Search Results - "2013 European Intelligence and Security Informatics Conference"
-
1
Probability Analysis of Cyber Attack Paths against Business and Commercial Enterprise Systems
Published in 2013 European Intelligence and Security Informatics Conference (01-08-2013)“…The level of risk of attack from new cyber-crime related malware is difficult to quantify as standard risk analysis models often take an incomplete view of the…”
Get full text
Conference Proceeding -
2
Towards Offensive Cyber Counterintelligence: Adopting a Target-Centric View on Advanced Persistent Threats
Published in 2013 European Intelligence and Security Informatics Conference (01-08-2013)“…Although the traditional strategies for cyber defense in use today are necessary to mitigate broad ranges of common threats, they are not well-suited to…”
Get full text
Conference Proceeding -
3
Keystroke Biometric Studies on Password and Numeric Keypad Input
Published in 2013 European Intelligence and Security Informatics Conference (01-08-2013)“…The keystroke biometric classification system described in this study was evaluated on two types of short input - passwords and numeric keypad input. On the…”
Get full text
Conference Proceeding -
4
National Security and Social Media Monitoring: A Presentation of the EMOTIVE and Related Systems
Published in 2013 European Intelligence and Security Informatics Conference (01-08-2013)“…Today social media streams, such as Twitter, represent vast amounts of 'real-time' daily streaming data. Topics on these streams cover every range of human…”
Get full text
Conference Proceeding -
5
A Multi-modal Biometric Fusion Implementation for ABC Systems
Published in 2013 European Intelligence and Security Informatics Conference (01-08-2013)“…In this paper, we introduce a multi-modal approach for traveller biometric identity verification, in the context of the Spanish Automated Border Control (ABC)…”
Get full text
Conference Proceeding -
6
The Effect of Personality Type on Deceptive Communication Style
Published in 2013 European Intelligence and Security Informatics Conference (01-08-2013)“…It has long been hypothesized that the ability to deceive depends on personality - some personality types are `better' at deceiving in that their deception is…”
Get full text
Conference Proceeding -
7
Recent Advances in the Development of a Long-Text-Input Keystroke Biometric Authentication System for Arbitrary Text Input
Published in 2013 European Intelligence and Security Informatics Conference (01-08-2013)“…This study focuses on the development and evaluation of a new classification algorithm that halves the previously reported best error rate. Using keystroke…”
Get full text
Conference Proceeding -
8
Enabling Real Time Crime Intelligence Using Mobile GIS and Prediction Methods
Published in 2013 European Intelligence and Security Informatics Conference (01-08-2013)“…A crime investigation is an official effort to uncover information about a crime. In recent years the number of crime cases has been on a rise. The traditional…”
Get full text
Conference Proceeding -
9
How "Digital" is Traditional Crime?
Published in 2013 European Intelligence and Security Informatics Conference (01-08-2013)“…Measuring how much cyber crime exists is typically done by first defining cyber crime and then quantifying how many cases fit that definition. The drawback is…”
Get full text
Conference Proceeding -
10
Exploiting Twitter for Border Security-Related Intelligence Gathering
Published in 2013 European Intelligence and Security Informatics Conference (01-08-2013)“…Nowadays, an ever-growing amount of information is being transferred through web-based social media. In particular, Twitter emerged to be an important social…”
Get full text
Conference Proceeding -
11
Integration of Media Sources for Situation Analysis in the Different Phases of Disaster Management: The QuOIMA Project
Published in 2013 European Intelligence and Security Informatics Conference (01-08-2013)“…In this paper we describe work in progress on a cross-media content analysis approach and framework, which is currently being developed within the QuOIMA…”
Get full text
Conference Proceeding -
12
A Bayesian Parametric Statistical Anomaly Detection Method for Finding Trends and Patterns in Criminal Behavior
Published in 2013 European Intelligence and Security Informatics Conference (01-08-2013)“…In this paper we describe how Bayesian Principal Anomaly Detection (BPAD) can be used for detecting long and short term trends and anomalies in geographically…”
Get full text
Conference Proceeding -
13
Towards e-Passport Duplicate Enrollment Check in the European Union
Published in 2013 European Intelligence and Security Informatics Conference (01-08-2013)“…Automated border control gates are now being more and more deployed at airports to smooth border crossings with reduced man power and more convenience to the…”
Get full text
Conference Proceeding -
14
Forensic Data Recovery from Android OS Devices: An Open Source Toolkit
Published in 2013 European Intelligence and Security Informatics Conference (01-08-2013)“…The recovery of data from mobile phones is a very specialist and evolving field, which can make considerable assistance in the prosecution of criminal cases…”
Get full text
Conference Proceeding -
15
Countering Plagiarism by Exposing Irregularities in Authors' Grammar
Published in 2013 European Intelligence and Security Informatics Conference (01-08-2013)“…Unauthorized copying or stealing of intellectual propierties of others is a serious problem in modern society. In case of textual plagiarism, it becomes more…”
Get full text
Conference Proceeding -
16
Law Enforcement Authorities' Legal Digital Evidence Gathering: Legal, Integrity and Chain-of-Custody Requirement
Published in 2013 European Intelligence and Security Informatics Conference (01-08-2013)“…When carrying out criminal investigations, Law Enforcement Agencies (LEAs) apply new technology in very effective ways. However at worst, LEAs must perform…”
Get full text
Conference Proceeding -
17
A Tool for Generating, Structuring, and Analyzing Multiple Hypotheses in Intelligence Work
Published in 2013 European Intelligence and Security Informatics Conference (01-08-2013)“…In this paper, we present an analysis tool that is developed to support the process of generating and evaluating a large set of hypotheses. The computer tool…”
Get full text
Conference Proceeding -
18
Crime Ridges: Exploring the Relationship between Crime Attractors and Offender Movement
Published in 2013 European Intelligence and Security Informatics Conference (01-08-2013)“…In this paper we present a new approach in the analysis of crime patterns by creating a formal framework for merging the concepts of crime attractors and the…”
Get full text
Conference Proceeding -
19
Analyzing Social Media Content for Security Informatics
Published in 2013 European Intelligence and Security Informatics Conference (01-08-2013)“…Inferring public opinion regarding an issue or event by analyzing social media content is of great interest to security analysts but is also technically…”
Get full text
Conference Proceeding -
20
The CriLiM Methodology: Crime Linkage with a Fuzzy MCDM Approach
Published in 2013 European Intelligence and Security Informatics Conference (01-08-2013)“…Grouping events having similarities has always been interesting for analysts. Actually, when a label is put on top of a set of events to denote they share…”
Get full text
Conference Proceeding