default search action
EISIC 2016: Uppsala, Sweden
- Joel Brynielsson, Fredrik Johansson:
2016 European Intelligence and Security Informatics Conference, EISIC 2016, Uppsala, Sweden, August 17-19, 2016. IEEE Computer Society 2016, ISBN 978-1-5090-2857-3
Long Papers
- Roger Clarke:
Quality Assurance for Security Applications of Big Data. 1-8 - Svorad Stolc, Peter Wild, Kristián Valentín, Franz Daubner, Markus Clabian:
On Interoperability of Security Document Reading Devices. 9-15 - Richard Frank, Mitch Macdonald, Bryan Monk:
Location, Location, Location: Mapping Potential Canadian Targets in Online Hacker Discussion Forums. 16-23 - Jeroen Pijpker, Harald P. E. Vranken:
The Role of Internet Service Providers in Botnet Mitigation. 24-31 - Razieh Nokhbeh Zaeem, Monisha Manoharan, K. Suzanne Barber:
Risk Kit: Highlighting Vulnerable Identity Assets for Specific Age Groups. 32-38 - Bénédicte Goujon:
How to Support the Decision Making in Crisis Context? 39-44 - Mustafa Aydin, Jeremy L. Jacob:
Providing Extensibility to Threat Modelling in Cloud-COVER's Underlying Analysis Model. 45-51 - Magdalena Granåsen, Maja Karasalo:
Methodology and Tool to Facilitate Structured Analysis of Multiple Hypotheses. 52-59 - Mariam Nouh, Jason R. C. Nurse, Michael Goldsmith:
Towards Designing a Multipurpose Cybercrime Intelligence Framework. 60-67 - Nallini Selvaraj, Simon Attfield, Peter J. Passmore, B. L. William Wong:
How Analysts Think: Think-steps as a Tool for Structuring Sensemaking in Criminal Intelligence Analysis. 68-75
Short Papers
- Peter Wild, Svorad Stolc, Kristián Valentín, Franz Daubner, Markus Clabian:
Compression Effects on Security Document Images. 76-79 - Alexander Mikhaylov, Richard Frank:
Cards, Money and Two Hacking Forums: An Analysis of Online Money Laundering Schemes. 80-83 - Blaz Ivanc, Borka Jerman Blazic:
Information Security Aspects of the Public Safety Data Interoperability Network. 88-91 - Martin Boldt, Jaswanth Bala:
Filtering Estimated Crime Series Based on Route Calculations on Spatio-temporal Data. 92-95 - Jiro Usugami:
Disaster Risk Reduction for International Residents in Japan: Barriers and Facilitators to Knowledge Sharing in Times of Disaster. 96-99 - Constantinos Orphanides, Babak Akhgar, Petra Saskia Bayerl:
Discovering Knowledge in Online Drug Transactions Using Conceptual Graphs and Formal Concept Analysis. 100-103 - Ryan Scrivens, Richard Frank:
Sentiment-based Classification of Radical Text on the Web. 104-107 - Johanna Björklund, Niklas Zechner:
My Name is Legion: Estimating Author Counts Based on Stylistic Diversity. 108-111 - Ilias Gialampoukidis, George Kalpakis, Theodora Tsikrika, Stefanos Vrochidis, Ioannis Kompatsiaris:
Key Player Identification in Terrorism-Related Social Media Networks Using Centrality Measures. 112-115 - Selmar Smit, Bob van der Vecht, Freek van Wermeskerken, Jan Willem Streefkerk:
QUIN: Providing Integrated Analysis Support to Crime Investigators. 120-123 - Swati Agarwal, Ashish Sureka:
But I did not Mean It! - Intent Classification of Racist Posts on Tumblr. 124-127 - Borka Jerman Blazic, Tomaz Klobucar:
Missing Solutions in the Fight against Cybercrime and Cyberterrorism - The New EU Research Agenda. 128-131 - Matylda Gerber, B. L. William Wong, Neesha Kodagoda:
How Analysts Think: Decision Making in the Absence of Clear Facts. 132-135 - Mordechai Guri, Eyal Shemer, Dov Shirtz, Yuval Elovici:
Personal Information Leakage During Password Recovery of Internet Services. 136-139 - Patrick Seidler, Johanna Haider, Neesha Kodagoda, B. L. William Wong, Margit Pohl, Richard Adderley:
Design for Intelligence Analysis of Complex Systems: Evolution of Criminal Networks. 140-143 - Jukka Ruohonen, Sanja Scepanovic, Sami Hyrynsalmi, Igor Mishkovski, Tuomas Aura, Ville Leppänen:
A Post-Mortem Empirical Investigation of the Popularity and Distribution of Malware Files in the Contemporary Web-Facing Internet. 144-147 - Alexander Nussbaumer, Katrien Verbert, Eva-Catherine Hillemann, Michael A. Bedek, Dietrich Albert:
A Framework for Cognitive Bias Detection and Feedback in a Visual Analytics Environment. 148-151 - Mandeep K. Dhami, Ian K. Belton, Kathryn E. Careless:
Critical Review of Analytic Techniques. 152-155 - Aprianti Nanda Sari, Ari Moesriami Barmawi:
Modified Graphstega Based on Chart Scale Modification. 156-159 - Ashay S. Jawale, Joon S. Park:
A Security Analysis on Apple Pay. 160-163 - Tina Alsadhan, Joon S. Park:
Enhancing Risk-Based Decisions by Leveraging Cyber Security Automation. 164-167 - Stefano Giovanni Rizzo, Flavio Bertini, Danilo Montesi:
Text Authorship Verification through Watermarking. 168-171 - Joseph Bugeja, Andreas Jacobsson, Paul Davidsson:
On Privacy and Security Challenges in Smart Connected Homes. 172-175 - Floris Bex, Bas Hovestad:
An Argumentative-Narrative Risk Assessment Model. 176-179 - Linus Gisslén, Andreas Horndahl:
A Quantitative Approach to Risk and Cost Assessment in Supply Chain Management. 180-183 - Javid Maghsoudi, Charles C. Tappert:
A Behavioral Biometrics User Authentication Study Using Motion Data from Android Smartphones. 184-187 - Anna Belozubova, Anna Epishkina, Konstantin Kogos:
Random Delays to Limit Timing Covert Channel. 188-191 - Bilal Al Sabbagh, Stewart Kowalski:
A Framework and Prototype for A Socio-Technical Security Information and Event Management System (ST-SIEM). 192-195
Poster Papers
- Niklas Hageback:
Forecasting the Underlying Psychological Forces to Political Violence through Big Data Symbol Mining. 196 - Swati Agarwal, Ashish Sureka:
Role of Author Personality Traits for Identifying Intent Based Racist Posts. 197 - George Leventakis, George Papalexandratos, George Kokkinis, Elisavet Charalambous, Nikolaos Koutras:
Towards Efficient Law Enforcement Decision Support Systems in the Area of Community Policing: The Use of Mobile Applications. 198 - Michael Ashcroft, Matteo Magnani, Davide Vega, Danilo Montesi, Luca Rossi:
Multilayer Analysis of Online Illicit Marketplaces. 199 - Maria Andersson, Ronnie Johansson, Karl-Göran Stenborg, Robert Forsgren, Thomas Cane, Grzegorz Taberski, Jose Luis Patino, James M. Ferryman:
The IPATCH System for Maritime Surveillance and Piracy Threat Classification. 200 - Aws Naser, Mohamed Fadli Bin Zolkipli, Shahid Anwar, Muna Sulieman Al-Hawawreh:
Present Status and Challenges in Cloud Monitoring Framework: A Survey. 201 - Marc Michel Pic:
A Dedicated Crawling Engine to Reduce Apps Distribution Risks. 202 - Haibo Li, Anders Hedman:
Harnessing Crowds to Avert or Mitigate Acts Terrorism: A Collective Intelligence Call for Action. 203
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.