Search Results - "2013 European Intelligence and Security Informatics Conference"

Refine Results
  1. 1

    Probability Analysis of Cyber Attack Paths against Business and Commercial Enterprise Systems by Dudorov, Dmitry, Stupples, David, Newby, Martin

    “…The level of risk of attack from new cyber-crime related malware is difficult to quantify as standard risk analysis models often take an incomplete view of the…”
    Get full text
    Conference Proceeding
  2. 2

    Towards Offensive Cyber Counterintelligence: Adopting a Target-Centric View on Advanced Persistent Threats by Sigholm, Johan, Bang, Martin

    “…Although the traditional strategies for cyber defense in use today are necessary to mitigate broad ranges of common threats, they are not well-suited to…”
    Get full text
    Conference Proceeding
  3. 3

    Keystroke Biometric Studies on Password and Numeric Keypad Input by Bakelman, Ned, Monaco, John V., Sung-Hyuk Cha, Tappert, Charles C.

    “…The keystroke biometric classification system described in this study was evaluated on two types of short input - passwords and numeric keypad input. On the…”
    Get full text
    Conference Proceeding
  4. 4

    National Security and Social Media Monitoring: A Presentation of the EMOTIVE and Related Systems by Sykora, Martin D., Jackson, Thomas W., O'Brien, Ann, Elayan, Suzanne

    “…Today social media streams, such as Twitter, represent vast amounts of 'real-time' daily streaming data. Topics on these streams cover every range of human…”
    Get full text
    Conference Proceeding
  5. 5

    A Multi-modal Biometric Fusion Implementation for ABC Systems by Cuesta Cantarero, Daniel, Perez Herrero, David Antonio, Martin Mendez, Fernando

    “…In this paper, we introduce a multi-modal approach for traveller biometric identity verification, in the context of the Spanish Automated Border Control (ABC)…”
    Get full text
    Conference Proceeding
  6. 6

    The Effect of Personality Type on Deceptive Communication Style by Fornaciari, Tommaso, Celli, Fabio, Poesio, Massimo

    “…It has long been hypothesized that the ability to deceive depends on personality - some personality types are `better' at deceiving in that their deception is…”
    Get full text
    Conference Proceeding
  7. 7

    Recent Advances in the Development of a Long-Text-Input Keystroke Biometric Authentication System for Arbitrary Text Input by Monaco, John V., Bakelman, Ned, Sung-Hyuk Cha, Tappert, Charles C.

    “…This study focuses on the development and evaluation of a new classification algorithm that halves the previously reported best error rate. Using keystroke…”
    Get full text
    Conference Proceeding
  8. 8

    Enabling Real Time Crime Intelligence Using Mobile GIS and Prediction Methods by Saravanan, M., Thayyil, Rakhi, Narayanan, Shwetha

    “…A crime investigation is an official effort to uncover information about a crime. In recent years the number of crime cases has been on a rise. The traditional…”
    Get full text
    Conference Proceeding
  9. 9

    How "Digital" is Traditional Crime? by Montoya, Lorena, Junger, Marianne, Hartel, Pieter

    “…Measuring how much cyber crime exists is typically done by first defining cyber crime and then quantifying how many cases fit that definition. The drawback is…”
    Get full text
    Conference Proceeding
  10. 10

    Exploiting Twitter for Border Security-Related Intelligence Gathering by Piskorski, Jakub, Tanev, Hristo, Balahur, Alexandra

    “…Nowadays, an ever-growing amount of information is being transferred through web-based social media. In particular, Twitter emerged to be an important social…”
    Get full text
    Conference Proceeding
  11. 11

    Integration of Media Sources for Situation Analysis in the Different Phases of Disaster Management: The QuOIMA Project by Backfried, Gerhard, Gollner, Johannes, Qirchmayr, Gerald, Rainer, Karin, Kienast, Gert, Thallinger, Georg, Schmidt, Christian, Peer, Andreas

    “…In this paper we describe work in progress on a cross-media content analysis approach and framework, which is currently being developed within the QuOIMA…”
    Get full text
    Conference Proceeding
  12. 12

    A Bayesian Parametric Statistical Anomaly Detection Method for Finding Trends and Patterns in Criminal Behavior by Holst, Anders, Bjurling, Bjorn

    “…In this paper we describe how Bayesian Principal Anomaly Detection (BPAD) can be used for detecting long and short term trends and anomalies in geographically…”
    Get full text
    Conference Proceeding
  13. 13

    Towards e-Passport Duplicate Enrollment Check in the European Union by Butt, Moazzam, Marti, Sandra, Nouak, Alexander, Koplin, Jorg, Raghavendra, R., Guoqiang Li

    “…Automated border control gates are now being more and more deployed at airports to smooth border crossings with reduced man power and more convenience to the…”
    Get full text
    Conference Proceeding
  14. 14

    Forensic Data Recovery from Android OS Devices: An Open Source Toolkit by Dibb, Patrick, Hammoudeh, Mohammad

    “…The recovery of data from mobile phones is a very specialist and evolving field, which can make considerable assistance in the prosecution of criminal cases…”
    Get full text
    Conference Proceeding
  15. 15

    Countering Plagiarism by Exposing Irregularities in Authors' Grammar by Tschuggnall, Michael, Specht, Gunther

    “…Unauthorized copying or stealing of intellectual propierties of others is a serious problem in modern society. In case of textual plagiarism, it becomes more…”
    Get full text
    Conference Proceeding
  16. 16

    Law Enforcement Authorities' Legal Digital Evidence Gathering: Legal, Integrity and Chain-of-Custody Requirement by Rajamaki, Jyri, Knuuttila, Juha

    “…When carrying out criminal investigations, Law Enforcement Agencies (LEAs) apply new technology in very effective ways. However at worst, LEAs must perform…”
    Get full text
    Conference Proceeding
  17. 17

    A Tool for Generating, Structuring, and Analyzing Multiple Hypotheses in Intelligence Work by Gustavi, Tove, Karasalo, Maja, Martenson, Christian

    “…In this paper, we present an analysis tool that is developed to support the process of generating and evaluating a large set of hypotheses. The computer tool…”
    Get full text
    Conference Proceeding
  18. 18

    Crime Ridges: Exploring the Relationship between Crime Attractors and Offender Movement by Song, Justin, Spicer, Valerie, Brantingham, Patricia, Frank, Richard

    “…In this paper we present a new approach in the analysis of crime patterns by creating a formal framework for merging the concepts of crime attractors and the…”
    Get full text
    Conference Proceeding
  19. 19

    Analyzing Social Media Content for Security Informatics by Colbaugh, Richard, Glass, Kristin

    “…Inferring public opinion regarding an issue or event by analyzing social media content is of great interest to security analysts but is also technically…”
    Get full text
    Conference Proceeding
  20. 20

    The CriLiM Methodology: Crime Linkage with a Fuzzy MCDM Approach by Albertetti, Fabrizio, Cotofrei, Paul, Grossrieder, Lionel, Ribaux, Olivier, Stoffel, Kilian

    “…Grouping events having similarities has always been interesting for analysts. Actually, when a label is put on top of a set of events to denote they share…”
    Get full text
    Conference Proceeding