


default search action
EISIC 2017: Athens, Greece
- Joel Brynielsson:
European Intelligence and Security Informatics Conference, EISIC 2017, Athens, Greece, September 11-13, 2017. IEEE Computer Society 2017, ISBN 978-1-5386-2385-5
Regular Papers
- Anton Borg
, Martin Boldt, Johan Eliasson:
Detecting Crime Series Based on Route Estimation and Behavioral Similarity. 1-8 - Erik T. Zouave, Thomas Marquenie:
An Inconvenient Truth: Algorithmic Transparency & Accountability in Criminal Intelligence Profiling. 17-23 - Nikolaos Dimitriou
, George Kioumourtzis
, Anargyros Sideris, Georgios Stavropoulos, Evdoxia Taka
, Nikolaos Zotos
, George Leventakis, Dimitrios Tzovaras
:
An Integrated Framework for the Timely Detection of Petty Crimes. 24-31 - Khaled Khelif, Yann Mombrun, Gerhard Backfried, Farhan Sahito, Luca Scarpato, Petr Motlícek
, Srikanth R. Madikeri, Damien Kelly, Gideon Hazzani, Emmanouil Chatzigavriil:
Towards a Breakthrough Speaker Identification Approach for Law Enforcement Agencies: SIIP. 32-39 - Yee Jang Foong, Mourad Oussalah:
Cyberbullying System Detection and Analysis. 40-46 - Celeste Groenewald, B. L. William Wong, Simon Attfield, Peter J. Passmore, Neesha Kodagoda:
How Analysts Think: How Do Criminal Intelligence Analysts Recognise and Manage Significant Information? 47-53 - Tim Isbister, Lisa Kaati, Katie Cohen:
Gender Classification with Data Independent Features in Multiple Languages. 54-60 - Johan Fernquist, Torbjorn Fangstrom, Lisa Kaati:
IoT Data Profiles: The Routines of Your Life Reveals Who You Are. 61-67 - Lisa Kaati, Adam Ruul:
Interpretable Probabilistic Divisive Clustering of Large Node-Attributed Networks. 68-75 - Konstantinos F. Xylogiannopoulos
, Panagiotis Karampelas
, Reda Alhajj:
Text Mining in Unclean, Noisy or Scrambled Datasets for Digital Forensics Analytics. 76-83 - Matthew Price-Williams, Nick Heard, Melissa J. Turcotte:
Detecting Periodic Subsequences in Cyber Security Data. 84-90 - Vasileios Mavroeidis, Siri Bromander:
Cyber Threat Intelligence Model: An Evaluation of Taxonomies, Sharing Standards, and Ontologies within Cyber Threat Intelligence. 91-98 - Lingwei Chen, Yanfang Ye, Thirimachos Bourlai
:
Adversarial Machine Learning in Malware Detection: Arms Race between Evasion Attack and Defense. 99-106 - Mikaela Poulymenopoulou, Aris Tsois:
Customs Risk Analysis through the ConTraffic Visual Analytics Tool. 107-114 - Hervé Borrion, Hashem Dehghanniri, Yuanxi Li:
Comparative Analysis of Crime Scripts: One CCTV Footage - Twenty-One Scripts. 115-122
Short Papers
- Martin Boldt, Anton Borg
:
A Statistical Method for Detecting Significant Temporal Hotspots Using LISA Statistics. 123-126 - Jukka Ruohonen
, Ville Leppänen
:
Whose Hands Are in the Finnish Cookie Jar? 127-130 - Mandeep K. Dhami:
A Survey of Intelligence Analysts' Perceptions of Analytic Tools. 131-134 - Michael Martin, Jeremy M. Dawson, Thirimachos Bourlai
:
Large Scale Data Collection of Tattoo-Based Biometric Data from Social-Media Websites. 135-138 - Panos Kostakos
, Miika Moilanen, Arttu Niemelä, Mourad Oussalah:
Catchem: A Browser Plugin for the Panama Papers Using Approximate String Matching. 139-142 - Nadeem Qazi, B. L. William Wong:
Behavioural & Tempo-Spatial Knowledge Graph for Crime Matching through Graph Theory. 143-146 - Junayed Islam, B. L. William Wong:
Behavioural Markers: Bridging the Gap between Art of Analysis and Science of Analytics in Criminal Intelligence. 147-150 - Michael A. Bedek, Alexander Nussbaumer, Eva-Catherine Hillemann, Dietrich Albert
:
A Framework for Measuring Imagination in Visual Analytics Systems. 151-154 - Lisa Kaati, Elias Lundeqvist, Amendra Shrestha, Maria Svensson:
Author Profiling in the Wild. 155-158 - Ioanna K. Lekea
, Panagiotis Karampelas
:
Are We Really That Close Together? Tracing and Discussing Similarities and Differences between Greek Terrorist Groups Using Cluster Analysis. 159-162
Poster Papers
- Marc Michel Pic, Amine Ouddan:
Photometrix (TM): A Digital Seal for Offline Identity Picture Authentication. 163 - Pragya Paudyal, Chris Rooney, Neesha Kodagoda, B. L. William Wong, Penny Duquenoy, Nadeem Qazi:
How the Use of Ethically Sensitive Information Helps to Identify Co-Offenders via a Purposed Privacy Scale: A Pilot Study. 164 - Javier Torregrosa, Irene Gilpérez-López, Raúl Lara-Cabrera
, David Garriga, David Camacho
:
Can an Automatic Tool Assess Risk of Radicalization Online? A Case Study on Facebook. 165 - Stelios Andreadis
, Ilias Gialampoukidis
, George Kalpakis
, Theodora Tsikrika
, Symeon Papadopoulos, Stefanos Vrochidis
, Ioannis Kompatsiaris:
A Monitoring Tool for Terrorism-Related Key-Players and Key-Communities in Social Media Networks. 166

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.