Search dblp for Publications

export results for "toc:db/conf/eisic/eisic2017.bht:"

 download as .bib file

@inproceedings{DBLP:conf/eisic/0004DB17,
  author       = {Michael Martin and
                  Jeremy M. Dawson and
                  Thirimachos Bourlai},
  editor       = {Joel Brynielsson},
  title        = {Large Scale Data Collection of Tattoo-Based Biometric Data from Social-Media
                  Websites},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2017, Athens, Greece, September 11-13, 2017},
  pages        = {135--138},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/EISIC.2017.27},
  doi          = {10.1109/EISIC.2017.27},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/0004DB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/AndreadisGKTPVK17,
  author       = {Stelios Andreadis and
                  Ilias Gialampoukidis and
                  George Kalpakis and
                  Theodora Tsikrika and
                  Symeon Papadopoulos and
                  Stefanos Vrochidis and
                  Ioannis Kompatsiaris},
  editor       = {Joel Brynielsson},
  title        = {A Monitoring Tool for Terrorism-Related Key-Players and Key-Communities
                  in Social Media Networks},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2017, Athens, Greece, September 11-13, 2017},
  pages        = {166},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/EISIC.2017.41},
  doi          = {10.1109/EISIC.2017.41},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/AndreadisGKTPVK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/BedekNHA17,
  author       = {Michael A. Bedek and
                  Alexander Nussbaumer and
                  Eva{-}Catherine Hillemann and
                  Dietrich Albert},
  editor       = {Joel Brynielsson},
  title        = {A Framework for Measuring Imagination in Visual Analytics Systems},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2017, Athens, Greece, September 11-13, 2017},
  pages        = {151--154},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/EISIC.2017.31},
  doi          = {10.1109/EISIC.2017.31},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/BedekNHA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/BoldtB17,
  author       = {Martin Boldt and
                  Anton Borg},
  editor       = {Joel Brynielsson},
  title        = {A Statistical Method for Detecting Significant Temporal Hotspots Using
                  {LISA} Statistics},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2017, Athens, Greece, September 11-13, 2017},
  pages        = {123--126},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/EISIC.2017.24},
  doi          = {10.1109/EISIC.2017.24},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/BoldtB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/BorgBE17,
  author       = {Anton Borg and
                  Martin Boldt and
                  Johan Eliasson},
  editor       = {Joel Brynielsson},
  title        = {Detecting Crime Series Based on Route Estimation and Behavioral Similarity},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2017, Athens, Greece, September 11-13, 2017},
  pages        = {1--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/EISIC.2017.10},
  doi          = {10.1109/EISIC.2017.10},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/BorgBE17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/BorrionDL17,
  author       = {Herv{\'{e}} Borrion and
                  Hashem Dehghanniri and
                  Yuanxi Li},
  editor       = {Joel Brynielsson},
  title        = {Comparative Analysis of Crime Scripts: One {CCTV} Footage - Twenty-One
                  Scripts},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2017, Athens, Greece, September 11-13, 2017},
  pages        = {115--122},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/EISIC.2017.23},
  doi          = {10.1109/EISIC.2017.23},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/BorrionDL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/ChenYB17,
  author       = {Lingwei Chen and
                  Yanfang Ye and
                  Thirimachos Bourlai},
  editor       = {Joel Brynielsson},
  title        = {Adversarial Machine Learning in Malware Detection: Arms Race between
                  Evasion Attack and Defense},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2017, Athens, Greece, September 11-13, 2017},
  pages        = {99--106},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/EISIC.2017.21},
  doi          = {10.1109/EISIC.2017.21},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/ChenYB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Dhami17,
  author       = {Mandeep K. Dhami},
  editor       = {Joel Brynielsson},
  title        = {A Survey of Intelligence Analysts' Perceptions of Analytic Tools},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2017, Athens, Greece, September 11-13, 2017},
  pages        = {131--134},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/EISIC.2017.26},
  doi          = {10.1109/EISIC.2017.26},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/Dhami17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/DimitriouKSSTZL17,
  author       = {Nikolaos Dimitriou and
                  George Kioumourtzis and
                  Anargyros Sideris and
                  Georgios Stavropoulos and
                  Evdoxia Taka and
                  Nikolaos Zotos and
                  George Leventakis and
                  Dimitrios Tzovaras},
  editor       = {Joel Brynielsson},
  title        = {An Integrated Framework for the Timely Detection of Petty Crimes},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2017, Athens, Greece, September 11-13, 2017},
  pages        = {24--31},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/EISIC.2017.13},
  doi          = {10.1109/EISIC.2017.13},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/DimitriouKSSTZL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/FernquistFK17,
  author       = {Johan Fernquist and
                  Torbjorn Fangstrom and
                  Lisa Kaati},
  editor       = {Joel Brynielsson},
  title        = {IoT Data Profiles: The Routines of Your Life Reveals Who You Are},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2017, Athens, Greece, September 11-13, 2017},
  pages        = {61--67},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/EISIC.2017.17},
  doi          = {10.1109/EISIC.2017.17},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/FernquistFK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/FoongO17,
  author       = {Yee Jang Foong and
                  Mourad Oussalah},
  editor       = {Joel Brynielsson},
  title        = {Cyberbullying System Detection and Analysis},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2017, Athens, Greece, September 11-13, 2017},
  pages        = {40--46},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/EISIC.2017.43},
  doi          = {10.1109/EISIC.2017.43},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/FoongO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/GroenewaldWAPK17,
  author       = {Celeste Groenewald and
                  B. L. William Wong and
                  Simon Attfield and
                  Peter J. Passmore and
                  Neesha Kodagoda},
  editor       = {Joel Brynielsson},
  title        = {How Analysts Think: How Do Criminal Intelligence Analysts Recognise
                  and Manage Significant Information?},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2017, Athens, Greece, September 11-13, 2017},
  pages        = {47--53},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/EISIC.2017.15},
  doi          = {10.1109/EISIC.2017.15},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/GroenewaldWAPK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/IsbisterKC17,
  author       = {Tim Isbister and
                  Lisa Kaati and
                  Katie Cohen},
  editor       = {Joel Brynielsson},
  title        = {Gender Classification with Data Independent Features in Multiple Languages},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2017, Athens, Greece, September 11-13, 2017},
  pages        = {54--60},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/EISIC.2017.16},
  doi          = {10.1109/EISIC.2017.16},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/IsbisterKC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/IslamW17,
  author       = {Junayed Islam and
                  B. L. William Wong},
  editor       = {Joel Brynielsson},
  title        = {Behavioural Markers: Bridging the Gap between Art of Analysis and
                  Science of Analytics in Criminal Intelligence},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2017, Athens, Greece, September 11-13, 2017},
  pages        = {147--150},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/EISIC.2017.30},
  doi          = {10.1109/EISIC.2017.30},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/IslamW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/KaatiLSS17,
  author       = {Lisa Kaati and
                  Elias Lundeqvist and
                  Amendra Shrestha and
                  Maria Svensson},
  editor       = {Joel Brynielsson},
  title        = {Author Profiling in the Wild},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2017, Athens, Greece, September 11-13, 2017},
  pages        = {155--158},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/EISIC.2017.32},
  doi          = {10.1109/EISIC.2017.32},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/KaatiLSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/KaatiR17,
  author       = {Lisa Kaati and
                  Adam Ruul},
  editor       = {Joel Brynielsson},
  title        = {Interpretable Probabilistic Divisive Clustering of Large Node-Attributed
                  Networks},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2017, Athens, Greece, September 11-13, 2017},
  pages        = {68--75},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/EISIC.2017.18},
  doi          = {10.1109/EISIC.2017.18},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/KaatiR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/KhelifMBSSMMKHC17,
  author       = {Khaled Khelif and
                  Yann Mombrun and
                  Gerhard Backfried and
                  Farhan Sahito and
                  Luca Scarpato and
                  Petr Motl{\'{\i}}cek and
                  Srikanth R. Madikeri and
                  Damien Kelly and
                  Gideon Hazzani and
                  Emmanouil Chatzigavriil},
  editor       = {Joel Brynielsson},
  title        = {Towards a Breakthrough Speaker Identification Approach for Law Enforcement
                  Agencies: {SIIP}},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2017, Athens, Greece, September 11-13, 2017},
  pages        = {32--39},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/EISIC.2017.14},
  doi          = {10.1109/EISIC.2017.14},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/KhelifMBSSMMKHC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/KostakosMNO17,
  author       = {Panos Kostakos and
                  Miika Moilanen and
                  Arttu Niemel{\"{a}} and
                  Mourad Oussalah},
  editor       = {Joel Brynielsson},
  title        = {Catchem: {A} Browser Plugin for the Panama Papers Using Approximate
                  String Matching},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2017, Athens, Greece, September 11-13, 2017},
  pages        = {139--142},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/EISIC.2017.28},
  doi          = {10.1109/EISIC.2017.28},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/KostakosMNO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/LekeaK17,
  author       = {Ioanna K. Lekea and
                  Panagiotis Karampelas},
  editor       = {Joel Brynielsson},
  title        = {Are We Really That Close Together? Tracing and Discussing Similarities
                  and Differences between Greek Terrorist Groups Using Cluster Analysis},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2017, Athens, Greece, September 11-13, 2017},
  pages        = {159--162},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/EISIC.2017.33},
  doi          = {10.1109/EISIC.2017.33},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/LekeaK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/MavroeidisB17,
  author       = {Vasileios Mavroeidis and
                  Siri Bromander},
  editor       = {Joel Brynielsson},
  title        = {Cyber Threat Intelligence Model: An Evaluation of Taxonomies, Sharing
                  Standards, and Ontologies within Cyber Threat Intelligence},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2017, Athens, Greece, September 11-13, 2017},
  pages        = {91--98},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/EISIC.2017.20},
  doi          = {10.1109/EISIC.2017.20},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/MavroeidisB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/PaudyalRKWDQ17,
  author       = {Pragya Paudyal and
                  Chris Rooney and
                  Neesha Kodagoda and
                  B. L. William Wong and
                  Penny Duquenoy and
                  Nadeem Qazi},
  editor       = {Joel Brynielsson},
  title        = {How the Use of Ethically Sensitive Information Helps to Identify Co-Offenders
                  via a Purposed Privacy Scale: {A} Pilot Study},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2017, Athens, Greece, September 11-13, 2017},
  pages        = {164},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/EISIC.2017.35},
  doi          = {10.1109/EISIC.2017.35},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/PaudyalRKWDQ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/PicO17,
  author       = {Marc Michel Pic and
                  Amine Ouddan},
  editor       = {Joel Brynielsson},
  title        = {Photometrix {(TM):} {A} Digital Seal for Offline Identity Picture
                  Authentication},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2017, Athens, Greece, September 11-13, 2017},
  pages        = {163},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/EISIC.2017.34},
  doi          = {10.1109/EISIC.2017.34},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/PicO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Poulymenopoulou17,
  author       = {Mikaela Poulymenopoulou and
                  Aris Tsois},
  editor       = {Joel Brynielsson},
  title        = {Customs Risk Analysis through the ConTraffic Visual Analytics Tool},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2017, Athens, Greece, September 11-13, 2017},
  pages        = {107--114},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/EISIC.2017.22},
  doi          = {10.1109/EISIC.2017.22},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/Poulymenopoulou17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Price-WilliamsH17,
  author       = {Matthew Price{-}Williams and
                  Nick Heard and
                  Melissa J. Turcotte},
  editor       = {Joel Brynielsson},
  title        = {Detecting Periodic Subsequences in Cyber Security Data},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2017, Athens, Greece, September 11-13, 2017},
  pages        = {84--90},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/EISIC.2017.40},
  doi          = {10.1109/EISIC.2017.40},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/Price-WilliamsH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/QaziW17,
  author       = {Nadeem Qazi and
                  B. L. William Wong},
  editor       = {Joel Brynielsson},
  title        = {Behavioural {\&} Tempo-Spatial Knowledge Graph for Crime Matching
                  through Graph Theory},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2017, Athens, Greece, September 11-13, 2017},
  pages        = {143--146},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/EISIC.2017.29},
  doi          = {10.1109/EISIC.2017.29},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/QaziW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/RuohonenL17,
  author       = {Jukka Ruohonen and
                  Ville Lepp{\"{a}}nen},
  editor       = {Joel Brynielsson},
  title        = {Whose Hands Are in the Finnish Cookie Jar?},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2017, Athens, Greece, September 11-13, 2017},
  pages        = {127--130},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/EISIC.2017.25},
  doi          = {10.1109/EISIC.2017.25},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/RuohonenL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/TorregrosaGLGC17,
  author       = {Javier Torregrosa and
                  Irene Gilp{\'{e}}rez{-}L{\'{o}}pez and
                  Ra{\'{u}}l Lara{-}Cabrera and
                  David Garriga and
                  David Camacho},
  editor       = {Joel Brynielsson},
  title        = {Can an Automatic Tool Assess Risk of Radicalization Online? {A} Case
                  Study on Facebook},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2017, Athens, Greece, September 11-13, 2017},
  pages        = {165},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/EISIC.2017.36},
  doi          = {10.1109/EISIC.2017.36},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/TorregrosaGLGC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Xylogiannopoulos17,
  author       = {Konstantinos F. Xylogiannopoulos and
                  Panagiotis Karampelas and
                  Reda Alhajj},
  editor       = {Joel Brynielsson},
  title        = {Text Mining in Unclean, Noisy or Scrambled Datasets for Digital Forensics
                  Analytics},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2017, Athens, Greece, September 11-13, 2017},
  pages        = {76--83},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/EISIC.2017.19},
  doi          = {10.1109/EISIC.2017.19},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/Xylogiannopoulos17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/ZouaveM17,
  author       = {Erik T. Zouave and
                  Thomas Marquenie},
  editor       = {Joel Brynielsson},
  title        = {An Inconvenient Truth: Algorithmic Transparency {\&} Accountability
                  in Criminal Intelligence Profiling},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2017, Athens, Greece, September 11-13, 2017},
  pages        = {17--23},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/EISIC.2017.12},
  doi          = {10.1109/EISIC.2017.12},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/ZouaveM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eisic/2017,
  editor       = {Joel Brynielsson},
  title        = {European Intelligence and Security Informatics Conference, {EISIC}
                  2017, Athens, Greece, September 11-13, 2017},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/8234922/proceeding},
  isbn         = {978-1-5386-2385-5},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics