Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Niall M. Adams, Daniel J. Lawson |
An Approximate Framework for Flexible Network Flow Screening. |
JISIC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Michael Gschwandtner, Svorad Stolc, Franz Daubner |
Optical Security Document Simulator for Black-Box Testing of ABC Systems. |
JISIC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Marc Michel Pic, Clarisse Mandridake, Mathieu Hoarau, Kevin Win-Lime |
DOCSCOPE: ID Printing Techniques Signatures. |
JISIC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Axel Weissenfeld, Andreas Kriechbaum-Zabini, Lukasz Szklarski |
Security Components in a One-Stop-Shop Border Control System. |
JISIC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Margit Pohl, Lisa-Christina Winter, Chris Pallaris, Simon Attfield, B. L. William Wong |
Sensemaking and Cognitive Bias Mitigation in Visual Analytics. |
JISIC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Michael Bachmann |
Passwords are Dead: Alternative Authentication Methods. |
JISIC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Rauno Pirinen |
Studies of Integration Readiness Levels: Case Shared Maritime Situational Awareness System. |
JISIC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jesse Musgrove, Bojan Cukic, Vittorio Cortellessa |
On the Adequacy of Performance Models in an Adaptive Border Inspection Management System. |
JISIC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Rune Nordvik, Yi-Ching Liao, Hanno Langweg |
AccountabilityFS: A File System Monitor for Forensic Readiness. |
JISIC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Marco Pini, Luca Pilosu, Lene Vesterlund, David Blanco, Fredrik Lindström, Emiliano Spaltro |
Robust Navigation and Communication in the Maritime Domain: The TRITON Project. |
JISIC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Chuan Luo 0004, Kainan Cui, Xiaolong Zheng 0001, Daniel Dajun Zeng |
Time Critical Disinformation Influence Minimization in Online Social Networks. |
JISIC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Mark W. Patton, Eric Gross, Ryan Chinn, Samantha Forbis, Leon Walker, Hsinchun Chen |
Uninvited Connections: A Study of Vulnerable Devices on the Internet of Things (IoT). |
JISIC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Anna Jurek, Yaxin Bi, Maurice D. Mulvenna |
Twitter Sentiment Analysis for Security-Related Information Gathering. |
JISIC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jennifer Sikos, Peter David, Nizar Habash, Reem Faraj |
Authorship Analysis of Inspire Magazine through Stylometric and Psychological Features. |
JISIC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Yuhao Zhang, Wenji Mao, Daniel Dajun Zeng, Ning Zhao, Xiuguo Bao |
Exploring Opinion Dynamics in Security-Related Microblog Data. |
JISIC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Qingchao Kong, Wenji Mao, Daniel Dajun Zeng, Lei Wang 0062 |
Predicting Popularity of Forum Threads for Public Events Security. |
JISIC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Anders Westling, Joel Brynielsson, Tove Gustavi |
Mining the Web for Sympathy: The Pussy Riot Case. |
JISIC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Saike He, Xiaolong Zheng 0001, Xiuguo Bao, Hongyuan Ma, Daniel Dajun Zeng, Bo Xu 0002, Guanhua Tian, Hongwei Hao |
Ranking Online Memes in Emergency Events Based on Transfer Entropy. |
JISIC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Brian Prue, Michael Jenkins, Lauren D. Stern, Jonathan D. Pfautz |
Overcoming Limited Collaboration Channels in Distributed Intelligence Analysis: Visualization Tools and Design Seeds. |
JISIC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Yoan Chabot, Aurélie Bertaux, Christophe Nicolle, M. Tahar Kechadi |
Automatic Timeline Construction and Analysis for Computer Forensics Purposes. |
JISIC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Nick Heard, Patrick Rubin-Delanchy, Daniel J. Lawson |
Filtering Automated Polling Traffic in Computer Network Flow Data. |
JISIC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Martijn Spitters, Pieter T. Eendebak, Daniël T. H. Worm, Henri Bouma |
Threat Detection in Tweets with Trigger Patterns and Contextual Cues. |
JISIC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Martijn Spitters, Stefan Verbruggen, Mark van Staalduinen |
Towards a Comprehensive Insight into the Thematic Organization of the Tor Hidden Services. |
JISIC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Weifeng Li 0002, Hsinchun Chen |
Identifying Top Sellers In Underground Economy Using Deep Learning-Based Sentiment Analysis. |
JISIC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Yulia Tyshchuk, William A. Wallace, Hao Li 0031, Heng Ji, Sue E. Kase |
The Nature of Communications and Emerging Communities on Twitter Following the 2013 Syria Sarin Gas Attacks. |
JISIC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ioannis Daniilidis, J.-J. Filippi, Wolfgang Vautz, Enrico Dalcanale, Stefano Zampolli, George Leventakis, I. Kauppinen, S. Sinisalo, Vasilis Tsoulkas, V. Kassouras, Mathieu Carras, B. Gerard, R. Pinalli, A. Ragnoni, L. Dujourdy, D. Zavali, Mickael Brun, Vasileios Grizis, Apostolos Argyris, Dimitris Syvridis |
Detection of Olfactory Traces by Orthogonal Gas Identification Technologies - DOGGIES. |
JISIC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Dean Adam Bodenham, Niall M. Adams |
Adaptive Change Detection for Relay-Like Behaviour. |
JISIC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | B. L. William Wong |
How Analysts Think (?): Early Observations. |
JISIC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Alya Abbott, Olga Simek |
Recommending Documents for Complex Question Exploration by Analyzing Browsing Behavior. |
JISIC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Bisharat Rasool Memon, Uffe Kock Wiil |
Predicting Links in Multi-relational Networks. |
JISIC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Mordechai Guri, Gabi Kedma, Boris Zadov, Yuval Elovici |
Trusted Detection of Sensitive Activities on Mobile Phones Using Power Consumption Measurements. |
JISIC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Rasim M. Alguliyev, Davud Rustamov, Mirza Rzayev |
Computational Approach for Detection of Illegal Activity over the Internet. |
JISIC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Herman-Dick Giok Tjiang Oey |
Military Geospatial Profiling Analysis. |
JISIC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ashish Sureka, Swati Agarwal 0001 |
Learning to Classify Hate and Extremism Promoting Tweets. |
JISIC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Pedro Chahuara, Luca Mazzola, Michail Makridis, Claudio Schifanella, Aris Tsois, Mauro Pedone |
Inferring itineraries of containerized cargo through the application of Conditional Random Fields. |
JISIC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jyri Rajamäki |
Challenges to a Smooth-Running Data Security Audits. Case: A Finnish National Security Auditing Criteria KATAKRI. |
JISIC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | |
IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014, The Hague, The Netherlands, 24-26 September, 2014 |
JISIC |
2014 |
DBLP BibTeX RDF |
|
1 | Victor A. Benjamin, Hsinchun Chen |
Time-to-Event Modeling for Predicting Hacker IRC Community Participant Trajectory. |
JISIC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Nir Nissim, Aviad Cohen 0002, Robert Moskovitch, Asaf Shabtai, Mattan Edry, Oren Bar-Ad, Yuval Elovici |
ALPD: Active Learning Framework for Enhancing the Detection of Malicious PDF Files. |
JISIC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Daniel J. Lawson, Patrick Rubin-Delanchy, Nicholas A. Heard, Niall M. Adams |
Statistical Frameworks for Detecting Tunnelling in Cyber Defence Using Big Data. |
JISIC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Fredrik Johansson, Lisa Kaati, Amendra Shrestha |
Time Profiles for Identifying Users in Online Environments. |
JISIC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Alexander Bolton, Nicholas A. Heard |
Application of a Linear Time Method for Change Point Detection to the Classification of Software. |
JISIC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Joel Lathrop, James B. O'Kane |
A Case Study in Opportunity Reduction: Mitigating the Dirt Jumper Drive-Smart Attack. |
JISIC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Patrick Rubin-Delanchy, Daniel J. Lawson, Melissa J. Turcotte, Nicholas A. Heard, Niall M. Adams |
Three Statistical Approaches to Sessionizing Network Flow Data. |
JISIC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Mordechai Guri, Gabi Kedma, Assaf Kachlon, Yuval Elovici |
Resilience of Anti-malware Programs to Naïve Modifications of Malicious Binaries. |
JISIC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Chuan Luo 0004, Xiaolong Zheng 0001, Daniel Dajun Zeng |
Causal Inference in Social Media Using Convergent Cross Mapping. |
JISIC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Vitali Sepetnitsky, Mordechai Guri, Yuval Elovici |
Exfiltration of Information from Air-Gapped Machines Using Monitor's LED Indicator. |
JISIC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Gila Molcho, Sebastian Maier, Felipe Melero, Carlo Aliprandi |
CAPER: Collaborative Information, Acquisition, Processing, Exploitation and Reporting for the Prevention of Organised Crime. |
JISIC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Michelle Cayford, Coen van Gulijk, Pieter H. A. J. M. van Gelder |
When Counting is Not Enough: Limitations of NSA's Effectiveness Assessment of Surveillance Technology. |
JISIC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ahmed Abbasi, Weifeng Li 0002, Victor A. Benjamin, Shiyu Hu, Hsinchun Chen |
Descriptive Analytics: Examining Expert Hackers in Web Forums. |
JISIC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Yi-Ching Liao, Hanno Langweg |
Resource-Based Event Reconstruction of Digital Crime Scenes. |
JISIC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Owen Brady, Richard E. Overill, Jeroen Keppens |
Addressing the Increasing Volume and Variety of Digital Evidence Using an Ontology. |
JISIC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Yongpeng Yang, Monisha Manoharan, K. Suzanne Barber |
Modelling and Analysis of Identity Threat Behaviors through Text Mining of Identity Theft Stories. |
JISIC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Andrea Ponzoni, Dario Zappa, Cristina Cerqui, Elisabetta Comini, Giorgio Sberveglieri |
Metal Oxide Gas Sensors Technologies for Hidden People Detection. |
JISIC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Dragos Datcu, Marina-Anca Cidotã, Heide K. Lukosch, Stephan G. Lukosch |
On the Usability of Augmented Reality for Information Exchange in Teams from the Security Domain. |
JISIC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Iwen Coisel, Ignacio Sanchez |
Practical Interception of DECT Encrypted Voice Communication in Unified Communications Environments. |
JISIC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Silvia Metelli, Nicholas A. Heard |
Modelling New Edge Formation in a Computer Network through Bayesian Variable Selection. |
JISIC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ricardo Guedes, Vasco Furtado, Tarcisio H. C. Pequeno |
Multiagent Models for Police Resource Allocation and Dispatch. |
JISIC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Niels L. M. van Adrichem, Antonio Reyes Lua, Xin Wang, Muhammad Wasif, Ficky Fatturrahman, Fernando A. Kuipers |
DNSSEC Misconfigurations: How Incorrectly Configured Security Leads to Unreachability. |
JISIC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Edgar Toshiro Yano, Parth Bhatt, Per M. Gustavsson, Rose-Mharie Åhlfeldt |
Towards a Methodology for Cybersecurity Risk Management Using Agents Paradigm. |
JISIC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Hamed Yaghoubi Shahir, Uwe Glässer, Narek Nalbandyan, Hans Wehn |
Maritime Situation Analysis: A Multi-vessel Interaction and Anomaly Detection Framework. |
JISIC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Hugo Lewi Hammer |
Detecting Threats of Violence in Online Discussions Using Bigrams of Important Words. |
JISIC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Gijs Koot, Mirjam A. A. Huis in 't Veld, Joost Hendricksen, Rianne Kaptein, Arnout de Vries, Egon L. van den Broek |
Foraging Online Social Networks. |
JISIC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Carlo Marcelo Revoredo da Silva, Jose Lutiano Costa da Silva, Rodrigo Elia Assad, Ruy Jose Guerra Barretto Garcia |
Aegis: A Lightweight Tool for Prevent Frauds in Web Browsers. |
JISIC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Steven Banaszak, Elizabeth K. Bowman, John P. Dickerson, V. S. Subrahmanian |
Forecasting Country Stability in North Africa. |
JISIC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Yuri Gil Dantas, Vivek Nigam, Iguatemi E. Fonseca |
A Selective Defense for Application Layer DDoS Attacks. |
JISIC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Neesha Kodagoda, Simon Attfield, Phong Hai Nguyen, Leishi Zhang, Kai Xu 0003, B. L. William Wong, Adrian Wagstaff, Graham Phillips, James Bullock, John Marshall, Stewart Bertram |
POLAR-An Interactive Patterns of Life Visualisation Tool for Intelligence Analysis. |
JISIC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | A. C. van den Broek, R. M. Schoemaker, Rob J. Dekker |
Land Border Permeability and Irregular Migration Using Geospatial Intelligence from Satellite Data. |
JISIC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Matthew John Edwards, Awais Rashid, Paul Rayson |
A Service-Indepenent Model for Linking Online User Profile Information. |
JISIC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Mari Ylikauppila, Sirra Toivonen, Minna Kulju, Minna Jokela |
Understanding the Factors Affecting UX and Technology Acceptance in the Context of Automated Border Controls. |
JISIC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Samer Al-khateeb, Nitin Agarwal |
Modeling Flash Mobs in Cybernetic Space: Evaluating Threats of Emerging Socio-Technical Behaviors to Human Security. |
JISIC |
2014 |
DBLP DOI BibTeX RDF |
|