By Topic

Intelligence and Security Informatics Conference (EISIC), 2011 European

Date 12-14 Sept. 2011

Filter Results

Displaying Results 1 - 25 of 90
  • [Front cover]

    Publication Year: 2011, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (98 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2011, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (76 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2011, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (137 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2011, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (112 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2011, Page(s):v - x
    Request permission for commercial reuse | PDF file iconPDF (165 KB)
    Freely Available from IEEE
  • Message from the General Chairs of EISIC 2011

    Publication Year: 2011, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (116 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Program Co-Chairs of EISIC 2011

    Publication Year: 2011, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (101 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the General Chairs of OSINT-WM 2011

    Publication Year: 2011, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (46 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Program Chairs of OSINT-WM 2011

    Publication Year: 2011, Page(s): xiv
    Request permission for commercial reuse | PDF file iconPDF (35 KB) | HTML iconHTML
    Freely Available from IEEE
  • EISIC 2011 Organizers

    Publication Year: 2011, Page(s): xv
    Request permission for commercial reuse | PDF file iconPDF (115 KB)
    Freely Available from IEEE
  • EISIC 2011 Program Committee and Reviewers

    Publication Year: 2011, Page(s):xvi - xvii
    Request permission for commercial reuse | PDF file iconPDF (167 KB)
    Freely Available from IEEE
  • EISIC 2011 Sponsors

    Publication Year: 2011, Page(s): xviii
    Request permission for commercial reuse | PDF file iconPDF (348 KB)
    Freely Available from IEEE
  • OSINT-WM 2011 Organizers

    Publication Year: 2011, Page(s): xix
    Request permission for commercial reuse | PDF file iconPDF (113 KB)
    Freely Available from IEEE
  • OSINT-WM 2011 Program Committee

    Publication Year: 2011, Page(s): xx
    Request permission for commercial reuse | PDF file iconPDF (321 KB)
    Freely Available from IEEE
  • Dark Web: Exploring and Mining the Dark Side of the Web

    Publication Year: 2011, Page(s):1 - 2
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (186 KB) | HTML iconHTML

    This talk will review the emerging research in Terrorism Informatics based on a web mining perspective. Recent progress in the internationally renowned Dark Web project will be reviewed, including: deep/dark web spidering (web sites, forums, Youtube, virtual worlds), web metrics analysis, dark network analysis, web-based authorship analysis, and sentiment and affect analysis for terrorism tracking... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computational Criminology

    Publication Year: 2011, Page(s): 3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (147 KB) | HTML iconHTML

    Crime and terrorism in the 21st century call for advancement in the modeling and simulation of criminal events in the complex environment. This presentation reviews the field of computational criminology, an emerging blend of criminology, computer science and applied mathematics. Modern concerns about public safety and security include a focus on a range of events from less serious ever... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data Mining for Malicious Code Detection and Security Applications

    Publication Year: 2011, Page(s):4 - 5
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (165 KB) | HTML iconHTML

    Summary form only given. Data mining is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques. Data mining has many applications in security including for national security as well as for cyber security. The threats to national security include attacking buildings, destroying critical infra... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Desktop Text Mining for Open Source Intelligence

    Publication Year: 2011, Page(s): 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (108 KB) | HTML iconHTML

    Summary form only given. The use of the Internet permeates more and more areas of our daily life. People share and use information in forums and social networks in ways unimaginable just a few years ago. This fantastic medium with global reach, easy access and fast information propagation is, unfortunately, also often a tool for illegal activities. Especially in areas like commercial fraud a huge ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Discovering Complex Networks of Events and Relations in News Surveillance

    Publication Year: 2011, Page(s): 7
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (107 KB) | HTML iconHTML

    When faced with the need for analyzing vast streams of on-line text data, we require methods that go well beyond keyword-based queries. Large-scale surveillance of on-line news streams requires an understanding of the text on a deeper level than is afforded by names and keywords alone, it becomes essential to understand complex interactions among the entities relationships and events. We will disc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Visualisation for Decision-Makers

    Publication Year: 2011, Page(s): 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (105 KB) | HTML iconHTML

    Summary form only given. How should we communicate the results of our analysis to decision-makers? This talk will argue that visualisations and infographics can play a very important role, not only for analytical processes of data analysts, but also for explaining our analytical results to decision-makers at the highest of levels. Some care must be taken to avoid various common pitfalls when desig... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Who, What, When, Where and How: Semantics Semantics Help Connect the Dots

    Publication Year: 2011, Page(s): 9
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (126 KB) | HTML iconHTML

    Summary form only given. In this session you will learn: to leverage semantic technology to bring information and intelligence from around the Web, inside your operation. Semantic technology can improve on your traditional data management methods through better data identification, classification, mapping and evaluation. Semantic Web technology can provide a window into how people, places, things ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Engineering Situation Analysis Decision Support Systems

    Publication Year: 2011, Page(s):10 - 18
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2397 KB) | HTML iconHTML

    This paper explores a new approach to model-driven engineering (MDE) of situation analysis decision support systems for Marine Safety & Security Operations. Realistic situation analysis scenarios routinely deal with complex dynamic situations involving multiple mobile agents and events distributed in space and time. The work presented here builds on Abstract State Machine (ASM) modeling paired... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Law Enforcement Ontology for Identification of Related Information of Interest Across Free Text Dcouments

    Publication Year: 2011, Page(s):19 - 27
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (939 KB) | HTML iconHTML

    A law enforcement ontology that incorporates extensions such as Thesauri, specialized rules, abductive hypothesis and process modeling for expansion of extracted entity phrases, is described. The ontology is part of a project to facilitate automated, reliable identification of related information of interest found in law enforcement-related free-text documents. Results of testing on a complex, rea... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cybercrime: Awareness and Fear: Slovenian Perspectives

    Publication Year: 2011, Page(s):28 - 33
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (333 KB) | HTML iconHTML

    In this paper the Slovene perspective on the perception of cyber crime in terms of awareness and fear is presented. On the basis of theoretical knowledge the online survey has been prepared and conducted. The results of the perception of cyber crime and its understanding have been analyzed. The results and their interpretations are the basis for further work with the cyberspace users. Based on the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • U.S. and EU Legislation on Cybercrime

    Publication Year: 2011, Page(s):34 - 37
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (187 KB) | HTML iconHTML

    The advent of Internet technologies has created global cyber crime problems. Cyber crimes affect all of us at the time when online transactions are in billions of dollars per year and cyber criminals are costing e-commerce billions of dollars in damages [1]. These are the components of cyber crime through which cyber criminals have perpetrated these areas: hacking, distributed denial-of-service, p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.