default search action
EISIC 2013: Uppsala, Sweden
- 2013 European Intelligence and Security Informatics Conference, Uppsala, Sweden, August 12-14, 2013. IEEE 2013, ISBN 978-0-7695-5062-6
Long Papers
- Tommaso Fornaciari, Fabio Celli, Massimo Poesio:
The Effect of Personality Type on Deceptive Communication Style. 1-6 - Uffe Kock Wiil:
Issues for the Next Generation of Criminal Network Investigation Tools. 7-14 - Michael Tschuggnall, Günther Specht:
Countering Plagiarism by Exposing Irregularities in Authors' Grammar. 15-22 - Tove Gustavi, Maja Karasalo, Christian Mårtenson:
A Tool for Generating, Structuring, and Analyzing Multiple Hypotheses in Intelligence Work. 23-30 - Lorena Montoya, Marianne Junger, Pieter H. Hartel:
How "Digital" is Traditional Crime? 31-37 - Dmitry Dudorov, David Stupples, Martin Newby:
Probability Analysis of Cyber Attack Paths against Business and Commercial Enterprise Systems. 38-44 - Richard Colbaugh, Kristin Glass:
Analyzing Social Media Content for Security Informatics. 45-51 - Yuichi Sei, Akihiko Ohsuga:
False Event Detection for Mobile Sinks in Wireless Sensor Networks. 52-59 - John V. Monaco, Ned Bakelman, Sung-Hyuk Cha, Charles C. Tappert:
Recent Advances in the Development of a Long-Text-Input Keystroke Biometric Authentication System for Arbitrary Text Input. 60-66 - Fabrizio Albertetti, Paul Cotofrei, Lionel Grossrieder, Olivier Ribaux, Kilian Stoffel:
The CriLiM Methodology: Crime Linkage with a Fuzzy MCDM Approach. 67-74 - Justin Song, Valerie Spicer, Patricia L. Brantingham, Richard Frank:
Crime Ridges: Exploring the Relationship between Crime Attractors and Offender Movement. 75-82 - Anders Holst, Björn Bjurling:
A Bayesian Parametric Statistical Anomaly Detection Method for Finding Trends and Patterns in Criminal Behavior. 83-88 - James Llinas:
Challenges in Information Fusion Technology Capabilities for Modern Intelligence and Security Problems. 89-95
Short Papers
- Zhaochun Ren, David van Dijk, David Graus, Nina van der Knaap, Hans Henseler, Maarten de Rijke:
Semantic Linking and Contextualization for Social Forensic Text Analysis. 96-99 - Kyle Goslin, Markus Hofmann:
Cross Domain Assessment of Document to HTML Conversion Tools to Quantify Text and Structural Loss during Document Analysis. 100-105 - Jasper Kuperus, Cor J. Veenman, Maurice van Keulen:
Increasing NER Recall with Minimal Precision Loss. 106-111 - Hans Henseler, Jop Hofste, Maurice van Keulen:
Digital-Forensics Based Pattern Recognition for Discovering Identities in Electronic Evidence. 112-116 - Mariëlle den Hengst, Martijn Warnier:
Cyber Crime in Privately Held Information Systems: Personal Data at Stake. 117-120 - Xingan Li, Martti Juhola:
Crime and Its Social Context: Analysis Using the Self-Organizing Map. 121-124 - M. Saravanan, Rakhi Thayyil, Shwetha Narayanan:
Enabling Real Time Crime Intelligence Using Mobile GIS and Prediction Methods. 125-128 - Bisharat Rasool Memon, Uffe Kock Wiil:
Visual Analysis of Heterogeneous Networks. 129-134 - Florence Amardeilh, Wessel Kraaij, Martijn Spitters, Corné Versloot, Sinan Yurtsever:
Semi-automatic Ontology Maintenance in the Virtuoso News Monitoring System. 135-138 - Joni A. Amorim, Rose-Mharie Åhlfeldt, Per M. Gustavsson, Sten F. Andler:
Privacy and Security in Cyberspace: Training Perspectives on the Personal Data Ecosystem. 139-142 - Gerhard Backfried, Johannes Göllner, Gerald Quirchmayr, Karin Rainer, Gert Kienast, Georg Thallinger, Christian Schmidt, Andreas Peer:
Integration of Media Sources for Situation Analysis in the Different Phases of Disaster Management: The QuOIMA Project. 143-146 - Lisa Rajbhandari:
Consideration of Opportunity and Human Factor: Required Paradigm Shift for Information Security Risk Management. 147-150 - Luca Mazzola, Aris Tsois, Tatyana Dimitrova, Elena Camossi:
Contextualisation of Geographical Scraped Data to Support Human Judgment and Classification. 151-154 - Anna Fensel, Michael Rogger, Tove Gustavi, Andreas Horndahl, Christian Mårtenson:
Semantic Data Management: Sensor-Based Port Security Use Case. 155-158 - Egon L. van den Broek, Martijn Spitters:
Physiological Signals: The Next Generation Authentication and Identification Methods!? 159-162 - Iordanis Kavathatzopoulos, Ryoko Asai, Mikael Laaksoharju:
Tools and Methods for Security: Stimulating the Skill to Philosophize. 163-165 - Johan Sigholm, Martin Bang:
Towards Offensive Cyber Counterintelligence: Adopting a Target-Centric View on Advanced Persistent Threats. 166-171 - Martin D. Sykora, Thomas W. Jackson, Ann O'Brien, Suzanne Elayan:
National Security and Social Media Monitoring: A Presentation of the EMOTIVE and Related Systems. 172-175 - Jyri Rajamäki, Paresh Rathod, John Holmström:
Decentralized Fully Redundant Cyber Secure Governmental Communications Concept. 176-181 - Tatyana Velikova Dimitrova, Aris Tsois, Elena Camossi:
Visualization of Container Movements through a Web-Based Geographical Information System. 182-185 - Amy Sliva, Mikhail Malyutov, Glenn Pierce, Xin Li:
Threats to Peace: Threat Perception and the Persistence or Desistance of Violent Conflict. 186-189 - Dennis Andersson, Mirko Thorstensson:
Reconstruction and Exploration: Applications in Criminology. 190-193 - Carlos Francisco Lerma Resendez:
The Intelligence Cycle as a Tool for Effective Information Security Infrastructure Design. 194-197 - Jyri Rajamäki, Juha S. Knuuttila:
Law Enforcement Authorities' Legal Digital Evidence Gathering: Legal, Integrity and Chain-of-Custody Requirement. 198-203 - Ned Bakelman, John V. Monaco, Sung-Hyuk Cha, Charles C. Tappert:
Keystroke Biometric Studies on Password and Numeric Keypad Input. 204-207 - Andrew J. Park, Herbert H. Tsang:
Detecting Key Players in Criminal Networks Using Dynalink. 208-211 - Jan Kallberg, Bhavani Thuraisingham, Erik Lakomaa:
Societal Cyberwar Theory Applied: The Disruptive Power of State Actor Aggression for Public Sector Information Security. 212-215
Poster Papers
- Leslie Ball, Matthew J. Craven:
Automated Counter-Terrorism. 216 - Vasile Florian Pais, Dan S. Ciobanu:
Fast Name Searching on GPU. 217 - Jyri Rajamäki, Paresh Rathod, Pasi Kamppi:
A New Redundant Tracking System for Emergency Response. 218 - Kamaruddin Abdul Ghani, Kaharudin Dimyati, Khadijah Ismail, Latifah Sarah Supian:
Radiated Emission from Handheld Devices with Touch-Screen LCDs. 219 - Bo Li, Duo-Yong Sun, Julei Fu, Zi-Han Lin:
Organization Network Construction and Understanding Based on Photo Face Recognition. 220 - Ala Berzinji, Frzand Sherko Abdullah, Ali Hayder Kakei:
Analysis of Terrorist Groups on Facebook. 221 - Sebastian Bernhardsson, Rickard Forsen:
Assessment of Damage and Protective Capacity of Buildings Exposed to Weapon Effects. 222 - Jyri Rajamäki, Paresh Rathod:
Service Standardization with Utility Computing and Service Oriented Architecture as a Tool for Public Protection and Disaster Relief. 223 - Urban Bilstrup, Magdalena Rosenberg:
A Pilot Study of Using Honeypots as Cyber Intelligence Sources. 224 - Valentina Dragos:
Browse and Search in Maritime Document Collections. 225 - Patrick Dibb, Mohammad Hammoudeh:
Forensic Data Recovery from Android OS Devices: An Open Source Toolkit. 226 - Louis Antani Holt, Mohammad Hammoudeh:
Cloud Forensics: A Technical Approach to Virtual Machine Acquisition. 227 - Marianela García Lozano:
Trusting Open Source Information. 228 - Amendra Shrestha:
A Tool for Visualizing and Analyzing Users on Discussion Boards. 229 - Niklas Zechner:
The Past, Present and Future of Text Classification. 230
WIBC Long Papers
- Monica Gariup, Gustav Soederlind:
Document Fraud Detection at the Border: Preliminary Observations on Human and Machine Performance. 231-238 - Jakub Piskorski, Hristo Tanev, Alexandra Balahur:
Exploiting Twitter for Border Security-Related Intelligence Gathering. 239-246
WIBC Short Papers
- Moazzam Butt, Sandra Marti, Alexander Nouak, Jörg Köplin, Ramachandra Raghavendra, Guoqiang Li:
Towards e-Passport Duplicate Enrollment Check in the European Union. 247-251 - Jeffrey L. Jenkins, Jim Marquardson, Jeffrey Gainer Proudfoot, Joseph S. Valacich, Elyse Golob, Jay F. Nunamaker Jr.:
The Checkpoint Simulation: A Tool for Informing Border Patrol Checkpoint Design and Resource Allocation. 252-255 - Jyri Rajamäki:
Mobile Digital Services for Border Protection: Standardization of Emergency Response Vehicles. 256-261 - Debra L. Tower, Matthew L. Jensen, Norah E. Dunbar, Aaron C. Elkins:
Don't Lie to Me: The Impact of Deception on Vocalic and Linguistic Synchrony. 262-265 - Joe S. Valacich, David W. Wilson, Jay F. Nunamaker Jr., Elyse Golob:
Modeling Border Traffic Flow Using Cell Phone Header Packets. 266-268 - Jeffrey Gainer Proudfoot:
Evaluating the Feasibility of Using Noncontact Sensors to Conduct a Targetless Concealed Information Test. 269-272
WIBC Practitioner Papers
- Gregory Duckworth, Archibald Owen, Jerry Worsley, Henry Stephenson:
OptaSense® Distributed Acoustic and Seismic Sensing Performance for Multi-threat, Multi-environment Border Monitoring. 273-276 - Daniel Cuesta Cantarero, David Antonio Perez Herrero, Fernando Martin Mendez:
A Multi-modal Biometric Fusion Implementation for ABC Systems. 277-280 - Sandrine Trochu, Olivier Touret:
Managing the Border, Smartly. 281-284 - Chris Hurrey:
The 'Swiss Army Knife' Approach to Border Control: Multitasking in a Multi-threat World. 285-288 - Bart Adams, Frank Suykens:
Astute: Increased Situational Awareness through Proactive Decision Support and Adaptive Map-Centric User Interfaces. 289-293
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.