default search action
1. EuroISI 2008: Esbjerg, Denmark
- Daniel Ortiz Arroyo, Henrik Legind Larsen, Daniel Dajun Zeng, David L. Hicks, Gerhard Wagner:
Intelligence and Security Informatics, First European Conference, EuroISI 2008, Esbjerg, Denmark, December 3-5, 2008. Proceedings. Lecture Notes in Computer Science 5376, Springer 2008, ISBN 978-3-540-89899-3
Abstracts of Plenary Talks
- Ronald R. Yager:
Intelligent Social Network Modeling and Analysis for Security Informatics. 1-2 - Ajith Abraham:
Nature Inspired Online Real Risk Assessment Models for Security Systems. 3 - Hsinchun Chen:
Homeland Security Data Mining Using Social Network Analysis. 4
Criminal and Social Network Analysis
- Richard Adderley, Atta Badii, Chaoxin Wu:
The Automatic Identification and Prioritisation of Criminal Networks from Police Crime Data. 5-14 - Daniel Ortiz Arroyo, Dil Muhammad Akbar Hussain:
An Information Theory Approach to Identify Sets of Key Players. 15-26 - Dil Muhammad Akbar Hussain, Daniel Ortiz Arroyo:
Locating Key Actors in Social Networks Using Bayes' Posterior Probability Framework. 27-38 - Uwe Glässer, Mona Vajihollahi:
Computational Modeling of Criminal Activity. 39-50
Intelligence Analysis and Knowledge Discovery
- Federico Neri, Angelo Priamo:
SPYWatch, Overcoming Linguistic Barriers in Information Management. 51-60 - Aaron Hunter:
Dissecting the Meaning of an Encrypted Message: An Approach to Discovering the Goals of an Adversary. 61-72 - Magnus Sahlgren, Jussi Karlgren:
Buzz Monitoring in Word Space. 73-84
Web-Based Intelligence Monitoring and Analysis
- Hsinchun Chen:
Nuclear Threat Detection Via the Nuclear Web and Dark Web: Framework and Preliminary Study. 85-96 - Clinton J. Mielke, Hsinchun Chen:
Mapping Dark Web Geolocation. 97-107 - Maura Conway, Lisa McInerney:
Jihadi Video and Auto-radicalisation: Evidence from an Exploratory YouTube Study. 108-118
Privacy Protection, Access Control, and Digital Rights Management
- Aneta Poniszewska-Maranda:
Access Control of Federated Information Systems. 119-130 - Giannakis Antoniou, Lynn Margaret Batten, Parampalli Udaya:
Designing Information Systems Which Manage or Avoid Privacy Incidents. 131-142 - Bon K. Sy:
Secure Computation for Privacy Preserving Biometric Data Retrieval and Authentication. 143-154 - Prayoth Kumsawat, Kitti Attakitmongcol, Arthit Srikaew:
Digital Audio Watermarking for Copyright Protection Based on Multiwavelet Transform. 155-164 - Youngseek Kim, Jessica Howard, Sharad Ravindranath, Joon S. Park:
Problem Analyses and Recommendations in DRM Security Policies. 165-178
Malware and Intrusion Detection
- Boris Rozenberg, Ehud Gudes, Yuval Elovici:
A Distributed Framework for the Detection of New Worm-Related Malware. 179-190 - Rami Puzis, Marius David Klippel, Yuval Elovici, Shlomi Dolev:
Optimization of NIDS Placement for Protection of Intercommunicating Critical Infrastructures. 191-203 - Robert Moskovitch, Clint Feher, Nir Tzachar, Eugene Berger, Marina Gitelman, Shlomi Dolev, Yuval Elovici:
Unknown Malcode Detection Using OPCODE Representation. 204-215
Surveillance and Crisis Management
- Sandro Leuchter, Thomas Partmann, Lothar Berger:
Mobile and Stationary Sensors for Local Surveillance: System Architecture and Applications. 216-225 - Jean-François Landry, Cédric Ulmer, Laurent Gomez:
Fuzzy Distributed Workflows for Crisis Management Decision Makers. 226-236 - Gianmarco Baldini, Raimondo Giuliani, Dimitrios Symeonidis:
Reconfigurable Radio Systems for Public Safety Based on Low-Cost Platforms. 237-247 - Steven R. Haynes, Jonathan M. Singel, Thomas George Kannampallil:
An Information Systems Design Theory for Supporting WMD Knowledge Reachback. 248-259 - Steven R. Haynes, Thomas George Kannampallil, Mark A. Cohen, Andrey Soares, Frank E. Ritter:
Rampart: A Service and Agent-Based Architecture for Anti-Terrorism Planning and Resource Allocation. 260-270
Posters
- James A. Danowski:
Evaluative Word Locations in Semantic Networks from News Stories about Al Qaeda and Implications for Optimal Communication Messages in Anti-terrorism Campaigns. 271-273 - Igor Nai Fovino, Marcelo Masera:
Methodology for Experimental ICT Industrial and Critical Infrastructure Security Tests. 274-275
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.