


default search action
1. EuroISI 2008: Esbjerg, Denmark
- Daniel Ortiz Arroyo, Henrik Legind Larsen, Daniel Dajun Zeng, David L. Hicks, Gerhard Wagner: 
 Intelligence and Security Informatics, First European Conference, EuroISI 2008, Esbjerg, Denmark, December 3-5, 2008. Proceedings. Lecture Notes in Computer Science 5376, Springer 2008, ISBN 978-3-540-89899-3
Abstracts of Plenary Talks
- Ronald R. Yager: 
 Intelligent Social Network Modeling and Analysis for Security Informatics. 1-2
- Ajith Abraham: 
 Nature Inspired Online Real Risk Assessment Models for Security Systems. 3
- Hsinchun Chen: 
 Homeland Security Data Mining Using Social Network Analysis. 4
Criminal and Social Network Analysis
- Richard Adderley, Atta Badii, Chaoxin Wu: 
 The Automatic Identification and Prioritisation of Criminal Networks from Police Crime Data. 5-14
- Daniel Ortiz Arroyo  , Dil Muhammad Akbar Hussain: , Dil Muhammad Akbar Hussain:
 An Information Theory Approach to Identify Sets of Key Players. 15-26
- Dil Muhammad Akbar Hussain, Daniel Ortiz Arroyo  : :
 Locating Key Actors in Social Networks Using Bayes' Posterior Probability Framework. 27-38
- Uwe Glässer, Mona Vajihollahi: 
 Computational Modeling of Criminal Activity. 39-50
Intelligence Analysis and Knowledge Discovery
- Federico Neri, Angelo Priamo: 
 SPYWatch, Overcoming Linguistic Barriers in Information Management. 51-60
- Aaron Hunter: 
 Dissecting the Meaning of an Encrypted Message: An Approach to Discovering the Goals of an Adversary. 61-72
- Magnus Sahlgren, Jussi Karlgren  : :
 Buzz Monitoring in Word Space. 73-84
Web-Based Intelligence Monitoring and Analysis
- Hsinchun Chen: 
 Nuclear Threat Detection Via the Nuclear Web and Dark Web: Framework and Preliminary Study. 85-96
- Clinton J. Mielke, Hsinchun Chen: 
 Mapping Dark Web Geolocation. 97-107
- Maura Conway  , Lisa McInerney: , Lisa McInerney:
 Jihadi Video and Auto-radicalisation: Evidence from an Exploratory YouTube Study. 108-118
Privacy Protection, Access Control, and Digital Rights Management
- Aneta Poniszewska-Maranda  : :
 Access Control of Federated Information Systems. 119-130
- Giannakis Antoniou, Lynn Margaret Batten, Parampalli Udaya  : :
 Designing Information Systems Which Manage or Avoid Privacy Incidents. 131-142
- Bon K. Sy: 
 Secure Computation for Privacy Preserving Biometric Data Retrieval and Authentication. 143-154
- Prayoth Kumsawat, Kitti Attakitmongcol, Arthit Srikaew: 
 Digital Audio Watermarking for Copyright Protection Based on Multiwavelet Transform. 155-164
- Youngseek Kim, Jessica Howard, Sharad Ravindranath, Joon S. Park: 
 Problem Analyses and Recommendations in DRM Security Policies. 165-178
Malware and Intrusion Detection
- Boris Rozenberg, Ehud Gudes, Yuval Elovici: 
 A Distributed Framework for the Detection of New Worm-Related Malware. 179-190
- Rami Puzis  , Marius David Klippel, Yuval Elovici, Shlomi Dolev: , Marius David Klippel, Yuval Elovici, Shlomi Dolev:
 Optimization of NIDS Placement for Protection of Intercommunicating Critical Infrastructures. 191-203
- Robert Moskovitch, Clint Feher, Nir Tzachar, Eugene Berger, Marina Gitelman, Shlomi Dolev, Yuval Elovici: 
 Unknown Malcode Detection Using OPCODE Representation. 204-215
Surveillance and Crisis Management
- Sandro Leuchter  , Thomas Partmann, Lothar Berger: , Thomas Partmann, Lothar Berger:
 Mobile and Stationary Sensors for Local Surveillance: System Architecture and Applications. 216-225
- Jean-François Landry, Cédric Ulmer, Laurent Gomez: 
 Fuzzy Distributed Workflows for Crisis Management Decision Makers. 226-236
- Gianmarco Baldini, Raimondo Giuliani, Dimitrios Symeonidis: 
 Reconfigurable Radio Systems for Public Safety Based on Low-Cost Platforms. 237-247
- Steven R. Haynes, Jonathan M. Singel, Thomas George Kannampallil  : :
 An Information Systems Design Theory for Supporting WMD Knowledge Reachback. 248-259
- Steven R. Haynes, Thomas George Kannampallil  , Mark A. Cohen, Andrey Soares, Frank E. Ritter: , Mark A. Cohen, Andrey Soares, Frank E. Ritter:
 Rampart: A Service and Agent-Based Architecture for Anti-Terrorism Planning and Resource Allocation. 260-270
Posters
- James A. Danowski: 
 Evaluative Word Locations in Semantic Networks from News Stories about Al Qaeda and Implications for Optimal Communication Messages in Anti-terrorism Campaigns. 271-273
- Igor Nai Fovino, Marcelo Masera: 
 Methodology for Experimental ICT Industrial and Critical Infrastructure Security Tests. 274-275

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


 Google
Google Google Scholar
Google Scholar Semantic Scholar
Semantic Scholar Internet Archive Scholar
Internet Archive Scholar CiteSeerX
CiteSeerX ORCID
ORCID














