default search action
EISIC 2012: Odense, Denmark
- Nasrullah Memon, Daniel Zeng:
2012 European Intelligence and Security Informatics Conference, EISIC 2012, Odense, Denmark, August 22-24, 2012. IEEE Computer Society 2012, ISBN 978-1-4673-2358-1
Keynotes
- Henry C. Lee:
The Utilization of Forensic Evidence in IED Incidents. 1-2 - Hsinchun Chen:
From Dark Web to GeoPolitical Web: Exploring the Value of Social Media Informatics. 3 - Clive Best:
OSINT, the Internet and Privacy. 4 - James R. (Bob) Johnson:
Detecting Emergent Terrorism Events: Finding Needles in Information Haystacks. 5-6
Long Papers
- David B. Skillicorn, Lynnette D. Purda:
Detecting Fraud in Financial Reports. 7-13 - Jyri Rajamäki, Jutta Tervahartiala, Sofia Tervola, Sari Johansson, Leila Ovaska, Paresh Rathod:
How Transparency Improves the Control of Law Enforcement Authorities' Activities? 14-21 - Mariëlle den Hengst, Jan ter Mors:
Community of Intelligence: The Secret Behind Intelligence-Led Policing. 22-29 - Muhammad Adnan Tariq, Joel Brynielsson, Henrik Artman:
Framing the Attacker in Organized Cybercrime. 30-37 - Richard Frank:
SPORS: A Suspect Recommendation System Based on Offenders' Reconstructed Spatial Profile. 38-45 - Mojtaba Eskandari, Zeinab Khorshidpour, Sattar Hashemi:
To Incorporate Sequential Dynamic Features in Malware Detection Engines. 46-52 - Travis Morris:
Extracting and Networking Emotions in Extremist Propaganda. 53-59 - Natalia Iwanski, Richard Frank, Andrew A. Reid, Vahid Dabbaghian:
A Computational Model for Predicting the Location of Crime Attractors on a Road Network. 60-67 - Hervé Borrion, Timothy Mitchener-Nissen, Jonathon Taylor, Ka-Man Lai:
Countering Bioterrorism: Why Smart Buildings Should Have a Code of Ethics. 68-75 - Elena Camossi, Tatyana Dimitrova, Aris Tsois:
Detecting Anomalous Maritime Container Itineraries for Anti-fraud and Supply Chain Security. 76-83 - Mortaza S. Bargh, Sunil Choenni, Ingrid Mulder, Roland Pastoor:
Exploring a Warrior Paradigm to Design Out Cybercrime. 84-90 - Alex Antoniou, Gauri Sinha:
Laundering Sexual Deviance: Targeting Online Pornography through Anti-money Laundering. 91-98 - Richard Frank, Bryan Kinney:
How Many Ways Do Offenders Travel - Evaluating the Activity Paths of Offenders. 99-106 - Koosha Golmohammadi, Osmar R. Zaïane:
Data Mining Applications for Fraud Detection in Securities Market. 107-114 - Duncan Hodges, Sadie Creese, Michael Goldsmith:
A Model for Identity in the Cyber and Natural Universes. 115-122 - Giusj Digioia, Chiara Foglietta, Stefano Panzieri, Alessandro Falleni:
Mixed Holistic Reductionistic Approach for Impact Assessment of Cyber Attacks. 123-130 - Bisharat Rasool Memon:
Identifying Important Nodes in Weighted Covert Networks Using Generalized Centrality Measures. 131-140 - Justin Sahs, Latifur Khan:
A Machine Learning Approach to Android Malware Detection. 141-147 - James R. (Bob) Johnson, Anita Miller, Latifur Khan, Bhavani Thuraisingham:
Measuring Relatedness and Augmentation of Information of Interest within Free Text Law Enforcement Documents. 148-155 - Bryce Westlake, Martin Bouchard, Richard Frank:
Comparing Methods for Detecting Child Exploitation Content Online. 156-163 - James A. Danowski:
Semantic Network Analysis of Islamist Sources Using Time Slices as Nodes and Semantic Similarity as Link Strengths: Some Implications for Propaganda Analysis about Jihad. 164-171 - Danny Livshitz, Newton Howard, Yair Neuman:
Can Computers Help Us to Better Understand Different Cultures? Toward a Computer-Based CULINT. 172-179 - Athakorn Kengpol, Pakorn Neungrit:
A Prediction of Terrorist Distribution Range Radius and Elapsing Time: A Case Study in Southern Parts of Thailand. 180-188 - Fredrik Johansson, Joel Brynielsson, Maribel Narganes Quijano:
Estimating Citizen Alertness in Crises Using Social Media Monitoring and Analysis. 189-196 - Joel Brynielsson, Andreas Horndahl, Fredrik Johansson, Lisa Kaati, Christian Mårtenson, Pontus Svenson:
Analysis of Weak Signals for Detecting Lone Wolf Terrorists. 197-204 - Navot Akiva, Moshe Koppel:
Identifying Distinct Components of a Multi-author Document. 205-209 - John V. Monaco, Ned Bakelman, Sung-Hyuk Cha, Charles C. Tappert:
Developing a Keystroke Biometric System for Continual Authentication of Computer Users. 210-216 - Andrew J. Park, Herbert H. Tsang, Patricia L. Brantingham:
Dynalink: A Framework for Dynamic Criminal Network Visualization. 217-224 - Cor J. Veenman:
Data Base Investigation as a Ranking Problem. 225-231 - Rasmus Rosenqvist Petersen:
Association and Centrality in Criminal Networks. 232-241 - Paul Elzinga, Karl Erich Wolff, Jonas Poelmans:
Analyzing Chat Conversations of Pedophiles with Temporal Relational Semantic Systems. 242-249
Short Papers
- Andi Fitriah Abdul Kadir, Raja Azrina Raja Othman, Normaziah Abdul Aziz:
Behavioral Analysis and Visualization of Fast-Flux DNS. 250-253 - Gerhard Backfried, Christian Schmidt, Mark Pfeiffer, Gerald Quirchmayr, Markus Glanzer, Karin Rainer:
Open Source Intelligence in Disaster Management. 254-258 - Newton Howard:
Perception in International Conflict: An Agent-Based Approach. 259-262 - Anthony Celso:
Al Qaeda Affiliates Operating in Failed States: The Next Front in the War on Terror. 263-267 - Natalia Danilova, David Stupples:
Application of Natural Language Processing and Evidential Analysis to Web-Based Intelligence Information Acquisition. 268-273 - Aaron Hunter:
Structured Documents: Signatures and Deception. 274-277 - Paolo D'Arminio, Ricardo Buendia Iglesias, Janusz Cichowski, Piotr Dalka, Damian Ellwart, Sateesh Pedagadi, James Orwell, Inga Kroener, Daniel Neyland:
Technologies for Granting Balance between Security and Privacy in Video-Surveillance. 278-283
Posters
- Hervé Borrion, Noémie Bouhana:
iCARE: A Scenario-Based Method for the RIBS Project. 284 - Jyri Rajamäki, Paresh Rathod, Anu Ahlgren, Johanna Aho, Mari Takari, Sami Ahlgren:
Resilience of Cyber-Physical System: A Case Study of Safe School Environment. 285 - Hanno Langweg:
Information Security Aspects of the 22/7 Attacks. 286 - David E. A. Johnson, Newton Howard:
Network Intelligence: An Emerging Discipline. 287-288 - Antonis Mouhtaropoulos, Chang-Tsun Li, Marthie Grobler:
Proactive Digital Forensics: The Ever-Increasing Need for Standardization. 289 - Tove Gustavi, Pontus Svenson:
Pattern Theory in Intelligence Analysis. 290
The International Symposium on Open Source Intelligence and Web Mining 2012 (OSINT-WM 2012)
- Hirad Asadi, Christian Mårtenson, Pontus Svenson, Magnus Sköld:
The HiTS/ISAC Social Network Analysis Tool. 291-296 - Ala Berzinji, Lisa Kaati, Ahmed Rezine:
Detecting Key Players in Terrorist Networks. 297-302 - James A. Danowski:
Sentiment Network Analysis of Taleban and RFE/RL Open-Source Content about Afghanistan. 303-310
The Workshop on Innovation in Border Control (WIBC 2012)
Long Papers
- Anthony J. Palmer, Chris Hurrey:
Ten Reasons Why IRIS Needed 20: 20 Foresight: Some Lessons for Introducing Biometric Border Control Systems. 311-316 - María Victoria Moreno Cano, Carolina Piñana-Díaz, Rafael Toledo-Moreo, Miguel A. Zamora, Antonio Fernandez Gómez-Skarmeta:
Multi-sensor Multi-target Tracking for Infrastructure Protection. 317-322 - Judee K. Burgoon, Lauren Hamel, Tiantian Qin:
Predicting Veracity from Linguistic Indicators. 323-328 - Erick E. Ruiz, K. Larry Head:
Use of an Automatic Under-Vehicle Inspection System as a Tool to Streamline Vehicle Screening at Ports of Entry and Security Checkpoints. 329-333 - Vanni Zavarella, Jakub Piskorski, Ana Sofia Esteves, Stefano Bucci:
Refining Border Security News Event Geotagging through Deployment of Lexico-Semantic Patterns. 334-339 - Maciej M. Latek, Seyed M. Mussavi Rizi, Andrew T. Crooks, Mark Fraser:
Social Simulations for Border Security. 340-345
Short/Demo Papers
- Jeffrey Gainer Proudfoot, Nathan W. Twyman, Judee K. Burgoon:
A Comparison of Invasive and Noninvasive Sensors in the Concealed Information Test. 346-349 - Mayra Sacanamboy, Bojan Cukic, Vittorio Cortellessa:
Performance and Risk Analysis for Border Management Applications: A Model-Driven Approach and a Perspective View. 350-352 - Senya Polikovsky, Maria Alejandra Quiros-Ramirez, Yoshinari Kameda, Yuichi Ohta, Judee K. Burgoon:
Benchmark Driven Framework for Development of Emotion Sensing Support Systems. 353-355 - Gregorio Ameyugo, Michal Art, Ana Sofia Esteves, Jakub Piskorski:
Creation of an EU-Level Information Exchange Network in the Domain of Border Security. 356-358 - Michal Tanas, Grzegorz Taberski, Witold Holubowicz, Krzysztof Samp, Agnieszka Spronska, Jakub Glówka, Mateusz Macias:
The TALOS Project - Autonomous Robotic Patrol Vehicles. 359-361 - Archibald Owen, Gregory Duckworth, Jerry Worsley:
OptaSense: Fibre Optic Distributed Acoustic Sensing for Border Monitoring. 362-364
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.