2016 european intelligence and security informatics...

49
CONFERENCE INFORMATION PAPERS BY SESSION PAPERS BY AUTHOR SEARCH GETTING STARTED TRADEMARKS 2016 European Intelligence and Security Informatics Conference 17-19 August 2016 • Uppsala, Sweden EISIC 2016 Edited by Joel Brynielsson and Fredrik Johansson

Upload: others

Post on 01-Jun-2020

4 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: 2016 European Intelligence and Security Informatics Conferencectappert/papers/proceedings/2016EISIC/start.pdf · Michele Fiorini, Vincenzo Esposito, Marcello Cinque, Christian Esposito,

CONFERENCE INFORMATION

PAPERS BY SESSION

PAPERS BY AUTHOR

SEARCH

GETTING STARTED

TRADEMARKS

2016 European Intelligence andSecurity Informatics Conference

17-19 August 2016 • Uppsala, Sweden

EISIC 2016

Edited by Joel Brynielsson and Fredrik Johansson

Page 2: 2016 European Intelligence and Security Informatics Conferencectappert/papers/proceedings/2016EISIC/start.pdf · Michele Fiorini, Vincenzo Esposito, Marcello Cinque, Christian Esposito,

Conference Information

2016 European Intelligenceand Security Informatics Conference

q Message from the General Chairsq Message from the Program Chairsq Organizationq Program Committeeq Title Page (Book version)q Copyright Page (Book version)q Table of Contents (Book version)q Author Index (Book version)q Publisher's Information (Book version)

Page 3: 2016 European Intelligence and Security Informatics Conferencectappert/papers/proceedings/2016EISIC/start.pdf · Michele Fiorini, Vincenzo Esposito, Marcello Cinque, Christian Esposito,

Sessions

q Long Papersq Short Papersq Poster Papers

Page 4: 2016 European Intelligence and Security Informatics Conferencectappert/papers/proceedings/2016EISIC/start.pdf · Michele Fiorini, Vincenzo Esposito, Marcello Cinque, Christian Esposito,

Papers by Session

Long Papers

q Quality Assurance for Security Applications of Big DataRoger Clarke

q On Interoperability of Security Document Reading DevicesSvorad Štolc, Peter Wild, Kristián Valentín, Franz Daubner, and Markus Clabian

q Location, Location, Location: Mapping Potential Canadian Targets in OnlineHacker Discussion Forums

Richard Frank, Mitch Macdonald, and Bryan Monk

q The Role of Internet Service Providers in Botnet MitigationJeroen Pijpker and Harald Vranken

q Risk Kit: Highlighting Vulnerable Identity Assets for Specific Age GroupsRazieh Nokhbeh Zaeem, Monisha Manoharan, and K. Suzanne Barber

q How to Support the Decision Making in Crisis Context?Bénédicte Goujon

q Providing Extensibility to Threat Modelling in Cloud-COVER’s Underlying AnalysisModel

Mustafa Aydin and Jeremy Jacob

Page 5: 2016 European Intelligence and Security Informatics Conferencectappert/papers/proceedings/2016EISIC/start.pdf · Michele Fiorini, Vincenzo Esposito, Marcello Cinque, Christian Esposito,

Papers by Session

q Methodology and Tool to Facilitate Structured Analysis of Multiple HypothesesMagdalena Granåsen and Maja Karasalo

q Towards Designing a Multipurpose Cybercrime Intelligence FrameworkMariam Nouh, Jason R. C. Nurse, and Michael Goldsmith

q How Analysts Think: Think-steps as a Tool for Structuring Sensemakingin Criminal Intelligence Analysis

Nallini Selvaraj, Simon Attfield, Peter Passmore, and B. L. William Wong

Page 6: 2016 European Intelligence and Security Informatics Conferencectappert/papers/proceedings/2016EISIC/start.pdf · Michele Fiorini, Vincenzo Esposito, Marcello Cinque, Christian Esposito,

Papers by Session

Short Papers

q Compression Effects on Security Document ImagesPeter Wild, Svorad Štolc, Kristián Valentín, Franz Daubner, and Markus Clabian

q Cards, Money and Two Hacking Forums: An Analysis of Online MoneyLaundering Schemes

Alexander Mikhaylov and Richard Frank

q The Effectiveness of Counter-terrorism Policies Based on the Terrorism DecisionChaomin Ou and Wenyao Yang

q Information Security Aspects of the Public Safety Data Interoperability NetworkBlaž Ivanc and Borka Jerman Blažič

q Filtering Estimated Crime Series Based on Route Calculations on Spatio-temporalData

Martin Boldt and Jaswanth Bala

q Disaster Risk Reduction for International Residents in Japan: Barriersand Facilitators to Knowledge Sharing in Times of Disaster

Jiro Usugami

Page 7: 2016 European Intelligence and Security Informatics Conferencectappert/papers/proceedings/2016EISIC/start.pdf · Michele Fiorini, Vincenzo Esposito, Marcello Cinque, Christian Esposito,

Papers by Session

q Discovering Knowledge in Online Drug Transactions Using Conceptual Graphsand Formal Concept Analysis

Constantinos Orphanides, Babak Akhgar, and Petra Saskia Bayerl

q Sentiment-based Classification of Radical Text on the WebRyan Scrivens and Richard Frank

q My Name is Legion: Estimating Author Counts Based on Stylistic DiversityJohanna Björklund and Niklas Zechner

q Key Player Identification in Terrorism-Related Social Media Networks UsingCentrality Measures

Ilias Gialampoukidis, George Kalpakis, Theodora Tsikrika, Stefanos Vrochidis,and Ioannis Kompatsiaris

q Confidential Crisis Information Sharing through an Interoperability Frameworkamong First Responders: A Discussion and a Preliminary Solution

Michele Fiorini, Vincenzo Esposito, Marcello Cinque, Christian Esposito, Mario Fiorentino,Domenico Cotroneo, and Stefano Russo

q QUIN: Providing Integrated Analysis Support to Crime InvestigatorsSelmar Smit, Bob van der Vecht, Freek van Wermeskerken, and Jan Willem Streefkerk

q But I did not Mean It!—Intent Classification of Racist Posts on TumblrSwati Agarwal and Ashish Sureka

Page 8: 2016 European Intelligence and Security Informatics Conferencectappert/papers/proceedings/2016EISIC/start.pdf · Michele Fiorini, Vincenzo Esposito, Marcello Cinque, Christian Esposito,

Papers by Session

q Missing Solutions in the Fight against Cybercrime and Cyberterrorism—The NewEU Research Agenda

Borka Jerman Blažič and Tomaž Klobučar

q How Analysts Think: Decision Making in the Absence of Clear FactsMatylda Gerber, B. L. William Wong, and Neesha Kodagoda

q Personal Information Leakage During Password Recovery of Internet ServicesMordechai Guri, Eyal Shemer, Dov Shirtz, and Yuval Elovici

q Design for Intelligence Analysis of Complex Systems: Evolution of CriminalNetworks

Patrick Seidler, Johanna Haider, Neesha Kodagoda, B. L. William Wong, Margit Pohl,and Richard Adderley

q A Post-Mortem Empirical Investigation of the Popularity and Distributionof Malware Files in the Contemporary Web-Facing Internet

Jukka Ruohonen, Sanja Šćepanović, Sami Hyrynsalmi, Igor Mishkovski, Tuomas Aura,and Ville Leppänen

q A Framework for Cognitive Bias Detection and Feedback in a Visual AnalyticsEnvironment

Alexander Nussbaumer, Katrien Verbert, Eva-Catherine Hillemann, Michael A. Bedek,and Dietrich Albert

Page 9: 2016 European Intelligence and Security Informatics Conferencectappert/papers/proceedings/2016EISIC/start.pdf · Michele Fiorini, Vincenzo Esposito, Marcello Cinque, Christian Esposito,

Papers by Session

q Critical Review of Analytic TechniquesMandeep K. Dhami, Ian K. Belton, and Kathryn E. Careless

q Modified Graphstega Based on Chart Scale ModificationAprianti Nanda Sari and Ari Moesriami Barmawi

q A Security Analysis on Apple PayAshay S. Jawale and Joon S. Park

q Enhancing Risk-Based Decisions by Leveraging Cyber Security AutomationTina AlSadhan and Joon S. Park

q Text Authorship Verification through WatermarkingStefano Giovanni Rizzo, Flavio Bertini, and Danilo Montesi

q On Privacy and Security Challenges in Smart Connected HomesJoseph Bugeja, Andreas Jacobsson, and Paul Davidsson

q An Argumentative-Narrative Risk Assessment ModelFloris Bex and Bas Hovestad

q A Quantitative Approach to Risk and Cost Assessment in Supply ChainManagement

Linus Gisslén and Andreas Horndahl

Page 10: 2016 European Intelligence and Security Informatics Conferencectappert/papers/proceedings/2016EISIC/start.pdf · Michele Fiorini, Vincenzo Esposito, Marcello Cinque, Christian Esposito,

Papers by Session

q A Behavioral Biometrics User Authentication Study Using Motion Datafrom Android Smartphones

Javid Maghsoudi and Charles C. Tappert

q Random Delays to Limit Timing Covert ChannelAnna Belozubova, Anna Epishkina, and Konstantin Kogos

q A Framework and Prototype for A Socio-Technical Security Information and EventManagement System (ST-SIEM)

Bilal AlSabbagh and Stewart Kowalski

Page 11: 2016 European Intelligence and Security Informatics Conferencectappert/papers/proceedings/2016EISIC/start.pdf · Michele Fiorini, Vincenzo Esposito, Marcello Cinque, Christian Esposito,

Papers by Session

Poster Papers

q Forecasting the Underlying Psychological Forces to Political Violence through BigData Symbol Mining

Niklas Hageback

q Role of Author Personality Traits for Identifying Intent Based Racist PostsSwati Agarwal and Ashish Sureka

q Towards Efficient Law Enforcement Decision Support Systems in the Areaof Community Policing: The Use of Mobile Applications

George Leventakis, George Papalexandratos, George Kokkinis, Elisavet Charalambous,and Nikolaos Koutras

q Multilayer Analysis of Online Illicit MarketplacesMichael Ashcroft, Matteo Magnani, Davide Vega, Danilo Montesi, and Luca Rossi

q The IPATCH System for Maritime Surveillance and Piracy Threat ClassificationMaria Andersson, Ronnie Johansson, Karl-Göran Stenborg, Robert Forsgren, Thomas Cane,Grzegorz Taberski, Luis Patino, and James Ferryman

q Present Status and Challenges in Cloud Monitoring Framework: A SurveyAws Naser, Mohamed Fadli Zolkipli, Shahid Anwar, and Muna Sulieman Al-Hawawreh

q A Dedicated Crawling Engine to Reduce Apps Distribution RisksMarc Michel Pic

Page 12: 2016 European Intelligence and Security Informatics Conferencectappert/papers/proceedings/2016EISIC/start.pdf · Michele Fiorini, Vincenzo Esposito, Marcello Cinque, Christian Esposito,

Papers by Session

q Harnessing Crowds to Avert or Mitigate Acts Terrorism: A Collective IntelligenceCall for Action

Haibo Li and Anders Hedman

Page 13: 2016 European Intelligence and Security Informatics Conferencectappert/papers/proceedings/2016EISIC/start.pdf · Michele Fiorini, Vincenzo Esposito, Marcello Cinque, Christian Esposito,

Papers by Author

Aq Adderley, Richardq Agarwal, Swatiq Akhgar, Babakq Albert, Dietrichq Al-Hawawreh, Muna Suliemanq AlSabbagh, Bilalq AlSadhan, Tinaq Andersson, Mariaq Anwar, Shahidq Ashcroft, Michaelq Attfield, Simonq Aura, Tuomasq Aydin, Mustafa

Bq Bala, Jaswanthq Barber, K. Suzanneq Barmawi, Ari Moesriamiq Bayerl, Petra Saskiaq Bedek, Michael A.q Belozubova, Annaq Belton, Ian K.q Bertini, Flavioq Bex, Florisq Björklund, Johannaq Boldt, Martinq Bugeja, Joseph

Cq Cane, Thomas

Page 14: 2016 European Intelligence and Security Informatics Conferencectappert/papers/proceedings/2016EISIC/start.pdf · Michele Fiorini, Vincenzo Esposito, Marcello Cinque, Christian Esposito,

Papers by Author

q Careless, Kathryn E.q Charalambous, Elisavetq Cinque, Marcelloq Clabian, Markusq Clarke, Rogerq Cotroneo, Domenico

Dq Daubner, Franzq Davidsson, Paulq Dhami, Mandeep K.

Eq Elovici, Yuvalq Epishkina, Annaq Esposito, Christianq Esposito, Vincenzo

Fq Ferryman, Jamesq Fiorentino, Marioq Fiorini, Micheleq Forsgren, Robertq Frank, Richard

Gq Gerber, Matyldaq Gialampoukidis, Iliasq Gisslén, Linusq Goldsmith, Michaelq Goujon, Bénédicteq Granåsen, Magdalenaq Guri, Mordechai

Page 15: 2016 European Intelligence and Security Informatics Conferencectappert/papers/proceedings/2016EISIC/start.pdf · Michele Fiorini, Vincenzo Esposito, Marcello Cinque, Christian Esposito,

Papers by Author

Hq Hageback, Niklasq Haider, Johannaq Hedman, Andersq Hillemann, Eva-Catherineq Horndahl, Andreasq Hovestad, Basq Hyrynsalmi, Sami

Iq Ivanc, Blaž

Jq Jacob, Jeremyq Jacobsson, Andreasq Jawale, Ashay S.

q Jerman Blažič, Borkaq Johansson, Ronnie

Kq Kalpakis, Georgeq Karasalo, Majaq Klobučar, Tomažq Kodagoda, Neeshaq Kogos, Konstantinq Kokkinis, Georgeq Kompatsiaris, Ioannisq Koutras, Nikolaosq Kowalski, Stewart

Lq Leppänen, Villeq Leventakis, George

Page 16: 2016 European Intelligence and Security Informatics Conferencectappert/papers/proceedings/2016EISIC/start.pdf · Michele Fiorini, Vincenzo Esposito, Marcello Cinque, Christian Esposito,

Papers by Author

q Li, Haibo

Mq Macdonald, Mitchq Maghsoudi, Javidq Magnani, Matteoq Manoharan, Monishaq Mikhaylov, Alexanderq Mishkovski, Igorq Monk, Bryanq Montesi, Danilo

Nq Naser, Awsq Nouh, Mariamq Nurse, Jason R. C.q Nussbaumer, Alexander

Oq Orphanides, Constantinosq Ou, Chaomin

Pq Papalexandratos, Georgeq Park, Joon S.q Passmore, Peterq Patino, Luisq Pic, Marc Michelq Pijpker, Jeroenq Pohl, Margit

Rq Rizzo, Stefano Giovanniq Rossi, Luca

Page 17: 2016 European Intelligence and Security Informatics Conferencectappert/papers/proceedings/2016EISIC/start.pdf · Michele Fiorini, Vincenzo Esposito, Marcello Cinque, Christian Esposito,

Papers by Author

q Ruohonen, Jukkaq Russo, Stefano

Sq Sari, Aprianti Nandaq Scrivens, Ryanq Seidler, Patrickq Selvaraj, Nalliniq Shemer, Eyalq Shirtz, Dovq Smit, Selmarq Stenborg, Karl-Göranq Streefkerk, Jan Willemq Sureka, Ashish

Šq Šćepanović, Sanja

q Štolc, Svorad

Tq Taberski, Grzegorzq Tappert, Charles C.q Tsikrika, Theodora

Uq Usugami, Jiro

vq van der Vecht, Bobq van Wermeskerken, Freek

Vq Valentín, Kristiánq Vega, Davide

Page 18: 2016 European Intelligence and Security Informatics Conferencectappert/papers/proceedings/2016EISIC/start.pdf · Michele Fiorini, Vincenzo Esposito, Marcello Cinque, Christian Esposito,

Papers by Author

q Verbert, Katrienq Vranken, Haraldq Vrochidis, Stefanos

Wq Wild, Peterq Wong, B. L. William

Yq Yang, Wenyao

Zq Zaeem, Razieh Nokhbehq Zechner, Niklasq Zolkipli, Mohamed Fadli

Page 19: 2016 European Intelligence and Security Informatics Conferencectappert/papers/proceedings/2016EISIC/start.pdf · Michele Fiorini, Vincenzo Esposito, Marcello Cinque, Christian Esposito,

Papers by Author

Adderley, Richardq Design for Intelligence Analysis of Complex Systems: Evolution of Criminal

Networks

Agarwal, Swatiq But I did not Mean It!—Intent Classification of Racist Posts on Tumblrq Role of Author Personality Traits for Identifying Intent Based Racist Posts

Akhgar, Babakq Discovering Knowledge in Online Drug Transactions Using Conceptual Graphs

and Formal Concept Analysis

Albert, Dietrichq A Framework for Cognitive Bias Detection and Feedback in a Visual Analytics

Environment

Page 20: 2016 European Intelligence and Security Informatics Conferencectappert/papers/proceedings/2016EISIC/start.pdf · Michele Fiorini, Vincenzo Esposito, Marcello Cinque, Christian Esposito,

Papers by Author

Al-Hawawreh, Muna Suliemanq Present Status and Challenges in Cloud Monitoring Framework: A Survey

AlSabbagh, Bilalq A Framework and Prototype for A Socio-Technical Security Information and Event

Management System (ST-SIEM)

AlSadhan, Tinaq Enhancing Risk-Based Decisions by Leveraging Cyber Security Automation

Andersson, Mariaq The IPATCH System for Maritime Surveillance and Piracy Threat Classification

Anwar, Shahidq Present Status and Challenges in Cloud Monitoring Framework: A Survey

Page 21: 2016 European Intelligence and Security Informatics Conferencectappert/papers/proceedings/2016EISIC/start.pdf · Michele Fiorini, Vincenzo Esposito, Marcello Cinque, Christian Esposito,

Papers by Author

Ashcroft, Michaelq Multilayer Analysis of Online Illicit Marketplaces

Attfield, Simonq How Analysts Think: Think-steps as a Tool for Structuring Sensemaking

in Criminal Intelligence Analysis

Aura, Tuomasq A Post-Mortem Empirical Investigation of the Popularity and Distribution

of Malware Files in the Contemporary Web-Facing Internet

Aydin, Mustafaq Providing Extensibility to Threat Modelling in Cloud-COVER’s Underlying Analysis

Model

Page 22: 2016 European Intelligence and Security Informatics Conferencectappert/papers/proceedings/2016EISIC/start.pdf · Michele Fiorini, Vincenzo Esposito, Marcello Cinque, Christian Esposito,

Papers by Author

Bala, Jaswanthq Filtering Estimated Crime Series Based on Route Calculations on Spatio-temporal

Data

Barber, K. Suzanneq Risk Kit: Highlighting Vulnerable Identity Assets for Specific Age Groups

Barmawi, Ari Moesriamiq Modified Graphstega Based on Chart Scale Modification

Bayerl, Petra Saskiaq Discovering Knowledge in Online Drug Transactions Using Conceptual Graphs

and Formal Concept Analysis

Page 23: 2016 European Intelligence and Security Informatics Conferencectappert/papers/proceedings/2016EISIC/start.pdf · Michele Fiorini, Vincenzo Esposito, Marcello Cinque, Christian Esposito,

Papers by Author

Bedek, Michael A.q A Framework for Cognitive Bias Detection and Feedback in a Visual Analytics

Environment

Belozubova, Annaq Random Delays to Limit Timing Covert Channel

Belton, Ian K.q Critical Review of Analytic Techniques

Bertini, Flavioq Text Authorship Verification through Watermarking

Bex, Florisq An Argumentative-Narrative Risk Assessment Model

Page 24: 2016 European Intelligence and Security Informatics Conferencectappert/papers/proceedings/2016EISIC/start.pdf · Michele Fiorini, Vincenzo Esposito, Marcello Cinque, Christian Esposito,

Papers by Author

Björklund, Johannaq My Name is Legion: Estimating Author Counts Based on Stylistic Diversity

Boldt, Martinq Filtering Estimated Crime Series Based on Route Calculations on Spatio-temporal

Data

Bugeja, Josephq On Privacy and Security Challenges in Smart Connected Homes

Cane, Thomasq The IPATCH System for Maritime Surveillance and Piracy Threat Classification

Careless, Kathryn E.q Critical Review of Analytic Techniques

Page 25: 2016 European Intelligence and Security Informatics Conferencectappert/papers/proceedings/2016EISIC/start.pdf · Michele Fiorini, Vincenzo Esposito, Marcello Cinque, Christian Esposito,

Papers by Author

Charalambous, Elisavetq Towards Efficient Law Enforcement Decision Support Systems in the Area

of Community Policing: The Use of Mobile Applications

Cinque, Marcelloq Confidential Crisis Information Sharing through an Interoperability Framework

among First Responders: A Discussion and a Preliminary Solution

Clabian, Markusq On Interoperability of Security Document Reading Devicesq Compression Effects on Security Document Images

Clarke, Rogerq Quality Assurance for Security Applications of Big Data

Page 26: 2016 European Intelligence and Security Informatics Conferencectappert/papers/proceedings/2016EISIC/start.pdf · Michele Fiorini, Vincenzo Esposito, Marcello Cinque, Christian Esposito,

Papers by Author

Cotroneo, Domenicoq Confidential Crisis Information Sharing through an Interoperability Framework

among First Responders: A Discussion and a Preliminary Solution

Daubner, Franzq On Interoperability of Security Document Reading Devicesq Compression Effects on Security Document Images

Davidsson, Paulq On Privacy and Security Challenges in Smart Connected Homes

Dhami, Mandeep K.q Critical Review of Analytic Techniques

Elovici, Yuvalq Personal Information Leakage During Password Recovery of Internet Services

Page 27: 2016 European Intelligence and Security Informatics Conferencectappert/papers/proceedings/2016EISIC/start.pdf · Michele Fiorini, Vincenzo Esposito, Marcello Cinque, Christian Esposito,

Papers by Author

Epishkina, Annaq Random Delays to Limit Timing Covert Channel

Esposito, Christianq Confidential Crisis Information Sharing through an Interoperability Framework

among First Responders: A Discussion and a Preliminary Solution

Esposito, Vincenzoq Confidential Crisis Information Sharing through an Interoperability Framework

among First Responders: A Discussion and a Preliminary Solution

Ferryman, Jamesq The IPATCH System for Maritime Surveillance and Piracy Threat Classification

Page 28: 2016 European Intelligence and Security Informatics Conferencectappert/papers/proceedings/2016EISIC/start.pdf · Michele Fiorini, Vincenzo Esposito, Marcello Cinque, Christian Esposito,

Papers by Author

Fiorentino, Marioq Confidential Crisis Information Sharing through an Interoperability Framework

among First Responders: A Discussion and a Preliminary Solution

Fiorini, Micheleq Confidential Crisis Information Sharing through an Interoperability Framework

among First Responders: A Discussion and a Preliminary Solution

Forsgren, Robertq The IPATCH System for Maritime Surveillance and Piracy Threat Classification

Frank, Richardq Location, Location, Location: Mapping Potential Canadian Targets in Online

Hacker Discussion Forumsq Cards, Money and Two Hacking Forums: An Analysis of Online Money

Laundering Schemesq Sentiment-based Classification of Radical Text on the Web

Page 29: 2016 European Intelligence and Security Informatics Conferencectappert/papers/proceedings/2016EISIC/start.pdf · Michele Fiorini, Vincenzo Esposito, Marcello Cinque, Christian Esposito,

Papers by Author

Gerber, Matyldaq How Analysts Think: Decision Making in the Absence of Clear Facts

Gialampoukidis, Iliasq Key Player Identification in Terrorism-Related Social Media Networks Using

Centrality Measures

Gisslén, Linusq A Quantitative Approach to Risk and Cost Assessment in Supply Chain

Management

Goldsmith, Michaelq Towards Designing a Multipurpose Cybercrime Intelligence Framework

Goujon, Bénédicteq How to Support the Decision Making in Crisis Context?

Page 30: 2016 European Intelligence and Security Informatics Conferencectappert/papers/proceedings/2016EISIC/start.pdf · Michele Fiorini, Vincenzo Esposito, Marcello Cinque, Christian Esposito,

Papers by Author

Granåsen, Magdalenaq Methodology and Tool to Facilitate Structured Analysis of Multiple Hypotheses

Guri, Mordechaiq Personal Information Leakage During Password Recovery of Internet Services

Hageback, Niklasq Forecasting the Underlying Psychological Forces to Political Violence through Big

Data Symbol Mining

Haider, Johannaq Design for Intelligence Analysis of Complex Systems: Evolution of Criminal

Networks

Page 31: 2016 European Intelligence and Security Informatics Conferencectappert/papers/proceedings/2016EISIC/start.pdf · Michele Fiorini, Vincenzo Esposito, Marcello Cinque, Christian Esposito,

Papers by Author

Hedman, Andersq Harnessing Crowds to Avert or Mitigate Acts Terrorism: A Collective Intelligence

Call for Action

Hillemann, Eva-Catherineq A Framework for Cognitive Bias Detection and Feedback in a Visual Analytics

Environment

Horndahl, Andreasq A Quantitative Approach to Risk and Cost Assessment in Supply Chain

Management

Hovestad, Basq An Argumentative-Narrative Risk Assessment Model

Page 32: 2016 European Intelligence and Security Informatics Conferencectappert/papers/proceedings/2016EISIC/start.pdf · Michele Fiorini, Vincenzo Esposito, Marcello Cinque, Christian Esposito,

Papers by Author

Hyrynsalmi, Samiq A Post-Mortem Empirical Investigation of the Popularity and Distribution

of Malware Files in the Contemporary Web-Facing Internet

Ivanc, Blažq Information Security Aspects of the Public Safety Data Interoperability Network

Jacob, Jeremyq Providing Extensibility to Threat Modelling in Cloud-COVER’s Underlying Analysis

Model

Jacobsson, Andreasq On Privacy and Security Challenges in Smart Connected Homes

Jawale, Ashay S.q A Security Analysis on Apple Pay

Page 33: 2016 European Intelligence and Security Informatics Conferencectappert/papers/proceedings/2016EISIC/start.pdf · Michele Fiorini, Vincenzo Esposito, Marcello Cinque, Christian Esposito,

Papers by Author

Jerman Blažič, Borkaq Information Security Aspects of the Public Safety Data Interoperability Networkq Missing Solutions in the Fight against Cybercrime and Cyberterrorism—The New

EU Research Agenda

Johansson, Ronnieq The IPATCH System for Maritime Surveillance and Piracy Threat Classification

Kalpakis, Georgeq Key Player Identification in Terrorism-Related Social Media Networks Using

Centrality Measures

Karasalo, Majaq Methodology and Tool to Facilitate Structured Analysis of Multiple Hypotheses

Page 34: 2016 European Intelligence and Security Informatics Conferencectappert/papers/proceedings/2016EISIC/start.pdf · Michele Fiorini, Vincenzo Esposito, Marcello Cinque, Christian Esposito,

Papers by Author

Klobučar, Tomažq Missing Solutions in the Fight against Cybercrime and Cyberterrorism—The New

EU Research Agenda

Kodagoda, Neeshaq How Analysts Think: Decision Making in the Absence of Clear Factsq Design for Intelligence Analysis of Complex Systems: Evolution of Criminal

Networks

Kogos, Konstantinq Random Delays to Limit Timing Covert Channel

Kokkinis, Georgeq Towards Efficient Law Enforcement Decision Support Systems in the Area

of Community Policing: The Use of Mobile Applications

Page 35: 2016 European Intelligence and Security Informatics Conferencectappert/papers/proceedings/2016EISIC/start.pdf · Michele Fiorini, Vincenzo Esposito, Marcello Cinque, Christian Esposito,

Papers by Author

Kompatsiaris, Ioannisq Key Player Identification in Terrorism-Related Social Media Networks Using

Centrality Measures

Koutras, Nikolaosq Towards Efficient Law Enforcement Decision Support Systems in the Area

of Community Policing: The Use of Mobile Applications

Kowalski, Stewartq A Framework and Prototype for A Socio-Technical Security Information and Event

Management System (ST-SIEM)

Leppänen, Villeq A Post-Mortem Empirical Investigation of the Popularity and Distribution

of Malware Files in the Contemporary Web-Facing Internet

Page 36: 2016 European Intelligence and Security Informatics Conferencectappert/papers/proceedings/2016EISIC/start.pdf · Michele Fiorini, Vincenzo Esposito, Marcello Cinque, Christian Esposito,

Papers by Author

Leventakis, Georgeq Towards Efficient Law Enforcement Decision Support Systems in the Area

of Community Policing: The Use of Mobile Applications

Li, Haiboq Harnessing Crowds to Avert or Mitigate Acts Terrorism: A Collective Intelligence

Call for Action

Macdonald, Mitchq Location, Location, Location: Mapping Potential Canadian Targets in Online

Hacker Discussion Forums

Maghsoudi, Javidq A Behavioral Biometrics User Authentication Study Using Motion Data

from Android Smartphones

Page 37: 2016 European Intelligence and Security Informatics Conferencectappert/papers/proceedings/2016EISIC/start.pdf · Michele Fiorini, Vincenzo Esposito, Marcello Cinque, Christian Esposito,

Papers by Author

Magnani, Matteoq Multilayer Analysis of Online Illicit Marketplaces

Manoharan, Monishaq Risk Kit: Highlighting Vulnerable Identity Assets for Specific Age Groups

Mikhaylov, Alexanderq Cards, Money and Two Hacking Forums: An Analysis of Online Money

Laundering Schemes

Mishkovski, Igorq A Post-Mortem Empirical Investigation of the Popularity and Distribution

of Malware Files in the Contemporary Web-Facing Internet

Page 38: 2016 European Intelligence and Security Informatics Conferencectappert/papers/proceedings/2016EISIC/start.pdf · Michele Fiorini, Vincenzo Esposito, Marcello Cinque, Christian Esposito,

Papers by Author

Monk, Bryanq Location, Location, Location: Mapping Potential Canadian Targets in Online

Hacker Discussion Forums

Montesi, Daniloq Text Authorship Verification through Watermarkingq Multilayer Analysis of Online Illicit Marketplaces

Naser, Awsq Present Status and Challenges in Cloud Monitoring Framework: A Survey

Nouh, Mariamq Towards Designing a Multipurpose Cybercrime Intelligence Framework

Nurse, Jason R. C.q Towards Designing a Multipurpose Cybercrime Intelligence Framework

Page 39: 2016 European Intelligence and Security Informatics Conferencectappert/papers/proceedings/2016EISIC/start.pdf · Michele Fiorini, Vincenzo Esposito, Marcello Cinque, Christian Esposito,

Papers by Author

Nussbaumer, Alexanderq A Framework for Cognitive Bias Detection and Feedback in a Visual Analytics

Environment

Orphanides, Constantinosq Discovering Knowledge in Online Drug Transactions Using Conceptual Graphs

and Formal Concept Analysis

Ou, Chaominq The Effectiveness of Counter-terrorism Policies Based on the Terrorism Decision

Papalexandratos, Georgeq Towards Efficient Law Enforcement Decision Support Systems in the Area

of Community Policing: The Use of Mobile Applications

Park, Joon S.q A Security Analysis on Apple Pay

Page 40: 2016 European Intelligence and Security Informatics Conferencectappert/papers/proceedings/2016EISIC/start.pdf · Michele Fiorini, Vincenzo Esposito, Marcello Cinque, Christian Esposito,

Papers by Author

q Enhancing Risk-Based Decisions by Leveraging Cyber Security Automation

Passmore, Peterq How Analysts Think: Think-steps as a Tool for Structuring Sensemaking

in Criminal Intelligence Analysis

Patino, Luisq The IPATCH System for Maritime Surveillance and Piracy Threat Classification

Pic, Marc Michelq A Dedicated Crawling Engine to Reduce Apps Distribution Risks

Pijpker, Jeroenq The Role of Internet Service Providers in Botnet Mitigation

Page 41: 2016 European Intelligence and Security Informatics Conferencectappert/papers/proceedings/2016EISIC/start.pdf · Michele Fiorini, Vincenzo Esposito, Marcello Cinque, Christian Esposito,

Papers by Author

Pohl, Margitq Design for Intelligence Analysis of Complex Systems: Evolution of Criminal

Networks

Rizzo, Stefano Giovanniq Text Authorship Verification through Watermarking

Rossi, Lucaq Multilayer Analysis of Online Illicit Marketplaces

Ruohonen, Jukkaq A Post-Mortem Empirical Investigation of the Popularity and Distribution

of Malware Files in the Contemporary Web-Facing Internet

Page 42: 2016 European Intelligence and Security Informatics Conferencectappert/papers/proceedings/2016EISIC/start.pdf · Michele Fiorini, Vincenzo Esposito, Marcello Cinque, Christian Esposito,

Papers by Author

Russo, Stefanoq Confidential Crisis Information Sharing through an Interoperability Framework

among First Responders: A Discussion and a Preliminary Solution

Sari, Aprianti Nandaq Modified Graphstega Based on Chart Scale Modification

Šćepanović, Sanjaq A Post-Mortem Empirical Investigation of the Popularity and Distribution

of Malware Files in the Contemporary Web-Facing Internet

Scrivens, Ryanq Sentiment-based Classification of Radical Text on the Web

Page 43: 2016 European Intelligence and Security Informatics Conferencectappert/papers/proceedings/2016EISIC/start.pdf · Michele Fiorini, Vincenzo Esposito, Marcello Cinque, Christian Esposito,

Papers by Author

Seidler, Patrickq Design for Intelligence Analysis of Complex Systems: Evolution of Criminal

Networks

Selvaraj, Nalliniq How Analysts Think: Think-steps as a Tool for Structuring Sensemaking

in Criminal Intelligence Analysis

Shemer, Eyalq Personal Information Leakage During Password Recovery of Internet Services

Shirtz, Dovq Personal Information Leakage During Password Recovery of Internet Services

Smit, Selmarq QUIN: Providing Integrated Analysis Support to Crime Investigators

Page 44: 2016 European Intelligence and Security Informatics Conferencectappert/papers/proceedings/2016EISIC/start.pdf · Michele Fiorini, Vincenzo Esposito, Marcello Cinque, Christian Esposito,

Papers by Author

Stenborg, Karl-Göranq The IPATCH System for Maritime Surveillance and Piracy Threat Classification

Štolc, Svoradq On Interoperability of Security Document Reading Devicesq Compression Effects on Security Document Images

Streefkerk, Jan Willemq QUIN: Providing Integrated Analysis Support to Crime Investigators

Sureka, Ashishq But I did not Mean It!—Intent Classification of Racist Posts on Tumblrq Role of Author Personality Traits for Identifying Intent Based Racist Posts

Taberski, Grzegorzq The IPATCH System for Maritime Surveillance and Piracy Threat Classification

Page 45: 2016 European Intelligence and Security Informatics Conferencectappert/papers/proceedings/2016EISIC/start.pdf · Michele Fiorini, Vincenzo Esposito, Marcello Cinque, Christian Esposito,

Papers by Author

Tappert, Charles C.q A Behavioral Biometrics User Authentication Study Using Motion Data

from Android Smartphones

Tsikrika, Theodoraq Key Player Identification in Terrorism-Related Social Media Networks Using

Centrality Measures

Usugami, Jiroq Disaster Risk Reduction for International Residents in Japan: Barriers

and Facilitators to Knowledge Sharing in Times of Disaster

Valentín, Kristiánq On Interoperability of Security Document Reading Devicesq Compression Effects on Security Document Images

Page 46: 2016 European Intelligence and Security Informatics Conferencectappert/papers/proceedings/2016EISIC/start.pdf · Michele Fiorini, Vincenzo Esposito, Marcello Cinque, Christian Esposito,

Papers by Author

van der Vecht, Bobq QUIN: Providing Integrated Analysis Support to Crime Investigators

van Wermeskerken, Freekq QUIN: Providing Integrated Analysis Support to Crime Investigators

Vega, Davideq Multilayer Analysis of Online Illicit Marketplaces

Verbert, Katrienq A Framework for Cognitive Bias Detection and Feedback in a Visual Analytics

Environment

Vranken, Haraldq The Role of Internet Service Providers in Botnet Mitigation

Page 47: 2016 European Intelligence and Security Informatics Conferencectappert/papers/proceedings/2016EISIC/start.pdf · Michele Fiorini, Vincenzo Esposito, Marcello Cinque, Christian Esposito,

Papers by Author

Vrochidis, Stefanosq Key Player Identification in Terrorism-Related Social Media Networks Using

Centrality Measures

Wild, Peterq On Interoperability of Security Document Reading Devicesq Compression Effects on Security Document Images

Wong, B. L. Williamq How Analysts Think: Think-steps as a Tool for Structuring Sensemaking

in Criminal Intelligence Analysisq How Analysts Think: Decision Making in the Absence of Clear Factsq Design for Intelligence Analysis of Complex Systems: Evolution of Criminal

Networks

Yang, Wenyaoq The Effectiveness of Counter-terrorism Policies Based on the Terrorism Decision

Page 48: 2016 European Intelligence and Security Informatics Conferencectappert/papers/proceedings/2016EISIC/start.pdf · Michele Fiorini, Vincenzo Esposito, Marcello Cinque, Christian Esposito,

Papers by Author

Zaeem, Razieh Nokhbehq Risk Kit: Highlighting Vulnerable Identity Assets for Specific Age Groups

Zechner, Niklasq My Name is Legion: Estimating Author Counts Based on Stylistic Diversity

Zolkipli, Mohamed Fadliq Present Status and Challenges in Cloud Monitoring Framework: A Survey

Page 49: 2016 European Intelligence and Security Informatics Conferencectappert/papers/proceedings/2016EISIC/start.pdf · Michele Fiorini, Vincenzo Esposito, Marcello Cinque, Christian Esposito,

Papers by Author

A B C D E F G

H I J K L M N

O P Q R S T U

V W X Y Z