20}, doi = {10.1109/EISIC.2017.20}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/MavroeidisB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/PaudyalRKWDQ17, author = {Pragya Paudyal and Chris Rooney and Neesha Kodagoda and B. L. William Wong and Penny Duquenoy and Nadeem Qazi}, editor = {Joel Brynielsson}, title = {How the Use of Ethically Sensitive Information Helps to Identify Co-Offenders via a Purposed Privacy Scale: {A} Pilot Study}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2017, Athens, Greece, September 11-13, 2017}, pages = {164}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/EISIC.2017.35}, doi = {10.1109/EISIC.2017.35}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/PaudyalRKWDQ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/PicO17, author = {Marc Michel Pic and Amine Ouddan}, editor = {Joel Brynielsson}, title = {Photometrix {(TM):} {A} Digital Seal for Offline Identity Picture Authentication}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2017, Athens, Greece, September 11-13, 2017}, pages = {163}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/EISIC.2017.34}, doi = {10.1109/EISIC.2017.34}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/PicO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Poulymenopoulou17, author = {Mikaela Poulymenopoulou and Aris Tsois}, editor = {Joel Brynielsson}, title = {Customs Risk Analysis through the ConTraffic Visual Analytics Tool}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2017, Athens, Greece, September 11-13, 2017}, pages = {107--114}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/EISIC.2017.22}, doi = {10.1109/EISIC.2017.22}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/Poulymenopoulou17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Price-WilliamsH17, author = {Matthew Price{-}Williams and Nick Heard and Melissa J. Turcotte}, editor = {Joel Brynielsson}, title = {Detecting Periodic Subsequences in Cyber Security Data}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2017, Athens, Greece, September 11-13, 2017}, pages = {84--90}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/EISIC.2017.40}, doi = {10.1109/EISIC.2017.40}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/Price-WilliamsH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/QaziW17, author = {Nadeem Qazi and B. L. William Wong}, editor = {Joel Brynielsson}, title = {Behavioural {\&} Tempo-Spatial Knowledge Graph for Crime Matching through Graph Theory}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2017, Athens, Greece, September 11-13, 2017}, pages = {143--146}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/EISIC.2017.29}, doi = {10.1109/EISIC.2017.29}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/QaziW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/RuohonenL17, author = {Jukka Ruohonen and Ville Lepp{\"{a}}nen}, editor = {Joel Brynielsson}, title = {Whose Hands Are in the Finnish Cookie Jar?}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2017, Athens, Greece, September 11-13, 2017}, pages = {127--130}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/EISIC.2017.25}, doi = {10.1109/EISIC.2017.25}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/RuohonenL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/TorregrosaGLGC17, author = {Javier Torregrosa and Irene Gilp{\'{e}}rez{-}L{\'{o}}pez and Ra{\'{u}}l Lara{-}Cabrera and David Garriga and David Camacho}, editor = {Joel Brynielsson}, title = {Can an Automatic Tool Assess Risk of Radicalization Online? {A} Case Study on Facebook}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2017, Athens, Greece, September 11-13, 2017}, pages = {165}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/EISIC.2017.36}, doi = {10.1109/EISIC.2017.36}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/TorregrosaGLGC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Xylogiannopoulos17, author = {Konstantinos F. Xylogiannopoulos and Panagiotis Karampelas and Reda Alhajj}, editor = {Joel Brynielsson}, title = {Text Mining in Unclean, Noisy or Scrambled Datasets for Digital Forensics Analytics}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2017, Athens, Greece, September 11-13, 2017}, pages = {76--83}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/EISIC.2017.19}, doi = {10.1109/EISIC.2017.19}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/Xylogiannopoulos17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/ZouaveM17, author = {Erik T. Zouave and Thomas Marquenie}, editor = {Joel Brynielsson}, title = {An Inconvenient Truth: Algorithmic Transparency {\&} Accountability in Criminal Intelligence Profiling}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2017, Athens, Greece, September 11-13, 2017}, pages = {17--23}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/EISIC.2017.12}, doi = {10.1109/EISIC.2017.12}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/ZouaveM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eisic/2017, editor = {Joel Brynielsson}, title = {European Intelligence and Security Informatics Conference, {EISIC} 2017, Athens, Greece, September 11-13, 2017}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://ieeexplore.ieee.org/xpl/conhome/8234922/proceeding}, isbn = {978-1-5386-2385-5}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/0001H16, author = {Haibo Li and Anders Hedman}, editor = {Joel Brynielsson and Fredrik Johansson}, title = {Harnessing Crowds to Avert or Mitigate Acts Terrorism: {A} Collective Intelligence Call for Action}, booktitle = {2016 European Intelligence and Security Informatics Conference, {EISIC} 2016, Uppsala, Sweden, August 17-19, 2016}, pages = {203}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/EISIC.2016.057}, doi = {10.1109/EISIC.2016.057}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/0001H16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/0001S16, author = {Swati Agarwal and Ashish Sureka}, editor = {Joel Brynielsson and Fredrik Johansson}, title = {But {I} did not Mean It! - Intent Classification of Racist Posts on Tumblr}, booktitle = {2016 European Intelligence and Security Informatics Conference, {EISIC} 2016, Uppsala, Sweden, August 17-19, 2016}, pages = {124--127}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/EISIC.2016.032}, doi = {10.1109/EISIC.2016.032}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/0001S16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/0001S16a, author = {Swati Agarwal and Ashish Sureka}, editor = {Joel Brynielsson and Fredrik Johansson}, title = {Role of Author Personality Traits for Identifying Intent Based Racist Posts}, booktitle = {2016 European Intelligence and Security Informatics Conference, {EISIC} 2016, Uppsala, Sweden, August 17-19, 2016}, pages = {197}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/EISIC.2016.051}, doi = {10.1109/EISIC.2016.051}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/0001S16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/AlsadhanP16, author = {Tina Alsadhan and Joon S. Park}, editor = {Joel Brynielsson and Fredrik Johansson}, title = {Enhancing Risk-Based Decisions by Leveraging Cyber Security Automation}, booktitle = {2016 European Intelligence and Security Informatics Conference, {EISIC} 2016, Uppsala, Sweden, August 17-19, 2016}, pages = {164--167}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/EISIC.2016.042}, doi = {10.1109/EISIC.2016.042}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/AlsadhanP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/AnderssonJSFCTP16, author = {Maria Andersson and Ronnie Johansson and Karl{-}G{\"{o}}ran Stenborg and Robert Forsgren and Thomas Cane and Grzegorz Taberski and Jose Luis Patino and James M. Ferryman}, editor = {Joel Brynielsson and Fredrik Johansson}, title = {The {IPATCH} System for Maritime Surveillance and Piracy Threat Classification}, booktitle = {2016 European Intelligence and Security Informatics Conference, {EISIC} 2016, Uppsala, Sweden, August 17-19, 2016}, pages = {200}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/EISIC.2016.054}, doi = {10.1109/EISIC.2016.054}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/AnderssonJSFCTP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/AshcroftMVM016, author = {Michael Ashcroft and Matteo Magnani and Davide Vega and Danilo Montesi and Luca Rossi}, editor = {Joel Brynielsson and Fredrik Johansson}, title = {Multilayer Analysis of Online Illicit Marketplaces}, booktitle = {2016 European Intelligence and Security Informatics Conference, {EISIC} 2016, Uppsala, Sweden, August 17-19, 2016}, pages = {199}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/EISIC.2016.053}, doi = {10.1109/EISIC.2016.053}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/AshcroftMVM016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/AydinJ16, author = {Mustafa Aydin and Jeremy L. Jacob}, editor = {Joel Brynielsson and Fredrik Johansson}, title = {Providing Extensibility to Threat Modelling in Cloud-COVER's Underlying Analysis Model}, booktitle = {2016 European Intelligence and Security Informatics Conference, {EISIC} 2016, Uppsala, Sweden, August 17-19, 2016}, pages = {45--51}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/EISIC.2016.016}, doi = {10.1109/EISIC.2016.016}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/AydinJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/BelozubovaEK16, author = {Anna Belozubova and Anna Epishkina and Konstantin Kogos}, editor = {Joel Brynielsson and Fredrik Johansson}, title = {Random Delays to Limit Timing Covert Channel}, booktitle = {2016 European Intelligence and Security Informatics Conference, {EISIC} 2016, Uppsala, Sweden, August 17-19, 2016}, pages = {188--191}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/EISIC.2016.048}, doi = {10.1109/EISIC.2016.048}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/BelozubovaEK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/BexH16, author = {Floris Bex and Bas Hovestad}, editor = {Joel Brynielsson and Fredrik Johansson}, title = {An Argumentative-Narrative Risk Assessment Model}, booktitle = {2016 European Intelligence and Security Informatics Conference, {EISIC} 2016, Uppsala, Sweden, August 17-19, 2016}, pages = {176--179}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/EISIC.2016.045}, doi = {10.1109/EISIC.2016.045}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/BexH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/BjorklundZ16, author = {Johanna Bj{\"{o}}rklund and Niklas Zechner}, editor = {Joel Brynielsson and Fredrik Johansson}, title = {My Name is Legion: Estimating Author Counts Based on Stylistic Diversity}, booktitle = {2016 European Intelligence and Security Informatics Conference, {EISIC} 2016, Uppsala, Sweden, August 17-19, 2016}, pages = {108--111}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/EISIC.2016.028}, doi = {10.1109/EISIC.2016.028}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/BjorklundZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/BlazicK16, author = {Borka Jerman Blazic and Tomaz Klobucar}, editor = {Joel Brynielsson and Fredrik Johansson}, title = {Missing Solutions in the Fight against Cybercrime and Cyberterrorism - The New {EU} Research Agenda}, booktitle = {2016 European Intelligence and Security Informatics Conference, {EISIC} 2016, Uppsala, Sweden, August 17-19, 2016}, pages = {128--131}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/EISIC.2016.033}, doi = {10.1109/EISIC.2016.033}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/BlazicK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/BoldtB16, author = {Martin Boldt and Jaswanth Bala}, editor = {Joel Brynielsson and Fredrik Johansson}, title = {Filtering Estimated Crime Series Based on Route Calculations on Spatio-temporal Data}, booktitle = {2016 European Intelligence and Security Informatics Conference, {EISIC} 2016, Uppsala, Sweden, August 17-19, 2016}, pages = {92--95}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/EISIC.2016.024}, doi = {10.1109/EISIC.2016.024}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/BoldtB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/BugejaJD16, author = {Joseph Bugeja and Andreas Jacobsson and Paul Davidsson}, editor = {Joel Brynielsson and Fredrik Johansson}, title = {On Privacy and Security Challenges in Smart Connected Homes}, booktitle = {2016 European Intelligence and Security Informatics Conference, {EISIC} 2016, Uppsala, Sweden, August 17-19, 2016}, pages = {172--175}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/EISIC.2016.044}, doi = {10.1109/EISIC.2016.044}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/BugejaJD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Clarke16, author = {Roger Clarke}, editor = {Joel Brynielsson and Fredrik Johansson}, title = {Quality Assurance for Security Applications of Big Data}, booktitle = {2016 European Intelligence and Security Informatics Conference, {EISIC} 2016, Uppsala, Sweden, August 17-19, 2016}, pages = {1--8}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/EISIC.2016.010}, doi = {10.1109/EISIC.2016.010}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/Clarke16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/DhamiBC16, author = {Mandeep K. Dhami and Ian K. Belton and Kathryn E. Careless}, editor = {Joel Brynielsson and Fredrik Johansson}, title = {Critical Review of Analytic Techniques}, booktitle = {2016 European Intelligence and Security Informatics Conference, {EISIC} 2016, Uppsala, Sweden, August 17-19, 2016}, pages = {152--155}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/EISIC.2016.039}, doi = {10.1109/EISIC.2016.039}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/DhamiBC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/FrankMM16, author = {Richard Frank and Mitch Macdonald and Bryan Monk}, editor = {Joel Brynielsson and Fredrik Johansson}, title = {Location, Location, Location: Mapping Potential Canadian Targets in Online Hacker Discussion Forums}, booktitle = {2016 European Intelligence and Security Informatics Conference, {EISIC} 2016, Uppsala, Sweden, August 17-19, 2016}, pages = {16--23}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/EISIC.2016.012}, doi = {10.1109/EISIC.2016.012}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/FrankMM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/GerberWK16, author = {Matylda Gerber and B. L. William Wong and Neesha Kodagoda}, editor = {Joel Brynielsson and Fredrik Johansson}, title = {How Analysts Think: Decision Making in the Absence of Clear Facts}, booktitle = {2016 European Intelligence and Security Informatics Conference, {EISIC} 2016, Uppsala, Sweden, August 17-19, 2016}, pages = {132--135}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/EISIC.2016.034}, doi = {10.1109/EISIC.2016.034}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/GerberWK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/GialampoukidisK16, author = {Ilias Gialampoukidis and George Kalpakis and Theodora Tsikrika and Stefanos Vrochidis and Ioannis Kompatsiaris}, editor = {Joel Brynielsson and Fredrik Johansson}, title = {Key Player Identification in Terrorism-Related Social Media Networks Using Centrality Measures}, booktitle = {2016 European Intelligence and Security Informatics Conference, {EISIC} 2016, Uppsala, Sweden, August 17-19, 2016}, pages = {112--115}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/EISIC.2016.029}, doi = {10.1109/EISIC.2016.029}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/GialampoukidisK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/GisslenH16, author = {Linus Gissl{\'{e}}n and Andreas Horndahl}, editor = {Joel Brynielsson and Fredrik Johansson}, title = {A Quantitative Approach to Risk and Cost Assessment in Supply Chain Management}, booktitle = {2016 European Intelligence and Security Informatics Conference, {EISIC} 2016, Uppsala, Sweden, August 17-19, 2016}, pages = {180--183}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/EISIC.2016.046}, doi = {10.1109/EISIC.2016.046}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/GisslenH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Goujon16, author = {B{\'{e}}n{\'{e}}dicte Goujon}, editor = {Joel Brynielsson and Fredrik Johansson}, title = {How to Support the Decision Making in Crisis Context?}, booktitle = {2016 European Intelligence and Security Informatics Conference, {EISIC} 2016, Uppsala, Sweden, August 17-19, 2016}, pages = {39--44}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/EISIC.2016.015}, doi = {10.1109/EISIC.2016.015}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/Goujon16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/GranasenK16, author = {Magdalena Gran{\aa}sen and Maja Karasalo}, editor = {Joel Brynielsson and Fredrik Johansson}, title = {Methodology and Tool to Facilitate Structured Analysis of Multiple Hypotheses}, booktitle = {2016 European Intelligence and Security Informatics Conference, {EISIC} 2016, Uppsala, Sweden, August 17-19, 2016}, pages = {52--59}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/EISIC.2016.017}, doi = {10.1109/EISIC.2016.017}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/GranasenK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/GuriSSE16, author = {Mordechai Guri and Eyal Shemer and Dov Shirtz and Yuval Elovici}, editor = {Joel Brynielsson and Fredrik Johansson}, title = {Personal Information Leakage During Password Recovery of Internet Services}, booktitle = {2016 European Intelligence and Security Informatics Conference, {EISIC} 2016, Uppsala, Sweden, August 17-19, 2016}, pages = {136--139}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/EISIC.2016.035}, doi = {10.1109/EISIC.2016.035}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/GuriSSE16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Hageback16, author = {Niklas Hageback}, editor = {Joel Brynielsson and Fredrik Johansson}, title = {Forecasting the Underlying Psychological Forces to Political Violence through Big Data Symbol Mining}, booktitle = {2016 European Intelligence and Security Informatics Conference, {EISIC} 2016, Uppsala, Sweden, August 17-19, 2016}, pages = {196}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/EISIC.2016.050}, doi = {10.1109/EISIC.2016.050}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/Hageback16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/IvancB16, author = {Blaz Ivanc and Borka Jerman Blazic}, editor = {Joel Brynielsson and Fredrik Johansson}, title = {Information Security Aspects of the Public Safety Data Interoperability Network}, booktitle = {2016 European Intelligence and Security Informatics Conference, {EISIC} 2016, Uppsala, Sweden, August 17-19, 2016}, pages = {88--91}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/EISIC.2016.023}, doi = {10.1109/EISIC.2016.023}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/IvancB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/JawaleP16, author = {Ashay S. Jawale and Joon S. Park}, editor = {Joel Brynielsson and Fredrik Johansson}, title = {A Security Analysis on Apple Pay}, booktitle = {2016 European Intelligence and Security Informatics Conference, {EISIC} 2016, Uppsala, Sweden, August 17-19, 2016}, pages = {160--163}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/EISIC.2016.041}, doi = {10.1109/EISIC.2016.041}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/JawaleP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/LeventakisPKCK16, author = {George Leventakis and George Papalexandratos and George Kokkinis and Elisavet Charalambous and Nikolaos Koutras}, editor = {Joel Brynielsson and Fredrik Johansson}, title = {Towards Efficient Law Enforcement Decision Support Systems in the Area of Community Policing: The Use of Mobile Applications}, booktitle = {2016 European Intelligence and Security Informatics Conference, {EISIC} 2016, Uppsala, Sweden, August 17-19, 2016}, pages = {198}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/EISIC.2016.052}, doi = {10.1109/EISIC.2016.052}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/LeventakisPKCK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/MaghsoudiT16, author = {Javid Maghsoudi and Charles C. Tappert}, editor = {Joel Brynielsson and Fredrik Johansson}, title = {A Behavioral Biometrics User Authentication Study Using Motion Data from Android Smartphones}, booktitle = {2016 European Intelligence and Security Informatics Conference, {EISIC} 2016, Uppsala, Sweden, August 17-19, 2016}, pages = {184--187}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/EISIC.2016.047}, doi = {10.1109/EISIC.2016.047}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/MaghsoudiT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/MikhaylovF16, author = {Alexander Mikhaylov and Richard Frank}, editor = {Joel Brynielsson and Fredrik Johansson}, title = {Cards, Money and Two Hacking Forums: An Analysis of Online Money Laundering Schemes}, booktitle = {2016 European Intelligence and Security Informatics Conference, {EISIC} 2016, Uppsala, Sweden, August 17-19, 2016}, pages = {80--83}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/EISIC.2016.021}, doi = {10.1109/EISIC.2016.021}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/MikhaylovF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/NaserZAA16, author = {Aws Naser and Mohamed Fadli Bin Zolkipli and Shahid Anwar and Muna Sulieman Al{-}Hawawreh}, editor = {Joel Brynielsson and Fredrik Johansson}, title = {Present Status and Challenges in Cloud Monitoring Framework: {A} Survey}, booktitle = {2016 European Intelligence and Security Informatics Conference, {EISIC} 2016, Uppsala, Sweden, August 17-19, 2016}, pages = {201}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/EISIC.2016.055}, doi = {10.1109/EISIC.2016.055}, timestamp = {Sat, 19 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/NaserZAA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/NouhNG16, author = {Mariam Nouh and Jason R. C. Nurse and Michael Goldsmith}, editor = {Joel Brynielsson and Fredrik Johansson}, title = {Towards Designing a Multipurpose Cybercrime Intelligence Framework}, booktitle = {2016 European Intelligence and Security Informatics Conference, {EISIC} 2016, Uppsala, Sweden, August 17-19, 2016}, pages = {60--67}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/EISIC.2016.018}, doi = {10.1109/EISIC.2016.018}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/NouhNG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/NussbaumerVHBA16, author = {Alexander Nussbaumer and Katrien Verbert and Eva{-}Catherine Hillemann and Michael A. Bedek and Dietrich Albert}, editor = {Joel Brynielsson and Fredrik Johansson}, title = {A Framework for Cognitive Bias Detection and Feedback in a Visual Analytics Environment}, booktitle = {2016 European Intelligence and Security Informatics Conference, {EISIC} 2016, Uppsala, Sweden, August 17-19, 2016}, pages = {148--151}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/EISIC.2016.038}, doi = {10.1109/EISIC.2016.038}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/NussbaumerVHBA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/OrphanidesAB16, author = {Constantinos Orphanides and Babak Akhgar and Petra Saskia Bayerl}, editor = {Joel Brynielsson and Fredrik Johansson}, title = {Discovering Knowledge in Online Drug Transactions Using Conceptual Graphs and Formal Concept Analysis}, booktitle = {2016 European Intelligence and Security Informatics Conference, {EISIC} 2016, Uppsala, Sweden, August 17-19, 2016}, pages = {100--103}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/EISIC.2016.026}, doi = {10.1109/EISIC.2016.026}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/OrphanidesAB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Pic16, author = {Marc Michel Pic}, editor = {Joel Brynielsson and Fredrik Johansson}, title = {A Dedicated Crawling Engine to Reduce Apps Distribution Risks}, booktitle = {2016 European Intelligence and Security Informatics Conference, {EISIC} 2016, Uppsala, Sweden, August 17-19, 2016}, pages = {202}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/EISIC.2016.056}, doi = {10.1109/EISIC.2016.056}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/Pic16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/PijpkerV16, author = {Jeroen Pijpker and Harald P. E. Vranken}, editor = {Joel Brynielsson and Fredrik Johansson}, title = {The Role of Internet Service Providers in Botnet Mitigation}, booktitle = {2016 European Intelligence and Security Informatics Conference, {EISIC} 2016, Uppsala, Sweden, August 17-19, 2016}, pages = {24--31}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/EISIC.2016.013}, doi = {10.1109/EISIC.2016.013}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/PijpkerV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/RizzoBM16, author = {Stefano Giovanni Rizzo and Flavio Bertini and Danilo Montesi}, editor = {Joel Brynielsson and Fredrik Johansson}, title = {Text Authorship Verification through Watermarking}, booktitle = {2016 European Intelligence and Security Informatics Conference, {EISIC} 2016, Uppsala, Sweden, August 17-19, 2016}, pages = {168--171}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/EISIC.2016.043}, doi = {10.1109/EISIC.2016.043}, timestamp = {Thu, 20 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/RizzoBM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/RuohonenSHMAL16, author = {Jukka Ruohonen and Sanja Scepanovic and Sami Hyrynsalmi and Igor Mishkovski and Tuomas Aura and Ville Lepp{\"{a}}nen}, editor = {Joel Brynielsson and Fredrik Johansson}, title = {A Post-Mortem Empirical Investigation of the Popularity and Distribution of Malware Files in the Contemporary Web-Facing Internet}, booktitle = {2016 European Intelligence and Security Informatics Conference, {EISIC} 2016, Uppsala, Sweden, August 17-19, 2016}, pages = {144--147}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/EISIC.2016.037}, doi = {10.1109/EISIC.2016.037}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/RuohonenSHMAL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/SabbaghK16, author = {Bilal Al Sabbagh and Stewart Kowalski}, editor = {Joel Brynielsson and Fredrik Johansson}, title = {A Framework and Prototype for {A} Socio-Technical Security Information and Event Management System {(ST-SIEM)}}, booktitle = {2016 European Intelligence and Security Informatics Conference, {EISIC} 2016, Uppsala, Sweden, August 17-19, 2016}, pages = {192--195}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/EISIC.2016.049}, doi = {10.1109/EISIC.2016.049}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/SabbaghK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/SariB16, author = {Aprianti Nanda Sari and Ari Moesriami Barmawi}, editor = {Joel Brynielsson and Fredrik Johansson}, title = {Modified Graphstega Based on Chart Scale Modification}, booktitle = {2016 European Intelligence and Security Informatics Conference, {EISIC} 2016, Uppsala, Sweden, August 17-19, 2016}, pages = {156--159}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/EISIC.2016.040}, doi = {10.1109/EISIC.2016.040}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/SariB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/ScrivensF16, author = {Ryan Scrivens and Richard Frank}, editor = {Joel Brynielsson and Fredrik Johansson}, title = {Sentiment-based Classification of Radical Text on the Web}, booktitle = {2016 European Intelligence and Security Informatics Conference, {EISIC} 2016, Uppsala, Sweden, August 17-19, 2016}, pages = {104--107}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/EISIC.2016.027}, doi = {10.1109/EISIC.2016.027}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/ScrivensF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/SeidlerHKWPA16, author = {Patrick Seidler and Johanna Haider and Neesha Kodagoda and B. L. William Wong and Margit Pohl and Richard Adderley}, editor = {Joel Brynielsson and Fredrik Johansson}, title = {Design for Intelligence Analysis of Complex Systems: Evolution of Criminal Networks}, booktitle = {2016 European Intelligence and Security Informatics Conference, {EISIC} 2016, Uppsala, Sweden, August 17-19, 2016}, pages = {140--143}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/EISIC.2016.036}, doi = {10.1109/EISIC.2016.036}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/SeidlerHKWPA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/SelvarajAPW16, author = {Nallini Selvaraj and Simon Attfield and Peter J. Passmore and B. L. William Wong}, editor = {Joel Brynielsson and Fredrik Johansson}, title = {How Analysts Think: Think-steps as a Tool for Structuring Sensemaking in Criminal Intelligence Analysis}, booktitle = {2016 European Intelligence and Security Informatics Conference, {EISIC} 2016, Uppsala, Sweden, August 17-19, 2016}, pages = {68--75}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/EISIC.2016.019}, doi = {10.1109/EISIC.2016.019}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/SelvarajAPW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/SmitVWS16, author = {Selmar Smit and Bob van der Vecht and Freek van Wermeskerken and Jan Willem Streefkerk}, editor = {Joel Brynielsson and Fredrik Johansson}, title = {{QUIN:} Providing Integrated Analysis Support to Crime Investigators}, booktitle = {2016 European Intelligence and Security Informatics Conference, {EISIC} 2016, Uppsala, Sweden, August 17-19, 2016}, pages = {120--123}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/EISIC.2016.031}, doi = {10.1109/EISIC.2016.031}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/SmitVWS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/StolcWVDC16, author = {Svorad Stolc and Peter Wild and Kristi{\'{a}}n Valent{\'{\i}}n and Franz Daubner and Markus Clabian}, editor = {Joel Brynielsson and Fredrik Johansson}, title = {On Interoperability of Security Document Reading Devices}, booktitle = {2016 European Intelligence and Security Informatics Conference, {EISIC} 2016, Uppsala, Sweden, August 17-19, 2016}, pages = {9--15}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/EISIC.2016.011}, doi = {10.1109/EISIC.2016.011}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/StolcWVDC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Usugami16, author = {Jiro Usugami}, editor = {Joel Brynielsson and Fredrik Johansson}, title = {Disaster Risk Reduction for International Residents in Japan: Barriers and Facilitators to Knowledge Sharing in Times of Disaster}, booktitle = {2016 European Intelligence and Security Informatics Conference, {EISIC} 2016, Uppsala, Sweden, August 17-19, 2016}, pages = {96--99}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/EISIC.2016.025}, doi = {10.1109/EISIC.2016.025}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/Usugami16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/WildSVDC16, author = {Peter Wild and Svorad Stolc and Kristi{\'{a}}n Valent{\'{\i}}n and Franz Daubner and Markus Clabian}, editor = {Joel Brynielsson and Fredrik Johansson}, title = {Compression Effects on Security Document Images}, booktitle = {2016 European Intelligence and Security Informatics Conference, {EISIC} 2016, Uppsala, Sweden, August 17-19, 2016}, pages = {76--79}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/EISIC.2016.020}, doi = {10.1109/EISIC.2016.020}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/WildSVDC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/ZaeemMB16, author = {Razieh Nokhbeh Zaeem and Monisha Manoharan and K. Suzanne Barber}, editor = {Joel Brynielsson and Fredrik Johansson}, title = {Risk Kit: Highlighting Vulnerable Identity Assets for Specific Age Groups}, booktitle = {2016 European Intelligence and Security Informatics Conference, {EISIC} 2016, Uppsala, Sweden, August 17-19, 2016}, pages = {32--38}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/EISIC.2016.014}, doi = {10.1109/EISIC.2016.014}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/ZaeemMB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eisic/2016, editor = {Joel Brynielsson and Fredrik Johansson}, title = {2016 European Intelligence and Security Informatics Conference, {EISIC} 2016, Uppsala, Sweden, August 17-19, 2016}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://ieeexplore.ieee.org/xpl/conhome/7869493/proceeding}, isbn = {978-1-5090-2857-3}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Abuarqoub15, author = {Abdelrahman Abuarqoub}, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {Optimal Mobile Sink Selection Scheme for Multiple Sink Mobile Wireless Sensor Networks}, booktitle = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, pages = {169--172}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EISIC.2015.19}, doi = {10.1109/EISIC.2015.19}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/Abuarqoub15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Al-NooriAL15, author = {Ahmed H. Al{-}Noori and Khamis A. Al{-}Karawi and Francis F. Li}, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {Improving Robustness of Speaker Recognition in Noisy and Reverberant Conditions via Training}, booktitle = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, pages = {180}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EISIC.2015.20}, doi = {10.1109/EISIC.2015.20}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/Al-NooriAL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/AlanaziJ15, author = {Fahad Alanazi and Andrew Jones}, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {The Value of Metadata in Digital Forensics}, booktitle = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, pages = {182}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EISIC.2015.26}, doi = {10.1109/EISIC.2015.26}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/AlanaziJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/AlfayezN15, author = {Fayez Alfayez and Ian Neill}, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {Topology-based Optimization of Linear Wireless Sensor Networks}, booktitle = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, pages = {183}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EISIC.2015.18}, doi = {10.1109/EISIC.2015.18}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/AlfayezN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/AlsumaytHL15, author = {Albandari Alsumayt and John Haggerty and Ahmad Lotfi}, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {Performance, Analysis, and Comparison of MrDR Method to Detect DoS Attacks in {MANET}}, booktitle = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, pages = {121--124}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EISIC.2015.30}, doi = {10.1109/EISIC.2015.30}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/AlsumaytHL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/AshcroftFKOP15, author = {Michael Ashcroft and Ali Fisher and Lisa Kaati and Enghin Omer and Nico Prucha}, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {Detecting Jihadist Messages on Twitter}, booktitle = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, pages = {161--164}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EISIC.2015.27}, doi = {10.1109/EISIC.2015.27}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/AshcroftFKOP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/AshcroftKM15, author = {Michael Ashcroft and Lisa Kaati and Maxime Meyer}, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {A Step Towards Detecting Online Grooming - Identifying Adults Pretending to be Children}, booktitle = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, pages = {98--104}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EISIC.2015.41}, doi = {10.1109/EISIC.2015.41}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/AshcroftKM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/AydinJ15, author = {Mustafa Aydin and Jeremy L. Jacob}, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {Cloud-COVER: Using User Security Attribute Preferences and Propagation Analysis to Prioritise Threats to Systems}, booktitle = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, pages = {53--60}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EISIC.2015.11}, doi = {10.1109/EISIC.2015.11}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/AydinJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/CarvalhoGC15, author = {Rodrigo Carvalho and Michael Goldsmith and Sadie Creese}, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {Applying Semantic Technologies to Fight Online Banking Fraud}, booktitle = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, pages = {61--68}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EISIC.2015.42}, doi = {10.1109/EISIC.2015.42}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/CarvalhoGC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Cayford15, author = {Michelle Cayford}, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {Measures of Success: Developing a Method for Evaluating the Effectiveness of Surveillance Technology}, booktitle = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, pages = {187}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EISIC.2015.33}, doi = {10.1109/EISIC.2015.33}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/Cayford15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/ChanK15, author = {Frodo Kin{-}Sun Chan and Adams Wai{-}Kin Kong}, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {Using Hair Follicles with Leg Geometry to Align Androgenic Hair Patterns}, booktitle = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, pages = {137--140}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EISIC.2015.17}, doi = {10.1109/EISIC.2015.17}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/ChanK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/DhamiC15, author = {Mandeep K. Dhami and Kathryn E. Careless}, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {Ordinal Structure of the Generic Analytic Workflow: {A} Survey of Intelligence Analysts}, booktitle = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, pages = {141--144}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EISIC.2015.37}, doi = {10.1109/EISIC.2015.37}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/DhamiC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/EleyanE15, author = {Amna Eleyan and Derar Eleyan}, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {Forensic Process as a Service (FPaaS) for Cloud Computing}, booktitle = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, pages = {157--160}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EISIC.2015.14}, doi = {10.1109/EISIC.2015.14}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/EleyanE15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/EskridgeCNTP15, author = {Thomas C. Eskridge and Marco M. Carvalho and Fitzroy Nembhard and Hari Thotempudi and Peter J. Polack}, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {Interactive Visualization of Netflow Traffic}, booktitle = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, pages = {188}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EISIC.2015.51}, doi = {10.1109/EISIC.2015.51}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/EskridgeCNTP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/GenzelS15, author = {Carl{-}Heinz Genzel and Richard Sethmann}, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {Custom Transport Interface for the Integration of Trusted Network Connect in German Smart Metering Systems}, booktitle = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, pages = {45--52}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EISIC.2015.25}, doi = {10.1109/EISIC.2015.25}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/GenzelS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/GisslenT15, author = {Linus Gissl{\'{e}}n and Anders T{\"{o}}rne}, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {A Semantic Approach to Information Management and Decision Support: An Application to Humanitarian Demining Operations}, booktitle = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, pages = {75--82}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EISIC.2015.34}, doi = {10.1109/EISIC.2015.34}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/GisslenT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/GuSLL15, author = {Ning Gu and Duoyong Sun and Bo Li and Ze Li}, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {Sentiment Analysis for Topics based on Interaction Chain Model}, booktitle = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, pages = {133--136}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EISIC.2015.23}, doi = {10.1109/EISIC.2015.23}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/GuSLL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/GuanLXSW15, author = {Lei Guan and Zan Li and Song Xiao and Jiangbo Si and Jiajun Wan}, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {A Family of Adaptive Frequency Slot Number {FH} Sequences for High Security and Reliability Communication}, booktitle = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, pages = {30--36}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EISIC.2015.12}, doi = {10.1109/EISIC.2015.12}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/GuanLXSW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/HamadZMT15, author = {Fadi Hamad and Jamal Zraqou and Adi Maaita and Anas Abu Taleb}, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {A Secure Authentication System for ePassport Detection and Verification}, booktitle = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, pages = {173--176}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EISIC.2015.21}, doi = {10.1109/EISIC.2015.21}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/HamadZMT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/HassanMS15, author = {Hatem Hassan and Ahmad Mostafa and Ahmed Shawish}, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {{S-SAC:} Towards a Scalable Secure Access Control Framework for Cloud Storage}, booktitle = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, pages = {165--168}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EISIC.2015.43}, doi = {10.1109/EISIC.2015.43}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/HassanMS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/HegartyH15, author = {Robert Hegarty and John Haggerty}, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {SlackStick: Signature-Based File Identification for Live Digital Forensics Examinations}, booktitle = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, pages = {24--29}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EISIC.2015.28}, doi = {10.1109/EISIC.2015.28}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/HegartyH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/HillemannNA15, author = {Eva{-}Catherine Hillemann and Alexander Nussbaumer and Dietrich Albert}, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {The Role of Cognitive Biases in Criminal Intelligence Analysis and Approaches for their Mitigation}, booktitle = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, pages = {125--128}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EISIC.2015.9}, doi = {10.1109/EISIC.2015.9}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/HillemannNA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/JohanssonGB15, author = {Erik Johansson and Christoffer Gahlin and Anton Borg}, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {Crime Hotspots: An Evaluation of the {KDE} Spatial Mapping Technique}, booktitle = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, pages = {69--74}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EISIC.2015.22}, doi = {10.1109/EISIC.2015.22}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/JohanssonGB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/KashifH15, author = {Mhair Kashif and Zahoor ul Haq}, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {An Optimal Use of Intrusion Detection and Prevention System {(IDPS)}}, booktitle = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, pages = {190}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EISIC.2015.40}, doi = {10.1109/EISIC.2015.40}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/KashifH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Lapayese15, author = {Manuel Jose Gazapo Lapayese}, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {Terrorism and its Transition to Cyberspace}, booktitle = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, pages = {178}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EISIC.2015.46}, doi = {10.1109/EISIC.2015.46}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/Lapayese15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/LiSLLT15, author = {Ze Li and Duoyong Sun and Bo Li and Zi{-}Han Lin and Min Tang}, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {Detecting Changes in Terrorism Networks: {A} Perspective of Multi-Meta-Network Modeling}, booktitle = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, pages = {179}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EISIC.2015.52}, doi = {10.1109/EISIC.2015.52}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/LiSLLT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/LiSLOZ15, author = {Bo Li and Duoyong Sun and Ze Li and Chaomin Ou and Renqi Zhu}, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {Understanding the Dynamic of Covert Organization with Multilayer Networks Model}, booktitle = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, pages = {37--44}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EISIC.2015.10}, doi = {10.1109/EISIC.2015.10}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/LiSLOZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/LinSLL15, author = {Zi{-}Han Lin and Duoyong Sun and Bo Li and Ze Li}, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {Game Analysis on the Counter-Terrorism Cooperation of Shanghai Cooperation Organization}, booktitle = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, pages = {185}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EISIC.2015.24}, doi = {10.1109/EISIC.2015.24}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/LinSLL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/MalatrasFB15, author = {Apostolos Malatras and {\'{E}}ric Freyssinet and Laurent Beslay}, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {Mobile Botnets Taxonomy and Challenges}, booktitle = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, pages = {149--152}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EISIC.2015.13}, doi = {10.1109/EISIC.2015.13}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/MalatrasFB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/MountN15, author = {Sarah Mount and Robert M. Newman}, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {Energy-Efficient Brute Force Password Cracking}, booktitle = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, pages = {189}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EISIC.2015.50}, doi = {10.1109/EISIC.2015.50}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/MountN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Papi15, author = {Francesco Papi}, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {Multi-Sensor d-GLMB Filter for Multi-Target Tracking using Doppler only Measurements}, booktitle = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, pages = {83--89}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EISIC.2015.48}, doi = {10.1109/EISIC.2015.48}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/Papi15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Papi15a, author = {Francesco Papi}, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {Constrained d-GLMB Filter for Multi-Target Track-Before-Detect using Radar Measurements}, booktitle = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, pages = {90--97}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EISIC.2015.49}, doi = {10.1109/EISIC.2015.49}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/Papi15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/ParkB15, author = {Andrew J. Park and Shawn Buckley}, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {Three-Dimensional Agent-Based Model and Simulation of a Burglar's Target Selection}, booktitle = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, pages = {105--112}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EISIC.2015.39}, doi = {10.1109/EISIC.2015.39}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/ParkB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/PassmoreAKGW15, author = {Peter J. Passmore and Simon Attfield and Neesha Kodagoda and Celeste Groenewald and B. L. William Wong}, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {Supporting the Externalisation of Thinking in Criminal Intelligence Analysis}, booktitle = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, pages = {16--23}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EISIC.2015.35}, doi = {10.1109/EISIC.2015.35}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/PassmoreAKGW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/PohlHPW15, author = {Margit Pohl and Johanna Haider and Chris Pallaris and B. L. William Wong}, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {Guidelines for Sensemaking in Intelligence Analysis}, booktitle = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, pages = {177}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EISIC.2015.45}, doi = {10.1109/EISIC.2015.45}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/PohlHPW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/RajamakiKRVP15, author = {Jyri Rajam{\"{a}}ki and Juha S. Knuuttila and Harri Ruoslahti and Jouni Viitanen and Pasi Patama}, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {Transparent Surveillance of Suspects for Building Trust between Citizens and Their Governments}, booktitle = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, pages = {181}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EISIC.2015.31}, doi = {10.1109/EISIC.2015.31}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/RajamakiKRVP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/RajamakiP15, author = {Jyri Rajam{\"{a}}ki and Rauno Pirinen}, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {Critical Infrastructure Protection: Towards a Design Theory for Resilient Software-Intensive Systems}, booktitle = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, pages = {184}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EISIC.2015.32}, doi = {10.1109/EISIC.2015.32}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/RajamakiP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/RodheBHK15, author = {Ioana Rodhe and Johan E. Bengtsson and Amund Hunstad and Henrik Karlz{\'{e}}n}, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {Future Schemes for Stronger Verification of the Access Rights of Border Control Inspection Systems}, booktitle = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, pages = {9--15}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EISIC.2015.16}, doi = {10.1109/EISIC.2015.16}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/RodheBHK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/SarlatiHM15, author = {Yasaman Sarlati and Sattar Hashemi and Niloofar Mozafari}, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {Adopting Community Features to Detect Social Spammers}, booktitle = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, pages = {153--156}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EISIC.2015.44}, doi = {10.1109/EISIC.2015.44}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/SarlatiHM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/SchlehahnAMSLSW15, author = {Eva Schlehahn and Patrick Aichroth and Sebastian Mann and Rudolf Schreiner and Ulrich Lang and Ifan D. H. Shepherd and B. L. William Wong}, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {Benefits and Pitfalls of Predictive Policing}, booktitle = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, pages = {145--148}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EISIC.2015.29}, doi = {10.1109/EISIC.2015.29}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/SchlehahnAMSLSW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/SpittersKKS15, author = {Martijn Spitters and Femke Klaver and Gijs Koot and Mark van Staalduinen}, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {Authorship Analysis on Dark Marketplace Forums}, booktitle = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, pages = {1--8}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EISIC.2015.47}, doi = {10.1109/EISIC.2015.47}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/SpittersKKS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/StembertPBCJ15, author = {Nathalie Stembert and Arne Padmos and Mortaza S. Bargh and Sunil Choenni and Frans Jansen}, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {A Study of Preventing Email (Spear) Phishing by Enabling Human Intelligence}, booktitle = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, pages = {113--120}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EISIC.2015.38}, doi = {10.1109/EISIC.2015.38}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/StembertPBCJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/TangSLOLL15, author = {Min Tang and Duoyong Sun and Bo Li and Chaomin Ou and Zi{-}Han Lin and Ze Li}, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {Research on the Evaluation Method of National Military Development Based on Net Assessment}, booktitle = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, pages = {129--132}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EISIC.2015.15}, doi = {10.1109/EISIC.2015.15}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/TangSLOLL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/VolpettiRMB15, author = {Vito Volpetti and Valentino Ricci and Francesco F. Monai and Francesco Barcio}, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {CBRNe Threat Detection and Monitoring System: Advanced Prototype}, booktitle = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, pages = {186}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EISIC.2015.36}, doi = {10.1109/EISIC.2015.36}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/VolpettiRMB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eisic/2015, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://ieeexplore.ieee.org/xpl/conhome/7366895/proceeding}, isbn = {978-1-4799-8657-6}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/AbbasiLBHC14, author = {Ahmed Abbasi and Weifeng Li and Victor A. Benjamin and Shiyu Hu and Hsinchun Chen}, title = {Descriptive Analytics: Examining Expert Hackers in Web Forums}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {56--63}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.18}, doi = {10.1109/JISIC.2014.18}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/AbbasiLBHC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/AbbottS14, author = {Alya Abbott and Olga Simek}, title = {Recommending Documents for Complex Question Exploration by Analyzing Browsing Behavior}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {321}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.66}, doi = {10.1109/JISIC.2014.66}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/AbbottS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/AdamsL14, author = {Niall M. Adams and Daniel J. Lawson}, title = {An Approximate Framework for Flexible Network Flow Screening}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {256--259}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.49}, doi = {10.1109/JISIC.2014.49}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/AdamsL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/AdrichemLWWFK14, author = {Niels L. M. van Adrichem and Antonio Reyes Lua and Xin Wang and Muhammad Wasif and Ficky Fatturrahman and Fernando A. Kuipers}, title = {{DNSSEC} Misconfigurations: How Incorrectly Configured Security Leads to Unreachability}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {9--16}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.12}, doi = {10.1109/JISIC.2014.12}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/AdrichemLWWFK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/Al-khateebA14, author = {Samer Al{-}khateeb and Nitin Agarwal}, title = {Modeling Flash Mobs in Cybernetic Space: Evaluating Threats of Emerging Socio-Technical Behaviors to Human Security}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {328}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.73}, doi = {10.1109/JISIC.2014.73}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isi/Al-khateebA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/AlguliyevRR14, author = {Rasim M. Alguliyev and Davud Rustamov and Mirza Rzayev}, title = {Computational Approach for Detection of Illegal Activity over the Internet}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {326}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.71}, doi = {10.1109/JISIC.2014.71}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/AlguliyevRR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/Bachmann14, author = {Michael Bachmann}, title = {Passwords are Dead: Alternative Authentication Methods}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {322}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.67}, doi = {10.1109/JISIC.2014.67}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/Bachmann14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/BanaszakBDS14, author = {Steven Banaszak and Elizabeth K. Bowman and John P. Dickerson and V. S. Subrahmanian}, title = {Forecasting Country Stability in North Africa}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {304--307}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.60}, doi = {10.1109/JISIC.2014.60}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/BanaszakBDS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/BenjaminC14, author = {Victor A. Benjamin and Hsinchun Chen}, title = {Time-to-Event Modeling for Predicting Hacker {IRC} Community Participant Trajectory}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {25--32}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.14}, doi = {10.1109/JISIC.2014.14}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/BenjaminC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/BodenhamA14, author = {Dean Adam Bodenham and Niall M. Adams}, title = {Adaptive Change Detection for Relay-Like Behaviour}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {252--255}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.48}, doi = {10.1109/JISIC.2014.48}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/BodenhamA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/BoltonH14, author = {Alexander Bolton and Nicholas A. Heard}, title = {Application of a Linear Time Method for Change Point Detection to the Classification of Software}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {292--295}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.58}, doi = {10.1109/JISIC.2014.58}, timestamp = {Wed, 26 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/BoltonH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/BradyOK14, author = {Owen Brady and Richard E. Overill and Jeroen Keppens}, title = {Addressing the Increasing Volume and Variety of Digital Evidence Using an Ontology}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {176--183}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.34}, doi = {10.1109/JISIC.2014.34}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/BradyOK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/BroekSD14, author = {A. C. van den Broek and R. M. Schoemaker and Rob J. Dekker}, title = {Land Border Permeability and Irregular Migration Using Geospatial Intelligence from Satellite Data}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {208--211}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.38}, doi = {10.1109/JISIC.2014.38}, timestamp = {Fri, 17 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/BroekSD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/CayfordGG14, author = {Michelle Cayford and Coen van Gulijk and Pieter H. A. J. M. van Gelder}, title = {When Counting is Not Enough: Limitations of NSA's Effectiveness Assessment of Surveillance Technology}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {333}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.80}, doi = {10.1109/JISIC.2014.80}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isi/CayfordGG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/ChabotBNK14, author = {Yoan Chabot and Aur{\'{e}}lie Bertaux and Christophe Nicolle and M. Tahar Kechadi}, title = {Automatic Timeline Construction and Analysis for Computer Forensics Purposes}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {276--279}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.54}, doi = {10.1109/JISIC.2014.54}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/ChabotBNK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/ChahuaraMMSTP14, author = {Pedro Chahuara and Luca Mazzola and Michail Makridis and Claudio Schifanella and Aris Tsois and Mauro Pedone}, title = {Inferring itineraries of containerized cargo through the application of Conditional Random Fields}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {137--144}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.29}, doi = {10.1109/JISIC.2014.29}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isi/ChahuaraMMSTP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/CoiselS14, author = {Iwen Coisel and Ignacio Sanchez}, title = {Practical Interception of {DECT} Encrypted Voice Communication in Unified Communications Environments}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {115--122}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.26}, doi = {10.1109/JISIC.2014.26}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/CoiselS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/DaniilidisFVDZLKSTKCGPRDZBGAS14, author = {Ioannis Daniilidis and J.{-}J. Filippi and Wolfgang Vautz and Enrico Dalcanale and Stefano Zampolli and George Leventakis and I. Kauppinen and S. Sinisalo and Vasilis Tsoulkas and V. Kassouras and Mathieu Carras and B. Gerard and R. Pinalli and A. Ragnoni and L. Dujourdy and D. Zavali and Mickael Brun and Vasileios Grizis and Apostolos Argyris and Dimitris Syvridis}, title = {Detection of Olfactory Traces by Orthogonal Gas Identification Technologies - {DOGGIES}}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {332}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.76}, doi = {10.1109/JISIC.2014.76}, timestamp = {Tue, 15 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isi/DaniilidisFVDZLKSTKCGPRDZBGAS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/DantasNF14, author = {Yuri Gil Dantas and Vivek Nigam and Iguatemi E. Fonseca}, title = {A Selective Defense for Application Layer DDoS Attacks}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {75--82}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.21}, doi = {10.1109/JISIC.2014.21}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/DantasNF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/DatcuCLL14, author = {Dragos Datcu and Marina{-}Anca Cidot{\~{a}} and Heide K. Lukosch and Stephan G. Lukosch}, title = {On the Usability of Augmented Reality for Information Exchange in Teams from the Security Domain}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {160--167}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.32}, doi = {10.1109/JISIC.2014.32}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/DatcuCLL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/EdwardsRR14, author = {Matthew John Edwards and Awais Rashid and Paul Rayson}, title = {A Service-Indepenent Model for Linking Online User Profile Information}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {280--283}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.55}, doi = {10.1109/JISIC.2014.55}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/EdwardsRR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/GschwandtnerSD14, author = {Michael Gschwandtner and Svorad Stolc and Franz Daubner}, title = {Optical Security Document Simulator for Black-Box Testing of {ABC} Systems}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {300--303}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.78}, doi = {10.1109/JISIC.2014.78}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/GschwandtnerSD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/GuedesFP14, author = {Ricardo Guedes and Vasco Furtado and Tarcisio H. C. Pequeno}, title = {Multiagent Models for Police Resource Allocation and Dispatch}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {288--291}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.57}, doi = {10.1109/JISIC.2014.57}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/GuedesFP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/GuriKKE14, author = {Mordechai Guri and Gabi Kedma and Assaf Kachlon and Yuval Elovici}, title = {Resilience of Anti-malware Programs to Na{\"{\i}}ve Modifications of Malicious Binaries}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {152--159}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.31}, doi = {10.1109/JISIC.2014.31}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/GuriKKE14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/GuriKZE14, author = {Mordechai Guri and Gabi Kedma and Boris Zadov and Yuval Elovici}, title = {Trusted Detection of Sensitive Activities on Mobile Phones Using Power Consumption Measurements}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {145--151}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.30}, doi = {10.1109/JISIC.2014.30}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/GuriKZE14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/Hammer14, author = {Hugo Lewi Hammer}, title = {Detecting Threats of Violence in Online Discussions Using Bigrams of Important Words}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {319}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.64}, doi = {10.1109/JISIC.2014.64}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/Hammer14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/HeZBMZXTH14, author = {Saike He and Xiaolong Zheng and Xiuguo Bao and Hongyuan Ma and Daniel Dajun Zeng and Bo Xu and Guanhua Tian and Hongwei Hao}, title = {Ranking Online Memes in Emergency Events Based on Transfer Entropy}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {236--239}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.44}, doi = {10.1109/JISIC.2014.44}, timestamp = {Tue, 25 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/HeZBMZXTH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/HeardRL14, author = {Nick Heard and Patrick Rubin{-}Delanchy and Daniel J. Lawson}, title = {Filtering Automated Polling Traffic in Computer Network Flow Data}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {268--271}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.52}, doi = {10.1109/JISIC.2014.52}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isi/HeardRL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/JohanssonKS14, author = {Fredrik Johansson and Lisa Kaati and Amendra Shrestha}, title = {Time Profiles for Identifying Users in Online Environments}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {83--90}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.22}, doi = {10.1109/JISIC.2014.22}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/JohanssonKS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/JurekBM14, author = {Anna Jurek and Yaxin Bi and Maurice D. Mulvenna}, title = {Twitter Sentiment Analysis for Security-Related Information Gathering}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {48--55}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.17}, doi = {10.1109/JISIC.2014.17}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/JurekBM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/KodagodaANZXWWPBMB14, author = {Neesha Kodagoda and Simon Attfield and Phong Hai Nguyen and Leishi Zhang and Kai Xu and B. L. William Wong and Adrian Wagstaff and Graham Phillips and James Bullock and John Marshall and Stewart Bertram}, title = {POLAR-An Interactive Patterns of Life Visualisation Tool for Intelligence Analysis}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {327}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.72}, doi = {10.1109/JISIC.2014.72}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isi/KodagodaANZXWWPBMB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/KongMZW14, author = {Qingchao Kong and Wenji Mao and Daniel Dajun Zeng and Lei Wang}, title = {Predicting Popularity of Forum Threads for Public Events Security}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {99--106}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.24}, doi = {10.1109/JISIC.2014.24}, timestamp = {Wed, 17 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isi/KongMZW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/KootVHKVB14, author = {Gijs Koot and Mirjam A. A. Huis in 't Veld and Joost Hendricksen and Rianne Kaptein and Arnout de Vries and Egon L. van den Broek}, title = {Foraging Online Social Networks}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {312--315}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.62}, doi = {10.1109/JISIC.2014.62}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/KootVHKVB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/LathropO14, author = {Joel Lathrop and James B. O'Kane}, title = {A Case Study in Opportunity Reduction: Mitigating the Dirt Jumper Drive-Smart Attack}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {224--227}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.41}, doi = {10.1109/JISIC.2014.41}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/LathropO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/LawsonRHA14, author = {Daniel J. Lawson and Patrick Rubin{-}Delanchy and Nicholas A. Heard and Niall M. Adams}, title = {Statistical Frameworks for Detecting Tunnelling in Cyber Defence Using Big Data}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {248--251}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.47}, doi = {10.1109/JISIC.2014.47}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isi/LawsonRHA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/LiC14, author = {Weifeng Li and Hsinchun Chen}, title = {Identifying Top Sellers In Underground Economy Using Deep Learning-Based Sentiment Analysis}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {64--67}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.19}, doi = {10.1109/JISIC.2014.19}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/LiC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/LiaoL14, author = {Yi{-}Ching Liao and Hanno Langweg}, title = {Resource-Based Event Reconstruction of Digital Crime Scenes}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {129--136}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.28}, doi = {10.1109/JISIC.2014.28}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/LiaoL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/LuoCZZ14, author = {Chuan Luo and Kainan Cui and Xiaolong Zheng and Daniel Dajun Zeng}, title = {Time Critical Disinformation Influence Minimization in Online Social Networks}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {68--74}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.20}, doi = {10.1109/JISIC.2014.20}, timestamp = {Thu, 21 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isi/LuoCZZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/LuoZZ14, author = {Chuan Luo and Xiaolong Zheng and Daniel Dajun Zeng}, title = {Causal Inference in Social Media Using Convergent Cross Mapping}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {260--263}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.50}, doi = {10.1109/JISIC.2014.50}, timestamp = {Thu, 21 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isi/LuoZZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/MemonW14, author = {Bisharat Rasool Memon and Uffe Kock Wiil}, title = {Predicting Links in Multi-relational Networks}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {107--114}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.25}, doi = {10.1109/JISIC.2014.25}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isi/MemonW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/MetelliH14, author = {Silvia Metelli and Nicholas A. Heard}, title = {Modelling New Edge Formation in a Computer Network through Bayesian Variable Selection}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {272--275}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.53}, doi = {10.1109/JISIC.2014.53}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/MetelliH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/MolchoMMA14, author = {Gila Molcho and Sebastian Maier and Felipe Melero and Carlo Aliprandi}, title = {{CAPER:} Collaborative Information, Acquisition, Processing, Exploitation and Reporting for the Prevention of Organised Crime}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {316}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.63}, doi = {10.1109/JISIC.2014.63}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/MolchoMMA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/MusgroveCC14, author = {Jesse Musgrove and Bojan Cukic and Vittorio Cortellessa}, title = {On the Adequacy of Performance Models in an Adaptive Border Inspection Management System}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {200--207}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.37}, doi = {10.1109/JISIC.2014.37}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/MusgroveCC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/NissimCMSEBE14, author = {Nir Nissim and Aviad Cohen and Robert Moskovitch and Asaf Shabtai and Mattan Edry and Oren Bar{-}Ad and Yuval Elovici}, title = {{ALPD:} Active Learning Framework for Enhancing the Detection of Malicious {PDF} Files}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {91--98}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.23}, doi = {10.1109/JISIC.2014.23}, timestamp = {Fri, 26 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isi/NissimCMSEBE14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/NordvikLL14, author = {Rune Nordvik and Yi{-}Ching Liao and Hanno Langweg}, title = {AccountabilityFS: {A} File System Monitor for Forensic Readiness}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {308--311}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.61}, doi = {10.1109/JISIC.2014.61}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/NordvikLL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/Oey14, author = {Herman{-}Dick Giok Tjiang Oey}, title = {Military Geospatial Profiling Analysis}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {329--330}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.74}, doi = {10.1109/JISIC.2014.74}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/Oey14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/PattonGCFWC14, author = {Mark W. Patton and Eric Gross and Ryan Chinn and Samantha Forbis and Leon Walker and Hsinchun Chen}, title = {Uninvited Connections: {A} Study of Vulnerable Devices on the Internet of Things (IoT)}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {232--235}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.43}, doi = {10.1109/JISIC.2014.43}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/PattonGCFWC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/PicMHW14, author = {Marc Michel Pic and Clarisse Mandridake and Mathieu Hoarau and Kevin Win{-}Lime}, title = {{DOCSCOPE:} {ID} Printing Techniques Signatures}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {334}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.77}, doi = {10.1109/JISIC.2014.77}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/PicMHW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/PiniPVBLS14, author = {Marco Pini and Luca Pilosu and Lene Vesterlund and David Blanco and Fredrik Lindstr{\"{o}}m and Emiliano Spaltro}, title = {Robust Navigation and Communication in the Maritime Domain: The {TRITON} Project}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {331}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.75}, doi = {10.1109/JISIC.2014.75}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/PiniPVBLS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/Pirinen14, author = {Rauno Pirinen}, title = {Studies of Integration Readiness Levels: Case Shared Maritime Situational Awareness System}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {212--215}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.79}, doi = {10.1109/JISIC.2014.79}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/Pirinen14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/PohlWPAW14, author = {Margit Pohl and Lisa{-}Christina Winter and Chris Pallaris and Simon Attfield and B. L. William Wong}, title = {Sensemaking and Cognitive Bias Mitigation in Visual Analytics}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {323}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.68}, doi = {10.1109/JISIC.2014.68}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/PohlWPAW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/PonzoniZCCS14, author = {Andrea Ponzoni and Dario Zappa and Cristina Cerqui and Elisabetta Comini and Giorgio Sberveglieri}, title = {Metal Oxide Gas Sensors Technologies for Hidden People Detection}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {324}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.69}, doi = {10.1109/JISIC.2014.69}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/PonzoniZCCS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/PrueJSP14, author = {Brian Prue and Michael Jenkins and Lauren D. Stern and Jonathan D. Pfautz}, title = {Overcoming Limited Collaboration Channels in Distributed Intelligence Analysis: Visualization Tools and Design Seeds}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {17--24}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.13}, doi = {10.1109/JISIC.2014.13}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/PrueJSP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/Rajamaki14, author = {Jyri Rajam{\"{a}}ki}, title = {Challenges to a Smooth-Running Data Security Audits. Case: {A} Finnish National Security Auditing Criteria {KATAKRI}}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {240--243}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.45}, doi = {10.1109/JISIC.2014.45}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/Rajamaki14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/Rubin-DelanchyLTHA14, author = {Patrick Rubin{-}Delanchy and Daniel J. Lawson and Melissa J. Turcotte and Nicholas A. Heard and Niall M. Adams}, title = {Three Statistical Approaches to Sessionizing Network Flow Data}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {244--247}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.46}, doi = {10.1109/JISIC.2014.46}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isi/Rubin-DelanchyLTHA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/SepetnitskyGE14, author = {Vitali Sepetnitsky and Mordechai Guri and Yuval Elovici}, title = {Exfiltration of Information from Air-Gapped Machines Using Monitor's {LED} Indicator}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {264--267}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.51}, doi = {10.1109/JISIC.2014.51}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isi/SepetnitskyGE14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/ShahirGNW14, author = {Hamed Yaghoubi Shahir and Uwe Gl{\"{a}}sser and Narek Nalbandyan and Hans Wehn}, title = {Maritime Situation Analysis: {A} Multi-vessel Interaction and Anomaly Detection Framework}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {192--199}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.36}, doi = {10.1109/JISIC.2014.36}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/ShahirGNW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/SikosDHF14, author = {Jennifer Sikos and Peter David and Nizar Habash and Reem Faraj}, title = {Authorship Analysis of Inspire Magazine through Stylometric and Psychological Features}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {33--40}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.15}, doi = {10.1109/JISIC.2014.15}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/SikosDHF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/SilvaSAG14, author = {Carlo Marcelo Revoredo da Silva and Jose Lutiano Costa da Silva and Rodrigo Elia Assad and Ruy Jose Guerra Barretto Garcia}, title = {Aegis: {A} Lightweight Tool for Prevent Frauds in Web Browsers}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {1--8}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.11}, doi = {10.1109/JISIC.2014.11}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/SilvaSAG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/SpittersEWB14, author = {Martijn Spitters and Pieter T. Eendebak and Dani{\"{e}}l T. H. Worm and Henri Bouma}, title = {Threat Detection in Tweets with Trigger Patterns and Contextual Cues}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {216--219}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.39}, doi = {10.1109/JISIC.2014.39}, timestamp = {Mon, 21 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isi/SpittersEWB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/SpittersVS14, author = {Martijn Spitters and Stefan Verbruggen and Mark van Staalduinen}, title = {Towards a Comprehensive Insight into the Thematic Organization of the Tor Hidden Services}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {220--223}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.40}, doi = {10.1109/JISIC.2014.40}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/SpittersVS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/Sureka014, author = {Ashish Sureka and Swati Agarwal}, title = {Learning to Classify Hate and Extremism Promoting Tweets}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {320}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.65}, doi = {10.1109/JISIC.2014.65}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/Sureka014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/TyshchukWLJK14, author = {Yulia Tyshchuk and William A. Wallace and Hao Li and Heng Ji and Sue E. Kase}, title = {The Nature of Communications and Emerging Communities on Twitter Following the 2013 Syria Sarin Gas Attacks}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {41--47}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.16}, doi = {10.1109/JISIC.2014.16}, timestamp = {Mon, 06 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/TyshchukWLJK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/WeissenfeldKS14, author = {Axel Weissenfeld and Andreas Kriechbaum{-}Zabini and Lukasz Szklarski}, title = {Security Components in a One-Stop-Shop Border Control System}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {228--231}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.42}, doi = {10.1109/JISIC.2014.42}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/WeissenfeldKS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/WestlingBG14, author = {Anders Westling and Joel Brynielsson and Tove Gustavi}, title = {Mining the Web for Sympathy: The Pussy Riot Case}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {123--128}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.27}, doi = {10.1109/JISIC.2014.27}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/WestlingBG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/Wong14, author = {B. L. William Wong}, title = {How Analysts Think (?): Early Observations}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {296--299}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.59}, doi = {10.1109/JISIC.2014.59}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/Wong14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/YangMB14, author = {Yongpeng Yang and Monisha Manoharan and K. Suzanne Barber}, title = {Modelling and Analysis of Identity Threat Behaviors through Text Mining of Identity Theft Stories}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {184--191}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.35}, doi = {10.1109/JISIC.2014.35}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/YangMB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/YanoBGA14, author = {Edgar Toshiro Yano and Parth Bhatt and Per M. Gustavsson and Rose{-}Mharie {\AA}hlfeldt}, title = {Towards a Methodology for Cybersecurity Risk Management Using Agents Paradigm}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {325}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.70}, doi = {10.1109/JISIC.2014.70}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/YanoBGA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/YlikauppilaTKJ14, author = {Mari Ylikauppila and Sirra Toivonen and Minna Kulju and Minna Jokela}, title = {Understanding the Factors Affecting {UX} and Technology Acceptance in the Context of Automated Border Controls}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {168--175}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.33}, doi = {10.1109/JISIC.2014.33}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/YlikauppilaTKJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/ZhangMZZB14, author = {Yuhao Zhang and Wenji Mao and Daniel Dajun Zeng and Ning Zhao and Xiuguo Bao}, title = {Exploring Opinion Dynamics in Security-Related Microblog Data}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {284--287}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.56}, doi = {10.1109/JISIC.2014.56}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/ZhangMZZB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/isi/2014, title = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, publisher = {{IEEE}}, year = {2014}, url = {https://ieeexplore.ieee.org/xpl/conhome/6968676/proceeding}, isbn = {978-1-4799-6363-8}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/AdamsS13, author = {Bart Adams and Frank Suykens}, title = {Astute: Increased Situational Awareness through Proactive Decision Support and Adaptive Map-Centric User Interfaces}, booktitle = {2013 European Intelligence and Security Informatics Conference, Uppsala, Sweden, August 12-14, 2013}, pages = {289--293}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/EISIC.2013.74}, doi = {10.1109/EISIC.2013.74}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/eisic/AdamsS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/AlbertettiCGRS13, author = {Fabrizio Albertetti and Paul Cotofrei and Lionel Grossrieder and Olivier Ribaux and Kilian Stoffel}, title = {The CriLiM Methodology: Crime Linkage with a Fuzzy {MCDM} Approach}, booktitle = {2013 European Intelligence and Security Informatics Conference, Uppsala, Sweden, August 12-14, 2013}, pages = {67--74}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/EISIC.2013.17}, doi = {10.1109/EISIC.2013.17}, timestamp = {Fri, 02 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/AlbertettiCGRS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/AmardeilhKSVY13, author = {Florence Amardeilh and Wessel Kraaij and Martijn Spitters and Corn{\'{e}} Versloot and Sinan Yurtsever}, title = {Semi-automatic Ontology Maintenance in the Virtuoso News Monitoring System}, booktitle = {2013 European Intelligence and Security Informatics Conference, Uppsala, Sweden, August 12-14, 2013}, pages = {135--138}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/EISIC.2013.29}, doi = {10.1109/EISIC.2013.29}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/AmardeilhKSVY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/AmorimAGA13, author = {Joni A. Amorim and Rose{-}Mharie {\AA}hlfeldt and Per M. Gustavsson and Sten F. Andler}, title = {Privacy and Security in Cyberspace: Training Perspectives on the Personal Data Ecosystem}, booktitle = {2013 European Intelligence and Security Informatics Conference, Uppsala, Sweden, August 12-14, 2013}, pages = {139--142}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/EISIC.2013.30}, doi = {10.1109/EISIC.2013.30}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/AmorimAGA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/AnderssonT13, author = {Dennis Andersson and Mirko Thorstensson}, title = {Reconstruction and Exploration: Applications in Criminology}, booktitle = {2013 European Intelligence and Security Informatics Conference, Uppsala, Sweden, August 12-14, 2013}, pages = {190--193}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/EISIC.2013.42}, doi = {10.1109/EISIC.2013.42}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/AnderssonT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/BackfriedGQRKTSP13, author = {Gerhard Backfried and Johannes G{\"{o}}llner and Gerald Quirchmayr and Karin Rainer and Gert Kienast and Georg Thallinger and Christian Schmidt and Andreas Peer}, title = {Integration of Media Sources for Situation Analysis in the Different Phases of Disaster Management: The QuOIMA Project}, booktitle = {2013 European Intelligence and Security Informatics Conference, Uppsala, Sweden, August 12-14, 2013}, pages = {143--146}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/EISIC.2013.31}, doi = {10.1109/EISIC.2013.31}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/BackfriedGQRKTSP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/BakelmanMCT13, author = {Ned Bakelman and John V. Monaco and Sung{-}Hyuk Cha and Charles C. Tappert}, title = {Keystroke Biometric Studies on Password and Numeric Keypad Input}, booktitle = {2013 European Intelligence and Security Informatics Conference, Uppsala, Sweden, August 12-14, 2013}, pages = {204--207}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/EISIC.2013.45}, doi = {10.1109/EISIC.2013.45}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/BakelmanMCT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/BallC13, author = {Leslie Ball and Matthew J. Craven}, title = {Automated Counter-Terrorism}, booktitle = {2013 European Intelligence and Security Informatics Conference, Uppsala, Sweden, August 12-14, 2013}, pages = {216}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/EISIC.2013.48}, doi = {10.1109/EISIC.2013.48}, timestamp = {Fri, 11 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/BallC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/BernhardssonF13, author = {Sebastian Bernhardsson and Rickard Forsen}, title = {Assessment of Damage and Protective Capacity of Buildings Exposed to Weapon Effects}, booktitle = {2013 European Intelligence and Security Informatics Conference, Uppsala, Sweden, August 12-14, 2013}, pages = {222}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/EISIC.2013.54}, doi = {10.1109/EISIC.2013.54}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/BernhardssonF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/BerzinjiAK13, author = {Ala Berzinji and Frzand Sherko Abdullah and Ali Hayder Kakei}, title = {Analysis of Terrorist Groups on Facebook}, booktitle = {2013 European Intelligence and Security Informatics Conference, Uppsala, Sweden, August 12-14, 2013}, pages = {221}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/EISIC.2013.53}, doi = {10.1109/EISIC.2013.53}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/BerzinjiAK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/BilstrupR13, author = {Urban Bilstrup and Magdalena Rosenberg}, title = {A Pilot Study of Using Honeypots as Cyber Intelligence Sources}, booktitle = {2013 European Intelligence and Security Informatics Conference, Uppsala, Sweden, August 12-14, 2013}, pages = {224}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/EISIC.2013.56}, doi = {10.1109/EISIC.2013.56}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/BilstrupR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/BroekS13, author = {Egon L. van den Broek and Martijn Spitters}, title = {Physiological Signals: The Next Generation Authentication and Identification Methods!?}, booktitle = {2013 European Intelligence and Security Informatics Conference, Uppsala, Sweden, August 12-14, 2013}, pages = {159--162}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/EISIC.2013.35}, doi = {10.1109/EISIC.2013.35}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/BroekS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/ButtMNKRL13, author = {Moazzam Butt and Sandra Marti and Alexander Nouak and J{\"{o}}rg K{\"{o}}plin and Ramachandra Raghavendra and Guoqiang Li}, title = {Towards e-Passport Duplicate Enrollment Check in the European Union}, booktitle = {2013 European Intelligence and Security Informatics Conference, Uppsala, Sweden, August 12-14, 2013}, pages = {247--251}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/EISIC.2013.64}, doi = {10.1109/EISIC.2013.64}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/ButtMNKRL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/CantareroHM13, author = {Daniel Cuesta Cantarero and David Antonio Perez Herrero and Fernando Martin Mendez}, title = {A Multi-modal Biometric Fusion Implementation for {ABC} Systems}, booktitle = {2013 European Intelligence and Security Informatics Conference, Uppsala, Sweden, August 12-14, 2013}, pages = {277--280}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/EISIC.2013.71}, doi = {10.1109/EISIC.2013.71}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/CantareroHM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/ColbaughG13, author = {Richard Colbaugh and Kristin Glass}, title = {Analyzing Social Media Content for Security Informatics}, booktitle = {2013 European Intelligence and Security Informatics Conference, Uppsala, Sweden, August 12-14, 2013}, pages = {45--51}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/EISIC.2013.14}, doi = {10.1109/EISIC.2013.14}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/ColbaughG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/DibbH13, author = {Patrick Dibb and Mohammad Hammoudeh}, title = {Forensic Data Recovery from Android {OS} Devices: An Open Source Toolkit}, booktitle = {2013 European Intelligence and Security Informatics Conference, Uppsala, Sweden, August 12-14, 2013}, pages = {226}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/EISIC.2013.58}, doi = {10.1109/EISIC.2013.58}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/DibbH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/DimitrovaTC13, author = {Tatyana Velikova Dimitrova and Aris Tsois and Elena Camossi}, title = {Visualization of Container Movements through a Web-Based Geographical Information System}, booktitle = {2013 European Intelligence and Security Informatics Conference, Uppsala, Sweden, August 12-14, 2013}, pages = {182--185}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/EISIC.2013.40}, doi = {10.1109/EISIC.2013.40}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/DimitrovaTC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Dragos13, author = {Valentina Dragos}, title = {Browse and Search in Maritime Document Collections}, booktitle = {2013 European Intelligence and Security Informatics Conference, Uppsala, Sweden, August 12-14, 2013}, pages = {225}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/EISIC.2013.57}, doi = {10.1109/EISIC.2013.57}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/Dragos13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/DuckworthOWS13, author = {Gregory Duckworth and Archibald Owen and Jerry Worsley and Henry Stephenson}, title = {OptaSense{\textregistered} Distributed Acoustic and Seismic Sensing Performance for Multi-threat, Multi-environment Border Monitoring}, booktitle = {2013 European Intelligence and Security Informatics Conference, Uppsala, Sweden, August 12-14, 2013}, pages = {273--276}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/EISIC.2013.70}, doi = {10.1109/EISIC.2013.70}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/DuckworthOWS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/DudorovSN13, author = {Dmitry Dudorov and David Stupples and Martin Newby}, title = {Probability Analysis of Cyber Attack Paths against Business and Commercial Enterprise Systems}, booktitle = {2013 European Intelligence and Security Informatics Conference, Uppsala, Sweden, August 12-14, 2013}, pages = {38--44}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/EISIC.2013.13}, doi = {10.1109/EISIC.2013.13}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/DudorovSN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/FenselRGHM13, author = {Anna Fensel and Michael Rogger and Tove Gustavi and Andreas Horndahl and Christian M{\aa}rtenson}, title = {Semantic Data Management: Sensor-Based Port Security Use Case}, booktitle = {2013 European Intelligence and Security Informatics Conference, Uppsala, Sweden, August 12-14, 2013}, pages = {155--158}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/EISIC.2013.34}, doi = {10.1109/EISIC.2013.34}, timestamp = {Sat, 16 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/FenselRGHM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/FornaciariCP13, author = {Tommaso Fornaciari and Fabio Celli and Massimo Poesio}, title = {The Effect of Personality Type on Deceptive Communication Style}, booktitle = {2013 European Intelligence and Security Informatics Conference, Uppsala, Sweden, August 12-14, 2013}, pages = {1--6}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/EISIC.2013.8}, doi = {10.1109/EISIC.2013.8}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/FornaciariCP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/GariupS13, author = {Monica Gariup and Gustav Soederlind}, title = {Document Fraud Detection at the Border: Preliminary Observations on Human and Machine Performance}, booktitle = {2013 European Intelligence and Security Informatics Conference, Uppsala, Sweden, August 12-14, 2013}, pages = {231--238}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/EISIC.2013.62}, doi = {10.1109/EISIC.2013.62}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/GariupS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/GhaniDIS13, author = {Kamaruddin Abdul Ghani and Kaharudin Dimyati and Khadijah Ismail and Latifah Sarah Supian}, title = {Radiated Emission from Handheld Devices with Touch-Screen LCDs}, booktitle = {2013 European Intelligence and Security Informatics Conference, Uppsala, Sweden, August 12-14, 2013}, pages = {219}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/EISIC.2013.51}, doi = {10.1109/EISIC.2013.51}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/GhaniDIS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/GoslinH13, author = {Kyle Goslin and Markus Hofmann}, title = {Cross Domain Assessment of Document to {HTML} Conversion Tools to Quantify Text and Structural Loss during Document Analysis}, booktitle = {2013 European Intelligence and Security Informatics Conference, Uppsala, Sweden, August 12-14, 2013}, pages = {100--105}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/EISIC.2013.22}, doi = {10.1109/EISIC.2013.22}, timestamp = {Thu, 08 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/GoslinH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/GustaviKM13, author = {Tove Gustavi and Maja Karasalo and Christian M{\aa}rtenson}, title = {A Tool for Generating, Structuring, and Analyzing Multiple Hypotheses in Intelligence Work}, booktitle = {2013 European Intelligence and Security Informatics Conference, Uppsala, Sweden, August 12-14, 2013}, pages = {23--30}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/EISIC.2013.11}, doi = {10.1109/EISIC.2013.11}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/GustaviKM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/HengstW13, author = {Mari{\"{e}}lle den Hengst and Martijn Warnier}, title = {Cyber Crime in Privately Held Information Systems: Personal Data at Stake}, booktitle = {2013 European Intelligence and Security Informatics Conference, Uppsala, Sweden, August 12-14, 2013}, pages = {117--120}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/EISIC.2013.25}, doi = {10.1109/EISIC.2013.25}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/HengstW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/HenselerHK13, author = {Hans Henseler and Jop Hofste and Maurice van Keulen}, title = {Digital-Forensics Based Pattern Recognition for Discovering Identities in Electronic Evidence}, booktitle = {2013 European Intelligence and Security Informatics Conference, Uppsala, Sweden, August 12-14, 2013}, pages = {112--116}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/EISIC.2013.24}, doi = {10.1109/EISIC.2013.24}, timestamp = {Fri, 02 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/HenselerHK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/HolstB13, author = {Anders Holst and Bj{\"{o}}rn Bjurling}, title = {A Bayesian Parametric Statistical Anomaly Detection Method for Finding Trends and Patterns in Criminal Behavior}, booktitle = {2013 European Intelligence and Security Informatics Conference, Uppsala, Sweden, August 12-14, 2013}, pages = {83--88}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/EISIC.2013.19}, doi = {10.1109/EISIC.2013.19}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/HolstB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/HoltH13, author = {Louis Antani Holt and Mohammad Hammoudeh}, title = {Cloud Forensics: {A} Technical Approach to Virtual Machine Acquisition}, booktitle = {2013 European Intelligence and Security Informatics Conference, Uppsala, Sweden, August 12-14, 2013}, pages = {227}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/EISIC.2013.59}, doi = {10.1109/EISIC.2013.59}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/HoltH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Hurrey13, author = {Chris Hurrey}, title = {The 'Swiss Army Knife' Approach to Border Control: Multitasking in a Multi-threat World}, booktitle = {2013 European Intelligence and Security Informatics Conference, Uppsala, Sweden, August 12-14, 2013}, pages = {285--288}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/EISIC.2013.73}, doi = {10.1109/EISIC.2013.73}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/Hurrey13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/JenkinsMPVGN13, author = {Jeffrey L. Jenkins and Jim Marquardson and Jeffrey Gainer Proudfoot and Joseph S. Valacich and Elyse Golob and Jay F. Nunamaker Jr.}, title = {The Checkpoint Simulation: {A} Tool for Informing Border Patrol Checkpoint Design and Resource Allocation}, booktitle = {2013 European Intelligence and Security Informatics Conference, Uppsala, Sweden, August 12-14, 2013}, pages = {252--255}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/EISIC.2013.65}, doi = {10.1109/EISIC.2013.65}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/JenkinsMPVGN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/KallbergTL13, author = {Jan Kallberg and Bhavani Thuraisingham and Erik Lakomaa}, title = {Societal Cyberwar Theory Applied: The Disruptive Power of State Actor Aggression for Public Sector Information Security}, booktitle = {2013 European Intelligence and Security Informatics Conference, Uppsala, Sweden, August 12-14, 2013}, pages = {212--215}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/EISIC.2013.47}, doi = {10.1109/EISIC.2013.47}, timestamp = {Wed, 29 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/KallbergTL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/KavathatzopoulosAL13, author = {Iordanis Kavathatzopoulos and Ryoko Asai and Mikael Laaksoharju}, title = {Tools and Methods for Security: Stimulating the Skill to Philosophize}, booktitle = {2013 European Intelligence and Security Informatics Conference, Uppsala, Sweden, August 12-14, 2013}, pages = {163--165}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/EISIC.2013.36}, doi = {10.1109/EISIC.2013.36}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/KavathatzopoulosAL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/KuperusVK13, author = {Jasper Kuperus and Cor J. Veenman and Maurice van Keulen}, title = {Increasing {NER} Recall with Minimal Precision Loss}, booktitle = {2013 European Intelligence and Security Informatics Conference, Uppsala, Sweden, August 12-14, 2013}, pages = {106--111}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/EISIC.2013.23}, doi = {10.1109/EISIC.2013.23}, timestamp = {Fri, 02 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/KuperusVK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/LiJ13, author = {Xingan Li and Martti Juhola}, title = {Crime and Its Social Context: Analysis Using the Self-Organizing Map}, booktitle = {2013 European Intelligence and Security Informatics Conference, Uppsala, Sweden, August 12-14, 2013}, pages = {121--124}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/EISIC.2013.26}, doi = {10.1109/EISIC.2013.26}, timestamp = {Fri, 02 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/LiJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/LiSFL13, author = {Bo Li and Duo{-}Yong Sun and Julei Fu and Zi{-}Han Lin}, title = {Organization Network Construction and Understanding Based on Photo Face Recognition}, booktitle = {2013 European Intelligence and Security Informatics Conference, Uppsala, Sweden, August 12-14, 2013}, pages = {220}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/EISIC.2013.52}, doi = {10.1109/EISIC.2013.52}, timestamp = {Mon, 06 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/LiSFL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Llinas13, author = {James Llinas}, title = {Challenges in Information Fusion Technology Capabilities for Modern Intelligence and Security Problems}, booktitle = {2013 European Intelligence and Security Informatics Conference, Uppsala, Sweden, August 12-14, 2013}, pages = {89--95}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/EISIC.2013.20}, doi = {10.1109/EISIC.2013.20}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/Llinas13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Lozano13, author = {Marianela Garc{\'{\i}}a Lozano}, title = {Trusting Open Source Information}, booktitle = {2013 European Intelligence and Security Informatics Conference, Uppsala, Sweden, August 12-14, 2013}, pages = {228}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/EISIC.2013.77}, doi = {10.1109/EISIC.2013.77}, timestamp = {Wed, 23 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/Lozano13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/MazzolaTDC13, author = {Luca Mazzola and Aris Tsois and Tatyana Dimitrova and Elena Camossi}, title = {Contextualisation of Geographical Scraped Data to Support Human Judgment and Classification}, booktitle = {2013 European Intelligence and Security Informatics Conference, Uppsala, Sweden, August 12-14, 2013}, pages = {151--154}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/EISIC.2013.33}, doi = {10.1109/EISIC.2013.33}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/MazzolaTDC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/MemonW13, author = {Bisharat Rasool Memon and Uffe Kock Wiil}, title = {Visual Analysis of Heterogeneous Networks}, booktitle = {2013 European Intelligence and Security Informatics Conference, Uppsala, Sweden, August 12-14, 2013}, pages = {129--134}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/EISIC.2013.28}, doi = {10.1109/EISIC.2013.28}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/MemonW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/MonacoBCT13, author = {John V. Monaco and Ned Bakelman and Sung{-}Hyuk Cha and Charles C. Tappert}, title = {Recent Advances in the Development of a Long-Text-Input Keystroke Biometric Authentication System for Arbitrary Text Input}, booktitle = {2013 European Intelligence and Security Informatics Conference, Uppsala, Sweden, August 12-14, 2013}, pages = {60--66}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/EISIC.2013.16}, doi = {10.1109/EISIC.2013.16}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/MonacoBCT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/MontoyaJH13, author = {Lorena Montoya and Marianne Junger and Pieter H. Hartel}, title = {How "Digital" is Traditional Crime?}, booktitle = {2013 European Intelligence and Security Informatics Conference, Uppsala, Sweden, August 12-14, 2013}, pages = {31--37}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/EISIC.2013.12}, doi = {10.1109/EISIC.2013.12}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/MontoyaJH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/PaisC13, author = {Vasile Florian Pais and Dan S. Ciobanu}, title = {Fast Name Searching on {GPU}}, booktitle = {2013 European Intelligence and Security Informatics Conference, Uppsala, Sweden, August 12-14, 2013}, pages = {217}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/EISIC.2013.49}, doi = {10.1109/EISIC.2013.49}, timestamp = {Tue, 07 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/PaisC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/ParkT13, author = {Andrew J. Park and Herbert H. Tsang}, title = {Detecting Key Players in Criminal Networks Using Dynalink}, booktitle = {2013 European Intelligence and Security Informatics Conference, Uppsala, Sweden, August 12-14, 2013}, pages = {208--211}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/EISIC.2013.46}, doi = {10.1109/EISIC.2013.46}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/ParkT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/PiskorskiTB13, author = {Jakub Piskorski and Hristo Tanev and Alexandra Balahur}, title = {Exploiting Twitter for Border Security-Related Intelligence Gathering}, booktitle = {2013 European Intelligence and Security Informatics Conference, Uppsala, Sweden, August 12-14, 2013}, pages = {239--246}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/EISIC.2013.63}, doi = {10.1109/EISIC.2013.63}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/PiskorskiTB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Proudfoot13, author = {Jeffrey Gainer Proudfoot}, title = {Evaluating the Feasibility of Using Noncontact Sensors to Conduct a Targetless Concealed Information Test}, booktitle = {2013 European Intelligence and Security Informatics Conference, Uppsala, Sweden, August 12-14, 2013}, pages = {269--272}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/EISIC.2013.69}, doi = {10.1109/EISIC.2013.69}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/Proudfoot13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Rajamaki13, author = {Jyri Rajam{\"{a}}ki}, title = {Mobile Digital Services for Border Protection: Standardization of Emergency Response Vehicles}, booktitle = {2013 European Intelligence and Security Informatics Conference, Uppsala, Sweden, August 12-14, 2013}, pages = {256--261}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/EISIC.2013.66}, doi = {10.1109/EISIC.2013.66}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/Rajamaki13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/RajamakiK13, author = {Jyri Rajam{\"{a}}ki and Juha S. Knuuttila}, title = {Law Enforcement Authorities' Legal Digital Evidence Gathering: Legal, Integrity and Chain-of-Custody Requirement}, booktitle = {2013 European Intelligence and Security Informatics Conference, Uppsala, Sweden, August 12-14, 2013}, pages = {198--203}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/EISIC.2013.44}, doi = {10.1109/EISIC.2013.44}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/RajamakiK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/RajamakiR13, author = {Jyri Rajam{\"{a}}ki and Paresh Rathod}, title = {Service Standardization with Utility Computing and Service Oriented Architecture as a Tool for Public Protection and Disaster Relief}, booktitle = {2013 European Intelligence and Security Informatics Conference, Uppsala, Sweden, August 12-14, 2013}, pages = {223}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/EISIC.2013.55}, doi = {10.1109/EISIC.2013.55}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/RajamakiR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/RajamakiRH13, author = {Jyri Rajam{\"{a}}ki and Paresh Rathod and John Holmstr{\"{o}}m}, title = {Decentralized Fully Redundant Cyber Secure Governmental Communications Concept}, booktitle = {2013 European Intelligence and Security Informatics Conference, Uppsala, Sweden, August 12-14, 2013}, pages = {176--181}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/EISIC.2013.39}, doi = {10.1109/EISIC.2013.39}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/RajamakiRH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/RajamakiRK13, author = {Jyri Rajam{\"{a}}ki and Paresh Rathod and Pasi Kamppi}, title = {A New Redundant Tracking System for Emergency Response}, booktitle = {2013 European Intelligence and Security Informatics Conference, Uppsala, Sweden, August 12-14, 2013}, pages = {218}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/EISIC.2013.50}, doi = {10.1109/EISIC.2013.50}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/RajamakiRK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Rajbhandari13, author = {Lisa Rajbhandari}, title = {Consideration of Opportunity and Human Factor: Required Paradigm Shift for Information Security Risk Management}, booktitle = {2013 European Intelligence and Security Informatics Conference, Uppsala, Sweden, August 12-14, 2013}, pages = {147--150}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/EISIC.2013.32}, doi = {10.1109/EISIC.2013.32}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/Rajbhandari13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/RenDGKHR13, author = {Zhaochun Ren and David van Dijk and David Graus and Nina van der Knaap and Hans Henseler and Maarten de Rijke}, title = {Semantic Linking and Contextualization for Social Forensic Text Analysis}, booktitle = {2013 European Intelligence and Security Informatics Conference, Uppsala, Sweden, August 12-14, 2013}, pages = {96--99}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/EISIC.2013.21}, doi = {10.1109/EISIC.2013.21}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/RenDGKHR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Resendez13, author = {Carlos Francisco Lerma Resendez}, title = {The Intelligence Cycle as a Tool for Effective Information Security Infrastructure Design}, booktitle = {2013 European Intelligence and Security Informatics Conference, Uppsala, Sweden, August 12-14, 2013}, pages = {194--197}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/EISIC.2013.43}, doi = {10.1109/EISIC.2013.43}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/Resendez13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/SaravananTN13, author = {M. Saravanan and Rakhi Thayyil and Shwetha Narayanan}, title = {Enabling Real Time Crime Intelligence Using Mobile {GIS} and Prediction Methods}, booktitle = {2013 European Intelligence and Security Informatics Conference, Uppsala, Sweden, August 12-14, 2013}, pages = {125--128}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/EISIC.2013.27}, doi = {10.1109/EISIC.2013.27}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/SaravananTN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/SeiO13, author = {Yuichi Sei and Akihiko Ohsuga}, title = {False Event Detection for Mobile Sinks in Wireless Sensor Networks}, booktitle = {2013 European Intelligence and Security Informatics Conference, Uppsala, Sweden, August 12-14, 2013}, pages = {52--59}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/EISIC.2013.15}, doi = {10.1109/EISIC.2013.15}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/SeiO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Shrestha13, author = {Amendra Shrestha}, title = {A Tool for Visualizing and Analyzing Users on Discussion Boards}, booktitle = {2013 European Intelligence and Security Informatics Conference, Uppsala, Sweden, August 12-14, 2013}, pages = {229}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/EISIC.2013.60}, doi = {10.1109/EISIC.2013.60}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/Shrestha13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/SigholmB13, author = {Johan Sigholm and Martin Bang}, title = {Towards Offensive Cyber Counterintelligence: Adopting a Target-Centric View on Advanced Persistent Threats}, booktitle = {2013 European Intelligence and Security Informatics Conference, Uppsala, Sweden, August 12-14, 2013}, pages = {166--171}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/EISIC.2013.37}, doi = {10.1109/EISIC.2013.37}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/SigholmB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/SlivaMPL13, author = {Amy Sliva and Mikhail Malyutov and Glenn Pierce and Xin Li}, title = {Threats to Peace: Threat Perception and the Persistence or Desistance of Violent Conflict}, booktitle = {2013 European Intelligence and Security Informatics Conference, Uppsala, Sweden, August 12-14, 2013}, pages = {186--189}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/EISIC.2013.41}, doi = {10.1109/EISIC.2013.41}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/SlivaMPL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/SongSBF13, author = {Justin Song and Valerie Spicer and Patricia L. Brantingham and Richard Frank}, title = {Crime Ridges: Exploring the Relationship between Crime Attractors and Offender Movement}, booktitle = {2013 European Intelligence and Security Informatics Conference, Uppsala, Sweden, August 12-14, 2013}, pages = {75--82}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/EISIC.2013.18}, doi = {10.1109/EISIC.2013.18}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/SongSBF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/SykoraJOE13, author = {Martin D. Sykora and Thomas W. Jackson and Ann O'Brien and Suzanne Elayan}, title = {National Security and Social Media Monitoring: {A} Presentation of the {EMOTIVE} and Related Systems}, booktitle = {2013 European Intelligence and Security Informatics Conference, Uppsala, Sweden, August 12-14, 2013}, pages = {172--175}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/EISIC.2013.38}, doi = {10.1109/EISIC.2013.38}, timestamp = {Mon, 19 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/SykoraJOE13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/TowerJDE13, author = {Debra L. Tower and Matthew L. Jensen and Norah E. Dunbar and Aaron C. Elkins}, title = {Don't Lie to Me: The Impact of Deception on Vocalic and Linguistic Synchrony}, booktitle = {2013 European Intelligence and Security Informatics Conference, Uppsala, Sweden, August 12-14, 2013}, pages = {262--265}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/EISIC.2013.67}, doi = {10.1109/EISIC.2013.67}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/TowerJDE13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/TrochuT13, author = {Sandrine Trochu and Olivier Touret}, title = {Managing the Border, Smartly}, booktitle = {2013 European Intelligence and Security Informatics Conference, Uppsala, Sweden, August 12-14, 2013}, pages = {281--284}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/EISIC.2013.72}, doi = {10.1109/EISIC.2013.72}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/TrochuT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/TschuggnallS13, author = {Michael Tschuggnall and G{\"{u}}nther Specht}, title = {Countering Plagiarism by Exposing Irregularities in Authors' Grammar}, booktitle = {2013 European Intelligence and Security Informatics Conference, Uppsala, Sweden, August 12-14, 2013}, pages = {15--22}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/EISIC.2013.10}, doi = {10.1109/EISIC.2013.10}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/TschuggnallS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/ValacichWNG13, author = {Joe S. Valacich and David W. Wilson and Jay F. Nunamaker Jr. and Elyse Golob}, title = {Modeling Border Traffic Flow Using Cell Phone Header Packets}, booktitle = {2013 European Intelligence and Security Informatics Conference, Uppsala, Sweden, August 12-14, 2013}, pages = {266--268}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/EISIC.2013.68}, doi = {10.1109/EISIC.2013.68}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/ValacichWNG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Wiil13, author = {Uffe Kock Wiil}, title = {Issues for the Next Generation of Criminal Network Investigation Tools}, booktitle = {2013 European Intelligence and Security Informatics Conference, Uppsala, Sweden, August 12-14, 2013}, pages = {7--14}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/EISIC.2013.9}, doi = {10.1109/EISIC.2013.9}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/Wiil13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Zechner13, author = {Niklas Zechner}, title = {The Past, Present and Future of Text Classification}, booktitle = {2013 European Intelligence and Security Informatics Conference, Uppsala, Sweden, August 12-14, 2013}, pages = {230}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/EISIC.2013.61}, doi = {10.1109/EISIC.2013.61}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/Zechner13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eisic/2013, title = {2013 European Intelligence and Security Informatics Conference, Uppsala, Sweden, August 12-14, 2013}, publisher = {{IEEE}}, year = {2013}, url = {https://ieeexplore.ieee.org/xpl/conhome/6656130/proceeding}, isbn = {978-0-7695-5062-6}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/AkivaK12, author = {Navot Akiva and Moshe Koppel}, editor = {Nasrullah Memon and Daniel Zeng}, title = {Identifying Distinct Components of a Multi-author Document}, booktitle = {2012 European Intelligence and Security Informatics Conference, {EISIC} 2012, Odense, Denmark, August 22-24, 2012}, pages = {205--209}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/EISIC.2012.16}, doi = {10.1109/EISIC.2012.16}, timestamp = {Tue, 16 May 2023 16:54:39 +0200}, biburl = {https://dblp.org/rec/conf/eisic/AkivaK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/AmeyugoAEP12, author = {Gregorio Ameyugo and Michal Art and Ana Sofia Esteves and Jakub Piskorski}, editor = {Nasrullah Memon and Daniel Zeng}, title = {Creation of an EU-Level Information Exchange Network in the Domain of Border Security}, booktitle = {2012 European Intelligence and Security Informatics Conference, {EISIC} 2012, Odense, Denmark, August 22-24, 2012}, pages = {356--358}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/EISIC.2012.55}, doi = {10.1109/EISIC.2012.55}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/AmeyugoAEP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/AntoniouS12, author = {Alex Antoniou and Gauri Sinha}, editor = {Nasrullah Memon and Daniel Zeng}, title = {Laundering Sexual Deviance: Targeting Online Pornography through Anti-money Laundering}, booktitle = {2012 European Intelligence and Security Informatics Conference, {EISIC} 2012, Odense, Denmark, August 22-24, 2012}, pages = {91--98}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/EISIC.2012.29}, doi = {10.1109/EISIC.2012.29}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/AntoniouS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/AsadiMSS12, author = {Hirad Asadi and Christian M{\aa}rtenson and Pontus Svenson and Magnus Sk{\"{o}}ld}, editor = {Nasrullah Memon and Daniel Zeng}, title = {The HiTS/ISAC Social Network Analysis Tool}, booktitle = {2012 European Intelligence and Security Informatics Conference, {EISIC} 2012, Odense, Denmark, August 22-24, 2012}, pages = {291--296}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/EISIC.2012.37}, doi = {10.1109/EISIC.2012.37}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/AsadiMSS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/BackfriedSPQGR12, author = {Gerhard Backfried and Christian Schmidt and Mark Pfeiffer and Gerald Quirchmayr and Markus Glanzer and Karin Rainer}, editor = {Nasrullah Memon and Daniel Zeng}, title = {Open Source Intelligence in Disaster Management}, booktitle = {2012 European Intelligence and Security Informatics Conference, {EISIC} 2012, Odense, Denmark, August 22-24, 2012}, pages = {254--258}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/EISIC.2012.42}, doi = {10.1109/EISIC.2012.42}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/BackfriedSPQGR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/BarghCMP12, author = {Mortaza S. Bargh and Sunil Choenni and Ingrid Mulder and Roland Pastoor}, editor = {Nasrullah Memon and Daniel Zeng}, title = {Exploring a Warrior Paradigm to Design Out Cybercrime}, booktitle = {2012 European Intelligence and Security Informatics Conference, {EISIC} 2012, Odense, Denmark, August 22-24, 2012}, pages = {84--90}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/EISIC.2012.40}, doi = {10.1109/EISIC.2012.40}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/BarghCMP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/BerzinjiKR12, author = {Ala Berzinji and Lisa Kaati and Ahmed Rezine}, editor = {Nasrullah Memon and Daniel Zeng}, title = {Detecting Key Players in Terrorist Networks}, booktitle = {2012 European Intelligence and Security Informatics Conference, {EISIC} 2012, Odense, Denmark, August 22-24, 2012}, pages = {297--302}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/EISIC.2012.13}, doi = {10.1109/EISIC.2012.13}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/BerzinjiKR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Best12, author = {Clive Best}, editor = {Nasrullah Memon and Daniel Zeng}, title = {OSINT, the Internet and Privacy}, booktitle = {2012 European Intelligence and Security Informatics Conference, {EISIC} 2012, Odense, Denmark, August 22-24, 2012}, pages = {4}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/EISIC.2012.71}, doi = {10.1109/EISIC.2012.71}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/Best12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/BorrionB12, author = {Herv{\'{e}} Borrion and No{\'{e}}mie Bouhana}, editor = {Nasrullah Memon and Daniel Zeng}, title = {iCARE: {A} Scenario-Based Method for the {RIBS} Project}, booktitle = {2012 European Intelligence and Security Informatics Conference, {EISIC} 2012, Odense, Denmark, August 22-24, 2012}, pages = {284}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/EISIC.2012.56}, doi = {10.1109/EISIC.2012.56}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/BorrionB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/BorrionMTL12, author = {Herv{\'{e}} Borrion and Timothy Mitchener{-}Nissen and Jonathon Taylor and Ka{-}Man Lai}, editor = {Nasrullah Memon and Daniel Zeng}, title = {Countering Bioterrorism: Why Smart Buildings Should Have a Code of Ethics}, booktitle = {2012 European Intelligence and Security Informatics Conference, {EISIC} 2012, Odense, Denmark, August 22-24, 2012}, pages = {68--75}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/EISIC.2012.45}, doi = {10.1109/EISIC.2012.45}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/BorrionMTL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/BrynielssonHJKMS12, author = {Joel Brynielsson and Andreas Horndahl and Fredrik Johansson and Lisa Kaati and Christian M{\aa}rtenson and Pontus Svenson}, editor = {Nasrullah Memon and Daniel Zeng}, title = {Analysis of Weak Signals for Detecting Lone Wolf Terrorists}, booktitle = {2012 European Intelligence and Security Informatics Conference, {EISIC} 2012, Odense, Denmark, August 22-24, 2012}, pages = {197--204}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/EISIC.2012.20}, doi = {10.1109/EISIC.2012.20}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/BrynielssonHJKMS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/BurgoonHQ12, author = {Judee K. Burgoon and Lauren Hamel and Tiantian Qin}, editor = {Nasrullah Memon and Daniel Zeng}, title = {Predicting Veracity from Linguistic Indicators}, booktitle = {2012 European Intelligence and Security Informatics Conference, {EISIC} 2012, Odense, Denmark, August 22-24, 2012}, pages = {323--328}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/EISIC.2012.21}, doi = {10.1109/EISIC.2012.21}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/BurgoonHQ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/CamossiDT12, author = {Elena Camossi and Tatyana Dimitrova and Aris Tsois}, editor = {Nasrullah Memon and Daniel Zeng}, title = {Detecting Anomalous Maritime Container Itineraries for Anti-fraud and Supply Chain Security}, booktitle = {2012 European Intelligence and Security Informatics Conference, {EISIC} 2012, Odense, Denmark, August 22-24, 2012}, pages = {76--83}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/EISIC.2012.39}, doi = {10.1109/EISIC.2012.39}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/CamossiDT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/CanoPTZG12, author = {Mar{\'{\i}}a Victoria Moreno Cano and Carolina Pi{\~{n}}ana{-}D{\'{\i}}az and Rafael Toledo{-}Moreo and Miguel A. Zamora and Antonio Fernandez G{\'{o}}mez{-}Skarmeta}, editor = {Nasrullah Memon and Daniel Zeng}, title = {Multi-sensor Multi-target Tracking for Infrastructure Protection}, booktitle = {2012 European Intelligence and Security Informatics Conference, {EISIC} 2012, Odense, Denmark, August 22-24, 2012}, pages = {317--322}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/EISIC.2012.22}, doi = {10.1109/EISIC.2012.22}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/CanoPTZG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Celso12, author = {Anthony Celso}, editor = {Nasrullah Memon and Daniel Zeng}, title = {Al Qaeda Affiliates Operating in Failed States: The Next Front in the War on Terror}, booktitle = {2012 European Intelligence and Security Informatics Conference, {EISIC} 2012, Odense, Denmark, August 22-24, 2012}, pages = {263--267}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/EISIC.2012.32}, doi = {10.1109/EISIC.2012.32}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/Celso12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Chen12, author = {Hsinchun Chen}, editor = {Nasrullah Memon and Daniel Zeng}, title = {From Dark Web to GeoPolitical Web: Exploring the Value of Social Media Informatics}, booktitle = {2012 European Intelligence and Security Informatics Conference, {EISIC} 2012, Odense, Denmark, August 22-24, 2012}, pages = {3}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/EISIC.2012.70}, doi = {10.1109/EISIC.2012.70}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/Chen12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/DArminioICDEPOKN12, author = {Paolo D'Arminio and Ricardo Buendia Iglesias and Janusz Cichowski and Piotr Dalka and Damian Ellwart and Sateesh Pedagadi and James Orwell and Inga Kroener and Daniel Neyland}, editor = {Nasrullah Memon and Daniel Zeng}, title = {Technologies for Granting Balance between Security and Privacy in Video-Surveillance}, booktitle = {2012 European Intelligence and Security Informatics Conference, {EISIC} 2012, Odense, Denmark, August 22-24, 2012}, pages = {278--283}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/EISIC.2012.38}, doi = {10.1109/EISIC.2012.38}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/DArminioICDEPOKN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/DanilovaS12, author = {Natalia Danilova and David Stupples}, editor = {Nasrullah Memon and Daniel Zeng}, title = {Application of Natural Language Processing and Evidential Analysis to Web-Based Intelligence Information Acquisition}, booktitle = {2012 European Intelligence and Security Informatics Conference, {EISIC} 2012, Odense, Denmark, August 22-24, 2012}, pages = {268--273}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/EISIC.2012.41}, doi = {10.1109/EISIC.2012.41}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/DanilovaS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Danowski12, author = {James A. Danowski}, editor = {Nasrullah Memon and Daniel Zeng}, title = {Semantic Network Analysis of Islamist Sources Using Time Slices as Nodes and Semantic Similarity as Link Strengths: Some Implications for Propaganda Analysis about Jihad}, booktitle = {2012 European Intelligence and Security Informatics Conference, {EISIC} 2012, Odense, Denmark, August 22-24, 2012}, pages = {164--171}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/EISIC.2012.53}, doi = {10.1109/EISIC.2012.53}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/Danowski12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Danowski12a, author = {James A. Danowski}, editor = {Nasrullah Memon and Daniel Zeng}, title = {Sentiment Network Analysis of Taleban and {RFE/RL} Open-Source Content about Afghanistan}, booktitle = {2012 European Intelligence and Security Informatics Conference, {EISIC} 2012, Odense, Denmark, August 22-24, 2012}, pages = {303--310}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/EISIC.2012.54}, doi = {10.1109/EISIC.2012.54}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/Danowski12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/DigioiaFPF12, author = {Giusj Digioia and Chiara Foglietta and Stefano Panzieri and Alessandro Falleni}, editor = {Nasrullah Memon and Daniel Zeng}, title = {Mixed Holistic Reductionistic Approach for Impact Assessment of Cyber Attacks}, booktitle = {2012 European Intelligence and Security Informatics Conference, {EISIC} 2012, Odense, Denmark, August 22-24, 2012}, pages = {123--130}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/EISIC.2012.30}, doi = {10.1109/EISIC.2012.30}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/DigioiaFPF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/ElzingaWP12, author = {Paul Elzinga and Karl Erich Wolff and Jonas Poelmans}, editor = {Nasrullah Memon and Daniel Zeng}, title = {Analyzing Chat Conversations of Pedophiles with Temporal Relational Semantic Systems}, booktitle = {2012 European Intelligence and Security Informatics Conference, {EISIC} 2012, Odense, Denmark, August 22-24, 2012}, pages = {242--249}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/EISIC.2012.12}, doi = {10.1109/EISIC.2012.12}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/ElzingaWP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/EskandariKH12, author = {Mojtaba Eskandari and Zeinab Khorshidpour and Sattar Hashemi}, editor = {Nasrullah Memon and Daniel Zeng}, title = {To Incorporate Sequential Dynamic Features in Malware Detection Engines}, booktitle = {2012 European Intelligence and Security Informatics Conference, {EISIC} 2012, Odense, Denmark, August 22-24, 2012}, pages = {46--52}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/EISIC.2012.57}, doi = {10.1109/EISIC.2012.57}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/EskandariKH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Frank12, author = {Richard Frank}, editor = {Nasrullah Memon and Daniel Zeng}, title = {{SPORS:} {A} Suspect Recommendation System Based on Offenders' Reconstructed Spatial Profile}, booktitle = {2012 European Intelligence and Security Informatics Conference, {EISIC} 2012, Odense, Denmark, August 22-24, 2012}, pages = {38--45}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/EISIC.2012.26}, doi = {10.1109/EISIC.2012.26}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/Frank12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/FrankK12, author = {Richard Frank and Bryan Kinney}, editor = {Nasrullah Memon and Daniel Zeng}, title = {How Many Ways Do Offenders Travel - Evaluating the Activity Paths of Offenders}, booktitle = {2012 European Intelligence and Security Informatics Conference, {EISIC} 2012, Odense, Denmark, August 22-24, 2012}, pages = {99--106}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/EISIC.2012.18}, doi = {10.1109/EISIC.2012.18}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/FrankK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/GolmohammadiZ12, author = {Koosha Golmohammadi and Osmar R. Za{\"{\i}}ane}, editor = {Nasrullah Memon and Daniel Zeng}, title = {Data Mining Applications for Fraud Detection in Securities Market}, booktitle = {2012 European Intelligence and Security Informatics Conference, {EISIC} 2012, Odense, Denmark, August 22-24, 2012}, pages = {107--114}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/EISIC.2012.51}, doi = {10.1109/EISIC.2012.51}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/GolmohammadiZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/GustaviS12, author = {Tove Gustavi and Pontus Svenson}, editor = {Nasrullah Memon and Daniel Zeng}, title = {Pattern Theory in Intelligence Analysis}, booktitle = {2012 European Intelligence and Security Informatics Conference, {EISIC} 2012, Odense, Denmark, August 22-24, 2012}, pages = {290}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/EISIC.2012.28}, doi = {10.1109/EISIC.2012.28}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/GustaviS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/HengstM12, author = {Mari{\"{e}}lle den Hengst and Jan ter Mors}, editor = {Nasrullah Memon and Daniel Zeng}, title = {Community of Intelligence: The Secret Behind Intelligence-Led Policing}, booktitle = {2012 European Intelligence and Security Informatics Conference, {EISIC} 2012, Odense, Denmark, August 22-24, 2012}, pages = {22--29}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/EISIC.2012.15}, doi = {10.1109/EISIC.2012.15}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/HengstM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/HodgesCG12, author = {Duncan Hodges and Sadie Creese and Michael Goldsmith}, editor = {Nasrullah Memon and Daniel Zeng}, title = {A Model for Identity in the Cyber and Natural Universes}, booktitle = {2012 European Intelligence and Security Informatics Conference, {EISIC} 2012, Odense, Denmark, August 22-24, 2012}, pages = {115--122}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/EISIC.2012.43}, doi = {10.1109/EISIC.2012.43}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/HodgesCG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Howard12, author = {Newton Howard}, editor = {Nasrullah Memon and Daniel Zeng}, title = {Perception in International Conflict: An Agent-Based Approach}, booktitle = {2012 European Intelligence and Security Informatics Conference, {EISIC} 2012, Odense, Denmark, August 22-24, 2012}, pages = {259--262}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/EISIC.2012.61}, doi = {10.1109/EISIC.2012.61}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/Howard12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Hunter12, author = {Aaron Hunter}, editor = {Nasrullah Memon and Daniel Zeng}, title = {Structured Documents: Signatures and Deception}, booktitle = {2012 European Intelligence and Security Informatics Conference, {EISIC} 2012, Odense, Denmark, August 22-24, 2012}, pages = {274--277}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/EISIC.2012.17}, doi = {10.1109/EISIC.2012.17}, timestamp = {Fri, 15 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/Hunter12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/IwanskiFRD12, author = {Natalia Iwanski and Richard Frank and Andrew A. Reid and Vahid Dabbaghian}, editor = {Nasrullah Memon and Daniel Zeng}, title = {A Computational Model for Predicting the Location of Crime Attractors on a Road Network}, booktitle = {2012 European Intelligence and Security Informatics Conference, {EISIC} 2012, Odense, Denmark, August 22-24, 2012}, pages = {60--67}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/EISIC.2012.14}, doi = {10.1109/EISIC.2012.14}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/IwanskiFRD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/JohanssonBQ12, author = {Fredrik Johansson and Joel Brynielsson and Maribel Narganes Quijano}, editor = {Nasrullah Memon and Daniel Zeng}, title = {Estimating Citizen Alertness in Crises Using Social Media Monitoring and Analysis}, booktitle = {2012 European Intelligence and Security Informatics Conference, {EISIC} 2012, Odense, Denmark, August 22-24, 2012}, pages = {189--196}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/EISIC.2012.23}, doi = {10.1109/EISIC.2012.23}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/JohanssonBQ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Johnson12, author = {James R. (Bob) Johnson}, editor = {Nasrullah Memon and Daniel Zeng}, title = {Detecting Emergent Terrorism Events: Finding Needles in Information Haystacks}, booktitle = {2012 European Intelligence and Security Informatics Conference, {EISIC} 2012, Odense, Denmark, August 22-24, 2012}, pages = {5--6}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/EISIC.2012.72}, doi = {10.1109/EISIC.2012.72}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/Johnson12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/JohnsonH12, author = {David E. A. Johnson and Newton Howard}, editor = {Nasrullah Memon and Daniel Zeng}, title = {Network Intelligence: An Emerging Discipline}, booktitle = {2012 European Intelligence and Security Informatics Conference, {EISIC} 2012, Odense, Denmark, August 22-24, 2012}, pages = {287--288}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/EISIC.2012.52}, doi = {10.1109/EISIC.2012.52}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/JohnsonH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/JohnsonMKT12, author = {James R. (Bob) Johnson and Anita Miller and Latifur Khan and Bhavani Thuraisingham}, editor = {Nasrullah Memon and Daniel Zeng}, title = {Measuring Relatedness and Augmentation of Information of Interest within Free Text Law Enforcement Documents}, booktitle = {2012 European Intelligence and Security Informatics Conference, {EISIC} 2012, Odense, Denmark, August 22-24, 2012}, pages = {148--155}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/EISIC.2012.49}, doi = {10.1109/EISIC.2012.49}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/JohnsonMKT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/KadirOA12, author = {Andi Fitriah Abdul Kadir and Raja Azrina Raja Othman and Normaziah Abdul Aziz}, editor = {Nasrullah Memon and Daniel Zeng}, title = {Behavioral Analysis and Visualization of Fast-Flux {DNS}}, booktitle = {2012 European Intelligence and Security Informatics Conference, {EISIC} 2012, Odense, Denmark, August 22-24, 2012}, pages = {250--253}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/EISIC.2012.36}, doi = {10.1109/EISIC.2012.36}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/KadirOA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/KengpolN12, author = {Athakorn Kengpol and Pakorn Neungrit}, editor = {Nasrullah Memon and Daniel Zeng}, title = {A Prediction of Terrorist Distribution Range Radius and Elapsing Time: {A} Case Study in Southern Parts of Thailand}, booktitle = {2012 European Intelligence and Security Informatics Conference, {EISIC} 2012, Odense, Denmark, August 22-24, 2012}, pages = {180--188}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/EISIC.2012.19}, doi = {10.1109/EISIC.2012.19}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/KengpolN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Langweg12, author = {Hanno Langweg}, editor = {Nasrullah Memon and Daniel Zeng}, title = {Information Security Aspects of the 22/7 Attacks}, booktitle = {2012 European Intelligence and Security Informatics Conference, {EISIC} 2012, Odense, Denmark, August 22-24, 2012}, pages = {286}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/EISIC.2012.9}, doi = {10.1109/EISIC.2012.9}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/Langweg12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/LatekRCF12, author = {Maciej M. Latek and Seyed M. Mussavi Rizi and Andrew T. Crooks and Mark Fraser}, editor = {Nasrullah Memon and Daniel Zeng}, title = {Social Simulations for Border Security}, booktitle = {2012 European Intelligence and Security Informatics Conference, {EISIC} 2012, Odense, Denmark, August 22-24, 2012}, pages = {340--345}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/EISIC.2012.50}, doi = {10.1109/EISIC.2012.50}, timestamp = {Thu, 28 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/LatekRCF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Lee12, author = {Henry C. Lee}, editor = {Nasrullah Memon and Daniel Zeng}, title = {The Utilization of Forensic Evidence in {IED} Incidents}, booktitle = {2012 European Intelligence and Security Informatics Conference, {EISIC} 2012, Odense, Denmark, August 22-24, 2012}, pages = {1--2}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/EISIC.2012.69}, doi = {10.1109/EISIC.2012.69}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/Lee12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/LivshitzHN12, author = {Danny Livshitz and Newton Howard and Yair Neuman}, editor = {Nasrullah Memon and Daniel Zeng}, title = {Can Computers Help Us to Better Understand Different Cultures? Toward a Computer-Based {CULINT}}, booktitle = {2012 European Intelligence and Security Informatics Conference, {EISIC} 2012, Odense, Denmark, August 22-24, 2012}, pages = {172--179}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/EISIC.2012.46}, doi = {10.1109/EISIC.2012.46}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/LivshitzHN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Memon12, author = {Bisharat Rasool Memon}, editor = {Nasrullah Memon and Daniel Zeng}, title = {Identifying Important Nodes in Weighted Covert Networks Using Generalized Centrality Measures}, booktitle = {2012 European Intelligence and Security Informatics Conference, {EISIC} 2012, Odense, Denmark, August 22-24, 2012}, pages = {131--140}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/EISIC.2012.65}, doi = {10.1109/EISIC.2012.65}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/Memon12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/MonacoBCT12, author = {John V. Monaco and Ned Bakelman and Sung{-}Hyuk Cha and Charles C. Tappert}, editor = {Nasrullah Memon and Daniel Zeng}, title = {Developing a Keystroke Biometric System for Continual Authentication of Computer Users}, booktitle = {2012 European Intelligence and Security Informatics Conference, {EISIC} 2012, Odense, Denmark, August 22-24, 2012}, pages = {210--216}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/EISIC.2012.58}, doi = {10.1109/EISIC.2012.58}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/MonacoBCT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Morris12, author = {Travis Morris}, editor = {Nasrullah Memon and Daniel Zeng}, title = {Extracting and Networking Emotions in Extremist Propaganda}, booktitle = {2012 European Intelligence and Security Informatics Conference, {EISIC} 2012, Odense, Denmark, August 22-24, 2012}, pages = {53--59}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/EISIC.2012.33}, doi = {10.1109/EISIC.2012.33}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/Morris12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/MouhtaropoulosLG12, author = {Antonis Mouhtaropoulos and Chang{-}Tsun Li and Marthie Grobler}, editor = {Nasrullah Memon and Daniel Zeng}, title = {Proactive Digital Forensics: The Ever-Increasing Need for Standardization}, booktitle = {2012 European Intelligence and Security Informatics Conference, {EISIC} 2012, Odense, Denmark, August 22-24, 2012}, pages = {289}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/EISIC.2012.66}, doi = {10.1109/EISIC.2012.66}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/MouhtaropoulosLG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/OwenDW12, author = {Archibald Owen and Gregory Duckworth and Jerry Worsley}, editor = {Nasrullah Memon and Daniel Zeng}, title = {OptaSense: Fibre Optic Distributed Acoustic Sensing for Border Monitoring}, booktitle = {2012 European Intelligence and Security Informatics Conference, {EISIC} 2012, Odense, Denmark, August 22-24, 2012}, pages = {362--364}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/EISIC.2012.59}, doi = {10.1109/EISIC.2012.59}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/OwenDW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/PalmerH12, author = {Anthony J. Palmer and Chris Hurrey}, editor = {Nasrullah Memon and Daniel Zeng}, title = {Ten Reasons Why {IRIS} Needed 20: 20 Foresight: Some Lessons for Introducing Biometric Border Control Systems}, booktitle = {2012 European Intelligence and Security Informatics Conference, {EISIC} 2012, Odense, Denmark, August 22-24, 2012}, pages = {311--316}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/EISIC.2012.31}, doi = {10.1109/EISIC.2012.31}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/PalmerH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/ParkTB12, author = {Andrew J. Park and Herbert H. Tsang and Patricia L. Brantingham}, editor = {Nasrullah Memon and Daniel Zeng}, title = {Dynalink: {A} Framework for Dynamic Criminal Network Visualization}, booktitle = {2012 European Intelligence and Security Informatics Conference, {EISIC} 2012, Odense, Denmark, August 22-24, 2012}, pages = {217--224}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/EISIC.2012.24}, doi = {10.1109/EISIC.2012.24}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/ParkTB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Petersen12, author = {Rasmus Rosenqvist Petersen}, editor = {Nasrullah Memon and Daniel Zeng}, title = {Association and Centrality in Criminal Networks}, booktitle = {2012 European Intelligence and Security Informatics Conference, {EISIC} 2012, Odense, Denmark, August 22-24, 2012}, pages = {232--241}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/EISIC.2012.63}, doi = {10.1109/EISIC.2012.63}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/Petersen12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/PolikovskyQKOB12, author = {Senya Polikovsky and Maria Alejandra Quiros{-}Ramirez and Yoshinari Kameda and Yuichi Ohta and Judee K. Burgoon}, editor = {Nasrullah Memon and Daniel Zeng}, title = {Benchmark Driven Framework for Development of Emotion Sensing Support Systems}, booktitle = {2012 European Intelligence and Security Informatics Conference, {EISIC} 2012, Odense, Denmark, August 22-24, 2012}, pages = {353--355}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/EISIC.2012.27}, doi = {10.1109/EISIC.2012.27}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/PolikovskyQKOB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/ProudfootTB12, author = {Jeffrey Gainer Proudfoot and Nathan W. Twyman and Judee K. Burgoon}, editor = {Nasrullah Memon and Daniel Zeng}, title = {A Comparison of Invasive and Noninvasive Sensors in the Concealed Information Test}, booktitle = {2012 European Intelligence and Security Informatics Conference, {EISIC} 2012, Odense, Denmark, August 22-24, 2012}, pages = {346--349}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/EISIC.2012.11}, doi = {10.1109/EISIC.2012.11}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/ProudfootTB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/RajamakiRAATA12, author = {Jyri Rajam{\"{a}}ki and Paresh Rathod and Anu Ahlgren and Johanna Aho and Mari Takari and Sami Ahlgren}, editor = {Nasrullah Memon and Daniel Zeng}, title = {Resilience of Cyber-Physical System: {A} Case Study of Safe School Environment}, booktitle = {2012 European Intelligence and Security Informatics Conference, {EISIC} 2012, Odense, Denmark, August 22-24, 2012}, pages = {285}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/EISIC.2012.10}, doi = {10.1109/EISIC.2012.10}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/RajamakiRAATA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/RajamakiTTJOR12, author = {Jyri Rajam{\"{a}}ki and Jutta Tervahartiala and Sofia Tervola and Sari Johansson and Leila Ovaska and Paresh Rathod}, editor = {Nasrullah Memon and Daniel Zeng}, title = {How Transparency Improves the Control of Law Enforcement Authorities' Activities?}, booktitle = {2012 European Intelligence and Security Informatics Conference, {EISIC} 2012, Odense, Denmark, August 22-24, 2012}, pages = {14--21}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/EISIC.2012.35}, doi = {10.1109/EISIC.2012.35}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/RajamakiTTJOR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/RuizH12, author = {Erick E. Ruiz and K. Larry Head}, editor = {Nasrullah Memon and Daniel Zeng}, title = {Use of an Automatic Under-Vehicle Inspection System as a Tool to Streamline Vehicle Screening at Ports of Entry and Security Checkpoints}, booktitle = {2012 European Intelligence and Security Informatics Conference, {EISIC} 2012, Odense, Denmark, August 22-24, 2012}, pages = {329--333}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/EISIC.2012.64}, doi = {10.1109/EISIC.2012.64}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/RuizH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/SacanamboyCC12, author = {Mayra Sacanamboy and Bojan Cukic and Vittorio Cortellessa}, editor = {Nasrullah Memon and Daniel Zeng}, title = {Performance and Risk Analysis for Border Management Applications: {A} Model-Driven Approach and a Perspective View}, booktitle = {2012 European Intelligence and Security Informatics Conference, {EISIC} 2012, Odense, Denmark, August 22-24, 2012}, pages = {350--352}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/EISIC.2012.47}, doi = {10.1109/EISIC.2012.47}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/SacanamboyCC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/SahsK12, author = {Justin Sahs and Latifur Khan}, editor = {Nasrullah Memon and Daniel Zeng}, title = {A Machine Learning Approach to Android Malware Detection}, booktitle = {2012 European Intelligence and Security Informatics Conference, {EISIC} 2012, Odense, Denmark, August 22-24, 2012}, pages = {141--147}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/EISIC.2012.34}, doi = {10.1109/EISIC.2012.34}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/SahsK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/SkillicornP12, author = {David B. Skillicorn and Lynnette D. Purda}, editor = {Nasrullah Memon and Daniel Zeng}, title = {Detecting Fraud in Financial Reports}, booktitle = {2012 European Intelligence and Security Informatics Conference, {EISIC} 2012, Odense, Denmark, August 22-24, 2012}, pages = {7--13}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/EISIC.2012.8}, doi = {10.1109/EISIC.2012.8}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/SkillicornP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/TanasTHSSGM12, author = {Michal Tanas and Grzegorz Taberski and Witold Holubowicz and Krzysztof Samp and Agnieszka Spronska and Jakub Gl{\'{o}}wka and Mateusz Macias}, editor = {Nasrullah Memon and Daniel Zeng}, title = {The {TALOS} Project - Autonomous Robotic Patrol Vehicles}, booktitle = {2012 European Intelligence and Security Informatics Conference, {EISIC} 2012, Odense, Denmark, August 22-24, 2012}, pages = {359--361}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/EISIC.2012.60}, doi = {10.1109/EISIC.2012.60}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/TanasTHSSGM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/TariqBA12, author = {Muhammad Adnan Tariq and Joel Brynielsson and Henrik Artman}, editor = {Nasrullah Memon and Daniel Zeng}, title = {Framing the Attacker in Organized Cybercrime}, booktitle = {2012 European Intelligence and Security Informatics Conference, {EISIC} 2012, Odense, Denmark, August 22-24, 2012}, pages = {30--37}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/EISIC.2012.48}, doi = {10.1109/EISIC.2012.48}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/TariqBA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Veenman12, author = {Cor J. Veenman}, editor = {Nasrullah Memon and Daniel Zeng}, title = {Data Base Investigation as a Ranking Problem}, booktitle = {2012 European Intelligence and Security Informatics Conference, {EISIC} 2012, Odense, Denmark, August 22-24, 2012}, pages = {225--231}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/EISIC.2012.44}, doi = {10.1109/EISIC.2012.44}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/Veenman12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/WestlakeBF12, author = {Bryce Westlake and Martin Bouchard and Richard Frank}, editor = {Nasrullah Memon and Daniel Zeng}, title = {Comparing Methods for Detecting Child Exploitation Content Online}, booktitle = {2012 European Intelligence and Security Informatics Conference, {EISIC} 2012, Odense, Denmark, August 22-24, 2012}, pages = {156--163}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/EISIC.2012.25}, doi = {10.1109/EISIC.2012.25}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/WestlakeBF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/ZavarellaPEB12, author = {Vanni Zavarella and Jakub Piskorski and Ana Sofia Esteves and Stefano Bucci}, editor = {Nasrullah Memon and Daniel Zeng}, title = {Refining Border Security News Event Geotagging through Deployment of Lexico-Semantic Patterns}, booktitle = {2012 European Intelligence and Security Informatics Conference, {EISIC} 2012, Odense, Denmark, August 22-24, 2012}, pages = {334--339}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/EISIC.2012.62}, doi = {10.1109/EISIC.2012.62}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/ZavarellaPEB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eisic/2012, editor = {Nasrullah Memon and Daniel Zeng}, title = {2012 European Intelligence and Security Informatics Conference, {EISIC} 2012, Odense, Denmark, August 22-24, 2012}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://ieeexplore.ieee.org/xpl/conhome/6298753/proceeding}, isbn = {978-1-4673-2358-1}, timestamp = {Tue, 16 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/AgrawalGJ11, author = {P. K. Agrawal and Brij B. Gupta and Satbir Jain}, title = {{SVM} Based Scheme for Predicting Number of Zombies in a DDoS Attack}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {178--182}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.19}, doi = {10.1109/EISIC.2011.19}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/AgrawalGJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/AlrubanE11, author = {Abdulrahman Alruban and Emlyn Everitt}, title = {Two Novel 802.1x Denial of Service Attacks}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {183--190}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.49}, doi = {10.1109/EISIC.2011.49}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/AlrubanE11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/AnastopoulosKKA11, author = {Vasileios Anastopoulos and Panagiotis Karampelas and Panagiotis Kalagiakos and Reda Alhajj}, title = {A Hybrid Framework for Building a Web-Page Recommender System}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {385--390}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.40}, doi = {10.1109/EISIC.2011.40}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/AnastopoulosKKA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/ArgioluB11, author = {Massimiliano Argiolu and Fabio Bisogni}, title = {Video Analytics: Opportunity or Spoof Story? The State of the Art of Intelligent Video Surveillance}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {294}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.46}, doi = {10.1109/EISIC.2011.46}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/ArgioluB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Barbian11, author = {Guido Barbian}, title = {Detecting Hidden Friendship in Online Social Network}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {269--272}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.14}, doi = {10.1109/EISIC.2011.14}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/Barbian11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Barbian11a, author = {Guido Barbian}, title = {Trust Centrality in Online Social Networks}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {372--377}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.17}, doi = {10.1109/EISIC.2011.17}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/Barbian11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Best11, author = {Clive Best}, title = {Challenges in Open Source Intelligence}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {58--62}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.41}, doi = {10.1109/EISIC.2011.41}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/Best11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/BestH11, author = {Clive Best and David Horby}, title = {{IQ} - {A} Web Mining Tool}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {382--384}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.42}, doi = {10.1109/EISIC.2011.42}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/BestH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/BourassaFS11, author = {M. A. J. Bourassa and J. Fug{\`{e}}re and David B. Skillicorn}, title = {Interestingness - Directing Analyst Focus to Significant Data}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {300--307}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.53}, doi = {10.1109/EISIC.2011.53}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/BourassaFS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Bowman-Grieve11, author = {Lorraine Bowman{-}Grieve}, title = {A Psychological Perspective on Virtual Communities Supporting Terrorist and Extremist Ideologies as a Tool for Recruitment}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {244--247}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.11}, doi = {10.1109/EISIC.2011.11}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/Bowman-Grieve11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Brantingham11, author = {Patricia L. Brantingham}, title = {Computational Criminology}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {3}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.79}, doi = {10.1109/EISIC.2011.79}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/Brantingham11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/BrantinghamGB11, author = {Paul J. Brantingham and Amir H. Ghaseminejad and Patricia L. Brantingham}, title = {The Distribution of Event Complexity in the British Columbia Court System: An Analysis Based on the CourBC Analytical System}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {94--99}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.51}, doi = {10.1109/EISIC.2011.51}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/BrantinghamGB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Chen11, author = {Hsinchun Chen}, title = {Dark Web: Exploring and Mining the Dark Side of the Web}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {1--2}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.78}, doi = {10.1109/EISIC.2011.78}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/Chen11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/ColbaughG11, author = {Richard Colbaugh and Kristin Glass}, title = {Agile Sentiment Analysis of Social Media Content for Security Informatics Applications}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {327--331}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.65}, doi = {10.1109/EISIC.2011.65}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/ColbaughG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/DahlinS11, author = {Johan Dahlin and Pontus Svenson}, title = {A Method for Community Detection in Uncertain Networks}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {155--162}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.58}, doi = {10.1109/EISIC.2011.58}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/DahlinS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Danowski11, author = {James A. Danowski}, title = {Changes in Muslim Nations' Centrality Mined from Open-Source World Jihad News: {A} Comparison of Networks in Late 2010, Early 2011, and Post-Bin Laden}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {314--321}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.69}, doi = {10.1109/EISIC.2011.69}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/Danowski11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/DanowskiP11, author = {James A. Danowski and Han Woo Park}, title = {Web Network and Content Changes Associated with the 2011 Muslim Middle-East and North African Early Uprisings: {A} Naturalistic Field Experiment}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {100--107}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.67}, doi = {10.1109/EISIC.2011.67}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/DanowskiP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/DesmaraisC11, author = {Bruce A. Desmarais and Skyler J. Cranmer}, title = {Forecasting the Locational Dynamics of Transnational Terrorism: {A} Network Analytic Approach}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {171--177}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.44}, doi = {10.1109/EISIC.2011.44}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/DesmaraisC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Diaz11, author = {Alejandro Fern{\'{a}}ndez{-}Cernuda Diaz}, title = {Technology vs. Infoxication - The Challenges of Obtaining Intelligence from the Buzz}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {391}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.74}, doi = {10.1109/EISIC.2011.74}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/Diaz11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/DickersonMS11, author = {John P. Dickerson and Aaron Mannes and V. S. Subrahmanian}, title = {Dealing with Lashkar-e-Taiba: {A} Multi-player Game-Theoretic Perspective}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {354--359}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.33}, doi = {10.1109/EISIC.2011.33}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/DickersonMS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/DoulaverakisKKKS11, author = {Charalampos Doulaverakis and Nikolaos Konstantinou and Thomas Knape and Ioannis Kompatsiaris and John Soldatos}, title = {An Approach to Intelligent Information Fusion in Sensor Saturated Urban Environments}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {108--115}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.24}, doi = {10.1109/EISIC.2011.24}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/DoulaverakisKKKS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/EachusS11, author = {Peter Eachus and Ben Short}, title = {Decision Support System for Intelligence Analysts}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {291}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.20}, doi = {10.1109/EISIC.2011.20}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/EachusS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Elvy11, author = {Dale Elvy}, title = {Terrorism, Threat and Time: The Mediating Effect of Terrorist Threat on Public Willingness to Forego Civil Liberties}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {52--57}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.35}, doi = {10.1109/EISIC.2011.35}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/Elvy11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/FarahbodAGG11, author = {Roozbeh Farahbod and Vladimir Avram and Uwe Gl{\"{a}}sser and Adel Guitouni}, title = {Engineering Situation Analysis Decision Support Systems}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {10--18}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.64}, doi = {10.1109/EISIC.2011.64}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/FarahbodAGG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/ForsgrenHST11, author = {Robert Forsgren and Andreas Horndahl and Pontus Svenson and Edward Tj{\"{o}}rnhammar}, title = {Information Fusion for Port Security Decision Support}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {292}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.59}, doi = {10.1109/EISIC.2011.59}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/ForsgrenHST11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/FrankACB11, author = {Richard Frank and Martin A. Andresen and Connie Cheng and Patricia L. Brantingham}, title = {Finding Criminal Attractors Based on Offenders' Directionality of Crimes}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {86--93}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.34}, doi = {10.1109/EISIC.2011.34}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/FrankACB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/GlassC11, author = {Kristin Glass and Richard Colbaugh}, title = {Web Analytics for Security Informatics}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {214--219}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.66}, doi = {10.1109/EISIC.2011.66}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/GlassC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Goujon11, author = {B{\'{e}}n{\'{e}}dicte Goujon}, title = {Text Mining for Opinion Target Detection}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {322--326}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.45}, doi = {10.1109/EISIC.2011.45}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/Goujon11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/HoogstrateK11, author = {Andre J. Hoogstrate and Chris A. J. Klaassen}, title = {Minimizing the Average Number of Inspections for Detecting Rare Items in Finite Populations}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {203--208}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.22}, doi = {10.1109/EISIC.2011.22}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/HoogstrateK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Howard11, author = {Newton Howard}, title = {Global Defense Policy System of Laws: Graph Theory Approach to Balance of Power Theory}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {248--258}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.73}, doi = {10.1109/EISIC.2011.73}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/Howard11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/HuangL11, author = {Yin{-}Fu Huang and Po{-}Lun Liou}, title = {Retrieving Representative Structures from {XML} Documents Using Clustering Techniques}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {332--339}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.16}, doi = {10.1109/EISIC.2011.16}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/HuangL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/IwanskiFDRB11, author = {Natalia Iwanski and Richard Frank and Vahid Dabbaghian and Andrew A. Reid and Patricia L. Brantingham}, title = {Analyzing an Offender's Journey to Crime: {A} Criminal Movement Model (CriMM)}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {70--77}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.13}, doi = {10.1109/EISIC.2011.13}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/IwanskiFDRB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/JoffresBFW11, author = {Kila Joffres and Martin Bouchard and Richard Frank and Bryce Westlake}, title = {Strategies to Disrupt Online Child Pornography Networks}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {163--170}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.32}, doi = {10.1109/EISIC.2011.32}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/JoffresBFW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/JohanssonBHMMTR11, author = {Fredrik Johansson and Joel Brynielsson and Pontus H{\"{o}}rling and Michael Malm and Christian M{\aa}rtenson and Staffan Truv{\'{e}} and Magnus Rosell}, title = {Detecting Emergent Conflicts through Web Mining and Visualization}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {346--353}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.21}, doi = {10.1109/EISIC.2011.21}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/JohanssonBHMMTR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/JohnsonMK11, author = {James R. (Bob) Johnson and Anita Miller and Latifur Khan}, title = {Law Enforcement Ontology for Identification of Related Information of Interest Across Free Text Dcouments}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {19--27}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.36}, doi = {10.1109/EISIC.2011.36}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/JohnsonMK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/KaatiS11, author = {Lisa Kaati and Pontus Svenson}, title = {Analysis of Competing Hypothesis for Investigating Lone Wolf Terrorist}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {295--299}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.60}, doi = {10.1109/EISIC.2011.60}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/KaatiS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/KasaeiK11, author = {Seyed Hamidreza Mohades Kasaei and Seyed Mohammadreza Mohades Kasaei}, title = {Extraction and Recognition of the Vehicle License Plate for Passing under Outside Environment}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {234--237}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.50}, doi = {10.1109/EISIC.2011.50}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/KasaeiK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/KiesebergSMHW11, author = {Peter Kieseberg and Sebastian Schrittwieser and Martin Mulazzani and Markus Huber and Edgar R. Weippl}, title = {Trees Cannot Lie: Using Data Structures for Forensics Purposes}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {282--285}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.18}, doi = {10.1109/EISIC.2011.18}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/KiesebergSMHW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/LiLT11, author = {Xufang Li and Peter K. K. Loh and Freddy Tan}, title = {Mechanisms of Polymorphic and Metamorphic Viruses}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {149--154}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.77}, doi = {10.1109/EISIC.2011.77}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/LiLT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/MannesSSS11, author = {Aaron Mannes and J. Shakarian and Amy Sliva and V. S. Subrahmanian}, title = {A Computationally-Enabled Analysis of Lashkar-e-Taiba Attacks in Jammu and Kashmir}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {224--229}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.61}, doi = {10.1109/EISIC.2011.61}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/MannesSSS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/MartinK11, author = {Nicolas Martin and Khaled Khelif}, title = {Focused Crawling Using Name Disambiguation on Search Engine Results}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {340--345}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.31}, doi = {10.1109/EISIC.2011.31}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/MartinK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Matz11, author = {Soren Matz}, title = {Public-Private Resilience: State vs. Private Conceptions of Security Risk Management in Danish Cyber-based Critical Infrastructures}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {135--141}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.52}, doi = {10.1109/EISIC.2011.52}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/Matz11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/MeskoB11, author = {Gorazd Mesko and Igor Bernik}, title = {Cybercrime: Awareness and Fear: Slovenian Perspectives}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {28--33}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.12}, doi = {10.1109/EISIC.2011.12}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/MeskoB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/MishraGJ11, author = {Anupama Mishra and Brij B. Gupta and Ramesh Chandra Joshi}, title = {A Comparative Study of Distributed Denial of Service Attacks, Intrusion Tolerance and Mitigation Techniques}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {286--289}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.15}, doi = {10.1109/EISIC.2011.15}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/MishraGJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/MontesinoF11, author = {Raydel Montesino and Stefan Fenz}, title = {Automation Possibilities in Information Security Management}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {259--262}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.39}, doi = {10.1109/EISIC.2011.39}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/MontesinoF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/MorrisAKD11, author = {James F. Morris and Keith Anthony and Kevin T. Kennedy and Richard F. Deckro}, title = {Extraction Distractions: {A} Comparison of Social Network Model Construction Methods}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {273--276}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.63}, doi = {10.1109/EISIC.2011.63}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/MorrisAKD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/MouhtaropoulosGL11, author = {Antonis Mouhtaropoulos and Marthie Grobler and Chang{-}Tsun Li}, title = {Digital Forensic Readiness: An Insight into Governmental and Academic Initiatives}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {191--196}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.30}, doi = {10.1109/EISIC.2011.30}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/MouhtaropoulosGL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/MouradOA11, author = {Azzam Mourad and Hadi Otrok and Sara Ayoubi}, title = {Toward Systematic Integration of Security Policies into Web Services}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {220--223}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.48}, doi = {10.1109/EISIC.2011.48}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/MouradOA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/NizamaniM11, author = {Sarwat Nizamani and Nasrullah Memon}, title = {Evolution of Terrorist Network Using Clustered Approach: {A} Case Study}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {116--122}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.10}, doi = {10.1109/EISIC.2011.10}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/NizamaniM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/OnnerudWO11, author = {Hans {\"{O}}nnerud and Sara Wallin and Henric {\"{O}}stmark}, title = {Localisation of Threat Substances in Urban Society - {LOTUS:} Tomorrow's System for Finding Illicit Manufacturing of Drugs and Home Made Explosives}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {238--243}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.25}, doi = {10.1109/EISIC.2011.25}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/OnnerudWO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/ParkHSCBS11, author = {Andrew J. Park and Eunju Hwang and Valerie Spicer and Connie Cheng and Patricia L. Brantingham and Andrew Sixsmith}, title = {Testing Elderly People's Fear of Crime Using a Virtual Environment}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {63--69}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.68}, doi = {10.1109/EISIC.2011.68}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/ParkHSCBS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Parry11, author = {Joe Parry}, title = {Visualisation for Decision-Makers}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {8}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.88}, doi = {10.1109/EISIC.2011.88}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/Parry11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/PetersenRW11, author = {Rasmus Rosenqvist Petersen and Christopher J. Rhodes and Uffe Kock Wiil}, title = {Node Removal in Criminal Networks}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {360--365}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.57}, doi = {10.1109/EISIC.2011.57}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/PetersenRW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/PetersenW11, author = {Rasmus Rosenqvist Petersen and Uffe Kock Wiil}, title = {CrimeFighter Investigator: {A} Novel Tool for Criminal Network Investigation}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {197--202}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.55}, doi = {10.1109/EISIC.2011.55}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/PetersenW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/PiskorskiBA11, author = {Jakub Piskorski and Jenya Belayeva and Martin Atkinson}, title = {On Refining Real-Time Multilingual News Event Extraction through Deployment of Cross-Lingual Information Fusion Techniques}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {38--45}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.72}, doi = {10.1109/EISIC.2011.72}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/PiskorskiBA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/PlevnikP11, author = {Mihael Plevnik and Iztok Podbregar}, title = {The Need to Introduce a New Tactical Telecommunication System in the Slovenian Army}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {230--233}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.9}, doi = {10.1109/EISIC.2011.9}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/PlevnikP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Poulatova11, author = {Chaditsa Poulatova}, title = {The Media: {A} Terrorist Tool or a Silent Ally?}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {293}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.47}, doi = {10.1109/EISIC.2011.47}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/Poulatova11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/QureshiM11, author = {Pir Abdul Rasool Qureshi and Nasrullah Memon}, title = {Statistical Model for Content Extraction}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {129--134}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.75}, doi = {10.1109/EISIC.2011.75}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/QureshiM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/QureshiMWKS11, author = {Pir Abdul Rasool Qureshi and Nasrullah Memon and Uffe Kock Wiil and Panagiotis Karampelas and Jose Ignacio Nieto Sancheze}, title = {Harvesting Information from Heterogeneous Sources}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {123--128}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.76}, doi = {10.1109/EISIC.2011.76}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/QureshiMWKS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Redford11, author = {Mike Redford}, title = {{U.S.} and {EU} Legislation on Cybercrime}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {34--37}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.38}, doi = {10.1109/EISIC.2011.38}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/Redford11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Sakharova11, author = {Irina Sakharova}, title = {Analysis of the Financial Crisis of 2007-2009 and Its Impact on Terrorism}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {290}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.62}, doi = {10.1109/EISIC.2011.62}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/Sakharova11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Sensidoni11, author = {Gianluca Sensidoni}, title = {Who, What, When, Where and How: Semantics Semantics Help Connect the Dots}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {9}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.89}, doi = {10.1109/EISIC.2011.89}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/Sensidoni11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/ShahO11, author = {Mahmood Hussain Shah and Romanus Izuchukwu Okeke}, title = {A Framework for Internal Identity Theft Prevention in Retail Industry}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {366--371}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.29}, doi = {10.1109/EISIC.2011.29}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/ShahO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/SpakL11, author = {Ulrik Spak and Mats Lind}, title = {Change Blindness in Intelligence: Effects of Attention Guidance by Instructions}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {142--148}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.23}, doi = {10.1109/EISIC.2011.23}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/SpakL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/SunGLL11, author = {Duo{-}Yong Sun and Shu{-}Quan Guo and Xiao{-}Peng Liu and Jiang Li}, title = {Multi-relational Network Analysis for Covert Organizations}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {263--268}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.28}, doi = {10.1109/EISIC.2011.28}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/SunGLL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/TemurhanMCOCL11, author = {M. Temurhan and Ronald Meijer and Sunil Choenni and M. van Ooyen{-}Houben and G. Cruts and Margriet van Laar}, title = {Capture-Recapture Method for Estimating the Number of Problem Drug Users: The Case of the Netherlands}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {46--51}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.26}, doi = {10.1109/EISIC.2011.26}, timestamp = {Wed, 10 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/TemurhanMCOCL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Thuraisingham11, author = {Bhavani Thuraisingham}, title = {Data Mining for Malicious Code Detection and Security Applications}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {4--5}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.80}, doi = {10.1109/EISIC.2011.80}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/Thuraisingham11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/TikvesBTGDSCWRA11, author = {Sukru Tikves and Sujogya Banerjee and Hamy Temkit and Sedat Gokalp and Hasan Davulcu and Arunabha Sen and Steven R. Corman and Mark Woodward and Inayah Rohmaniyah and Ali Amin}, title = {A System for Ranking Organizations Using Social Scale Analysis}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {308--313}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.37}, doi = {10.1109/EISIC.2011.37}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/TikvesBTGDSCWRA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Torok11, author = {Robyn Torok}, title = {The Online Institution: Psychiatric Power as an Explanatory Model for the Normalisation of Radicalisation and Terrorism}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {78--85}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.43}, doi = {10.1109/EISIC.2011.43}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/Torok11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/UstunbasO11, author = {Yonca Ustunbas and Sule G{\"{u}}nd{\"{u}}z {\"{O}}g{\"{u}}d{\"{u}}c{\"{u}}}, title = {A Recommendation Model for Social Resource Sharing Systems Based on Tripartite Graph Clustering}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {378--381}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.56}, doi = {10.1109/EISIC.2011.56}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/UstunbasO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/VybornovaSSKTCKO11, author = {Olga Vybornova and Ivan V. Smirnov and Ilya Sochenkov and Alexander Kiselyov and Ilya Tikhomirov and Natalya V. Chudova and Yulia Kuznetsova and Gennady S. Osipov}, title = {Social Tension Detection and Intention Recognition Using Natural Language Semantic Analysis: On the Material of Russian-Speaking Social Networks and Web Forums}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {277--281}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.27}, doi = {10.1109/EISIC.2011.27}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/VybornovaSSKTCKO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Wagner11, author = {Gerhard Wagner}, title = {Desktop Text Mining for Open Source Intelligence}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {6}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.86}, doi = {10.1109/EISIC.2011.86}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/Wagner11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Wehinger11, author = {Frank Wehinger}, title = {The Dark Net: Self-Regulation Dynamics of Illegal Online Markets for Identities and Related Services}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {209--213}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.54}, doi = {10.1109/EISIC.2011.54}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/Wehinger11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Yangarber11, author = {Roman Yangarber}, title = {Discovering Complex Networks of Events and Relations in News Surveillance}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {7}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.87}, doi = {10.1109/EISIC.2011.87}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/Yangarber11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eisic/2011, title = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://ieeexplore.ieee.org/xpl/conhome/6059524/proceeding}, isbn = {978-1-4577-1464-1}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.