default search action
JISIC (ISI + EISIC) 2014: The Hague, The Netherlands
- IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014, The Hague, The Netherlands, 24-26 September, 2014. IEEE 2014, ISBN 978-1-4799-6363-8
- Carlo Marcelo Revoredo da Silva, Jose Lutiano Costa da Silva, Rodrigo Elia Assad, Ruy Jose Guerra Barretto Garcia:
Aegis: A Lightweight Tool for Prevent Frauds in Web Browsers. 1-8 - Niels L. M. van Adrichem, Antonio Reyes Lua, Xin Wang, Muhammad Wasif, Ficky Fatturrahman, Fernando A. Kuipers:
DNSSEC Misconfigurations: How Incorrectly Configured Security Leads to Unreachability. 9-16 - Brian Prue, Michael Jenkins, Lauren D. Stern, Jonathan D. Pfautz:
Overcoming Limited Collaboration Channels in Distributed Intelligence Analysis: Visualization Tools and Design Seeds. 17-24 - Victor A. Benjamin, Hsinchun Chen:
Time-to-Event Modeling for Predicting Hacker IRC Community Participant Trajectory. 25-32 - Jennifer Sikos, Peter David, Nizar Habash, Reem Faraj:
Authorship Analysis of Inspire Magazine through Stylometric and Psychological Features. 33-40 - Yulia Tyshchuk, William A. Wallace, Hao Li, Heng Ji, Sue E. Kase:
The Nature of Communications and Emerging Communities on Twitter Following the 2013 Syria Sarin Gas Attacks. 41-47 - Anna Jurek, Yaxin Bi, Maurice D. Mulvenna:
Twitter Sentiment Analysis for Security-Related Information Gathering. 48-55 - Ahmed Abbasi, Weifeng Li, Victor A. Benjamin, Shiyu Hu, Hsinchun Chen:
Descriptive Analytics: Examining Expert Hackers in Web Forums. 56-63 - Weifeng Li, Hsinchun Chen:
Identifying Top Sellers In Underground Economy Using Deep Learning-Based Sentiment Analysis. 64-67 - Chuan Luo, Kainan Cui, Xiaolong Zheng, Daniel Dajun Zeng:
Time Critical Disinformation Influence Minimization in Online Social Networks. 68-74 - Yuri Gil Dantas, Vivek Nigam, Iguatemi E. Fonseca:
A Selective Defense for Application Layer DDoS Attacks. 75-82 - Fredrik Johansson, Lisa Kaati, Amendra Shrestha:
Time Profiles for Identifying Users in Online Environments. 83-90 - Nir Nissim, Aviad Cohen, Robert Moskovitch, Asaf Shabtai, Mattan Edry, Oren Bar-Ad, Yuval Elovici:
ALPD: Active Learning Framework for Enhancing the Detection of Malicious PDF Files. 91-98 - Qingchao Kong, Wenji Mao, Daniel Dajun Zeng, Lei Wang:
Predicting Popularity of Forum Threads for Public Events Security. 99-106 - Bisharat Rasool Memon, Uffe Kock Wiil:
Predicting Links in Multi-relational Networks. 107-114 - Iwen Coisel, Ignacio Sanchez:
Practical Interception of DECT Encrypted Voice Communication in Unified Communications Environments. 115-122 - Anders Westling, Joel Brynielsson, Tove Gustavi:
Mining the Web for Sympathy: The Pussy Riot Case. 123-128 - Yi-Ching Liao, Hanno Langweg:
Resource-Based Event Reconstruction of Digital Crime Scenes. 129-136 - Pedro Chahuara, Luca Mazzola, Michail Makridis, Claudio Schifanella, Aris Tsois, Mauro Pedone:
Inferring itineraries of containerized cargo through the application of Conditional Random Fields. 137-144 - Mordechai Guri, Gabi Kedma, Boris Zadov, Yuval Elovici:
Trusted Detection of Sensitive Activities on Mobile Phones Using Power Consumption Measurements. 145-151 - Mordechai Guri, Gabi Kedma, Assaf Kachlon, Yuval Elovici:
Resilience of Anti-malware Programs to Naïve Modifications of Malicious Binaries. 152-159 - Dragos Datcu, Marina-Anca Cidotã, Heide K. Lukosch, Stephan G. Lukosch:
On the Usability of Augmented Reality for Information Exchange in Teams from the Security Domain. 160-167 - Mari Ylikauppila, Sirra Toivonen, Minna Kulju, Minna Jokela:
Understanding the Factors Affecting UX and Technology Acceptance in the Context of Automated Border Controls. 168-175 - Owen Brady, Richard E. Overill, Jeroen Keppens:
Addressing the Increasing Volume and Variety of Digital Evidence Using an Ontology. 176-183 - Yongpeng Yang, Monisha Manoharan, K. Suzanne Barber:
Modelling and Analysis of Identity Threat Behaviors through Text Mining of Identity Theft Stories. 184-191 - Hamed Yaghoubi Shahir, Uwe Glässer, Narek Nalbandyan, Hans Wehn:
Maritime Situation Analysis: A Multi-vessel Interaction and Anomaly Detection Framework. 192-199 - Jesse Musgrove, Bojan Cukic, Vittorio Cortellessa:
On the Adequacy of Performance Models in an Adaptive Border Inspection Management System. 200-207 - A. C. van den Broek, R. M. Schoemaker, Rob J. Dekker:
Land Border Permeability and Irregular Migration Using Geospatial Intelligence from Satellite Data. 208-211 - Rauno Pirinen:
Studies of Integration Readiness Levels: Case Shared Maritime Situational Awareness System. 212-215 - Martijn Spitters, Pieter T. Eendebak, Daniël T. H. Worm, Henri Bouma:
Threat Detection in Tweets with Trigger Patterns and Contextual Cues. 216-219 - Martijn Spitters, Stefan Verbruggen, Mark van Staalduinen:
Towards a Comprehensive Insight into the Thematic Organization of the Tor Hidden Services. 220-223 - Joel Lathrop, James B. O'Kane:
A Case Study in Opportunity Reduction: Mitigating the Dirt Jumper Drive-Smart Attack. 224-227 - Axel Weissenfeld, Andreas Kriechbaum-Zabini, Lukasz Szklarski:
Security Components in a One-Stop-Shop Border Control System. 228-231 - Mark W. Patton, Eric Gross, Ryan Chinn, Samantha Forbis, Leon Walker, Hsinchun Chen:
Uninvited Connections: A Study of Vulnerable Devices on the Internet of Things (IoT). 232-235 - Saike He, Xiaolong Zheng, Xiuguo Bao, Hongyuan Ma, Daniel Dajun Zeng, Bo Xu, Guanhua Tian, Hongwei Hao:
Ranking Online Memes in Emergency Events Based on Transfer Entropy. 236-239 - Jyri Rajamäki:
Challenges to a Smooth-Running Data Security Audits. Case: A Finnish National Security Auditing Criteria KATAKRI. 240-243 - Patrick Rubin-Delanchy, Daniel J. Lawson, Melissa J. Turcotte, Nicholas A. Heard, Niall M. Adams:
Three Statistical Approaches to Sessionizing Network Flow Data. 244-247 - Daniel J. Lawson, Patrick Rubin-Delanchy, Nicholas A. Heard, Niall M. Adams:
Statistical Frameworks for Detecting Tunnelling in Cyber Defence Using Big Data. 248-251 - Dean Adam Bodenham, Niall M. Adams:
Adaptive Change Detection for Relay-Like Behaviour. 252-255 - Niall M. Adams, Daniel J. Lawson:
An Approximate Framework for Flexible Network Flow Screening. 256-259 - Chuan Luo, Xiaolong Zheng, Daniel Dajun Zeng:
Causal Inference in Social Media Using Convergent Cross Mapping. 260-263 - Vitali Sepetnitsky, Mordechai Guri, Yuval Elovici:
Exfiltration of Information from Air-Gapped Machines Using Monitor's LED Indicator. 264-267 - Nick Heard, Patrick Rubin-Delanchy, Daniel J. Lawson:
Filtering Automated Polling Traffic in Computer Network Flow Data. 268-271 - Silvia Metelli, Nicholas A. Heard:
Modelling New Edge Formation in a Computer Network through Bayesian Variable Selection. 272-275 - Yoan Chabot, Aurélie Bertaux, Christophe Nicolle, M. Tahar Kechadi:
Automatic Timeline Construction and Analysis for Computer Forensics Purposes. 276-279 - Matthew John Edwards, Awais Rashid, Paul Rayson:
A Service-Indepenent Model for Linking Online User Profile Information. 280-283 - Yuhao Zhang, Wenji Mao, Daniel Dajun Zeng, Ning Zhao, Xiuguo Bao:
Exploring Opinion Dynamics in Security-Related Microblog Data. 284-287 - Ricardo Guedes, Vasco Furtado, Tarcisio H. C. Pequeno:
Multiagent Models for Police Resource Allocation and Dispatch. 288-291 - Alexander Bolton, Nicholas A. Heard:
Application of a Linear Time Method for Change Point Detection to the Classification of Software. 292-295 - B. L. William Wong:
How Analysts Think (?): Early Observations. 296-299 - Michael Gschwandtner, Svorad Stolc, Franz Daubner:
Optical Security Document Simulator for Black-Box Testing of ABC Systems. 300-303 - Steven Banaszak, Elizabeth K. Bowman, John P. Dickerson, V. S. Subrahmanian:
Forecasting Country Stability in North Africa. 304-307 - Rune Nordvik, Yi-Ching Liao, Hanno Langweg:
AccountabilityFS: A File System Monitor for Forensic Readiness. 308-311 - Gijs Koot, Mirjam A. A. Huis in 't Veld, Joost Hendricksen, Rianne Kaptein, Arnout de Vries, Egon L. van den Broek:
Foraging Online Social Networks. 312-315 - Gila Molcho, Sebastian Maier, Felipe Melero, Carlo Aliprandi:
CAPER: Collaborative Information, Acquisition, Processing, Exploitation and Reporting for the Prevention of Organised Crime. 316 - Hugo Lewi Hammer:
Detecting Threats of Violence in Online Discussions Using Bigrams of Important Words. 319 - Ashish Sureka, Swati Agarwal:
Learning to Classify Hate and Extremism Promoting Tweets. 320 - Alya Abbott, Olga Simek:
Recommending Documents for Complex Question Exploration by Analyzing Browsing Behavior. 321 - Michael Bachmann:
Passwords are Dead: Alternative Authentication Methods. 322 - Margit Pohl, Lisa-Christina Winter, Chris Pallaris, Simon Attfield, B. L. William Wong:
Sensemaking and Cognitive Bias Mitigation in Visual Analytics. 323 - Andrea Ponzoni, Dario Zappa, Cristina Cerqui, Elisabetta Comini, Giorgio Sberveglieri:
Metal Oxide Gas Sensors Technologies for Hidden People Detection. 324 - Edgar Toshiro Yano, Parth Bhatt, Per M. Gustavsson, Rose-Mharie Åhlfeldt:
Towards a Methodology for Cybersecurity Risk Management Using Agents Paradigm. 325 - Rasim M. Alguliyev, Davud Rustamov, Mirza Rzayev:
Computational Approach for Detection of Illegal Activity over the Internet. 326 - Neesha Kodagoda, Simon Attfield, Phong Hai Nguyen, Leishi Zhang, Kai Xu, B. L. William Wong, Adrian Wagstaff, Graham Phillips, James Bullock, John Marshall, Stewart Bertram:
POLAR-An Interactive Patterns of Life Visualisation Tool for Intelligence Analysis. 327 - Samer Al-khateeb, Nitin Agarwal:
Modeling Flash Mobs in Cybernetic Space: Evaluating Threats of Emerging Socio-Technical Behaviors to Human Security. 328 - Herman-Dick Giok Tjiang Oey:
Military Geospatial Profiling Analysis. 329-330 - Marco Pini, Luca Pilosu, Lene Vesterlund, David Blanco, Fredrik Lindström, Emiliano Spaltro:
Robust Navigation and Communication in the Maritime Domain: The TRITON Project. 331 - Ioannis Daniilidis, J.-J. Filippi, Wolfgang Vautz, Enrico Dalcanale, Stefano Zampolli, George Leventakis, I. Kauppinen, S. Sinisalo, Vasilis Tsoulkas, V. Kassouras, Mathieu Carras, B. Gerard, R. Pinalli, A. Ragnoni, L. Dujourdy, D. Zavali, Mickael Brun, Vasileios Grizis, Apostolos Argyris, Dimitris Syvridis:
Detection of Olfactory Traces by Orthogonal Gas Identification Technologies - DOGGIES. 332 - Michelle Cayford, Coen van Gulijk, Pieter H. A. J. M. van Gelder:
When Counting is Not Enough: Limitations of NSA's Effectiveness Assessment of Surveillance Technology. 333 - Marc Michel Pic, Clarisse Mandridake, Mathieu Hoarau, Kevin Win-Lime:
DOCSCOPE: ID Printing Techniques Signatures. 334
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.