default search action
EISIC 2011: Athens, Greece
- European Intelligence and Security Informatics Conference, EISIC 2011, Athens, Greece, September 12-14, 2011. IEEE Computer Soecity 2011, ISBN 978-1-4577-1464-1
- Hsinchun Chen:
Dark Web: Exploring and Mining the Dark Side of the Web. 1-2 - Patricia L. Brantingham:
Computational Criminology. 3 - Bhavani Thuraisingham:
Data Mining for Malicious Code Detection and Security Applications. 4-5 - Gerhard Wagner:
Desktop Text Mining for Open Source Intelligence. 6 - Roman Yangarber:
Discovering Complex Networks of Events and Relations in News Surveillance. 7 - Joe Parry:
Visualisation for Decision-Makers. 8 - Gianluca Sensidoni:
Who, What, When, Where and How: Semantics Semantics Help Connect the Dots. 9 - Roozbeh Farahbod, Vladimir Avram, Uwe Glässer, Adel Guitouni:
Engineering Situation Analysis Decision Support Systems. 10-18 - James R. (Bob) Johnson, Anita Miller, Latifur Khan:
Law Enforcement Ontology for Identification of Related Information of Interest Across Free Text Dcouments. 19-27 - Gorazd Mesko, Igor Bernik:
Cybercrime: Awareness and Fear: Slovenian Perspectives. 28-33 - Mike Redford:
U.S. and EU Legislation on Cybercrime. 34-37 - Jakub Piskorski, Jenya Belayeva, Martin Atkinson:
On Refining Real-Time Multilingual News Event Extraction through Deployment of Cross-Lingual Information Fusion Techniques. 38-45 - M. Temurhan, Ronald Meijer, Sunil Choenni, M. van Ooyen-Houben, G. Cruts, Margriet van Laar:
Capture-Recapture Method for Estimating the Number of Problem Drug Users: The Case of the Netherlands. 46-51 - Dale Elvy:
Terrorism, Threat and Time: The Mediating Effect of Terrorist Threat on Public Willingness to Forego Civil Liberties. 52-57 - Clive Best:
Challenges in Open Source Intelligence. 58-62 - Andrew J. Park, Eunju Hwang, Valerie Spicer, Connie Cheng, Patricia L. Brantingham, Andrew Sixsmith:
Testing Elderly People's Fear of Crime Using a Virtual Environment. 63-69 - Natalia Iwanski, Richard Frank, Vahid Dabbaghian, Andrew A. Reid, Patricia L. Brantingham:
Analyzing an Offender's Journey to Crime: A Criminal Movement Model (CriMM). 70-77 - Robyn Torok:
The Online Institution: Psychiatric Power as an Explanatory Model for the Normalisation of Radicalisation and Terrorism. 78-85 - Richard Frank, Martin A. Andresen, Connie Cheng, Patricia L. Brantingham:
Finding Criminal Attractors Based on Offenders' Directionality of Crimes. 86-93 - Paul J. Brantingham, Amir H. Ghaseminejad, Patricia L. Brantingham:
The Distribution of Event Complexity in the British Columbia Court System: An Analysis Based on the CourBC Analytical System. 94-99 - James A. Danowski, Han Woo Park:
Web Network and Content Changes Associated with the 2011 Muslim Middle-East and North African Early Uprisings: A Naturalistic Field Experiment. 100-107 - Charalampos Doulaverakis, Nikolaos Konstantinou, Thomas Knape, Ioannis Kompatsiaris, John Soldatos:
An Approach to Intelligent Information Fusion in Sensor Saturated Urban Environments. 108-115 - Sarwat Nizamani, Nasrullah Memon:
Evolution of Terrorist Network Using Clustered Approach: A Case Study. 116-122 - Pir Abdul Rasool Qureshi, Nasrullah Memon, Uffe Kock Wiil, Panagiotis Karampelas, Jose Ignacio Nieto Sancheze:
Harvesting Information from Heterogeneous Sources. 123-128 - Pir Abdul Rasool Qureshi, Nasrullah Memon:
Statistical Model for Content Extraction. 129-134 - Soren Matz:
Public-Private Resilience: State vs. Private Conceptions of Security Risk Management in Danish Cyber-based Critical Infrastructures. 135-141 - Ulrik Spak, Mats Lind:
Change Blindness in Intelligence: Effects of Attention Guidance by Instructions. 142-148 - Xufang Li, Peter K. K. Loh, Freddy Tan:
Mechanisms of Polymorphic and Metamorphic Viruses. 149-154 - Johan Dahlin, Pontus Svenson:
A Method for Community Detection in Uncertain Networks. 155-162 - Kila Joffres, Martin Bouchard, Richard Frank, Bryce Westlake:
Strategies to Disrupt Online Child Pornography Networks. 163-170 - Bruce A. Desmarais, Skyler J. Cranmer:
Forecasting the Locational Dynamics of Transnational Terrorism: A Network Analytic Approach. 171-177 - P. K. Agrawal, Brij B. Gupta, Satbir Jain:
SVM Based Scheme for Predicting Number of Zombies in a DDoS Attack. 178-182 - Abdulrahman Alruban, Emlyn Everitt:
Two Novel 802.1x Denial of Service Attacks. 183-190 - Antonis Mouhtaropoulos, Marthie Grobler, Chang-Tsun Li:
Digital Forensic Readiness: An Insight into Governmental and Academic Initiatives. 191-196 - Rasmus Rosenqvist Petersen, Uffe Kock Wiil:
CrimeFighter Investigator: A Novel Tool for Criminal Network Investigation. 197-202 - Andre J. Hoogstrate, Chris A. J. Klaassen:
Minimizing the Average Number of Inspections for Detecting Rare Items in Finite Populations. 203-208 - Frank Wehinger:
The Dark Net: Self-Regulation Dynamics of Illegal Online Markets for Identities and Related Services. 209-213 - Kristin Glass, Richard Colbaugh:
Web Analytics for Security Informatics. 214-219 - Azzam Mourad, Hadi Otrok, Sara Ayoubi:
Toward Systematic Integration of Security Policies into Web Services. 220-223 - Aaron Mannes, J. Shakarian, Amy Sliva, V. S. Subrahmanian:
A Computationally-Enabled Analysis of Lashkar-e-Taiba Attacks in Jammu and Kashmir. 224-229 - Mihael Plevnik, Iztok Podbregar:
The Need to Introduce a New Tactical Telecommunication System in the Slovenian Army. 230-233 - Seyed Hamidreza Mohades Kasaei, Seyed Mohammadreza Mohades Kasaei:
Extraction and Recognition of the Vehicle License Plate for Passing under Outside Environment. 234-237 - Hans Önnerud, Sara Wallin, Henric Östmark:
Localisation of Threat Substances in Urban Society - LOTUS: Tomorrow's System for Finding Illicit Manufacturing of Drugs and Home Made Explosives. 238-243 - Lorraine Bowman-Grieve:
A Psychological Perspective on Virtual Communities Supporting Terrorist and Extremist Ideologies as a Tool for Recruitment. 244-247 - Newton Howard:
Global Defense Policy System of Laws: Graph Theory Approach to Balance of Power Theory. 248-258 - Raydel Montesino, Stefan Fenz:
Automation Possibilities in Information Security Management. 259-262 - Duo-Yong Sun, Shu-Quan Guo, Xiao-Peng Liu, Jiang Li:
Multi-relational Network Analysis for Covert Organizations. 263-268 - Guido Barbian:
Detecting Hidden Friendship in Online Social Network. 269-272 - James F. Morris, Keith Anthony, Kevin T. Kennedy, Richard F. Deckro:
Extraction Distractions: A Comparison of Social Network Model Construction Methods. 273-276 - Olga Vybornova, Ivan V. Smirnov, Ilya Sochenkov, Alexander Kiselyov, Ilya Tikhomirov, Natalya V. Chudova, Yulia Kuznetsova, Gennady S. Osipov:
Social Tension Detection and Intention Recognition Using Natural Language Semantic Analysis: On the Material of Russian-Speaking Social Networks and Web Forums. 277-281 - Peter Kieseberg, Sebastian Schrittwieser, Martin Mulazzani, Markus Huber, Edgar R. Weippl:
Trees Cannot Lie: Using Data Structures for Forensics Purposes. 282-285 - Anupama Mishra, Brij B. Gupta, Ramesh Chandra Joshi:
A Comparative Study of Distributed Denial of Service Attacks, Intrusion Tolerance and Mitigation Techniques. 286-289 - Irina Sakharova:
Analysis of the Financial Crisis of 2007-2009 and Its Impact on Terrorism. 290 - Peter Eachus, Ben Short:
Decision Support System for Intelligence Analysts. 291 - Robert Forsgren, Andreas Horndahl, Pontus Svenson, Edward Tjörnhammar:
Information Fusion for Port Security Decision Support. 292 - Chaditsa Poulatova:
The Media: A Terrorist Tool or a Silent Ally? 293 - Massimiliano Argiolu, Fabio Bisogni:
Video Analytics: Opportunity or Spoof Story? The State of the Art of Intelligent Video Surveillance. 294 - Lisa Kaati, Pontus Svenson:
Analysis of Competing Hypothesis for Investigating Lone Wolf Terrorist. 295-299 - M. A. J. Bourassa, J. Fugère, David B. Skillicorn:
Interestingness - Directing Analyst Focus to Significant Data. 300-307 - Sukru Tikves, Sujogya Banerjee, Hamy Temkit, Sedat Gokalp, Hasan Davulcu, Arunabha Sen, Steven R. Corman, Mark Woodward, Inayah Rohmaniyah, Ali Amin:
A System for Ranking Organizations Using Social Scale Analysis. 308-313 - James A. Danowski:
Changes in Muslim Nations' Centrality Mined from Open-Source World Jihad News: A Comparison of Networks in Late 2010, Early 2011, and Post-Bin Laden. 314-321 - Bénédicte Goujon:
Text Mining for Opinion Target Detection. 322-326 - Richard Colbaugh, Kristin Glass:
Agile Sentiment Analysis of Social Media Content for Security Informatics Applications. 327-331 - Yin-Fu Huang, Po-Lun Liou:
Retrieving Representative Structures from XML Documents Using Clustering Techniques. 332-339 - Nicolas Martin, Khaled Khelif:
Focused Crawling Using Name Disambiguation on Search Engine Results. 340-345 - Fredrik Johansson, Joel Brynielsson, Pontus Hörling, Michael Malm, Christian Mårtenson, Staffan Truvé, Magnus Rosell:
Detecting Emergent Conflicts through Web Mining and Visualization. 346-353 - John P. Dickerson, Aaron Mannes, V. S. Subrahmanian:
Dealing with Lashkar-e-Taiba: A Multi-player Game-Theoretic Perspective. 354-359 - Rasmus Rosenqvist Petersen, Christopher J. Rhodes, Uffe Kock Wiil:
Node Removal in Criminal Networks. 360-365 - Mahmood Hussain Shah, Romanus Izuchukwu Okeke:
A Framework for Internal Identity Theft Prevention in Retail Industry. 366-371 - Guido Barbian:
Trust Centrality in Online Social Networks. 372-377 - Yonca Ustunbas, Sule Gündüz Ögüdücü:
A Recommendation Model for Social Resource Sharing Systems Based on Tripartite Graph Clustering. 378-381 - Clive Best, David Horby:
IQ - A Web Mining Tool. 382-384 - Vasileios Anastopoulos, Panagiotis Karampelas, Panagiotis Kalagiakos, Reda Alhajj:
A Hybrid Framework for Building a Web-Page Recommender System. 385-390 - Alejandro Fernández-Cernuda Diaz:
Technology vs. Infoxication - The Challenges of Obtaining Intelligence from the Buzz. 391
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.