Search dblp for Publications

export results for "toc:db/conf/eisic/eisic2019.bht:"

 download as .bib file

@inproceedings{DBLP:conf/eisic/BastasKTVK19,
  author       = {Nikolaos Bastas and
                  George Kalpakis and
                  Theodora Tsikrika and
                  Stefanos Vrochidis and
                  Ioannis Kompatsiaris},
  title        = {A comparative study of clustering methods using word embeddings},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2019, Oulu, Finland, November 26-27, 2019},
  pages        = {54--61},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/EISIC49498.2019.9108898},
  doi          = {10.1109/EISIC49498.2019.9108898},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/BastasKTVK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Bemer19,
  author       = {Fabrizia Bemer},
  title        = {The Directive 2014/41/UE - The European Investigation Order},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2019, Oulu, Finland, November 26-27, 2019},
  pages        = {138},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/EISIC49498.2019.9108881},
  doi          = {10.1109/EISIC49498.2019.9108881},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/Bemer19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/ChenZB19,
  author       = {Chia{-}Ju Chen and
                  Razieh Nokhbeh Zaeem and
                  K. Suzanne Barber},
  title        = {Statistical Analysis of Identity Risk of Exposure and Cost Using the
                  Ecosystem of Identity Attributes},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2019, Oulu, Finland, November 26-27, 2019},
  pages        = {32--39},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/EISIC49498.2019.9108859},
  doi          = {10.1109/EISIC49498.2019.9108859},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/ChenZB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/EgiazarovMZV19,
  author       = {Alexander Egiazarov and
                  Vasileios Mavroeidis and
                  Fabio Massimo Zennaro and
                  Kamer Vishi},
  title        = {Firearm Detection and Segmentation Using an Ensemble of Semantic Neural
                  Networks},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2019, Oulu, Finland, November 26-27, 2019},
  pages        = {70--77},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/EISIC49498.2019.9108871},
  doi          = {10.1109/EISIC49498.2019.9108871},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/EgiazarovMZV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/El-NaggarB19,
  author       = {Susan El{-}Naggar and
                  Thirimachos Bourlai},
  title        = {Evaluation of Deep Learning Models for Ear Recognition Against Image
                  Distortions},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2019, Oulu, Finland, November 26-27, 2019},
  pages        = {85--93},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/EISIC49498.2019.9108870},
  doi          = {10.1109/EISIC49498.2019.9108870},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/El-NaggarB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/ElitzurPZ19,
  author       = {Aviad Elitzur and
                  Rami Puzis and
                  Polina Zilberman},
  title        = {Attack Hypothesis Generation},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2019, Oulu, Finland, November 26-27, 2019},
  pages        = {40--47},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/EISIC49498.2019.9108886},
  doi          = {10.1109/EISIC49498.2019.9108886},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/ElitzurPZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/EpishkinaFKY19,
  author       = {Anna Epishkina and
                  Mikhail Finoshin and
                  Konstantin Kogos and
                  Aleksandra Yazykova},
  title        = {Timing Covert Channels Detection Cases via Machine Learning},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2019, Oulu, Finland, November 26-27, 2019},
  pages        = {139},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/EISIC49498.2019.9108873},
  doi          = {10.1109/EISIC49498.2019.9108873},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/EpishkinaFKY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/FernquistSKJ19,
  author       = {Johan Fernquist and
                  Ola Svenonius and
                  Lisa Kaati and
                  Fredrik Johansson},
  title        = {Extracting Account Attributes for Analyzing Influence on Twitter},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2019, Oulu, Finland, November 26-27, 2019},
  pages        = {62--69},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/EISIC49498.2019.9108896},
  doi          = {10.1109/EISIC49498.2019.9108896},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/FernquistSKJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/FrolovaEK19,
  author       = {Daria Frolova and
                  Anna Epishkina and
                  Konstantin Kogos},
  title        = {Mobile User Authentication Using Keystroke Dynamics},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2019, Oulu, Finland, November 26-27, 2019},
  pages        = {140},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/EISIC49498.2019.9108890},
  doi          = {10.1109/EISIC49498.2019.9108890},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/FrolovaEK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/GarbuzEK19,
  author       = {Alina Garbuz and
                  Anna Epishkina and
                  Konstantin Kogos},
  title        = {Continuous Authentication of Smartphone Users via Swipes and Taps
                  Analysis},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2019, Oulu, Finland, November 26-27, 2019},
  pages        = {48--53},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/EISIC49498.2019.9108780},
  doi          = {10.1109/EISIC49498.2019.9108780},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/GarbuzEK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Guri19,
  author       = {Mordechai Guri},
  title        = {{HOTSPOT:} Crossing the Air-Gap Between Isolated PCs and Nearby Smartphones
                  Using Temperature},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2019, Oulu, Finland, November 26-27, 2019},
  pages        = {94--100},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/EISIC49498.2019.9108874},
  doi          = {10.1109/EISIC49498.2019.9108874},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/Guri19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/HaapamakiMHO19,
  author       = {Eetu Haapam{\"{a}}ki and
                  Juho Mikkola and
                  Markus Hirsim{\"{a}}ki and
                  Mourad Oussalah},
  title        = {Mining Security discussions in Suomi24},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2019, Oulu, Finland, November 26-27, 2019},
  pages        = {101--108},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/EISIC49498.2019.9108877},
  doi          = {10.1109/EISIC49498.2019.9108877},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/HaapamakiMHO19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/KostakosRLO19,
  author       = {Panos Kostakos and
                  Somkiadcharoen Robroo and
                  Bofan Lin and
                  Mourad Oussalah},
  title        = {Crime Prediction Using Hotel Reviews?},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2019, Oulu, Finland, November 26-27, 2019},
  pages        = {134--137},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/EISIC49498.2019.9108861},
  doi          = {10.1109/EISIC49498.2019.9108861},
  timestamp    = {Fri, 12 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/KostakosRLO19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/LozanoF19,
  author       = {Marianela Garc{\'{\i}}a Lozano and
                  Johan Fernquist},
  title        = {Identifying Deceptive Reviews: Feature Exploration, Model Transferability
                  and Classification Attack},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2019, Oulu, Finland, November 26-27, 2019},
  pages        = {109--116},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/EISIC49498.2019.9108852},
  doi          = {10.1109/EISIC49498.2019.9108852},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/LozanoF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/PandyaKMCG0P19,
  author       = {Abhinay Pandya and
                  Panos Kostakos and
                  Hassan Mehmood and
                  Marta Cort{\'{e}}s and
                  Ekaterina Gilman and
                  Mourad Oussalah and
                  Susanna Pirttikangas},
  title        = {Privacy preserving sentiment analysis on multiple edge data streams
                  with Apache NiFi},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2019, Oulu, Finland, November 26-27, 2019},
  pages        = {130--133},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/EISIC49498.2019.9108851},
  doi          = {10.1109/EISIC49498.2019.9108851},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/PandyaKMCG0P19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/ParkPTFSS19,
  author       = {Andrew J. Park and
                  Lee D. Patterson and
                  Herbert H. Tsang and
                  Ryan Ficocelli and
                  Valerie Spicer and
                  Justin Song},
  title        = {Devising and Optimizing Crowd Control Strategies Using Agent-Based
                  Modeling and Simulation},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2019, Oulu, Finland, November 26-27, 2019},
  pages        = {78--84},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/EISIC49498.2019.9108875},
  doi          = {10.1109/EISIC49498.2019.9108875},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/ParkPTFSS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/PicMT19,
  author       = {Marc Pic and
                  Ga{\"{e}}l Mahfoudi and
                  Anis Trabelsi},
  title        = {Remote {KYC:} Attacks and Counter-Measures},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2019, Oulu, Finland, November 26-27, 2019},
  pages        = {126--129},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/EISIC49498.2019.9108787},
  doi          = {10.1109/EISIC49498.2019.9108787},
  timestamp    = {Tue, 25 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/PicMT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/RomeoB19,
  author       = {Justin Romeo and
                  Thirimachos Bourlai},
  title        = {Semi-Automatic Geometric Normalization of Profile Faces},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2019, Oulu, Finland, November 26-27, 2019},
  pages        = {121--125},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/EISIC49498.2019.9108897},
  doi          = {10.1109/EISIC49498.2019.9108897},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/RomeoB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Sariola19,
  author       = {Disa Sariola},
  title        = {A model of quantifying social relationships},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2019, Oulu, Finland, November 26-27, 2019},
  pages        = {17--23},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/EISIC49498.2019.9108853},
  doi          = {10.1109/EISIC49498.2019.9108853},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/Sariola19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/SimekMLD19,
  author       = {Olga Simek and
                  Alyssa C. Mensch and
                  Lin Li and
                  Charlie K. Dagli},
  title        = {Characterization of Disinformation Networks Using Graph Embeddings
                  and Opinion Mining},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2019, Oulu, Finland, November 26-27, 2019},
  pages        = {117--120},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/EISIC49498.2019.9108876},
  doi          = {10.1109/EISIC49498.2019.9108876},
  timestamp    = {Mon, 10 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/SimekMLD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/SimekSH19,
  author       = {Olga Simek and
                  Danelle C. Shah and
                  Andrew Heier},
  title        = {Prototype and Analytics for Discovery and Exploitation of Threat Networks
                  on Social Media},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2019, Oulu, Finland, November 26-27, 2019},
  pages        = {9--16},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/EISIC49498.2019.9108895},
  doi          = {10.1109/EISIC49498.2019.9108895},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/SimekSH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/SutmullerHBVNG19,
  author       = {August Daniel Sutmuller and
                  Mari{\"{e}}lle den Hengst and
                  Ana Isabel Barros and
                  Bob van der Vecht and
                  Wouter Noordkamp and
                  Pieter H. A. J. M. van Gelder},
  title        = {Predicting the Offender: Frequency versus Bayes},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2019, Oulu, Finland, November 26-27, 2019},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/EISIC49498.2019.9108891},
  doi          = {10.1109/EISIC49498.2019.9108891},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/SutmullerHBVNG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/ZhuLJ19,
  author       = {Jessica Zhu and
                  Lin Li and
                  Cara Jones},
  title        = {Identification and Detection of Human Trafficking Using Language Models},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2019, Oulu, Finland, November 26-27, 2019},
  pages        = {24--31},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/EISIC49498.2019.9108860},
  doi          = {10.1109/EISIC49498.2019.9108860},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/ZhuLJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eisic/2019,
  title        = {European Intelligence and Security Informatics Conference, {EISIC}
                  2019, Oulu, Finland, November 26-27, 2019},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/9102321/proceeding},
  isbn         = {978-1-7281-6735-0},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}