


default search action
EISIC 2012: Odense, Denmark
- Nasrullah Memon, Daniel Zeng:

2012 European Intelligence and Security Informatics Conference, EISIC 2012, Odense, Denmark, August 22-24, 2012. IEEE Computer Society 2012, ISBN 978-1-4673-2358-1
Keynotes
- Henry C. Lee:

The Utilization of Forensic Evidence in IED Incidents. 1-2 - Hsinchun Chen:

From Dark Web to GeoPolitical Web: Exploring the Value of Social Media Informatics. 3 - Clive Best:

OSINT, the Internet and Privacy. 4 - James R. (Bob) Johnson:

Detecting Emergent Terrorism Events: Finding Needles in Information Haystacks. 5-6
Long Papers
- David B. Skillicorn

, Lynnette D. Purda:
Detecting Fraud in Financial Reports. 7-13 - Jyri Rajamäki, Jutta Tervahartiala, Sofia Tervola, Sari Johansson, Leila Ovaska, Paresh Rathod:

How Transparency Improves the Control of Law Enforcement Authorities' Activities? 14-21 - Mariëlle den Hengst, Jan ter Mors:

Community of Intelligence: The Secret Behind Intelligence-Led Policing. 22-29 - Muhammad Adnan Tariq, Joel Brynielsson, Henrik Artman:

Framing the Attacker in Organized Cybercrime. 30-37 - Richard Frank:

SPORS: A Suspect Recommendation System Based on Offenders' Reconstructed Spatial Profile. 38-45 - Mojtaba Eskandari, Zeinab Khorshidpour, Sattar Hashemi

:
To Incorporate Sequential Dynamic Features in Malware Detection Engines. 46-52 - Travis Morris:

Extracting and Networking Emotions in Extremist Propaganda. 53-59 - Natalia Iwanski, Richard Frank, Andrew A. Reid, Vahid Dabbaghian

:
A Computational Model for Predicting the Location of Crime Attractors on a Road Network. 60-67 - Hervé Borrion, Timothy Mitchener-Nissen, Jonathon Taylor

, Ka-Man Lai
:
Countering Bioterrorism: Why Smart Buildings Should Have a Code of Ethics. 68-75 - Elena Camossi

, Tatyana Dimitrova, Aris Tsois:
Detecting Anomalous Maritime Container Itineraries for Anti-fraud and Supply Chain Security. 76-83 - Mortaza S. Bargh, Sunil Choenni, Ingrid Mulder

, Roland Pastoor:
Exploring a Warrior Paradigm to Design Out Cybercrime. 84-90 - Alex Antoniou, Gauri Sinha:

Laundering Sexual Deviance: Targeting Online Pornography through Anti-money Laundering. 91-98 - Richard Frank, Bryan Kinney:

How Many Ways Do Offenders Travel - Evaluating the Activity Paths of Offenders. 99-106 - Koosha Golmohammadi, Osmar R. Zaïane:

Data Mining Applications for Fraud Detection in Securities Market. 107-114 - Duncan Hodges

, Sadie Creese, Michael Goldsmith:
A Model for Identity in the Cyber and Natural Universes. 115-122 - Giusj Digioia, Chiara Foglietta

, Stefano Panzieri
, Alessandro Falleni:
Mixed Holistic Reductionistic Approach for Impact Assessment of Cyber Attacks. 123-130 - Bisharat Rasool Memon

:
Identifying Important Nodes in Weighted Covert Networks Using Generalized Centrality Measures. 131-140 - Justin Sahs, Latifur Khan

:
A Machine Learning Approach to Android Malware Detection. 141-147 - James R. (Bob) Johnson, Anita Miller, Latifur Khan

, Bhavani Thuraisingham:
Measuring Relatedness and Augmentation of Information of Interest within Free Text Law Enforcement Documents. 148-155 - Bryce Westlake

, Martin Bouchard, Richard Frank:
Comparing Methods for Detecting Child Exploitation Content Online. 156-163 - James A. Danowski:

Semantic Network Analysis of Islamist Sources Using Time Slices as Nodes and Semantic Similarity as Link Strengths: Some Implications for Propaganda Analysis about Jihad. 164-171 - Danny Livshitz, Newton Howard

, Yair Neuman:
Can Computers Help Us to Better Understand Different Cultures? Toward a Computer-Based CULINT. 172-179 - Athakorn Kengpol

, Pakorn Neungrit:
A Prediction of Terrorist Distribution Range Radius and Elapsing Time: A Case Study in Southern Parts of Thailand. 180-188 - Fredrik Johansson, Joel Brynielsson, Maribel Narganes Quijano

:
Estimating Citizen Alertness in Crises Using Social Media Monitoring and Analysis. 189-196 - Joel Brynielsson, Andreas Horndahl, Fredrik Johansson, Lisa Kaati, Christian Mårtenson, Pontus Svenson:

Analysis of Weak Signals for Detecting Lone Wolf Terrorists. 197-204 - Navot Akiva, Moshe Koppel:

Identifying Distinct Components of a Multi-author Document. 205-209 - John V. Monaco

, Ned Bakelman, Sung-Hyuk Cha, Charles C. Tappert:
Developing a Keystroke Biometric System for Continual Authentication of Computer Users. 210-216 - Andrew J. Park, Herbert H. Tsang

, Patricia L. Brantingham:
Dynalink: A Framework for Dynamic Criminal Network Visualization. 217-224 - Cor J. Veenman:

Data Base Investigation as a Ranking Problem. 225-231 - Rasmus Rosenqvist Petersen:

Association and Centrality in Criminal Networks. 232-241 - Paul Elzinga, Karl Erich Wolff, Jonas Poelmans:

Analyzing Chat Conversations of Pedophiles with Temporal Relational Semantic Systems. 242-249
Short Papers
- Andi Fitriah Abdul Kadir

, Raja Azrina Raja Othman, Normaziah Abdul Aziz
:
Behavioral Analysis and Visualization of Fast-Flux DNS. 250-253 - Gerhard Backfried, Christian Schmidt, Mark Pfeiffer, Gerald Quirchmayr, Markus Glanzer, Karin Rainer:

Open Source Intelligence in Disaster Management. 254-258 - Newton Howard

:
Perception in International Conflict: An Agent-Based Approach. 259-262 - Anthony Celso:

Al Qaeda Affiliates Operating in Failed States: The Next Front in the War on Terror. 263-267 - Natalia Danilova, David Stupples:

Application of Natural Language Processing and Evidential Analysis to Web-Based Intelligence Information Acquisition. 268-273 - Aaron Hunter:

Structured Documents: Signatures and Deception. 274-277 - Paolo D'Arminio, Ricardo Buendia Iglesias, Janusz Cichowski, Piotr Dalka, Damian Ellwart, Sateesh Pedagadi, James Orwell, Inga Kroener, Daniel Neyland

:
Technologies for Granting Balance between Security and Privacy in Video-Surveillance. 278-283
Posters
- Hervé Borrion, Noémie Bouhana

:
iCARE: A Scenario-Based Method for the RIBS Project. 284 - Jyri Rajamäki, Paresh Rathod, Anu Ahlgren, Johanna Aho, Mari Takari, Sami Ahlgren:

Resilience of Cyber-Physical System: A Case Study of Safe School Environment. 285 - Hanno Langweg:

Information Security Aspects of the 22/7 Attacks. 286 - David E. A. Johnson, Newton Howard

:
Network Intelligence: An Emerging Discipline. 287-288 - Antonis Mouhtaropoulos, Chang-Tsun Li

, Marthie Grobler
:
Proactive Digital Forensics: The Ever-Increasing Need for Standardization. 289 - Tove Gustavi, Pontus Svenson:

Pattern Theory in Intelligence Analysis. 290
The International Symposium on Open Source Intelligence and Web Mining 2012 (OSINT-WM 2012)
- Hirad Asadi, Christian Mårtenson, Pontus Svenson, Magnus Sköld:

The HiTS/ISAC Social Network Analysis Tool. 291-296 - Ala Berzinji, Lisa Kaati, Ahmed Rezine:

Detecting Key Players in Terrorist Networks. 297-302 - James A. Danowski:

Sentiment Network Analysis of Taleban and RFE/RL Open-Source Content about Afghanistan. 303-310
The Workshop on Innovation in Border Control (WIBC 2012)
Long Papers
- Anthony J. Palmer, Chris Hurrey:

Ten Reasons Why IRIS Needed 20: 20 Foresight: Some Lessons for Introducing Biometric Border Control Systems. 311-316 - María Victoria Moreno Cano

, Carolina Piñana-Díaz, Rafael Toledo-Moreo
, Miguel A. Zamora, Antonio Fernandez Gómez-Skarmeta:
Multi-sensor Multi-target Tracking for Infrastructure Protection. 317-322 - Judee K. Burgoon, Lauren Hamel, Tiantian Qin:

Predicting Veracity from Linguistic Indicators. 323-328 - Erick E. Ruiz, K. Larry Head

:
Use of an Automatic Under-Vehicle Inspection System as a Tool to Streamline Vehicle Screening at Ports of Entry and Security Checkpoints. 329-333 - Vanni Zavarella

, Jakub Piskorski, Ana Sofia Esteves, Stefano Bucci:
Refining Border Security News Event Geotagging through Deployment of Lexico-Semantic Patterns. 334-339 - Maciej M. Latek, Seyed M. Mussavi Rizi, Andrew T. Crooks

, Mark Fraser:
Social Simulations for Border Security. 340-345
Short/Demo Papers
- Jeffrey Gainer Proudfoot, Nathan W. Twyman

, Judee K. Burgoon:
A Comparison of Invasive and Noninvasive Sensors in the Concealed Information Test. 346-349 - Mayra Sacanamboy, Bojan Cukic

, Vittorio Cortellessa:
Performance and Risk Analysis for Border Management Applications: A Model-Driven Approach and a Perspective View. 350-352 - Senya Polikovsky, Maria Alejandra Quiros-Ramirez

, Yoshinari Kameda, Yuichi Ohta
, Judee K. Burgoon:
Benchmark Driven Framework for Development of Emotion Sensing Support Systems. 353-355 - Gregorio Ameyugo, Michal Art, Ana Sofia Esteves, Jakub Piskorski:

Creation of an EU-Level Information Exchange Network in the Domain of Border Security. 356-358 - Michal Tanas, Grzegorz Taberski, Witold Holubowicz

, Krzysztof Samp, Agnieszka Spronska, Jakub Glówka, Mateusz Macias:
The TALOS Project - Autonomous Robotic Patrol Vehicles. 359-361 - Archibald Owen, Gregory Duckworth, Jerry Worsley:

OptaSense: Fibre Optic Distributed Acoustic Sensing for Border Monitoring. 362-364

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














