default search action
Search dblp for Publications
export results for "toc:db/conf/eisic/eisic2019.bht:"
@inproceedings{DBLP:conf/eisic/BastasKTVK19, author = {Nikolaos Bastas and George Kalpakis and Theodora Tsikrika and Stefanos Vrochidis and Ioannis Kompatsiaris}, title = {A comparative study of clustering methods using word embeddings}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2019, Oulu, Finland, November 26-27, 2019}, pages = {54--61}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/EISIC49498.2019.9108898}, doi = {10.1109/EISIC49498.2019.9108898}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/BastasKTVK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Bemer19, author = {Fabrizia Bemer}, title = {The Directive 2014/41/UE - The European Investigation Order}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2019, Oulu, Finland, November 26-27, 2019}, pages = {138}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/EISIC49498.2019.9108881}, doi = {10.1109/EISIC49498.2019.9108881}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/Bemer19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/ChenZB19, author = {Chia{-}Ju Chen and Razieh Nokhbeh Zaeem and K. Suzanne Barber}, title = {Statistical Analysis of Identity Risk of Exposure and Cost Using the Ecosystem of Identity Attributes}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2019, Oulu, Finland, November 26-27, 2019}, pages = {32--39}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/EISIC49498.2019.9108859}, doi = {10.1109/EISIC49498.2019.9108859}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/ChenZB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/EgiazarovMZV19, author = {Alexander Egiazarov and Vasileios Mavroeidis and Fabio Massimo Zennaro and Kamer Vishi}, title = {Firearm Detection and Segmentation Using an Ensemble of Semantic Neural Networks}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2019, Oulu, Finland, November 26-27, 2019}, pages = {70--77}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/EISIC49498.2019.9108871}, doi = {10.1109/EISIC49498.2019.9108871}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/EgiazarovMZV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/El-NaggarB19, author = {Susan El{-}Naggar and Thirimachos Bourlai}, title = {Evaluation of Deep Learning Models for Ear Recognition Against Image Distortions}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2019, Oulu, Finland, November 26-27, 2019}, pages = {85--93}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/EISIC49498.2019.9108870}, doi = {10.1109/EISIC49498.2019.9108870}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/El-NaggarB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/ElitzurPZ19, author = {Aviad Elitzur and Rami Puzis and Polina Zilberman}, title = {Attack Hypothesis Generation}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2019, Oulu, Finland, November 26-27, 2019}, pages = {40--47}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/EISIC49498.2019.9108886}, doi = {10.1109/EISIC49498.2019.9108886}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/ElitzurPZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/EpishkinaFKY19, author = {Anna Epishkina and Mikhail Finoshin and Konstantin Kogos and Aleksandra Yazykova}, title = {Timing Covert Channels Detection Cases via Machine Learning}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2019, Oulu, Finland, November 26-27, 2019}, pages = {139}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/EISIC49498.2019.9108873}, doi = {10.1109/EISIC49498.2019.9108873}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/EpishkinaFKY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/FernquistSKJ19, author = {Johan Fernquist and Ola Svenonius and Lisa Kaati and Fredrik Johansson}, title = {Extracting Account Attributes for Analyzing Influence on Twitter}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2019, Oulu, Finland, November 26-27, 2019}, pages = {62--69}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/EISIC49498.2019.9108896}, doi = {10.1109/EISIC49498.2019.9108896}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/FernquistSKJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/FrolovaEK19, author = {Daria Frolova and Anna Epishkina and Konstantin Kogos}, title = {Mobile User Authentication Using Keystroke Dynamics}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2019, Oulu, Finland, November 26-27, 2019}, pages = {140}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/EISIC49498.2019.9108890}, doi = {10.1109/EISIC49498.2019.9108890}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/FrolovaEK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/GarbuzEK19, author = {Alina Garbuz and Anna Epishkina and Konstantin Kogos}, title = {Continuous Authentication of Smartphone Users via Swipes and Taps Analysis}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2019, Oulu, Finland, November 26-27, 2019}, pages = {48--53}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/EISIC49498.2019.9108780}, doi = {10.1109/EISIC49498.2019.9108780}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/GarbuzEK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Guri19, author = {Mordechai Guri}, title = {{HOTSPOT:} Crossing the Air-Gap Between Isolated PCs and Nearby Smartphones Using Temperature}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2019, Oulu, Finland, November 26-27, 2019}, pages = {94--100}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/EISIC49498.2019.9108874}, doi = {10.1109/EISIC49498.2019.9108874}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/Guri19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/HaapamakiMHO19, author = {Eetu Haapam{\"{a}}ki and Juho Mikkola and Markus Hirsim{\"{a}}ki and Mourad Oussalah}, title = {Mining Security discussions in Suomi24}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2019, Oulu, Finland, November 26-27, 2019}, pages = {101--108}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/EISIC49498.2019.9108877}, doi = {10.1109/EISIC49498.2019.9108877}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/HaapamakiMHO19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/KostakosRLO19, author = {Panos Kostakos and Somkiadcharoen Robroo and Bofan Lin and Mourad Oussalah}, title = {Crime Prediction Using Hotel Reviews?}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2019, Oulu, Finland, November 26-27, 2019}, pages = {134--137}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/EISIC49498.2019.9108861}, doi = {10.1109/EISIC49498.2019.9108861}, timestamp = {Fri, 12 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/KostakosRLO19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/LozanoF19, author = {Marianela Garc{\'{\i}}a Lozano and Johan Fernquist}, title = {Identifying Deceptive Reviews: Feature Exploration, Model Transferability and Classification Attack}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2019, Oulu, Finland, November 26-27, 2019}, pages = {109--116}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/EISIC49498.2019.9108852}, doi = {10.1109/EISIC49498.2019.9108852}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/LozanoF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/PandyaKMCG0P19, author = {Abhinay Pandya and Panos Kostakos and Hassan Mehmood and Marta Cort{\'{e}}s and Ekaterina Gilman and Mourad Oussalah and Susanna Pirttikangas}, title = {Privacy preserving sentiment analysis on multiple edge data streams with Apache NiFi}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2019, Oulu, Finland, November 26-27, 2019}, pages = {130--133}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/EISIC49498.2019.9108851}, doi = {10.1109/EISIC49498.2019.9108851}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/PandyaKMCG0P19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/ParkPTFSS19, author = {Andrew J. Park and Lee D. Patterson and Herbert H. Tsang and Ryan Ficocelli and Valerie Spicer and Justin Song}, title = {Devising and Optimizing Crowd Control Strategies Using Agent-Based Modeling and Simulation}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2019, Oulu, Finland, November 26-27, 2019}, pages = {78--84}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/EISIC49498.2019.9108875}, doi = {10.1109/EISIC49498.2019.9108875}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/ParkPTFSS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/PicMT19, author = {Marc Pic and Ga{\"{e}}l Mahfoudi and Anis Trabelsi}, title = {Remote {KYC:} Attacks and Counter-Measures}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2019, Oulu, Finland, November 26-27, 2019}, pages = {126--129}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/EISIC49498.2019.9108787}, doi = {10.1109/EISIC49498.2019.9108787}, timestamp = {Tue, 25 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/PicMT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/RomeoB19, author = {Justin Romeo and Thirimachos Bourlai}, title = {Semi-Automatic Geometric Normalization of Profile Faces}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2019, Oulu, Finland, November 26-27, 2019}, pages = {121--125}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/EISIC49498.2019.9108897}, doi = {10.1109/EISIC49498.2019.9108897}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/RomeoB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Sariola19, author = {Disa Sariola}, title = {A model of quantifying social relationships}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2019, Oulu, Finland, November 26-27, 2019}, pages = {17--23}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/EISIC49498.2019.9108853}, doi = {10.1109/EISIC49498.2019.9108853}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/Sariola19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/SimekMLD19, author = {Olga Simek and Alyssa C. Mensch and Lin Li and Charlie K. Dagli}, title = {Characterization of Disinformation Networks Using Graph Embeddings and Opinion Mining}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2019, Oulu, Finland, November 26-27, 2019}, pages = {117--120}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/EISIC49498.2019.9108876}, doi = {10.1109/EISIC49498.2019.9108876}, timestamp = {Mon, 10 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/SimekMLD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/SimekSH19, author = {Olga Simek and Danelle C. Shah and Andrew Heier}, title = {Prototype and Analytics for Discovery and Exploitation of Threat Networks on Social Media}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2019, Oulu, Finland, November 26-27, 2019}, pages = {9--16}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/EISIC49498.2019.9108895}, doi = {10.1109/EISIC49498.2019.9108895}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/SimekSH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/SutmullerHBVNG19, author = {August Daniel Sutmuller and Mari{\"{e}}lle den Hengst and Ana Isabel Barros and Bob van der Vecht and Wouter Noordkamp and Pieter H. A. J. M. van Gelder}, title = {Predicting the Offender: Frequency versus Bayes}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2019, Oulu, Finland, November 26-27, 2019}, pages = {1--8}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/EISIC49498.2019.9108891}, doi = {10.1109/EISIC49498.2019.9108891}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/SutmullerHBVNG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/ZhuLJ19, author = {Jessica Zhu and Lin Li and Cara Jones}, title = {Identification and Detection of Human Trafficking Using Language Models}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2019, Oulu, Finland, November 26-27, 2019}, pages = {24--31}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/EISIC49498.2019.9108860}, doi = {10.1109/EISIC49498.2019.9108860}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/ZhuLJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eisic/2019, title = {European Intelligence and Security Informatics Conference, {EISIC} 2019, Oulu, Finland, November 26-27, 2019}, publisher = {{IEEE}}, year = {2019}, url = {https://ieeexplore.ieee.org/xpl/conhome/9102321/proceeding}, isbn = {978-1-7281-6735-0}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.