![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
EISIC 2019: Oulu, Finland
- European Intelligence and Security Informatics Conference, EISIC 2019, Oulu, Finland, November 26-27, 2019. IEEE 2019, ISBN 978-1-7281-6735-0
- August Daniel Sutmuller, Mariëlle den Hengst, Ana Isabel Barros
, Bob van der Vecht, Wouter Noordkamp, Pieter H. A. J. M. van Gelder:
Predicting the Offender: Frequency versus Bayes. 1-8 - Olga Simek, Danelle C. Shah, Andrew Heier:
Prototype and Analytics for Discovery and Exploitation of Threat Networks on Social Media. 9-16 - Disa Sariola:
A model of quantifying social relationships. 17-23 - Jessica Zhu
, Lin Li, Cara Jones:
Identification and Detection of Human Trafficking Using Language Models. 24-31 - Chia-Ju Chen, Razieh Nokhbeh Zaeem, K. Suzanne Barber:
Statistical Analysis of Identity Risk of Exposure and Cost Using the Ecosystem of Identity Attributes. 32-39 - Aviad Elitzur, Rami Puzis, Polina Zilberman:
Attack Hypothesis Generation. 40-47 - Alina Garbuz, Anna Epishkina, Konstantin Kogos:
Continuous Authentication of Smartphone Users via Swipes and Taps Analysis. 48-53 - Nikolaos Bastas, George Kalpakis
, Theodora Tsikrika
, Stefanos Vrochidis
, Ioannis Kompatsiaris:
A comparative study of clustering methods using word embeddings. 54-61 - Johan Fernquist, Ola Svenonius
, Lisa Kaati, Fredrik Johansson:
Extracting Account Attributes for Analyzing Influence on Twitter. 62-69 - Alexander Egiazarov, Vasileios Mavroeidis, Fabio Massimo Zennaro
, Kamer Vishi
:
Firearm Detection and Segmentation Using an Ensemble of Semantic Neural Networks. 70-77 - Andrew J. Park, Lee D. Patterson, Herbert H. Tsang, Ryan Ficocelli, Valerie Spicer, Justin Song:
Devising and Optimizing Crowd Control Strategies Using Agent-Based Modeling and Simulation. 78-84 - Susan El-Naggar, Thirimachos Bourlai
:
Evaluation of Deep Learning Models for Ear Recognition Against Image Distortions. 85-93 - Mordechai Guri:
HOTSPOT: Crossing the Air-Gap Between Isolated PCs and Nearby Smartphones Using Temperature. 94-100 - Eetu Haapamäki, Juho Mikkola, Markus Hirsimäki, Mourad Oussalah:
Mining Security discussions in Suomi24. 101-108 - Marianela García Lozano, Johan Fernquist:
Identifying Deceptive Reviews: Feature Exploration, Model Transferability and Classification Attack. 109-116 - Olga Simek, Alyssa C. Mensch, Lin Li, Charlie K. Dagli:
Characterization of Disinformation Networks Using Graph Embeddings and Opinion Mining. 117-120 - Justin Romeo, Thirimachos Bourlai
:
Semi-Automatic Geometric Normalization of Profile Faces. 121-125 - Marc Pic, Gaël Mahfoudi
, Anis Trabelsi:
Remote KYC: Attacks and Counter-Measures. 126-129 - Abhinay Pandya, Panos Kostakos
, Hassan Mehmood, Marta Cortés
, Ekaterina Gilman, Mourad Oussalah, Susanna Pirttikangas
:
Privacy preserving sentiment analysis on multiple edge data streams with Apache NiFi. 130-133 - Panos Kostakos
, Somkiadcharoen Robroo, Bofan Lin, Mourad Oussalah:
Crime Prediction Using Hotel Reviews? 134-137 - Fabrizia Bemer:
The Directive 2014/41/UE - The European Investigation Order. 138 - Anna Epishkina, Mikhail Finoshin, Konstantin Kogos, Aleksandra Yazykova:
Timing Covert Channels Detection Cases via Machine Learning. 139 - Daria Frolova, Anna Epishkina, Konstantin Kogos
:
Mobile User Authentication Using Keystroke Dynamics. 140
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.