Search dblp for Publications

export results for "toc:db/conf/eisic/eisic2015.bht:"

 download as .bib file

@inproceedings{DBLP:conf/eisic/Abuarqoub15,
  author       = {Abdelrahman Abuarqoub},
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {Optimal Mobile Sink Selection Scheme for Multiple Sink Mobile Wireless
                  Sensor Networks},
  booktitle    = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  pages        = {169--172},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EISIC.2015.19},
  doi          = {10.1109/EISIC.2015.19},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/Abuarqoub15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Al-NooriAL15,
  author       = {Ahmed H. Al{-}Noori and
                  Khamis A. Al{-}Karawi and
                  Francis F. Li},
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {Improving Robustness of Speaker Recognition in Noisy and Reverberant
                  Conditions via Training},
  booktitle    = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  pages        = {180},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EISIC.2015.20},
  doi          = {10.1109/EISIC.2015.20},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/Al-NooriAL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/AlanaziJ15,
  author       = {Fahad Alanazi and
                  Andrew Jones},
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {The Value of Metadata in Digital Forensics},
  booktitle    = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  pages        = {182},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EISIC.2015.26},
  doi          = {10.1109/EISIC.2015.26},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/AlanaziJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/AlfayezN15,
  author       = {Fayez Alfayez and
                  Ian Neill},
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {Topology-based Optimization of Linear Wireless Sensor Networks},
  booktitle    = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  pages        = {183},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EISIC.2015.18},
  doi          = {10.1109/EISIC.2015.18},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/AlfayezN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/AlsumaytHL15,
  author       = {Albandari Alsumayt and
                  John Haggerty and
                  Ahmad Lotfi},
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {Performance, Analysis, and Comparison of MrDR Method to Detect DoS
                  Attacks in {MANET}},
  booktitle    = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  pages        = {121--124},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EISIC.2015.30},
  doi          = {10.1109/EISIC.2015.30},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/AlsumaytHL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/AshcroftFKOP15,
  author       = {Michael Ashcroft and
                  Ali Fisher and
                  Lisa Kaati and
                  Enghin Omer and
                  Nico Prucha},
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {Detecting Jihadist Messages on Twitter},
  booktitle    = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  pages        = {161--164},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EISIC.2015.27},
  doi          = {10.1109/EISIC.2015.27},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/AshcroftFKOP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/AshcroftKM15,
  author       = {Michael Ashcroft and
                  Lisa Kaati and
                  Maxime Meyer},
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {A Step Towards Detecting Online Grooming - Identifying Adults Pretending
                  to be Children},
  booktitle    = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  pages        = {98--104},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EISIC.2015.41},
  doi          = {10.1109/EISIC.2015.41},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/AshcroftKM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/AydinJ15,
  author       = {Mustafa Aydin and
                  Jeremy L. Jacob},
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {Cloud-COVER: Using User Security Attribute Preferences and Propagation
                  Analysis to Prioritise Threats to Systems},
  booktitle    = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  pages        = {53--60},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EISIC.2015.11},
  doi          = {10.1109/EISIC.2015.11},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/AydinJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/CarvalhoGC15,
  author       = {Rodrigo Carvalho and
                  Michael Goldsmith and
                  Sadie Creese},
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {Applying Semantic Technologies to Fight Online Banking Fraud},
  booktitle    = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  pages        = {61--68},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EISIC.2015.42},
  doi          = {10.1109/EISIC.2015.42},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/CarvalhoGC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Cayford15,
  author       = {Michelle Cayford},
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {Measures of Success: Developing a Method for Evaluating the Effectiveness
                  of Surveillance Technology},
  booktitle    = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  pages        = {187},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EISIC.2015.33},
  doi          = {10.1109/EISIC.2015.33},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/Cayford15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/ChanK15,
  author       = {Frodo Kin{-}Sun Chan and
                  Adams Wai{-}Kin Kong},
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {Using Hair Follicles with Leg Geometry to Align Androgenic Hair Patterns},
  booktitle    = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  pages        = {137--140},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EISIC.2015.17},
  doi          = {10.1109/EISIC.2015.17},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/ChanK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/DhamiC15,
  author       = {Mandeep K. Dhami and
                  Kathryn E. Careless},
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {Ordinal Structure of the Generic Analytic Workflow: {A} Survey of
                  Intelligence Analysts},
  booktitle    = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  pages        = {141--144},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EISIC.2015.37},
  doi          = {10.1109/EISIC.2015.37},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/DhamiC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/EleyanE15,
  author       = {Amna Eleyan and
                  Derar Eleyan},
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {Forensic Process as a Service (FPaaS) for Cloud Computing},
  booktitle    = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  pages        = {157--160},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EISIC.2015.14},
  doi          = {10.1109/EISIC.2015.14},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/EleyanE15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/EskridgeCNTP15,
  author       = {Thomas C. Eskridge and
                  Marco M. Carvalho and
                  Fitzroy Nembhard and
                  Hari Thotempudi and
                  Peter J. Polack},
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {Interactive Visualization of Netflow Traffic},
  booktitle    = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  pages        = {188},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EISIC.2015.51},
  doi          = {10.1109/EISIC.2015.51},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/EskridgeCNTP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/GenzelS15,
  author       = {Carl{-}Heinz Genzel and
                  Richard Sethmann},
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {Custom Transport Interface for the Integration of Trusted Network
                  Connect in German Smart Metering Systems},
  booktitle    = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  pages        = {45--52},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EISIC.2015.25},
  doi          = {10.1109/EISIC.2015.25},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/GenzelS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/GisslenT15,
  author       = {Linus Gissl{\'{e}}n and
                  Anders T{\"{o}}rne},
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {A Semantic Approach to Information Management and Decision Support:
                  An Application to Humanitarian Demining Operations},
  booktitle    = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  pages        = {75--82},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EISIC.2015.34},
  doi          = {10.1109/EISIC.2015.34},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/GisslenT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/GuSLL15,
  author       = {Ning Gu and
                  Duoyong Sun and
                  Bo Li and
                  Ze Li},
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {Sentiment Analysis for Topics based on Interaction Chain Model},
  booktitle    = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  pages        = {133--136},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EISIC.2015.23},
  doi          = {10.1109/EISIC.2015.23},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/GuSLL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/GuanLXSW15,
  author       = {Lei Guan and
                  Zan Li and
                  Song Xiao and
                  Jiangbo Si and
                  Jiajun Wan},
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {A Family of Adaptive Frequency Slot Number {FH} Sequences for High
                  Security and Reliability Communication},
  booktitle    = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  pages        = {30--36},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EISIC.2015.12},
  doi          = {10.1109/EISIC.2015.12},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/GuanLXSW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/HamadZMT15,
  author       = {Fadi Hamad and
                  Jamal Zraqou and
                  Adi Maaita and
                  Anas Abu Taleb},
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {A Secure Authentication System for ePassport Detection and Verification},
  booktitle    = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  pages        = {173--176},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EISIC.2015.21},
  doi          = {10.1109/EISIC.2015.21},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/HamadZMT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/HassanMS15,
  author       = {Hatem Hassan and
                  Ahmad Mostafa and
                  Ahmed Shawish},
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {{S-SAC:} Towards a Scalable Secure Access Control Framework for Cloud
                  Storage},
  booktitle    = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  pages        = {165--168},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EISIC.2015.43},
  doi          = {10.1109/EISIC.2015.43},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/HassanMS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/HegartyH15,
  author       = {Robert Hegarty and
                  John Haggerty},
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {SlackStick: Signature-Based File Identification for Live Digital Forensics
                  Examinations},
  booktitle    = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  pages        = {24--29},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EISIC.2015.28},
  doi          = {10.1109/EISIC.2015.28},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/HegartyH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/HillemannNA15,
  author       = {Eva{-}Catherine Hillemann and
                  Alexander Nussbaumer and
                  Dietrich Albert},
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {The Role of Cognitive Biases in Criminal Intelligence Analysis and
                  Approaches for their Mitigation},
  booktitle    = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  pages        = {125--128},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EISIC.2015.9},
  doi          = {10.1109/EISIC.2015.9},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/HillemannNA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/JohanssonGB15,
  author       = {Erik Johansson and
                  Christoffer Gahlin and
                  Anton Borg},
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {Crime Hotspots: An Evaluation of the {KDE} Spatial Mapping Technique},
  booktitle    = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  pages        = {69--74},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EISIC.2015.22},
  doi          = {10.1109/EISIC.2015.22},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/JohanssonGB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/KashifH15,
  author       = {Mhair Kashif and
                  Zahoor ul Haq},
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {An Optimal Use of Intrusion Detection and Prevention System {(IDPS)}},
  booktitle    = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  pages        = {190},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EISIC.2015.40},
  doi          = {10.1109/EISIC.2015.40},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/KashifH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Lapayese15,
  author       = {Manuel Jose Gazapo Lapayese},
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {Terrorism and its Transition to Cyberspace},
  booktitle    = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  pages        = {178},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EISIC.2015.46},
  doi          = {10.1109/EISIC.2015.46},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/Lapayese15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/LiSLLT15,
  author       = {Ze Li and
                  Duoyong Sun and
                  Bo Li and
                  Zi{-}Han Lin and
                  Min Tang},
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {Detecting Changes in Terrorism Networks: {A} Perspective of Multi-Meta-Network
                  Modeling},
  booktitle    = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  pages        = {179},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EISIC.2015.52},
  doi          = {10.1109/EISIC.2015.52},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/LiSLLT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/LiSLOZ15,
  author       = {Bo Li and
                  Duoyong Sun and
                  Ze Li and
                  Chaomin Ou and
                  Renqi Zhu},
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {Understanding the Dynamic of Covert Organization with Multilayer Networks
                  Model},
  booktitle    = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  pages        = {37--44},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EISIC.2015.10},
  doi          = {10.1109/EISIC.2015.10},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/LiSLOZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/LinSLL15,
  author       = {Zi{-}Han Lin and
                  Duoyong Sun and
                  Bo Li and
                  Ze Li},
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {Game Analysis on the Counter-Terrorism Cooperation of Shanghai Cooperation
                  Organization},
  booktitle    = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  pages        = {185},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EISIC.2015.24},
  doi          = {10.1109/EISIC.2015.24},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/LinSLL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/MalatrasFB15,
  author       = {Apostolos Malatras and
                  {\'{E}}ric Freyssinet and
                  Laurent Beslay},
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {Mobile Botnets Taxonomy and Challenges},
  booktitle    = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  pages        = {149--152},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EISIC.2015.13},
  doi          = {10.1109/EISIC.2015.13},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/MalatrasFB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/MountN15,
  author       = {Sarah Mount and
                  Robert M. Newman},
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {Energy-Efficient Brute Force Password Cracking},
  booktitle    = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  pages        = {189},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EISIC.2015.50},
  doi          = {10.1109/EISIC.2015.50},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/MountN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Papi15,
  author       = {Francesco Papi},
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {Multi-Sensor d-GLMB Filter for Multi-Target Tracking using Doppler
                  only Measurements},
  booktitle    = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  pages        = {83--89},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EISIC.2015.48},
  doi          = {10.1109/EISIC.2015.48},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/Papi15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Papi15a,
  author       = {Francesco Papi},
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {Constrained d-GLMB Filter for Multi-Target Track-Before-Detect using
                  Radar Measurements},
  booktitle    = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  pages        = {90--97},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EISIC.2015.49},
  doi          = {10.1109/EISIC.2015.49},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/Papi15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/ParkB15,
  author       = {Andrew J. Park and
                  Shawn Buckley},
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {Three-Dimensional Agent-Based Model and Simulation of a Burglar's
                  Target Selection},
  booktitle    = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  pages        = {105--112},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EISIC.2015.39},
  doi          = {10.1109/EISIC.2015.39},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/ParkB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/PassmoreAKGW15,
  author       = {Peter J. Passmore and
                  Simon Attfield and
                  Neesha Kodagoda and
                  Celeste Groenewald and
                  B. L. William Wong},
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {Supporting the Externalisation of Thinking in Criminal Intelligence
                  Analysis},
  booktitle    = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  pages        = {16--23},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EISIC.2015.35},
  doi          = {10.1109/EISIC.2015.35},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/PassmoreAKGW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/PohlHPW15,
  author       = {Margit Pohl and
                  Johanna Haider and
                  Chris Pallaris and
                  B. L. William Wong},
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {Guidelines for Sensemaking in Intelligence Analysis},
  booktitle    = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  pages        = {177},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EISIC.2015.45},
  doi          = {10.1109/EISIC.2015.45},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/PohlHPW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/RajamakiKRVP15,
  author       = {Jyri Rajam{\"{a}}ki and
                  Juha S. Knuuttila and
                  Harri Ruoslahti and
                  Jouni Viitanen and
                  Pasi Patama},
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {Transparent Surveillance of Suspects for Building Trust between Citizens
                  and Their Governments},
  booktitle    = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  pages        = {181},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EISIC.2015.31},
  doi          = {10.1109/EISIC.2015.31},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/RajamakiKRVP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/RajamakiP15,
  author       = {Jyri Rajam{\"{a}}ki and
                  Rauno Pirinen},
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {Critical Infrastructure Protection: Towards a Design Theory for Resilient
                  Software-Intensive Systems},
  booktitle    = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  pages        = {184},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EISIC.2015.32},
  doi          = {10.1109/EISIC.2015.32},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/RajamakiP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/RodheBHK15,
  author       = {Ioana Rodhe and
                  Johan E. Bengtsson and
                  Amund Hunstad and
                  Henrik Karlz{\'{e}}n},
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {Future Schemes for Stronger Verification of the Access Rights of Border
                  Control Inspection Systems},
  booktitle    = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  pages        = {9--15},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EISIC.2015.16},
  doi          = {10.1109/EISIC.2015.16},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/RodheBHK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/SarlatiHM15,
  author       = {Yasaman Sarlati and
                  Sattar Hashemi and
                  Niloofar Mozafari},
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {Adopting Community Features to Detect Social Spammers},
  booktitle    = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  pages        = {153--156},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EISIC.2015.44},
  doi          = {10.1109/EISIC.2015.44},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/SarlatiHM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/SchlehahnAMSLSW15,
  author       = {Eva Schlehahn and
                  Patrick Aichroth and
                  Sebastian Mann and
                  Rudolf Schreiner and
                  Ulrich Lang and
                  Ifan D. H. Shepherd and
                  B. L. William Wong},
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {Benefits and Pitfalls of Predictive Policing},
  booktitle    = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  pages        = {145--148},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EISIC.2015.29},
  doi          = {10.1109/EISIC.2015.29},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/SchlehahnAMSLSW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/SpittersKKS15,
  author       = {Martijn Spitters and
                  Femke Klaver and
                  Gijs Koot and
                  Mark van Staalduinen},
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {Authorship Analysis on Dark Marketplace Forums},
  booktitle    = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  pages        = {1--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EISIC.2015.47},
  doi          = {10.1109/EISIC.2015.47},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/SpittersKKS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/StembertPBCJ15,
  author       = {Nathalie Stembert and
                  Arne Padmos and
                  Mortaza S. Bargh and
                  Sunil Choenni and
                  Frans Jansen},
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {A Study of Preventing Email (Spear) Phishing by Enabling Human Intelligence},
  booktitle    = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  pages        = {113--120},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EISIC.2015.38},
  doi          = {10.1109/EISIC.2015.38},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/StembertPBCJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/TangSLOLL15,
  author       = {Min Tang and
                  Duoyong Sun and
                  Bo Li and
                  Chaomin Ou and
                  Zi{-}Han Lin and
                  Ze Li},
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {Research on the Evaluation Method of National Military Development
                  Based on Net Assessment},
  booktitle    = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  pages        = {129--132},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EISIC.2015.15},
  doi          = {10.1109/EISIC.2015.15},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/TangSLOLL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/VolpettiRMB15,
  author       = {Vito Volpetti and
                  Valentino Ricci and
                  Francesco F. Monai and
                  Francesco Barcio},
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {CBRNe Threat Detection and Monitoring System: Advanced Prototype},
  booktitle    = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  pages        = {186},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EISIC.2015.36},
  doi          = {10.1109/EISIC.2015.36},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/VolpettiRMB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eisic/2015,
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/7366895/proceeding},
  isbn         = {978-1-4799-8657-6},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics