2016 european intelligence and security informatics...
TRANSCRIPT
CONFERENCE INFORMATION
PAPERS BY SESSION
PAPERS BY AUTHOR
SEARCH
GETTING STARTED
TRADEMARKS
2016 European Intelligence andSecurity Informatics Conference
17-19 August 2016 • Uppsala, Sweden
EISIC 2016
Edited by Joel Brynielsson and Fredrik Johansson
Conference Information
2016 European Intelligenceand Security Informatics Conference
q Message from the General Chairsq Message from the Program Chairsq Organizationq Program Committeeq Title Page (Book version)q Copyright Page (Book version)q Table of Contents (Book version)q Author Index (Book version)q Publisher's Information (Book version)
Sessions
q Long Papersq Short Papersq Poster Papers
Papers by Session
Long Papers
q Quality Assurance for Security Applications of Big DataRoger Clarke
q On Interoperability of Security Document Reading DevicesSvorad Štolc, Peter Wild, Kristián Valentín, Franz Daubner, and Markus Clabian
q Location, Location, Location: Mapping Potential Canadian Targets in OnlineHacker Discussion Forums
Richard Frank, Mitch Macdonald, and Bryan Monk
q The Role of Internet Service Providers in Botnet MitigationJeroen Pijpker and Harald Vranken
q Risk Kit: Highlighting Vulnerable Identity Assets for Specific Age GroupsRazieh Nokhbeh Zaeem, Monisha Manoharan, and K. Suzanne Barber
q How to Support the Decision Making in Crisis Context?Bénédicte Goujon
q Providing Extensibility to Threat Modelling in Cloud-COVER’s Underlying AnalysisModel
Mustafa Aydin and Jeremy Jacob
Papers by Session
q Methodology and Tool to Facilitate Structured Analysis of Multiple HypothesesMagdalena Granåsen and Maja Karasalo
q Towards Designing a Multipurpose Cybercrime Intelligence FrameworkMariam Nouh, Jason R. C. Nurse, and Michael Goldsmith
q How Analysts Think: Think-steps as a Tool for Structuring Sensemakingin Criminal Intelligence Analysis
Nallini Selvaraj, Simon Attfield, Peter Passmore, and B. L. William Wong
Papers by Session
Short Papers
q Compression Effects on Security Document ImagesPeter Wild, Svorad Štolc, Kristián Valentín, Franz Daubner, and Markus Clabian
q Cards, Money and Two Hacking Forums: An Analysis of Online MoneyLaundering Schemes
Alexander Mikhaylov and Richard Frank
q The Effectiveness of Counter-terrorism Policies Based on the Terrorism DecisionChaomin Ou and Wenyao Yang
q Information Security Aspects of the Public Safety Data Interoperability NetworkBlaž Ivanc and Borka Jerman Blažič
q Filtering Estimated Crime Series Based on Route Calculations on Spatio-temporalData
Martin Boldt and Jaswanth Bala
q Disaster Risk Reduction for International Residents in Japan: Barriersand Facilitators to Knowledge Sharing in Times of Disaster
Jiro Usugami
Papers by Session
q Discovering Knowledge in Online Drug Transactions Using Conceptual Graphsand Formal Concept Analysis
Constantinos Orphanides, Babak Akhgar, and Petra Saskia Bayerl
q Sentiment-based Classification of Radical Text on the WebRyan Scrivens and Richard Frank
q My Name is Legion: Estimating Author Counts Based on Stylistic DiversityJohanna Björklund and Niklas Zechner
q Key Player Identification in Terrorism-Related Social Media Networks UsingCentrality Measures
Ilias Gialampoukidis, George Kalpakis, Theodora Tsikrika, Stefanos Vrochidis,and Ioannis Kompatsiaris
q Confidential Crisis Information Sharing through an Interoperability Frameworkamong First Responders: A Discussion and a Preliminary Solution
Michele Fiorini, Vincenzo Esposito, Marcello Cinque, Christian Esposito, Mario Fiorentino,Domenico Cotroneo, and Stefano Russo
q QUIN: Providing Integrated Analysis Support to Crime InvestigatorsSelmar Smit, Bob van der Vecht, Freek van Wermeskerken, and Jan Willem Streefkerk
q But I did not Mean It!—Intent Classification of Racist Posts on TumblrSwati Agarwal and Ashish Sureka
Papers by Session
q Missing Solutions in the Fight against Cybercrime and Cyberterrorism—The NewEU Research Agenda
Borka Jerman Blažič and Tomaž Klobučar
q How Analysts Think: Decision Making in the Absence of Clear FactsMatylda Gerber, B. L. William Wong, and Neesha Kodagoda
q Personal Information Leakage During Password Recovery of Internet ServicesMordechai Guri, Eyal Shemer, Dov Shirtz, and Yuval Elovici
q Design for Intelligence Analysis of Complex Systems: Evolution of CriminalNetworks
Patrick Seidler, Johanna Haider, Neesha Kodagoda, B. L. William Wong, Margit Pohl,and Richard Adderley
q A Post-Mortem Empirical Investigation of the Popularity and Distributionof Malware Files in the Contemporary Web-Facing Internet
Jukka Ruohonen, Sanja Šćepanović, Sami Hyrynsalmi, Igor Mishkovski, Tuomas Aura,and Ville Leppänen
q A Framework for Cognitive Bias Detection and Feedback in a Visual AnalyticsEnvironment
Alexander Nussbaumer, Katrien Verbert, Eva-Catherine Hillemann, Michael A. Bedek,and Dietrich Albert
Papers by Session
q Critical Review of Analytic TechniquesMandeep K. Dhami, Ian K. Belton, and Kathryn E. Careless
q Modified Graphstega Based on Chart Scale ModificationAprianti Nanda Sari and Ari Moesriami Barmawi
q A Security Analysis on Apple PayAshay S. Jawale and Joon S. Park
q Enhancing Risk-Based Decisions by Leveraging Cyber Security AutomationTina AlSadhan and Joon S. Park
q Text Authorship Verification through WatermarkingStefano Giovanni Rizzo, Flavio Bertini, and Danilo Montesi
q On Privacy and Security Challenges in Smart Connected HomesJoseph Bugeja, Andreas Jacobsson, and Paul Davidsson
q An Argumentative-Narrative Risk Assessment ModelFloris Bex and Bas Hovestad
q A Quantitative Approach to Risk and Cost Assessment in Supply ChainManagement
Linus Gisslén and Andreas Horndahl
Papers by Session
q A Behavioral Biometrics User Authentication Study Using Motion Datafrom Android Smartphones
Javid Maghsoudi and Charles C. Tappert
q Random Delays to Limit Timing Covert ChannelAnna Belozubova, Anna Epishkina, and Konstantin Kogos
q A Framework and Prototype for A Socio-Technical Security Information and EventManagement System (ST-SIEM)
Bilal AlSabbagh and Stewart Kowalski
Papers by Session
Poster Papers
q Forecasting the Underlying Psychological Forces to Political Violence through BigData Symbol Mining
Niklas Hageback
q Role of Author Personality Traits for Identifying Intent Based Racist PostsSwati Agarwal and Ashish Sureka
q Towards Efficient Law Enforcement Decision Support Systems in the Areaof Community Policing: The Use of Mobile Applications
George Leventakis, George Papalexandratos, George Kokkinis, Elisavet Charalambous,and Nikolaos Koutras
q Multilayer Analysis of Online Illicit MarketplacesMichael Ashcroft, Matteo Magnani, Davide Vega, Danilo Montesi, and Luca Rossi
q The IPATCH System for Maritime Surveillance and Piracy Threat ClassificationMaria Andersson, Ronnie Johansson, Karl-Göran Stenborg, Robert Forsgren, Thomas Cane,Grzegorz Taberski, Luis Patino, and James Ferryman
q Present Status and Challenges in Cloud Monitoring Framework: A SurveyAws Naser, Mohamed Fadli Zolkipli, Shahid Anwar, and Muna Sulieman Al-Hawawreh
q A Dedicated Crawling Engine to Reduce Apps Distribution RisksMarc Michel Pic
Papers by Session
q Harnessing Crowds to Avert or Mitigate Acts Terrorism: A Collective IntelligenceCall for Action
Haibo Li and Anders Hedman
Papers by Author
Aq Adderley, Richardq Agarwal, Swatiq Akhgar, Babakq Albert, Dietrichq Al-Hawawreh, Muna Suliemanq AlSabbagh, Bilalq AlSadhan, Tinaq Andersson, Mariaq Anwar, Shahidq Ashcroft, Michaelq Attfield, Simonq Aura, Tuomasq Aydin, Mustafa
Bq Bala, Jaswanthq Barber, K. Suzanneq Barmawi, Ari Moesriamiq Bayerl, Petra Saskiaq Bedek, Michael A.q Belozubova, Annaq Belton, Ian K.q Bertini, Flavioq Bex, Florisq Björklund, Johannaq Boldt, Martinq Bugeja, Joseph
Cq Cane, Thomas
Papers by Author
q Careless, Kathryn E.q Charalambous, Elisavetq Cinque, Marcelloq Clabian, Markusq Clarke, Rogerq Cotroneo, Domenico
Dq Daubner, Franzq Davidsson, Paulq Dhami, Mandeep K.
Eq Elovici, Yuvalq Epishkina, Annaq Esposito, Christianq Esposito, Vincenzo
Fq Ferryman, Jamesq Fiorentino, Marioq Fiorini, Micheleq Forsgren, Robertq Frank, Richard
Gq Gerber, Matyldaq Gialampoukidis, Iliasq Gisslén, Linusq Goldsmith, Michaelq Goujon, Bénédicteq Granåsen, Magdalenaq Guri, Mordechai
Papers by Author
Hq Hageback, Niklasq Haider, Johannaq Hedman, Andersq Hillemann, Eva-Catherineq Horndahl, Andreasq Hovestad, Basq Hyrynsalmi, Sami
Iq Ivanc, Blaž
Jq Jacob, Jeremyq Jacobsson, Andreasq Jawale, Ashay S.
q Jerman Blažič, Borkaq Johansson, Ronnie
Kq Kalpakis, Georgeq Karasalo, Majaq Klobučar, Tomažq Kodagoda, Neeshaq Kogos, Konstantinq Kokkinis, Georgeq Kompatsiaris, Ioannisq Koutras, Nikolaosq Kowalski, Stewart
Lq Leppänen, Villeq Leventakis, George
Papers by Author
q Li, Haibo
Mq Macdonald, Mitchq Maghsoudi, Javidq Magnani, Matteoq Manoharan, Monishaq Mikhaylov, Alexanderq Mishkovski, Igorq Monk, Bryanq Montesi, Danilo
Nq Naser, Awsq Nouh, Mariamq Nurse, Jason R. C.q Nussbaumer, Alexander
Oq Orphanides, Constantinosq Ou, Chaomin
Pq Papalexandratos, Georgeq Park, Joon S.q Passmore, Peterq Patino, Luisq Pic, Marc Michelq Pijpker, Jeroenq Pohl, Margit
Rq Rizzo, Stefano Giovanniq Rossi, Luca
Papers by Author
q Ruohonen, Jukkaq Russo, Stefano
Sq Sari, Aprianti Nandaq Scrivens, Ryanq Seidler, Patrickq Selvaraj, Nalliniq Shemer, Eyalq Shirtz, Dovq Smit, Selmarq Stenborg, Karl-Göranq Streefkerk, Jan Willemq Sureka, Ashish
Šq Šćepanović, Sanja
q Štolc, Svorad
Tq Taberski, Grzegorzq Tappert, Charles C.q Tsikrika, Theodora
Uq Usugami, Jiro
vq van der Vecht, Bobq van Wermeskerken, Freek
Vq Valentín, Kristiánq Vega, Davide
Papers by Author
q Verbert, Katrienq Vranken, Haraldq Vrochidis, Stefanos
Wq Wild, Peterq Wong, B. L. William
Yq Yang, Wenyao
Zq Zaeem, Razieh Nokhbehq Zechner, Niklasq Zolkipli, Mohamed Fadli
Papers by Author
Adderley, Richardq Design for Intelligence Analysis of Complex Systems: Evolution of Criminal
Networks
Agarwal, Swatiq But I did not Mean It!—Intent Classification of Racist Posts on Tumblrq Role of Author Personality Traits for Identifying Intent Based Racist Posts
Akhgar, Babakq Discovering Knowledge in Online Drug Transactions Using Conceptual Graphs
and Formal Concept Analysis
Albert, Dietrichq A Framework for Cognitive Bias Detection and Feedback in a Visual Analytics
Environment
Papers by Author
Al-Hawawreh, Muna Suliemanq Present Status and Challenges in Cloud Monitoring Framework: A Survey
AlSabbagh, Bilalq A Framework and Prototype for A Socio-Technical Security Information and Event
Management System (ST-SIEM)
AlSadhan, Tinaq Enhancing Risk-Based Decisions by Leveraging Cyber Security Automation
Andersson, Mariaq The IPATCH System for Maritime Surveillance and Piracy Threat Classification
Anwar, Shahidq Present Status and Challenges in Cloud Monitoring Framework: A Survey
Papers by Author
Ashcroft, Michaelq Multilayer Analysis of Online Illicit Marketplaces
Attfield, Simonq How Analysts Think: Think-steps as a Tool for Structuring Sensemaking
in Criminal Intelligence Analysis
Aura, Tuomasq A Post-Mortem Empirical Investigation of the Popularity and Distribution
of Malware Files in the Contemporary Web-Facing Internet
Aydin, Mustafaq Providing Extensibility to Threat Modelling in Cloud-COVER’s Underlying Analysis
Model
Papers by Author
Bala, Jaswanthq Filtering Estimated Crime Series Based on Route Calculations on Spatio-temporal
Data
Barber, K. Suzanneq Risk Kit: Highlighting Vulnerable Identity Assets for Specific Age Groups
Barmawi, Ari Moesriamiq Modified Graphstega Based on Chart Scale Modification
Bayerl, Petra Saskiaq Discovering Knowledge in Online Drug Transactions Using Conceptual Graphs
and Formal Concept Analysis
Papers by Author
Bedek, Michael A.q A Framework for Cognitive Bias Detection and Feedback in a Visual Analytics
Environment
Belozubova, Annaq Random Delays to Limit Timing Covert Channel
Belton, Ian K.q Critical Review of Analytic Techniques
Bertini, Flavioq Text Authorship Verification through Watermarking
Bex, Florisq An Argumentative-Narrative Risk Assessment Model
Papers by Author
Björklund, Johannaq My Name is Legion: Estimating Author Counts Based on Stylistic Diversity
Boldt, Martinq Filtering Estimated Crime Series Based on Route Calculations on Spatio-temporal
Data
Bugeja, Josephq On Privacy and Security Challenges in Smart Connected Homes
Cane, Thomasq The IPATCH System for Maritime Surveillance and Piracy Threat Classification
Careless, Kathryn E.q Critical Review of Analytic Techniques
Papers by Author
Charalambous, Elisavetq Towards Efficient Law Enforcement Decision Support Systems in the Area
of Community Policing: The Use of Mobile Applications
Cinque, Marcelloq Confidential Crisis Information Sharing through an Interoperability Framework
among First Responders: A Discussion and a Preliminary Solution
Clabian, Markusq On Interoperability of Security Document Reading Devicesq Compression Effects on Security Document Images
Clarke, Rogerq Quality Assurance for Security Applications of Big Data
Papers by Author
Cotroneo, Domenicoq Confidential Crisis Information Sharing through an Interoperability Framework
among First Responders: A Discussion and a Preliminary Solution
Daubner, Franzq On Interoperability of Security Document Reading Devicesq Compression Effects on Security Document Images
Davidsson, Paulq On Privacy and Security Challenges in Smart Connected Homes
Dhami, Mandeep K.q Critical Review of Analytic Techniques
Elovici, Yuvalq Personal Information Leakage During Password Recovery of Internet Services
Papers by Author
Epishkina, Annaq Random Delays to Limit Timing Covert Channel
Esposito, Christianq Confidential Crisis Information Sharing through an Interoperability Framework
among First Responders: A Discussion and a Preliminary Solution
Esposito, Vincenzoq Confidential Crisis Information Sharing through an Interoperability Framework
among First Responders: A Discussion and a Preliminary Solution
Ferryman, Jamesq The IPATCH System for Maritime Surveillance and Piracy Threat Classification
Papers by Author
Fiorentino, Marioq Confidential Crisis Information Sharing through an Interoperability Framework
among First Responders: A Discussion and a Preliminary Solution
Fiorini, Micheleq Confidential Crisis Information Sharing through an Interoperability Framework
among First Responders: A Discussion and a Preliminary Solution
Forsgren, Robertq The IPATCH System for Maritime Surveillance and Piracy Threat Classification
Frank, Richardq Location, Location, Location: Mapping Potential Canadian Targets in Online
Hacker Discussion Forumsq Cards, Money and Two Hacking Forums: An Analysis of Online Money
Laundering Schemesq Sentiment-based Classification of Radical Text on the Web
Papers by Author
Gerber, Matyldaq How Analysts Think: Decision Making in the Absence of Clear Facts
Gialampoukidis, Iliasq Key Player Identification in Terrorism-Related Social Media Networks Using
Centrality Measures
Gisslén, Linusq A Quantitative Approach to Risk and Cost Assessment in Supply Chain
Management
Goldsmith, Michaelq Towards Designing a Multipurpose Cybercrime Intelligence Framework
Goujon, Bénédicteq How to Support the Decision Making in Crisis Context?
Papers by Author
Granåsen, Magdalenaq Methodology and Tool to Facilitate Structured Analysis of Multiple Hypotheses
Guri, Mordechaiq Personal Information Leakage During Password Recovery of Internet Services
Hageback, Niklasq Forecasting the Underlying Psychological Forces to Political Violence through Big
Data Symbol Mining
Haider, Johannaq Design for Intelligence Analysis of Complex Systems: Evolution of Criminal
Networks
Papers by Author
Hedman, Andersq Harnessing Crowds to Avert or Mitigate Acts Terrorism: A Collective Intelligence
Call for Action
Hillemann, Eva-Catherineq A Framework for Cognitive Bias Detection and Feedback in a Visual Analytics
Environment
Horndahl, Andreasq A Quantitative Approach to Risk and Cost Assessment in Supply Chain
Management
Hovestad, Basq An Argumentative-Narrative Risk Assessment Model
Papers by Author
Hyrynsalmi, Samiq A Post-Mortem Empirical Investigation of the Popularity and Distribution
of Malware Files in the Contemporary Web-Facing Internet
Ivanc, Blažq Information Security Aspects of the Public Safety Data Interoperability Network
Jacob, Jeremyq Providing Extensibility to Threat Modelling in Cloud-COVER’s Underlying Analysis
Model
Jacobsson, Andreasq On Privacy and Security Challenges in Smart Connected Homes
Jawale, Ashay S.q A Security Analysis on Apple Pay
Papers by Author
Jerman Blažič, Borkaq Information Security Aspects of the Public Safety Data Interoperability Networkq Missing Solutions in the Fight against Cybercrime and Cyberterrorism—The New
EU Research Agenda
Johansson, Ronnieq The IPATCH System for Maritime Surveillance and Piracy Threat Classification
Kalpakis, Georgeq Key Player Identification in Terrorism-Related Social Media Networks Using
Centrality Measures
Karasalo, Majaq Methodology and Tool to Facilitate Structured Analysis of Multiple Hypotheses
Papers by Author
Klobučar, Tomažq Missing Solutions in the Fight against Cybercrime and Cyberterrorism—The New
EU Research Agenda
Kodagoda, Neeshaq How Analysts Think: Decision Making in the Absence of Clear Factsq Design for Intelligence Analysis of Complex Systems: Evolution of Criminal
Networks
Kogos, Konstantinq Random Delays to Limit Timing Covert Channel
Kokkinis, Georgeq Towards Efficient Law Enforcement Decision Support Systems in the Area
of Community Policing: The Use of Mobile Applications
Papers by Author
Kompatsiaris, Ioannisq Key Player Identification in Terrorism-Related Social Media Networks Using
Centrality Measures
Koutras, Nikolaosq Towards Efficient Law Enforcement Decision Support Systems in the Area
of Community Policing: The Use of Mobile Applications
Kowalski, Stewartq A Framework and Prototype for A Socio-Technical Security Information and Event
Management System (ST-SIEM)
Leppänen, Villeq A Post-Mortem Empirical Investigation of the Popularity and Distribution
of Malware Files in the Contemporary Web-Facing Internet
Papers by Author
Leventakis, Georgeq Towards Efficient Law Enforcement Decision Support Systems in the Area
of Community Policing: The Use of Mobile Applications
Li, Haiboq Harnessing Crowds to Avert or Mitigate Acts Terrorism: A Collective Intelligence
Call for Action
Macdonald, Mitchq Location, Location, Location: Mapping Potential Canadian Targets in Online
Hacker Discussion Forums
Maghsoudi, Javidq A Behavioral Biometrics User Authentication Study Using Motion Data
from Android Smartphones
Papers by Author
Magnani, Matteoq Multilayer Analysis of Online Illicit Marketplaces
Manoharan, Monishaq Risk Kit: Highlighting Vulnerable Identity Assets for Specific Age Groups
Mikhaylov, Alexanderq Cards, Money and Two Hacking Forums: An Analysis of Online Money
Laundering Schemes
Mishkovski, Igorq A Post-Mortem Empirical Investigation of the Popularity and Distribution
of Malware Files in the Contemporary Web-Facing Internet
Papers by Author
Monk, Bryanq Location, Location, Location: Mapping Potential Canadian Targets in Online
Hacker Discussion Forums
Montesi, Daniloq Text Authorship Verification through Watermarkingq Multilayer Analysis of Online Illicit Marketplaces
Naser, Awsq Present Status and Challenges in Cloud Monitoring Framework: A Survey
Nouh, Mariamq Towards Designing a Multipurpose Cybercrime Intelligence Framework
Nurse, Jason R. C.q Towards Designing a Multipurpose Cybercrime Intelligence Framework
Papers by Author
Nussbaumer, Alexanderq A Framework for Cognitive Bias Detection and Feedback in a Visual Analytics
Environment
Orphanides, Constantinosq Discovering Knowledge in Online Drug Transactions Using Conceptual Graphs
and Formal Concept Analysis
Ou, Chaominq The Effectiveness of Counter-terrorism Policies Based on the Terrorism Decision
Papalexandratos, Georgeq Towards Efficient Law Enforcement Decision Support Systems in the Area
of Community Policing: The Use of Mobile Applications
Park, Joon S.q A Security Analysis on Apple Pay
Papers by Author
q Enhancing Risk-Based Decisions by Leveraging Cyber Security Automation
Passmore, Peterq How Analysts Think: Think-steps as a Tool for Structuring Sensemaking
in Criminal Intelligence Analysis
Patino, Luisq The IPATCH System for Maritime Surveillance and Piracy Threat Classification
Pic, Marc Michelq A Dedicated Crawling Engine to Reduce Apps Distribution Risks
Pijpker, Jeroenq The Role of Internet Service Providers in Botnet Mitigation
Papers by Author
Pohl, Margitq Design for Intelligence Analysis of Complex Systems: Evolution of Criminal
Networks
Rizzo, Stefano Giovanniq Text Authorship Verification through Watermarking
Rossi, Lucaq Multilayer Analysis of Online Illicit Marketplaces
Ruohonen, Jukkaq A Post-Mortem Empirical Investigation of the Popularity and Distribution
of Malware Files in the Contemporary Web-Facing Internet
Papers by Author
Russo, Stefanoq Confidential Crisis Information Sharing through an Interoperability Framework
among First Responders: A Discussion and a Preliminary Solution
Sari, Aprianti Nandaq Modified Graphstega Based on Chart Scale Modification
Šćepanović, Sanjaq A Post-Mortem Empirical Investigation of the Popularity and Distribution
of Malware Files in the Contemporary Web-Facing Internet
Scrivens, Ryanq Sentiment-based Classification of Radical Text on the Web
Papers by Author
Seidler, Patrickq Design for Intelligence Analysis of Complex Systems: Evolution of Criminal
Networks
Selvaraj, Nalliniq How Analysts Think: Think-steps as a Tool for Structuring Sensemaking
in Criminal Intelligence Analysis
Shemer, Eyalq Personal Information Leakage During Password Recovery of Internet Services
Shirtz, Dovq Personal Information Leakage During Password Recovery of Internet Services
Smit, Selmarq QUIN: Providing Integrated Analysis Support to Crime Investigators
Papers by Author
Stenborg, Karl-Göranq The IPATCH System for Maritime Surveillance and Piracy Threat Classification
Štolc, Svoradq On Interoperability of Security Document Reading Devicesq Compression Effects on Security Document Images
Streefkerk, Jan Willemq QUIN: Providing Integrated Analysis Support to Crime Investigators
Sureka, Ashishq But I did not Mean It!—Intent Classification of Racist Posts on Tumblrq Role of Author Personality Traits for Identifying Intent Based Racist Posts
Taberski, Grzegorzq The IPATCH System for Maritime Surveillance and Piracy Threat Classification
Papers by Author
Tappert, Charles C.q A Behavioral Biometrics User Authentication Study Using Motion Data
from Android Smartphones
Tsikrika, Theodoraq Key Player Identification in Terrorism-Related Social Media Networks Using
Centrality Measures
Usugami, Jiroq Disaster Risk Reduction for International Residents in Japan: Barriers
and Facilitators to Knowledge Sharing in Times of Disaster
Valentín, Kristiánq On Interoperability of Security Document Reading Devicesq Compression Effects on Security Document Images
Papers by Author
van der Vecht, Bobq QUIN: Providing Integrated Analysis Support to Crime Investigators
van Wermeskerken, Freekq QUIN: Providing Integrated Analysis Support to Crime Investigators
Vega, Davideq Multilayer Analysis of Online Illicit Marketplaces
Verbert, Katrienq A Framework for Cognitive Bias Detection and Feedback in a Visual Analytics
Environment
Vranken, Haraldq The Role of Internet Service Providers in Botnet Mitigation
Papers by Author
Vrochidis, Stefanosq Key Player Identification in Terrorism-Related Social Media Networks Using
Centrality Measures
Wild, Peterq On Interoperability of Security Document Reading Devicesq Compression Effects on Security Document Images
Wong, B. L. Williamq How Analysts Think: Think-steps as a Tool for Structuring Sensemaking
in Criminal Intelligence Analysisq How Analysts Think: Decision Making in the Absence of Clear Factsq Design for Intelligence Analysis of Complex Systems: Evolution of Criminal
Networks
Yang, Wenyaoq The Effectiveness of Counter-terrorism Policies Based on the Terrorism Decision
Papers by Author
Zaeem, Razieh Nokhbehq Risk Kit: Highlighting Vulnerable Identity Assets for Specific Age Groups
Zechner, Niklasq My Name is Legion: Estimating Author Counts Based on Stylistic Diversity
Zolkipli, Mohamed Fadliq Present Status and Challenges in Cloud Monitoring Framework: A Survey
Papers by Author
A B C D E F G
H I J K L M N
O P Q R S T U
V W X Y Z