


default search action
EISIC 2013: Uppsala, Sweden
- 2013 European Intelligence and Security Informatics Conference, Uppsala, Sweden, August 12-14, 2013. IEEE 2013, ISBN 978-0-7695-5062-6

Long Papers
- Tommaso Fornaciari

, Fabio Celli, Massimo Poesio
:
The Effect of Personality Type on Deceptive Communication Style. 1-6 - Uffe Kock Wiil

:
Issues for the Next Generation of Criminal Network Investigation Tools. 7-14 - Michael Tschuggnall, Günther Specht:

Countering Plagiarism by Exposing Irregularities in Authors' Grammar. 15-22 - Tove Gustavi, Maja Karasalo, Christian Mårtenson:

A Tool for Generating, Structuring, and Analyzing Multiple Hypotheses in Intelligence Work. 23-30 - Lorena Montoya

, Marianne Junger, Pieter H. Hartel
:
How "Digital" is Traditional Crime? 31-37 - Dmitry Dudorov, David Stupples, Martin Newby:

Probability Analysis of Cyber Attack Paths against Business and Commercial Enterprise Systems. 38-44 - Richard Colbaugh, Kristin Glass:

Analyzing Social Media Content for Security Informatics. 45-51 - Yuichi Sei

, Akihiko Ohsuga:
False Event Detection for Mobile Sinks in Wireless Sensor Networks. 52-59 - John V. Monaco

, Ned Bakelman, Sung-Hyuk Cha, Charles C. Tappert:
Recent Advances in the Development of a Long-Text-Input Keystroke Biometric Authentication System for Arbitrary Text Input. 60-66 - Fabrizio Albertetti

, Paul Cotofrei, Lionel Grossrieder, Olivier Ribaux
, Kilian Stoffel:
The CriLiM Methodology: Crime Linkage with a Fuzzy MCDM Approach. 67-74 - Justin Song, Valerie Spicer, Patricia L. Brantingham, Richard Frank:

Crime Ridges: Exploring the Relationship between Crime Attractors and Offender Movement. 75-82 - Anders Holst, Björn Bjurling:

A Bayesian Parametric Statistical Anomaly Detection Method for Finding Trends and Patterns in Criminal Behavior. 83-88 - James Llinas:

Challenges in Information Fusion Technology Capabilities for Modern Intelligence and Security Problems. 89-95
Short Papers
- Zhaochun Ren, David van Dijk, David Graus

, Nina van der Knaap, Hans Henseler, Maarten de Rijke
:
Semantic Linking and Contextualization for Social Forensic Text Analysis. 96-99 - Kyle Goslin, Markus Hofmann:

Cross Domain Assessment of Document to HTML Conversion Tools to Quantify Text and Structural Loss during Document Analysis. 100-105 - Jasper Kuperus, Cor J. Veenman, Maurice van Keulen

:
Increasing NER Recall with Minimal Precision Loss. 106-111 - Hans Henseler, Jop Hofste, Maurice van Keulen

:
Digital-Forensics Based Pattern Recognition for Discovering Identities in Electronic Evidence. 112-116 - Mariëlle den Hengst, Martijn Warnier

:
Cyber Crime in Privately Held Information Systems: Personal Data at Stake. 117-120 - Xingan Li

, Martti Juhola:
Crime and Its Social Context: Analysis Using the Self-Organizing Map. 121-124 - M. Saravanan, Rakhi Thayyil, Shwetha Narayanan:

Enabling Real Time Crime Intelligence Using Mobile GIS and Prediction Methods. 125-128 - Bisharat Rasool Memon

, Uffe Kock Wiil
:
Visual Analysis of Heterogeneous Networks. 129-134 - Florence Amardeilh, Wessel Kraaij

, Martijn Spitters, Corné Versloot, Sinan Yurtsever:
Semi-automatic Ontology Maintenance in the Virtuoso News Monitoring System. 135-138 - Joni A. Amorim, Rose-Mharie Åhlfeldt, Per M. Gustavsson

, Sten F. Andler:
Privacy and Security in Cyberspace: Training Perspectives on the Personal Data Ecosystem. 139-142 - Gerhard Backfried, Johannes Göllner, Gerald Quirchmayr, Karin Rainer, Gert Kienast, Georg Thallinger

, Christian Schmidt, Andreas Peer:
Integration of Media Sources for Situation Analysis in the Different Phases of Disaster Management: The QuOIMA Project. 143-146 - Lisa Rajbhandari:

Consideration of Opportunity and Human Factor: Required Paradigm Shift for Information Security Risk Management. 147-150 - Luca Mazzola

, Aris Tsois, Tatyana Dimitrova, Elena Camossi
:
Contextualisation of Geographical Scraped Data to Support Human Judgment and Classification. 151-154 - Anna Fensel

, Michael Rogger, Tove Gustavi, Andreas Horndahl, Christian Mårtenson:
Semantic Data Management: Sensor-Based Port Security Use Case. 155-158 - Egon L. van den Broek, Martijn Spitters:

Physiological Signals: The Next Generation Authentication and Identification Methods!? 159-162 - Iordanis Kavathatzopoulos, Ryoko Asai, Mikael Laaksoharju:

Tools and Methods for Security: Stimulating the Skill to Philosophize. 163-165 - Johan Sigholm, Martin Bang:

Towards Offensive Cyber Counterintelligence: Adopting a Target-Centric View on Advanced Persistent Threats. 166-171 - Martin D. Sykora

, Thomas W. Jackson
, Ann O'Brien, Suzanne Elayan
:
National Security and Social Media Monitoring: A Presentation of the EMOTIVE and Related Systems. 172-175 - Jyri Rajamäki, Paresh Rathod, John Holmström:

Decentralized Fully Redundant Cyber Secure Governmental Communications Concept. 176-181 - Tatyana Velikova Dimitrova, Aris Tsois, Elena Camossi:

Visualization of Container Movements through a Web-Based Geographical Information System. 182-185 - Amy Sliva, Mikhail Malyutov, Glenn Pierce, Xin Li:

Threats to Peace: Threat Perception and the Persistence or Desistance of Violent Conflict. 186-189 - Dennis Andersson, Mirko Thorstensson:

Reconstruction and Exploration: Applications in Criminology. 190-193 - Carlos Francisco Lerma Resendez:

The Intelligence Cycle as a Tool for Effective Information Security Infrastructure Design. 194-197 - Jyri Rajamäki, Juha S. Knuuttila:

Law Enforcement Authorities' Legal Digital Evidence Gathering: Legal, Integrity and Chain-of-Custody Requirement. 198-203 - Ned Bakelman, John V. Monaco

, Sung-Hyuk Cha, Charles C. Tappert:
Keystroke Biometric Studies on Password and Numeric Keypad Input. 204-207 - Andrew J. Park, Herbert H. Tsang

:
Detecting Key Players in Criminal Networks Using Dynalink. 208-211 - Jan Kallberg

, Bhavani Thuraisingham, Erik Lakomaa:
Societal Cyberwar Theory Applied: The Disruptive Power of State Actor Aggression for Public Sector Information Security. 212-215
Poster Papers
- Leslie Ball, Matthew J. Craven

:
Automated Counter-Terrorism. 216 - Vasile Florian Pais, Dan S. Ciobanu:

Fast Name Searching on GPU. 217 - Jyri Rajamäki, Paresh Rathod, Pasi Kamppi:

A New Redundant Tracking System for Emergency Response. 218 - Kamaruddin Abdul Ghani, Kaharudin Dimyati, Khadijah Ismail, Latifah Sarah Supian

:
Radiated Emission from Handheld Devices with Touch-Screen LCDs. 219 - Bo Li, Duo-Yong Sun, Julei Fu, Zi-Han Lin:

Organization Network Construction and Understanding Based on Photo Face Recognition. 220 - Ala Berzinji, Frzand Sherko Abdullah, Ali Hayder Kakei:

Analysis of Terrorist Groups on Facebook. 221 - Sebastian Bernhardsson, Rickard Forsen:

Assessment of Damage and Protective Capacity of Buildings Exposed to Weapon Effects. 222 - Jyri Rajamäki, Paresh Rathod:

Service Standardization with Utility Computing and Service Oriented Architecture as a Tool for Public Protection and Disaster Relief. 223 - Urban Bilstrup, Magdalena Rosenberg:

A Pilot Study of Using Honeypots as Cyber Intelligence Sources. 224 - Valentina Dragos

:
Browse and Search in Maritime Document Collections. 225 - Patrick Dibb, Mohammad Hammoudeh

:
Forensic Data Recovery from Android OS Devices: An Open Source Toolkit. 226 - Louis Antani Holt, Mohammad Hammoudeh

:
Cloud Forensics: A Technical Approach to Virtual Machine Acquisition. 227 - Marianela García Lozano

:
Trusting Open Source Information. 228 - Amendra Shrestha:

A Tool for Visualizing and Analyzing Users on Discussion Boards. 229 - Niklas Zechner:

The Past, Present and Future of Text Classification. 230
WIBC Long Papers
- Monica Gariup, Gustav Soederlind:

Document Fraud Detection at the Border: Preliminary Observations on Human and Machine Performance. 231-238 - Jakub Piskorski, Hristo Tanev, Alexandra Balahur

:
Exploiting Twitter for Border Security-Related Intelligence Gathering. 239-246
WIBC Short Papers
- Moazzam Butt, Sandra Marti, Alexander Nouak, Jörg Köplin, Ramachandra Raghavendra

, Guoqiang Li:
Towards e-Passport Duplicate Enrollment Check in the European Union. 247-251 - Jeffrey L. Jenkins

, Jim Marquardson, Jeffrey Gainer Proudfoot, Joseph S. Valacich, Elyse Golob, Jay F. Nunamaker Jr.:
The Checkpoint Simulation: A Tool for Informing Border Patrol Checkpoint Design and Resource Allocation. 252-255 - Jyri Rajamäki:

Mobile Digital Services for Border Protection: Standardization of Emergency Response Vehicles. 256-261 - Debra L. Tower, Matthew L. Jensen, Norah E. Dunbar, Aaron C. Elkins

:
Don't Lie to Me: The Impact of Deception on Vocalic and Linguistic Synchrony. 262-265 - Joe S. Valacich, David W. Wilson, Jay F. Nunamaker Jr., Elyse Golob:

Modeling Border Traffic Flow Using Cell Phone Header Packets. 266-268 - Jeffrey Gainer Proudfoot:

Evaluating the Feasibility of Using Noncontact Sensors to Conduct a Targetless Concealed Information Test. 269-272
WIBC Practitioner Papers
- Gregory Duckworth, Archibald Owen, Jerry Worsley, Henry Stephenson:

OptaSense® Distributed Acoustic and Seismic Sensing Performance for Multi-threat, Multi-environment Border Monitoring. 273-276 - Daniel Cuesta Cantarero, David Antonio Perez Herrero, Fernando Martin Mendez:

A Multi-modal Biometric Fusion Implementation for ABC Systems. 277-280 - Sandrine Trochu, Olivier Touret:

Managing the Border, Smartly. 281-284 - Chris Hurrey:

The 'Swiss Army Knife' Approach to Border Control: Multitasking in a Multi-threat World. 285-288 - Bart Adams, Frank Suykens:

Astute: Increased Situational Awareness through Proactive Decision Support and Adaptive Map-Centric User Interfaces. 289-293

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














