![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp for Publications
export results for "toc:db/conf/eisic/eisic2015.bht:"
@inproceedings{DBLP:conf/eisic/Abuarqoub15, author = {Abdelrahman Abuarqoub}, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {Optimal Mobile Sink Selection Scheme for Multiple Sink Mobile Wireless Sensor Networks}, booktitle = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, pages = {169--172}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EISIC.2015.19}, doi = {10.1109/EISIC.2015.19}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/Abuarqoub15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Al-NooriAL15, author = {Ahmed H. Al{-}Noori and Khamis A. Al{-}Karawi and Francis F. Li}, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {Improving Robustness of Speaker Recognition in Noisy and Reverberant Conditions via Training}, booktitle = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, pages = {180}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EISIC.2015.20}, doi = {10.1109/EISIC.2015.20}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/Al-NooriAL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/AlanaziJ15, author = {Fahad Alanazi and Andrew Jones}, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {The Value of Metadata in Digital Forensics}, booktitle = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, pages = {182}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EISIC.2015.26}, doi = {10.1109/EISIC.2015.26}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/AlanaziJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/AlfayezN15, author = {Fayez Alfayez and Ian Neill}, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {Topology-based Optimization of Linear Wireless Sensor Networks}, booktitle = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, pages = {183}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EISIC.2015.18}, doi = {10.1109/EISIC.2015.18}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/AlfayezN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/AlsumaytHL15, author = {Albandari Alsumayt and John Haggerty and Ahmad Lotfi}, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {Performance, Analysis, and Comparison of MrDR Method to Detect DoS Attacks in {MANET}}, booktitle = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, pages = {121--124}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EISIC.2015.30}, doi = {10.1109/EISIC.2015.30}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/AlsumaytHL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/AshcroftFKOP15, author = {Michael Ashcroft and Ali Fisher and Lisa Kaati and Enghin Omer and Nico Prucha}, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {Detecting Jihadist Messages on Twitter}, booktitle = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, pages = {161--164}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EISIC.2015.27}, doi = {10.1109/EISIC.2015.27}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/AshcroftFKOP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/AshcroftKM15, author = {Michael Ashcroft and Lisa Kaati and Maxime Meyer}, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {A Step Towards Detecting Online Grooming - Identifying Adults Pretending to be Children}, booktitle = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, pages = {98--104}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EISIC.2015.41}, doi = {10.1109/EISIC.2015.41}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/AshcroftKM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/AydinJ15, author = {Mustafa Aydin and Jeremy L. Jacob}, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {Cloud-COVER: Using User Security Attribute Preferences and Propagation Analysis to Prioritise Threats to Systems}, booktitle = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, pages = {53--60}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EISIC.2015.11}, doi = {10.1109/EISIC.2015.11}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/AydinJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/CarvalhoGC15, author = {Rodrigo Carvalho and Michael Goldsmith and Sadie Creese}, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {Applying Semantic Technologies to Fight Online Banking Fraud}, booktitle = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, pages = {61--68}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EISIC.2015.42}, doi = {10.1109/EISIC.2015.42}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/CarvalhoGC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Cayford15, author = {Michelle Cayford}, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {Measures of Success: Developing a Method for Evaluating the Effectiveness of Surveillance Technology}, booktitle = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, pages = {187}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EISIC.2015.33}, doi = {10.1109/EISIC.2015.33}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/Cayford15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/ChanK15, author = {Frodo Kin{-}Sun Chan and Adams Wai{-}Kin Kong}, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {Using Hair Follicles with Leg Geometry to Align Androgenic Hair Patterns}, booktitle = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, pages = {137--140}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EISIC.2015.17}, doi = {10.1109/EISIC.2015.17}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/ChanK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/DhamiC15, author = {Mandeep K. Dhami and Kathryn E. Careless}, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {Ordinal Structure of the Generic Analytic Workflow: {A} Survey of Intelligence Analysts}, booktitle = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, pages = {141--144}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EISIC.2015.37}, doi = {10.1109/EISIC.2015.37}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/DhamiC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/EleyanE15, author = {Amna Eleyan and Derar Eleyan}, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {Forensic Process as a Service (FPaaS) for Cloud Computing}, booktitle = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, pages = {157--160}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EISIC.2015.14}, doi = {10.1109/EISIC.2015.14}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/EleyanE15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/EskridgeCNTP15, author = {Thomas C. Eskridge and Marco M. Carvalho and Fitzroy Nembhard and Hari Thotempudi and Peter J. Polack}, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {Interactive Visualization of Netflow Traffic}, booktitle = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, pages = {188}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EISIC.2015.51}, doi = {10.1109/EISIC.2015.51}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/EskridgeCNTP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/GenzelS15, author = {Carl{-}Heinz Genzel and Richard Sethmann}, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {Custom Transport Interface for the Integration of Trusted Network Connect in German Smart Metering Systems}, booktitle = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, pages = {45--52}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EISIC.2015.25}, doi = {10.1109/EISIC.2015.25}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/GenzelS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/GisslenT15, author = {Linus Gissl{\'{e}}n and Anders T{\"{o}}rne}, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {A Semantic Approach to Information Management and Decision Support: An Application to Humanitarian Demining Operations}, booktitle = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, pages = {75--82}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EISIC.2015.34}, doi = {10.1109/EISIC.2015.34}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/GisslenT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/GuSLL15, author = {Ning Gu and Duoyong Sun and Bo Li and Ze Li}, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {Sentiment Analysis for Topics based on Interaction Chain Model}, booktitle = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, pages = {133--136}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EISIC.2015.23}, doi = {10.1109/EISIC.2015.23}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/GuSLL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/GuanLXSW15, author = {Lei Guan and Zan Li and Song Xiao and Jiangbo Si and Jiajun Wan}, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {A Family of Adaptive Frequency Slot Number {FH} Sequences for High Security and Reliability Communication}, booktitle = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, pages = {30--36}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EISIC.2015.12}, doi = {10.1109/EISIC.2015.12}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/GuanLXSW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/HamadZMT15, author = {Fadi Hamad and Jamal Zraqou and Adi Maaita and Anas Abu Taleb}, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {A Secure Authentication System for ePassport Detection and Verification}, booktitle = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, pages = {173--176}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EISIC.2015.21}, doi = {10.1109/EISIC.2015.21}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/HamadZMT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/HassanMS15, author = {Hatem Hassan and Ahmad Mostafa and Ahmed Shawish}, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {{S-SAC:} Towards a Scalable Secure Access Control Framework for Cloud Storage}, booktitle = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, pages = {165--168}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EISIC.2015.43}, doi = {10.1109/EISIC.2015.43}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/HassanMS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/HegartyH15, author = {Robert Hegarty and John Haggerty}, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {SlackStick: Signature-Based File Identification for Live Digital Forensics Examinations}, booktitle = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, pages = {24--29}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EISIC.2015.28}, doi = {10.1109/EISIC.2015.28}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/HegartyH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/HillemannNA15, author = {Eva{-}Catherine Hillemann and Alexander Nussbaumer and Dietrich Albert}, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {The Role of Cognitive Biases in Criminal Intelligence Analysis and Approaches for their Mitigation}, booktitle = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, pages = {125--128}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EISIC.2015.9}, doi = {10.1109/EISIC.2015.9}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/HillemannNA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/JohanssonGB15, author = {Erik Johansson and Christoffer Gahlin and Anton Borg}, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {Crime Hotspots: An Evaluation of the {KDE} Spatial Mapping Technique}, booktitle = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, pages = {69--74}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EISIC.2015.22}, doi = {10.1109/EISIC.2015.22}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/JohanssonGB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/KashifH15, author = {Mhair Kashif and Zahoor ul Haq}, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {An Optimal Use of Intrusion Detection and Prevention System {(IDPS)}}, booktitle = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, pages = {190}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EISIC.2015.40}, doi = {10.1109/EISIC.2015.40}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/KashifH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Lapayese15, author = {Manuel Jose Gazapo Lapayese}, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {Terrorism and its Transition to Cyberspace}, booktitle = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, pages = {178}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EISIC.2015.46}, doi = {10.1109/EISIC.2015.46}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/Lapayese15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/LiSLLT15, author = {Ze Li and Duoyong Sun and Bo Li and Zi{-}Han Lin and Min Tang}, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {Detecting Changes in Terrorism Networks: {A} Perspective of Multi-Meta-Network Modeling}, booktitle = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, pages = {179}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EISIC.2015.52}, doi = {10.1109/EISIC.2015.52}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/LiSLLT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/LiSLOZ15, author = {Bo Li and Duoyong Sun and Ze Li and Chaomin Ou and Renqi Zhu}, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {Understanding the Dynamic of Covert Organization with Multilayer Networks Model}, booktitle = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, pages = {37--44}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EISIC.2015.10}, doi = {10.1109/EISIC.2015.10}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/LiSLOZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/LinSLL15, author = {Zi{-}Han Lin and Duoyong Sun and Bo Li and Ze Li}, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {Game Analysis on the Counter-Terrorism Cooperation of Shanghai Cooperation Organization}, booktitle = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, pages = {185}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EISIC.2015.24}, doi = {10.1109/EISIC.2015.24}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/LinSLL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/MalatrasFB15, author = {Apostolos Malatras and {\'{E}}ric Freyssinet and Laurent Beslay}, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {Mobile Botnets Taxonomy and Challenges}, booktitle = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, pages = {149--152}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EISIC.2015.13}, doi = {10.1109/EISIC.2015.13}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/MalatrasFB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/MountN15, author = {Sarah Mount and Robert M. Newman}, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {Energy-Efficient Brute Force Password Cracking}, booktitle = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, pages = {189}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EISIC.2015.50}, doi = {10.1109/EISIC.2015.50}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/MountN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Papi15, author = {Francesco Papi}, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {Multi-Sensor d-GLMB Filter for Multi-Target Tracking using Doppler only Measurements}, booktitle = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, pages = {83--89}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EISIC.2015.48}, doi = {10.1109/EISIC.2015.48}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/Papi15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Papi15a, author = {Francesco Papi}, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {Constrained d-GLMB Filter for Multi-Target Track-Before-Detect using Radar Measurements}, booktitle = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, pages = {90--97}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EISIC.2015.49}, doi = {10.1109/EISIC.2015.49}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/Papi15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/ParkB15, author = {Andrew J. Park and Shawn Buckley}, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {Three-Dimensional Agent-Based Model and Simulation of a Burglar's Target Selection}, booktitle = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, pages = {105--112}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EISIC.2015.39}, doi = {10.1109/EISIC.2015.39}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/ParkB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/PassmoreAKGW15, author = {Peter J. Passmore and Simon Attfield and Neesha Kodagoda and Celeste Groenewald and B. L. William Wong}, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {Supporting the Externalisation of Thinking in Criminal Intelligence Analysis}, booktitle = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, pages = {16--23}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EISIC.2015.35}, doi = {10.1109/EISIC.2015.35}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/PassmoreAKGW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/PohlHPW15, author = {Margit Pohl and Johanna Haider and Chris Pallaris and B. L. William Wong}, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {Guidelines for Sensemaking in Intelligence Analysis}, booktitle = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, pages = {177}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EISIC.2015.45}, doi = {10.1109/EISIC.2015.45}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/PohlHPW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/RajamakiKRVP15, author = {Jyri Rajam{\"{a}}ki and Juha S. Knuuttila and Harri Ruoslahti and Jouni Viitanen and Pasi Patama}, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {Transparent Surveillance of Suspects for Building Trust between Citizens and Their Governments}, booktitle = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, pages = {181}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EISIC.2015.31}, doi = {10.1109/EISIC.2015.31}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/RajamakiKRVP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/RajamakiP15, author = {Jyri Rajam{\"{a}}ki and Rauno Pirinen}, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {Critical Infrastructure Protection: Towards a Design Theory for Resilient Software-Intensive Systems}, booktitle = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, pages = {184}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EISIC.2015.32}, doi = {10.1109/EISIC.2015.32}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/RajamakiP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/RodheBHK15, author = {Ioana Rodhe and Johan E. Bengtsson and Amund Hunstad and Henrik Karlz{\'{e}}n}, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {Future Schemes for Stronger Verification of the Access Rights of Border Control Inspection Systems}, booktitle = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, pages = {9--15}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EISIC.2015.16}, doi = {10.1109/EISIC.2015.16}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/RodheBHK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/SarlatiHM15, author = {Yasaman Sarlati and Sattar Hashemi and Niloofar Mozafari}, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {Adopting Community Features to Detect Social Spammers}, booktitle = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, pages = {153--156}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EISIC.2015.44}, doi = {10.1109/EISIC.2015.44}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/SarlatiHM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/SchlehahnAMSLSW15, author = {Eva Schlehahn and Patrick Aichroth and Sebastian Mann and Rudolf Schreiner and Ulrich Lang and Ifan D. H. Shepherd and B. L. William Wong}, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {Benefits and Pitfalls of Predictive Policing}, booktitle = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, pages = {145--148}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EISIC.2015.29}, doi = {10.1109/EISIC.2015.29}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/SchlehahnAMSLSW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/SpittersKKS15, author = {Martijn Spitters and Femke Klaver and Gijs Koot and Mark van Staalduinen}, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {Authorship Analysis on Dark Marketplace Forums}, booktitle = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, pages = {1--8}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EISIC.2015.47}, doi = {10.1109/EISIC.2015.47}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/SpittersKKS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/StembertPBCJ15, author = {Nathalie Stembert and Arne Padmos and Mortaza S. Bargh and Sunil Choenni and Frans Jansen}, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {A Study of Preventing Email (Spear) Phishing by Enabling Human Intelligence}, booktitle = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, pages = {113--120}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EISIC.2015.38}, doi = {10.1109/EISIC.2015.38}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/StembertPBCJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/TangSLOLL15, author = {Min Tang and Duoyong Sun and Bo Li and Chaomin Ou and Zi{-}Han Lin and Ze Li}, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {Research on the Evaluation Method of National Military Development Based on Net Assessment}, booktitle = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, pages = {129--132}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EISIC.2015.15}, doi = {10.1109/EISIC.2015.15}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/TangSLOLL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/VolpettiRMB15, author = {Vito Volpetti and Valentino Ricci and Francesco F. Monai and Francesco Barcio}, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {CBRNe Threat Detection and Monitoring System: Advanced Prototype}, booktitle = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, pages = {186}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EISIC.2015.36}, doi = {10.1109/EISIC.2015.36}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/VolpettiRMB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eisic/2015, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://ieeexplore.ieee.org/xpl/conhome/7366895/proceeding}, isbn = {978-1-4799-8657-6}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.