The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "JISIC"( http://dblp.L3S.de/Venues/JISIC )

URL (DBLP): http://dblp.uni-trier.de/db/conf/isi

Publication years (Num. hits)
2014 (71)
Publication types (Num. hits)
inproceedings(70) proceedings(1)
Venues (Conferences, Journals, ...)
JISIC(71)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 71 publication records. Showing 71 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Niall M. Adams, Daniel J. Lawson An Approximate Framework for Flexible Network Flow Screening. Search on Bibsonomy JISIC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Michael Gschwandtner, Svorad Stolc, Franz Daubner Optical Security Document Simulator for Black-Box Testing of ABC Systems. Search on Bibsonomy JISIC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Marc Michel Pic, Clarisse Mandridake, Mathieu Hoarau, Kevin Win-Lime DOCSCOPE: ID Printing Techniques Signatures. Search on Bibsonomy JISIC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Axel Weissenfeld, Andreas Kriechbaum-Zabini, Lukasz Szklarski Security Components in a One-Stop-Shop Border Control System. Search on Bibsonomy JISIC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Margit Pohl, Lisa-Christina Winter, Chris Pallaris, Simon Attfield, B. L. William Wong Sensemaking and Cognitive Bias Mitigation in Visual Analytics. Search on Bibsonomy JISIC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Michael Bachmann Passwords are Dead: Alternative Authentication Methods. Search on Bibsonomy JISIC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Rauno Pirinen Studies of Integration Readiness Levels: Case Shared Maritime Situational Awareness System. Search on Bibsonomy JISIC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jesse Musgrove, Bojan Cukic, Vittorio Cortellessa On the Adequacy of Performance Models in an Adaptive Border Inspection Management System. Search on Bibsonomy JISIC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Rune Nordvik, Yi-Ching Liao, Hanno Langweg AccountabilityFS: A File System Monitor for Forensic Readiness. Search on Bibsonomy JISIC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Marco Pini, Luca Pilosu, Lene Vesterlund, David Blanco, Fredrik Lindström, Emiliano Spaltro Robust Navigation and Communication in the Maritime Domain: The TRITON Project. Search on Bibsonomy JISIC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Chuan Luo 0004, Kainan Cui, Xiaolong Zheng 0001, Daniel Dajun Zeng Time Critical Disinformation Influence Minimization in Online Social Networks. Search on Bibsonomy JISIC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Mark W. Patton, Eric Gross, Ryan Chinn, Samantha Forbis, Leon Walker, Hsinchun Chen Uninvited Connections: A Study of Vulnerable Devices on the Internet of Things (IoT). Search on Bibsonomy JISIC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Anna Jurek, Yaxin Bi, Maurice D. Mulvenna Twitter Sentiment Analysis for Security-Related Information Gathering. Search on Bibsonomy JISIC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jennifer Sikos, Peter David, Nizar Habash, Reem Faraj Authorship Analysis of Inspire Magazine through Stylometric and Psychological Features. Search on Bibsonomy JISIC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Yuhao Zhang, Wenji Mao, Daniel Dajun Zeng, Ning Zhao, Xiuguo Bao Exploring Opinion Dynamics in Security-Related Microblog Data. Search on Bibsonomy JISIC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Qingchao Kong, Wenji Mao, Daniel Dajun Zeng, Lei Wang 0062 Predicting Popularity of Forum Threads for Public Events Security. Search on Bibsonomy JISIC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Anders Westling, Joel Brynielsson, Tove Gustavi Mining the Web for Sympathy: The Pussy Riot Case. Search on Bibsonomy JISIC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Saike He, Xiaolong Zheng 0001, Xiuguo Bao, Hongyuan Ma, Daniel Dajun Zeng, Bo Xu 0002, Guanhua Tian, Hongwei Hao Ranking Online Memes in Emergency Events Based on Transfer Entropy. Search on Bibsonomy JISIC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Brian Prue, Michael Jenkins, Lauren D. Stern, Jonathan D. Pfautz Overcoming Limited Collaboration Channels in Distributed Intelligence Analysis: Visualization Tools and Design Seeds. Search on Bibsonomy JISIC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Yoan Chabot, Aurélie Bertaux, Christophe Nicolle, M. Tahar Kechadi Automatic Timeline Construction and Analysis for Computer Forensics Purposes. Search on Bibsonomy JISIC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Nick Heard, Patrick Rubin-Delanchy, Daniel J. Lawson Filtering Automated Polling Traffic in Computer Network Flow Data. Search on Bibsonomy JISIC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Martijn Spitters, Pieter T. Eendebak, Daniël T. H. Worm, Henri Bouma Threat Detection in Tweets with Trigger Patterns and Contextual Cues. Search on Bibsonomy JISIC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Martijn Spitters, Stefan Verbruggen, Mark van Staalduinen Towards a Comprehensive Insight into the Thematic Organization of the Tor Hidden Services. Search on Bibsonomy JISIC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Weifeng Li 0002, Hsinchun Chen Identifying Top Sellers In Underground Economy Using Deep Learning-Based Sentiment Analysis. Search on Bibsonomy JISIC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Yulia Tyshchuk, William A. Wallace, Hao Li 0031, Heng Ji, Sue E. Kase The Nature of Communications and Emerging Communities on Twitter Following the 2013 Syria Sarin Gas Attacks. Search on Bibsonomy JISIC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Ioannis Daniilidis, J.-J. Filippi, Wolfgang Vautz, Enrico Dalcanale, Stefano Zampolli, George Leventakis, I. Kauppinen, S. Sinisalo, Vasilis Tsoulkas, V. Kassouras, Mathieu Carras, B. Gerard, R. Pinalli, A. Ragnoni, L. Dujourdy, D. Zavali, Mickael Brun, Vasileios Grizis, Apostolos Argyris, Dimitris Syvridis Detection of Olfactory Traces by Orthogonal Gas Identification Technologies - DOGGIES. Search on Bibsonomy JISIC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Dean Adam Bodenham, Niall M. Adams Adaptive Change Detection for Relay-Like Behaviour. Search on Bibsonomy JISIC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1B. L. William Wong How Analysts Think (?): Early Observations. Search on Bibsonomy JISIC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Alya Abbott, Olga Simek Recommending Documents for Complex Question Exploration by Analyzing Browsing Behavior. Search on Bibsonomy JISIC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Bisharat Rasool Memon, Uffe Kock Wiil Predicting Links in Multi-relational Networks. Search on Bibsonomy JISIC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Mordechai Guri, Gabi Kedma, Boris Zadov, Yuval Elovici Trusted Detection of Sensitive Activities on Mobile Phones Using Power Consumption Measurements. Search on Bibsonomy JISIC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Rasim M. Alguliyev, Davud Rustamov, Mirza Rzayev Computational Approach for Detection of Illegal Activity over the Internet. Search on Bibsonomy JISIC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Herman-Dick Giok Tjiang Oey Military Geospatial Profiling Analysis. Search on Bibsonomy JISIC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Ashish Sureka, Swati Agarwal 0001 Learning to Classify Hate and Extremism Promoting Tweets. Search on Bibsonomy JISIC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Pedro Chahuara, Luca Mazzola, Michail Makridis, Claudio Schifanella, Aris Tsois, Mauro Pedone Inferring itineraries of containerized cargo through the application of Conditional Random Fields. Search on Bibsonomy JISIC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jyri Rajamäki Challenges to a Smooth-Running Data Security Audits. Case: A Finnish National Security Auditing Criteria KATAKRI. Search on Bibsonomy JISIC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1 IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014, The Hague, The Netherlands, 24-26 September, 2014 Search on Bibsonomy JISIC The full citation details ... 2014 DBLP  BibTeX  RDF
1Victor A. Benjamin, Hsinchun Chen Time-to-Event Modeling for Predicting Hacker IRC Community Participant Trajectory. Search on Bibsonomy JISIC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Nir Nissim, Aviad Cohen 0002, Robert Moskovitch, Asaf Shabtai, Mattan Edry, Oren Bar-Ad, Yuval Elovici ALPD: Active Learning Framework for Enhancing the Detection of Malicious PDF Files. Search on Bibsonomy JISIC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Daniel J. Lawson, Patrick Rubin-Delanchy, Nicholas A. Heard, Niall M. Adams Statistical Frameworks for Detecting Tunnelling in Cyber Defence Using Big Data. Search on Bibsonomy JISIC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Fredrik Johansson, Lisa Kaati, Amendra Shrestha Time Profiles for Identifying Users in Online Environments. Search on Bibsonomy JISIC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Alexander Bolton, Nicholas A. Heard Application of a Linear Time Method for Change Point Detection to the Classification of Software. Search on Bibsonomy JISIC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Joel Lathrop, James B. O'Kane A Case Study in Opportunity Reduction: Mitigating the Dirt Jumper Drive-Smart Attack. Search on Bibsonomy JISIC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Patrick Rubin-Delanchy, Daniel J. Lawson, Melissa J. Turcotte, Nicholas A. Heard, Niall M. Adams Three Statistical Approaches to Sessionizing Network Flow Data. Search on Bibsonomy JISIC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Mordechai Guri, Gabi Kedma, Assaf Kachlon, Yuval Elovici Resilience of Anti-malware Programs to Naïve Modifications of Malicious Binaries. Search on Bibsonomy JISIC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Chuan Luo 0004, Xiaolong Zheng 0001, Daniel Dajun Zeng Causal Inference in Social Media Using Convergent Cross Mapping. Search on Bibsonomy JISIC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Vitali Sepetnitsky, Mordechai Guri, Yuval Elovici Exfiltration of Information from Air-Gapped Machines Using Monitor's LED Indicator. Search on Bibsonomy JISIC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Gila Molcho, Sebastian Maier, Felipe Melero, Carlo Aliprandi CAPER: Collaborative Information, Acquisition, Processing, Exploitation and Reporting for the Prevention of Organised Crime. Search on Bibsonomy JISIC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Michelle Cayford, Coen van Gulijk, Pieter H. A. J. M. van Gelder When Counting is Not Enough: Limitations of NSA's Effectiveness Assessment of Surveillance Technology. Search on Bibsonomy JISIC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Ahmed Abbasi, Weifeng Li 0002, Victor A. Benjamin, Shiyu Hu, Hsinchun Chen Descriptive Analytics: Examining Expert Hackers in Web Forums. Search on Bibsonomy JISIC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Yi-Ching Liao, Hanno Langweg Resource-Based Event Reconstruction of Digital Crime Scenes. Search on Bibsonomy JISIC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Owen Brady, Richard E. Overill, Jeroen Keppens Addressing the Increasing Volume and Variety of Digital Evidence Using an Ontology. Search on Bibsonomy JISIC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Yongpeng Yang, Monisha Manoharan, K. Suzanne Barber Modelling and Analysis of Identity Threat Behaviors through Text Mining of Identity Theft Stories. Search on Bibsonomy JISIC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Andrea Ponzoni, Dario Zappa, Cristina Cerqui, Elisabetta Comini, Giorgio Sberveglieri Metal Oxide Gas Sensors Technologies for Hidden People Detection. Search on Bibsonomy JISIC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Dragos Datcu, Marina-Anca Cidotã, Heide K. Lukosch, Stephan G. Lukosch On the Usability of Augmented Reality for Information Exchange in Teams from the Security Domain. Search on Bibsonomy JISIC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Iwen Coisel, Ignacio Sanchez Practical Interception of DECT Encrypted Voice Communication in Unified Communications Environments. Search on Bibsonomy JISIC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Silvia Metelli, Nicholas A. Heard Modelling New Edge Formation in a Computer Network through Bayesian Variable Selection. Search on Bibsonomy JISIC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Ricardo Guedes, Vasco Furtado, Tarcisio H. C. Pequeno Multiagent Models for Police Resource Allocation and Dispatch. Search on Bibsonomy JISIC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Niels L. M. van Adrichem, Antonio Reyes Lua, Xin Wang, Muhammad Wasif, Ficky Fatturrahman, Fernando A. Kuipers DNSSEC Misconfigurations: How Incorrectly Configured Security Leads to Unreachability. Search on Bibsonomy JISIC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Edgar Toshiro Yano, Parth Bhatt, Per M. Gustavsson, Rose-Mharie Åhlfeldt Towards a Methodology for Cybersecurity Risk Management Using Agents Paradigm. Search on Bibsonomy JISIC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Hamed Yaghoubi Shahir, Uwe Glässer, Narek Nalbandyan, Hans Wehn Maritime Situation Analysis: A Multi-vessel Interaction and Anomaly Detection Framework. Search on Bibsonomy JISIC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Hugo Lewi Hammer Detecting Threats of Violence in Online Discussions Using Bigrams of Important Words. Search on Bibsonomy JISIC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Gijs Koot, Mirjam A. A. Huis in 't Veld, Joost Hendricksen, Rianne Kaptein, Arnout de Vries, Egon L. van den Broek Foraging Online Social Networks. Search on Bibsonomy JISIC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Carlo Marcelo Revoredo da Silva, Jose Lutiano Costa da Silva, Rodrigo Elia Assad, Ruy Jose Guerra Barretto Garcia Aegis: A Lightweight Tool for Prevent Frauds in Web Browsers. Search on Bibsonomy JISIC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Steven Banaszak, Elizabeth K. Bowman, John P. Dickerson, V. S. Subrahmanian Forecasting Country Stability in North Africa. Search on Bibsonomy JISIC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Yuri Gil Dantas, Vivek Nigam, Iguatemi E. Fonseca A Selective Defense for Application Layer DDoS Attacks. Search on Bibsonomy JISIC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Neesha Kodagoda, Simon Attfield, Phong Hai Nguyen, Leishi Zhang, Kai Xu 0003, B. L. William Wong, Adrian Wagstaff, Graham Phillips, James Bullock, John Marshall, Stewart Bertram POLAR-An Interactive Patterns of Life Visualisation Tool for Intelligence Analysis. Search on Bibsonomy JISIC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1A. C. van den Broek, R. M. Schoemaker, Rob J. Dekker Land Border Permeability and Irregular Migration Using Geospatial Intelligence from Satellite Data. Search on Bibsonomy JISIC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Matthew John Edwards, Awais Rashid, Paul Rayson A Service-Indepenent Model for Linking Online User Profile Information. Search on Bibsonomy JISIC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Mari Ylikauppila, Sirra Toivonen, Minna Kulju, Minna Jokela Understanding the Factors Affecting UX and Technology Acceptance in the Context of Automated Border Controls. Search on Bibsonomy JISIC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Samer Al-khateeb, Nitin Agarwal Modeling Flash Mobs in Cybernetic Space: Evaluating Threats of Emerging Socio-Technical Behaviors to Human Security. Search on Bibsonomy JISIC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #71 of 71 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license