default search action
EISIC 2019: Oulu, Finland
- European Intelligence and Security Informatics Conference, EISIC 2019, Oulu, Finland, November 26-27, 2019. IEEE 2019, ISBN 978-1-7281-6735-0
- August Daniel Sutmuller, Mariëlle den Hengst, Ana Isabel Barros, Bob van der Vecht, Wouter Noordkamp, Pieter H. A. J. M. van Gelder:
Predicting the Offender: Frequency versus Bayes. 1-8 - Olga Simek, Danelle C. Shah, Andrew Heier:
Prototype and Analytics for Discovery and Exploitation of Threat Networks on Social Media. 9-16 - Disa Sariola:
A model of quantifying social relationships. 17-23 - Jessica Zhu, Lin Li, Cara Jones:
Identification and Detection of Human Trafficking Using Language Models. 24-31 - Chia-Ju Chen, Razieh Nokhbeh Zaeem, K. Suzanne Barber:
Statistical Analysis of Identity Risk of Exposure and Cost Using the Ecosystem of Identity Attributes. 32-39 - Aviad Elitzur, Rami Puzis, Polina Zilberman:
Attack Hypothesis Generation. 40-47 - Alina Garbuz, Anna Epishkina, Konstantin Kogos:
Continuous Authentication of Smartphone Users via Swipes and Taps Analysis. 48-53 - Nikolaos Bastas, George Kalpakis, Theodora Tsikrika, Stefanos Vrochidis, Ioannis Kompatsiaris:
A comparative study of clustering methods using word embeddings. 54-61 - Johan Fernquist, Ola Svenonius, Lisa Kaati, Fredrik Johansson:
Extracting Account Attributes for Analyzing Influence on Twitter. 62-69 - Alexander Egiazarov, Vasileios Mavroeidis, Fabio Massimo Zennaro, Kamer Vishi:
Firearm Detection and Segmentation Using an Ensemble of Semantic Neural Networks. 70-77 - Andrew J. Park, Lee D. Patterson, Herbert H. Tsang, Ryan Ficocelli, Valerie Spicer, Justin Song:
Devising and Optimizing Crowd Control Strategies Using Agent-Based Modeling and Simulation. 78-84 - Susan El-Naggar, Thirimachos Bourlai:
Evaluation of Deep Learning Models for Ear Recognition Against Image Distortions. 85-93 - Mordechai Guri:
HOTSPOT: Crossing the Air-Gap Between Isolated PCs and Nearby Smartphones Using Temperature. 94-100 - Eetu Haapamäki, Juho Mikkola, Markus Hirsimäki, Mourad Oussalah:
Mining Security discussions in Suomi24. 101-108 - Marianela García Lozano, Johan Fernquist:
Identifying Deceptive Reviews: Feature Exploration, Model Transferability and Classification Attack. 109-116 - Olga Simek, Alyssa C. Mensch, Lin Li, Charlie K. Dagli:
Characterization of Disinformation Networks Using Graph Embeddings and Opinion Mining. 117-120 - Justin Romeo, Thirimachos Bourlai:
Semi-Automatic Geometric Normalization of Profile Faces. 121-125 - Marc Pic, Gaël Mahfoudi, Anis Trabelsi:
Remote KYC: Attacks and Counter-Measures. 126-129 - Abhinay Pandya, Panos Kostakos, Hassan Mehmood, Marta Cortés, Ekaterina Gilman, Mourad Oussalah, Susanna Pirttikangas:
Privacy preserving sentiment analysis on multiple edge data streams with Apache NiFi. 130-133 - Panos Kostakos, Somkiadcharoen Robroo, Bofan Lin, Mourad Oussalah:
Crime Prediction Using Hotel Reviews? 134-137 - Fabrizia Bemer:
The Directive 2014/41/UE - The European Investigation Order. 138 - Anna Epishkina, Mikhail Finoshin, Konstantin Kogos, Aleksandra Yazykova:
Timing Covert Channels Detection Cases via Machine Learning. 139 - Daria Frolova, Anna Epishkina, Konstantin Kogos:
Mobile User Authentication Using Keystroke Dynamics. 140
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.