Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/isi/jisic2014.bht:"
@inproceedings{DBLP:conf/isi/AbbasiLBHC14, author = {Ahmed Abbasi and Weifeng Li and Victor A. Benjamin and Shiyu Hu and Hsinchun Chen}, title = {Descriptive Analytics: Examining Expert Hackers in Web Forums}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {56--63}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.18}, doi = {10.1109/JISIC.2014.18}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/AbbasiLBHC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/AbbottS14, author = {Alya Abbott and Olga Simek}, title = {Recommending Documents for Complex Question Exploration by Analyzing Browsing Behavior}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {321}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.66}, doi = {10.1109/JISIC.2014.66}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/AbbottS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/AdamsL14, author = {Niall M. Adams and Daniel J. Lawson}, title = {An Approximate Framework for Flexible Network Flow Screening}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {256--259}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.49}, doi = {10.1109/JISIC.2014.49}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/AdamsL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/AdrichemLWWFK14, author = {Niels L. M. van Adrichem and Antonio Reyes Lua and Xin Wang and Muhammad Wasif and Ficky Fatturrahman and Fernando A. Kuipers}, title = {{DNSSEC} Misconfigurations: How Incorrectly Configured Security Leads to Unreachability}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {9--16}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.12}, doi = {10.1109/JISIC.2014.12}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/AdrichemLWWFK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/Al-khateebA14, author = {Samer Al{-}khateeb and Nitin Agarwal}, title = {Modeling Flash Mobs in Cybernetic Space: Evaluating Threats of Emerging Socio-Technical Behaviors to Human Security}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {328}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.73}, doi = {10.1109/JISIC.2014.73}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isi/Al-khateebA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/AlguliyevRR14, author = {Rasim M. Alguliyev and Davud Rustamov and Mirza Rzayev}, title = {Computational Approach for Detection of Illegal Activity over the Internet}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {326}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.71}, doi = {10.1109/JISIC.2014.71}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/AlguliyevRR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/Bachmann14, author = {Michael Bachmann}, title = {Passwords are Dead: Alternative Authentication Methods}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {322}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.67}, doi = {10.1109/JISIC.2014.67}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/Bachmann14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/BanaszakBDS14, author = {Steven Banaszak and Elizabeth K. Bowman and John P. Dickerson and V. S. Subrahmanian}, title = {Forecasting Country Stability in North Africa}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {304--307}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.60}, doi = {10.1109/JISIC.2014.60}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/BanaszakBDS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/BenjaminC14, author = {Victor A. Benjamin and Hsinchun Chen}, title = {Time-to-Event Modeling for Predicting Hacker {IRC} Community Participant Trajectory}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {25--32}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.14}, doi = {10.1109/JISIC.2014.14}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/BenjaminC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/BodenhamA14, author = {Dean Adam Bodenham and Niall M. Adams}, title = {Adaptive Change Detection for Relay-Like Behaviour}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {252--255}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.48}, doi = {10.1109/JISIC.2014.48}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/BodenhamA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/BoltonH14, author = {Alexander Bolton and Nicholas A. Heard}, title = {Application of a Linear Time Method for Change Point Detection to the Classification of Software}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {292--295}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.58}, doi = {10.1109/JISIC.2014.58}, timestamp = {Wed, 26 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/BoltonH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/BradyOK14, author = {Owen Brady and Richard E. Overill and Jeroen Keppens}, title = {Addressing the Increasing Volume and Variety of Digital Evidence Using an Ontology}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {176--183}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.34}, doi = {10.1109/JISIC.2014.34}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/BradyOK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/BroekSD14, author = {A. C. van den Broek and R. M. Schoemaker and Rob J. Dekker}, title = {Land Border Permeability and Irregular Migration Using Geospatial Intelligence from Satellite Data}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {208--211}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.38}, doi = {10.1109/JISIC.2014.38}, timestamp = {Fri, 17 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/BroekSD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/CayfordGG14, author = {Michelle Cayford and Coen van Gulijk and Pieter H. A. J. M. van Gelder}, title = {When Counting is Not Enough: Limitations of NSA's Effectiveness Assessment of Surveillance Technology}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {333}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.80}, doi = {10.1109/JISIC.2014.80}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isi/CayfordGG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/ChabotBNK14, author = {Yoan Chabot and Aur{\'{e}}lie Bertaux and Christophe Nicolle and M. Tahar Kechadi}, title = {Automatic Timeline Construction and Analysis for Computer Forensics Purposes}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {276--279}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.54}, doi = {10.1109/JISIC.2014.54}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/ChabotBNK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/ChahuaraMMSTP14, author = {Pedro Chahuara and Luca Mazzola and Michail Makridis and Claudio Schifanella and Aris Tsois and Mauro Pedone}, title = {Inferring itineraries of containerized cargo through the application of Conditional Random Fields}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {137--144}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.29}, doi = {10.1109/JISIC.2014.29}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isi/ChahuaraMMSTP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/CoiselS14, author = {Iwen Coisel and Ignacio Sanchez}, title = {Practical Interception of {DECT} Encrypted Voice Communication in Unified Communications Environments}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {115--122}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.26}, doi = {10.1109/JISIC.2014.26}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/CoiselS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/DaniilidisFVDZLKSTKCGPRDZBGAS14, author = {Ioannis Daniilidis and J.{-}J. Filippi and Wolfgang Vautz and Enrico Dalcanale and Stefano Zampolli and George Leventakis and I. Kauppinen and S. Sinisalo and Vasilis Tsoulkas and V. Kassouras and Mathieu Carras and B. Gerard and R. Pinalli and A. Ragnoni and L. Dujourdy and D. Zavali and Mickael Brun and Vasileios Grizis and Apostolos Argyris and Dimitris Syvridis}, title = {Detection of Olfactory Traces by Orthogonal Gas Identification Technologies - {DOGGIES}}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {332}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.76}, doi = {10.1109/JISIC.2014.76}, timestamp = {Tue, 15 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isi/DaniilidisFVDZLKSTKCGPRDZBGAS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/DantasNF14, author = {Yuri Gil Dantas and Vivek Nigam and Iguatemi E. Fonseca}, title = {A Selective Defense for Application Layer DDoS Attacks}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {75--82}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.21}, doi = {10.1109/JISIC.2014.21}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/DantasNF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/DatcuCLL14, author = {Dragos Datcu and Marina{-}Anca Cidot{\~{a}} and Heide K. Lukosch and Stephan G. Lukosch}, title = {On the Usability of Augmented Reality for Information Exchange in Teams from the Security Domain}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {160--167}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.32}, doi = {10.1109/JISIC.2014.32}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/DatcuCLL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/EdwardsRR14, author = {Matthew John Edwards and Awais Rashid and Paul Rayson}, title = {A Service-Indepenent Model for Linking Online User Profile Information}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {280--283}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.55}, doi = {10.1109/JISIC.2014.55}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/EdwardsRR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/GschwandtnerSD14, author = {Michael Gschwandtner and Svorad Stolc and Franz Daubner}, title = {Optical Security Document Simulator for Black-Box Testing of {ABC} Systems}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {300--303}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.78}, doi = {10.1109/JISIC.2014.78}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/GschwandtnerSD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/GuedesFP14, author = {Ricardo Guedes and Vasco Furtado and Tarcisio H. C. Pequeno}, title = {Multiagent Models for Police Resource Allocation and Dispatch}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {288--291}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.57}, doi = {10.1109/JISIC.2014.57}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/GuedesFP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/GuriKKE14, author = {Mordechai Guri and Gabi Kedma and Assaf Kachlon and Yuval Elovici}, title = {Resilience of Anti-malware Programs to Na{\"{\i}}ve Modifications of Malicious Binaries}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {152--159}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.31}, doi = {10.1109/JISIC.2014.31}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/GuriKKE14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/GuriKZE14, author = {Mordechai Guri and Gabi Kedma and Boris Zadov and Yuval Elovici}, title = {Trusted Detection of Sensitive Activities on Mobile Phones Using Power Consumption Measurements}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {145--151}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.30}, doi = {10.1109/JISIC.2014.30}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/GuriKZE14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/Hammer14, author = {Hugo Lewi Hammer}, title = {Detecting Threats of Violence in Online Discussions Using Bigrams of Important Words}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {319}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.64}, doi = {10.1109/JISIC.2014.64}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/Hammer14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/HeZBMZXTH14, author = {Saike He and Xiaolong Zheng and Xiuguo Bao and Hongyuan Ma and Daniel Dajun Zeng and Bo Xu and Guanhua Tian and Hongwei Hao}, title = {Ranking Online Memes in Emergency Events Based on Transfer Entropy}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {236--239}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.44}, doi = {10.1109/JISIC.2014.44}, timestamp = {Tue, 25 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/HeZBMZXTH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/HeardRL14, author = {Nick Heard and Patrick Rubin{-}Delanchy and Daniel J. Lawson}, title = {Filtering Automated Polling Traffic in Computer Network Flow Data}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {268--271}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.52}, doi = {10.1109/JISIC.2014.52}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isi/HeardRL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/JohanssonKS14, author = {Fredrik Johansson and Lisa Kaati and Amendra Shrestha}, title = {Time Profiles for Identifying Users in Online Environments}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {83--90}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.22}, doi = {10.1109/JISIC.2014.22}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/JohanssonKS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/JurekBM14, author = {Anna Jurek and Yaxin Bi and Maurice D. Mulvenna}, title = {Twitter Sentiment Analysis for Security-Related Information Gathering}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {48--55}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.17}, doi = {10.1109/JISIC.2014.17}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/JurekBM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/KodagodaANZXWWPBMB14, author = {Neesha Kodagoda and Simon Attfield and Phong Hai Nguyen and Leishi Zhang and Kai Xu and B. L. William Wong and Adrian Wagstaff and Graham Phillips and James Bullock and John Marshall and Stewart Bertram}, title = {POLAR-An Interactive Patterns of Life Visualisation Tool for Intelligence Analysis}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {327}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.72}, doi = {10.1109/JISIC.2014.72}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isi/KodagodaANZXWWPBMB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/KongMZW14, author = {Qingchao Kong and Wenji Mao and Daniel Dajun Zeng and Lei Wang}, title = {Predicting Popularity of Forum Threads for Public Events Security}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {99--106}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.24}, doi = {10.1109/JISIC.2014.24}, timestamp = {Wed, 17 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isi/KongMZW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/KootVHKVB14, author = {Gijs Koot and Mirjam A. A. Huis in 't Veld and Joost Hendricksen and Rianne Kaptein and Arnout de Vries and Egon L. van den Broek}, title = {Foraging Online Social Networks}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {312--315}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.62}, doi = {10.1109/JISIC.2014.62}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/KootVHKVB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/LathropO14, author = {Joel Lathrop and James B. O'Kane}, title = {A Case Study in Opportunity Reduction: Mitigating the Dirt Jumper Drive-Smart Attack}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {224--227}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.41}, doi = {10.1109/JISIC.2014.41}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/LathropO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/LawsonRHA14, author = {Daniel J. Lawson and Patrick Rubin{-}Delanchy and Nicholas A. Heard and Niall M. Adams}, title = {Statistical Frameworks for Detecting Tunnelling in Cyber Defence Using Big Data}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {248--251}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.47}, doi = {10.1109/JISIC.2014.47}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isi/LawsonRHA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/LiC14, author = {Weifeng Li and Hsinchun Chen}, title = {Identifying Top Sellers In Underground Economy Using Deep Learning-Based Sentiment Analysis}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {64--67}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.19}, doi = {10.1109/JISIC.2014.19}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/LiC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/LiaoL14, author = {Yi{-}Ching Liao and Hanno Langweg}, title = {Resource-Based Event Reconstruction of Digital Crime Scenes}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {129--136}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.28}, doi = {10.1109/JISIC.2014.28}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/LiaoL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/LuoCZZ14, author = {Chuan Luo and Kainan Cui and Xiaolong Zheng and Daniel Dajun Zeng}, title = {Time Critical Disinformation Influence Minimization in Online Social Networks}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {68--74}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.20}, doi = {10.1109/JISIC.2014.20}, timestamp = {Thu, 21 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isi/LuoCZZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/LuoZZ14, author = {Chuan Luo and Xiaolong Zheng and Daniel Dajun Zeng}, title = {Causal Inference in Social Media Using Convergent Cross Mapping}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {260--263}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.50}, doi = {10.1109/JISIC.2014.50}, timestamp = {Thu, 21 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isi/LuoZZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/MemonW14, author = {Bisharat Rasool Memon and Uffe Kock Wiil}, title = {Predicting Links in Multi-relational Networks}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {107--114}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.25}, doi = {10.1109/JISIC.2014.25}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isi/MemonW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/MetelliH14, author = {Silvia Metelli and Nicholas A. Heard}, title = {Modelling New Edge Formation in a Computer Network through Bayesian Variable Selection}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {272--275}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.53}, doi = {10.1109/JISIC.2014.53}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/MetelliH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/MolchoMMA14, author = {Gila Molcho and Sebastian Maier and Felipe Melero and Carlo Aliprandi}, title = {{CAPER:} Collaborative Information, Acquisition, Processing, Exploitation and Reporting for the Prevention of Organised Crime}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {316}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.63}, doi = {10.1109/JISIC.2014.63}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/MolchoMMA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/MusgroveCC14, author = {Jesse Musgrove and Bojan Cukic and Vittorio Cortellessa}, title = {On the Adequacy of Performance Models in an Adaptive Border Inspection Management System}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {200--207}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.37}, doi = {10.1109/JISIC.2014.37}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/MusgroveCC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/NissimCMSEBE14, author = {Nir Nissim and Aviad Cohen and Robert Moskovitch and Asaf Shabtai and Mattan Edry and Oren Bar{-}Ad and Yuval Elovici}, title = {{ALPD:} Active Learning Framework for Enhancing the Detection of Malicious {PDF} Files}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {91--98}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.23}, doi = {10.1109/JISIC.2014.23}, timestamp = {Fri, 26 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isi/NissimCMSEBE14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/NordvikLL14, author = {Rune Nordvik and Yi{-}Ching Liao and Hanno Langweg}, title = {AccountabilityFS: {A} File System Monitor for Forensic Readiness}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {308--311}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.61}, doi = {10.1109/JISIC.2014.61}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/NordvikLL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/Oey14, author = {Herman{-}Dick Giok Tjiang Oey}, title = {Military Geospatial Profiling Analysis}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {329--330}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.74}, doi = {10.1109/JISIC.2014.74}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/Oey14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/PattonGCFWC14, author = {Mark W. Patton and Eric Gross and Ryan Chinn and Samantha Forbis and Leon Walker and Hsinchun Chen}, title = {Uninvited Connections: {A} Study of Vulnerable Devices on the Internet of Things (IoT)}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {232--235}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.43}, doi = {10.1109/JISIC.2014.43}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/PattonGCFWC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/PicMHW14, author = {Marc Michel Pic and Clarisse Mandridake and Mathieu Hoarau and Kevin Win{-}Lime}, title = {{DOCSCOPE:} {ID} Printing Techniques Signatures}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {334}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.77}, doi = {10.1109/JISIC.2014.77}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/PicMHW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/PiniPVBLS14, author = {Marco Pini and Luca Pilosu and Lene Vesterlund and David Blanco and Fredrik Lindstr{\"{o}}m and Emiliano Spaltro}, title = {Robust Navigation and Communication in the Maritime Domain: The {TRITON} Project}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {331}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.75}, doi = {10.1109/JISIC.2014.75}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/PiniPVBLS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/Pirinen14, author = {Rauno Pirinen}, title = {Studies of Integration Readiness Levels: Case Shared Maritime Situational Awareness System}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {212--215}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.79}, doi = {10.1109/JISIC.2014.79}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/Pirinen14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/PohlWPAW14, author = {Margit Pohl and Lisa{-}Christina Winter and Chris Pallaris and Simon Attfield and B. L. William Wong}, title = {Sensemaking and Cognitive Bias Mitigation in Visual Analytics}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {323}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.68}, doi = {10.1109/JISIC.2014.68}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/PohlWPAW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/PonzoniZCCS14, author = {Andrea Ponzoni and Dario Zappa and Cristina Cerqui and Elisabetta Comini and Giorgio Sberveglieri}, title = {Metal Oxide Gas Sensors Technologies for Hidden People Detection}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {324}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.69}, doi = {10.1109/JISIC.2014.69}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/PonzoniZCCS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/PrueJSP14, author = {Brian Prue and Michael Jenkins and Lauren D. Stern and Jonathan D. Pfautz}, title = {Overcoming Limited Collaboration Channels in Distributed Intelligence Analysis: Visualization Tools and Design Seeds}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {17--24}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.13}, doi = {10.1109/JISIC.2014.13}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/PrueJSP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/Rajamaki14, author = {Jyri Rajam{\"{a}}ki}, title = {Challenges to a Smooth-Running Data Security Audits. Case: {A} Finnish National Security Auditing Criteria {KATAKRI}}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {240--243}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.45}, doi = {10.1109/JISIC.2014.45}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/Rajamaki14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/Rubin-DelanchyLTHA14, author = {Patrick Rubin{-}Delanchy and Daniel J. Lawson and Melissa J. Turcotte and Nicholas A. Heard and Niall M. Adams}, title = {Three Statistical Approaches to Sessionizing Network Flow Data}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {244--247}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.46}, doi = {10.1109/JISIC.2014.46}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isi/Rubin-DelanchyLTHA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/SepetnitskyGE14, author = {Vitali Sepetnitsky and Mordechai Guri and Yuval Elovici}, title = {Exfiltration of Information from Air-Gapped Machines Using Monitor's {LED} Indicator}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {264--267}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.51}, doi = {10.1109/JISIC.2014.51}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isi/SepetnitskyGE14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/ShahirGNW14, author = {Hamed Yaghoubi Shahir and Uwe Gl{\"{a}}sser and Narek Nalbandyan and Hans Wehn}, title = {Maritime Situation Analysis: {A} Multi-vessel Interaction and Anomaly Detection Framework}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {192--199}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.36}, doi = {10.1109/JISIC.2014.36}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/ShahirGNW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/SikosDHF14, author = {Jennifer Sikos and Peter David and Nizar Habash and Reem Faraj}, title = {Authorship Analysis of Inspire Magazine through Stylometric and Psychological Features}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {33--40}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.15}, doi = {10.1109/JISIC.2014.15}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/SikosDHF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/SilvaSAG14, author = {Carlo Marcelo Revoredo da Silva and Jose Lutiano Costa da Silva and Rodrigo Elia Assad and Ruy Jose Guerra Barretto Garcia}, title = {Aegis: {A} Lightweight Tool for Prevent Frauds in Web Browsers}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {1--8}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.11}, doi = {10.1109/JISIC.2014.11}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/SilvaSAG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/SpittersEWB14, author = {Martijn Spitters and Pieter T. Eendebak and Dani{\"{e}}l T. H. Worm and Henri Bouma}, title = {Threat Detection in Tweets with Trigger Patterns and Contextual Cues}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {216--219}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.39}, doi = {10.1109/JISIC.2014.39}, timestamp = {Mon, 21 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isi/SpittersEWB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/SpittersVS14, author = {Martijn Spitters and Stefan Verbruggen and Mark van Staalduinen}, title = {Towards a Comprehensive Insight into the Thematic Organization of the Tor Hidden Services}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {220--223}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.40}, doi = {10.1109/JISIC.2014.40}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/SpittersVS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/Sureka014, author = {Ashish Sureka and Swati Agarwal}, title = {Learning to Classify Hate and Extremism Promoting Tweets}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {320}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.65}, doi = {10.1109/JISIC.2014.65}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/Sureka014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/TyshchukWLJK14, author = {Yulia Tyshchuk and William A. Wallace and Hao Li and Heng Ji and Sue E. Kase}, title = {The Nature of Communications and Emerging Communities on Twitter Following the 2013 Syria Sarin Gas Attacks}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {41--47}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.16}, doi = {10.1109/JISIC.2014.16}, timestamp = {Mon, 06 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/TyshchukWLJK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/WeissenfeldKS14, author = {Axel Weissenfeld and Andreas Kriechbaum{-}Zabini and Lukasz Szklarski}, title = {Security Components in a One-Stop-Shop Border Control System}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {228--231}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.42}, doi = {10.1109/JISIC.2014.42}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/WeissenfeldKS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/WestlingBG14, author = {Anders Westling and Joel Brynielsson and Tove Gustavi}, title = {Mining the Web for Sympathy: The Pussy Riot Case}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {123--128}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.27}, doi = {10.1109/JISIC.2014.27}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/WestlingBG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/Wong14, author = {B. L. William Wong}, title = {How Analysts Think (?): Early Observations}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {296--299}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.59}, doi = {10.1109/JISIC.2014.59}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/Wong14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/YangMB14, author = {Yongpeng Yang and Monisha Manoharan and K. Suzanne Barber}, title = {Modelling and Analysis of Identity Threat Behaviors through Text Mining of Identity Theft Stories}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {184--191}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.35}, doi = {10.1109/JISIC.2014.35}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/YangMB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/YanoBGA14, author = {Edgar Toshiro Yano and Parth Bhatt and Per M. Gustavsson and Rose{-}Mharie {\AA}hlfeldt}, title = {Towards a Methodology for Cybersecurity Risk Management Using Agents Paradigm}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {325}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.70}, doi = {10.1109/JISIC.2014.70}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/YanoBGA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/YlikauppilaTKJ14, author = {Mari Ylikauppila and Sirra Toivonen and Minna Kulju and Minna Jokela}, title = {Understanding the Factors Affecting {UX} and Technology Acceptance in the Context of Automated Border Controls}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {168--175}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.33}, doi = {10.1109/JISIC.2014.33}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/YlikauppilaTKJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/ZhangMZZB14, author = {Yuhao Zhang and Wenji Mao and Daniel Dajun Zeng and Ning Zhao and Xiuguo Bao}, title = {Exploring Opinion Dynamics in Security-Related Microblog Data}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {284--287}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.56}, doi = {10.1109/JISIC.2014.56}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/ZhangMZZB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/isi/2014, title = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, publisher = {{IEEE}}, year = {2014}, url = {https://ieeexplore.ieee.org/xpl/conhome/6968676/proceeding}, isbn = {978-1-4799-6363-8}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.