Search dblp for Publications

export results for "toc:db/conf/isi/jisic2014.bht:"

 download as .bib file

@inproceedings{DBLP:conf/isi/AbbasiLBHC14,
  author       = {Ahmed Abbasi and
                  Weifeng Li and
                  Victor A. Benjamin and
                  Shiyu Hu and
                  Hsinchun Chen},
  title        = {Descriptive Analytics: Examining Expert Hackers in Web Forums},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {56--63},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.18},
  doi          = {10.1109/JISIC.2014.18},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/AbbasiLBHC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/AbbottS14,
  author       = {Alya Abbott and
                  Olga Simek},
  title        = {Recommending Documents for Complex Question Exploration by Analyzing
                  Browsing Behavior},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {321},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.66},
  doi          = {10.1109/JISIC.2014.66},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/AbbottS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/AdamsL14,
  author       = {Niall M. Adams and
                  Daniel J. Lawson},
  title        = {An Approximate Framework for Flexible Network Flow Screening},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {256--259},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.49},
  doi          = {10.1109/JISIC.2014.49},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/AdamsL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/AdrichemLWWFK14,
  author       = {Niels L. M. van Adrichem and
                  Antonio Reyes Lua and
                  Xin Wang and
                  Muhammad Wasif and
                  Ficky Fatturrahman and
                  Fernando A. Kuipers},
  title        = {{DNSSEC} Misconfigurations: How Incorrectly Configured Security Leads
                  to Unreachability},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {9--16},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.12},
  doi          = {10.1109/JISIC.2014.12},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/AdrichemLWWFK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/Al-khateebA14,
  author       = {Samer Al{-}khateeb and
                  Nitin Agarwal},
  title        = {Modeling Flash Mobs in Cybernetic Space: Evaluating Threats of Emerging
                  Socio-Technical Behaviors to Human Security},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {328},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.73},
  doi          = {10.1109/JISIC.2014.73},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isi/Al-khateebA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/AlguliyevRR14,
  author       = {Rasim M. Alguliyev and
                  Davud Rustamov and
                  Mirza Rzayev},
  title        = {Computational Approach for Detection of Illegal Activity over the
                  Internet},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {326},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.71},
  doi          = {10.1109/JISIC.2014.71},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/AlguliyevRR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/Bachmann14,
  author       = {Michael Bachmann},
  title        = {Passwords are Dead: Alternative Authentication Methods},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {322},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.67},
  doi          = {10.1109/JISIC.2014.67},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/Bachmann14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/BanaszakBDS14,
  author       = {Steven Banaszak and
                  Elizabeth K. Bowman and
                  John P. Dickerson and
                  V. S. Subrahmanian},
  title        = {Forecasting Country Stability in North Africa},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {304--307},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.60},
  doi          = {10.1109/JISIC.2014.60},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/BanaszakBDS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/BenjaminC14,
  author       = {Victor A. Benjamin and
                  Hsinchun Chen},
  title        = {Time-to-Event Modeling for Predicting Hacker {IRC} Community Participant
                  Trajectory},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {25--32},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.14},
  doi          = {10.1109/JISIC.2014.14},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/BenjaminC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/BodenhamA14,
  author       = {Dean Adam Bodenham and
                  Niall M. Adams},
  title        = {Adaptive Change Detection for Relay-Like Behaviour},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {252--255},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.48},
  doi          = {10.1109/JISIC.2014.48},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/BodenhamA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/BoltonH14,
  author       = {Alexander Bolton and
                  Nicholas A. Heard},
  title        = {Application of a Linear Time Method for Change Point Detection to
                  the Classification of Software},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {292--295},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.58},
  doi          = {10.1109/JISIC.2014.58},
  timestamp    = {Wed, 26 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/BoltonH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/BradyOK14,
  author       = {Owen Brady and
                  Richard E. Overill and
                  Jeroen Keppens},
  title        = {Addressing the Increasing Volume and Variety of Digital Evidence Using
                  an Ontology},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {176--183},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.34},
  doi          = {10.1109/JISIC.2014.34},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/BradyOK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/BroekSD14,
  author       = {A. C. van den Broek and
                  R. M. Schoemaker and
                  Rob J. Dekker},
  title        = {Land Border Permeability and Irregular Migration Using Geospatial
                  Intelligence from Satellite Data},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {208--211},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.38},
  doi          = {10.1109/JISIC.2014.38},
  timestamp    = {Fri, 17 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/BroekSD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/CayfordGG14,
  author       = {Michelle Cayford and
                  Coen van Gulijk and
                  Pieter H. A. J. M. van Gelder},
  title        = {When Counting is Not Enough: Limitations of NSA's Effectiveness Assessment
                  of Surveillance Technology},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {333},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.80},
  doi          = {10.1109/JISIC.2014.80},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isi/CayfordGG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/ChabotBNK14,
  author       = {Yoan Chabot and
                  Aur{\'{e}}lie Bertaux and
                  Christophe Nicolle and
                  M. Tahar Kechadi},
  title        = {Automatic Timeline Construction and Analysis for Computer Forensics
                  Purposes},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {276--279},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.54},
  doi          = {10.1109/JISIC.2014.54},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/ChabotBNK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/ChahuaraMMSTP14,
  author       = {Pedro Chahuara and
                  Luca Mazzola and
                  Michail Makridis and
                  Claudio Schifanella and
                  Aris Tsois and
                  Mauro Pedone},
  title        = {Inferring itineraries of containerized cargo through the application
                  of Conditional Random Fields},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {137--144},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.29},
  doi          = {10.1109/JISIC.2014.29},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isi/ChahuaraMMSTP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/CoiselS14,
  author       = {Iwen Coisel and
                  Ignacio Sanchez},
  title        = {Practical Interception of {DECT} Encrypted Voice Communication in
                  Unified Communications Environments},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {115--122},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.26},
  doi          = {10.1109/JISIC.2014.26},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/CoiselS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/DaniilidisFVDZLKSTKCGPRDZBGAS14,
  author       = {Ioannis Daniilidis and
                  J.{-}J. Filippi and
                  Wolfgang Vautz and
                  Enrico Dalcanale and
                  Stefano Zampolli and
                  George Leventakis and
                  I. Kauppinen and
                  S. Sinisalo and
                  Vasilis Tsoulkas and
                  V. Kassouras and
                  Mathieu Carras and
                  B. Gerard and
                  R. Pinalli and
                  A. Ragnoni and
                  L. Dujourdy and
                  D. Zavali and
                  Mickael Brun and
                  Vasileios Grizis and
                  Apostolos Argyris and
                  Dimitris Syvridis},
  title        = {Detection of Olfactory Traces by Orthogonal Gas Identification Technologies
                  - {DOGGIES}},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {332},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.76},
  doi          = {10.1109/JISIC.2014.76},
  timestamp    = {Tue, 15 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isi/DaniilidisFVDZLKSTKCGPRDZBGAS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/DantasNF14,
  author       = {Yuri Gil Dantas and
                  Vivek Nigam and
                  Iguatemi E. Fonseca},
  title        = {A Selective Defense for Application Layer DDoS Attacks},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {75--82},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.21},
  doi          = {10.1109/JISIC.2014.21},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/DantasNF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/DatcuCLL14,
  author       = {Dragos Datcu and
                  Marina{-}Anca Cidot{\~{a}} and
                  Heide K. Lukosch and
                  Stephan G. Lukosch},
  title        = {On the Usability of Augmented Reality for Information Exchange in
                  Teams from the Security Domain},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {160--167},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.32},
  doi          = {10.1109/JISIC.2014.32},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/DatcuCLL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/EdwardsRR14,
  author       = {Matthew John Edwards and
                  Awais Rashid and
                  Paul Rayson},
  title        = {A Service-Indepenent Model for Linking Online User Profile Information},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {280--283},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.55},
  doi          = {10.1109/JISIC.2014.55},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/EdwardsRR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/GschwandtnerSD14,
  author       = {Michael Gschwandtner and
                  Svorad Stolc and
                  Franz Daubner},
  title        = {Optical Security Document Simulator for Black-Box Testing of {ABC}
                  Systems},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {300--303},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.78},
  doi          = {10.1109/JISIC.2014.78},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/GschwandtnerSD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/GuedesFP14,
  author       = {Ricardo Guedes and
                  Vasco Furtado and
                  Tarcisio H. C. Pequeno},
  title        = {Multiagent Models for Police Resource Allocation and Dispatch},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {288--291},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.57},
  doi          = {10.1109/JISIC.2014.57},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/GuedesFP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/GuriKKE14,
  author       = {Mordechai Guri and
                  Gabi Kedma and
                  Assaf Kachlon and
                  Yuval Elovici},
  title        = {Resilience of Anti-malware Programs to Na{\"{\i}}ve Modifications
                  of Malicious Binaries},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {152--159},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.31},
  doi          = {10.1109/JISIC.2014.31},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/GuriKKE14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/GuriKZE14,
  author       = {Mordechai Guri and
                  Gabi Kedma and
                  Boris Zadov and
                  Yuval Elovici},
  title        = {Trusted Detection of Sensitive Activities on Mobile Phones Using Power
                  Consumption Measurements},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {145--151},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.30},
  doi          = {10.1109/JISIC.2014.30},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/GuriKZE14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/Hammer14,
  author       = {Hugo Lewi Hammer},
  title        = {Detecting Threats of Violence in Online Discussions Using Bigrams
                  of Important Words},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {319},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.64},
  doi          = {10.1109/JISIC.2014.64},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/Hammer14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/HeZBMZXTH14,
  author       = {Saike He and
                  Xiaolong Zheng and
                  Xiuguo Bao and
                  Hongyuan Ma and
                  Daniel Dajun Zeng and
                  Bo Xu and
                  Guanhua Tian and
                  Hongwei Hao},
  title        = {Ranking Online Memes in Emergency Events Based on Transfer Entropy},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {236--239},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.44},
  doi          = {10.1109/JISIC.2014.44},
  timestamp    = {Tue, 25 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/HeZBMZXTH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/HeardRL14,
  author       = {Nick Heard and
                  Patrick Rubin{-}Delanchy and
                  Daniel J. Lawson},
  title        = {Filtering Automated Polling Traffic in Computer Network Flow Data},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {268--271},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.52},
  doi          = {10.1109/JISIC.2014.52},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isi/HeardRL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/JohanssonKS14,
  author       = {Fredrik Johansson and
                  Lisa Kaati and
                  Amendra Shrestha},
  title        = {Time Profiles for Identifying Users in Online Environments},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {83--90},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.22},
  doi          = {10.1109/JISIC.2014.22},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/JohanssonKS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/JurekBM14,
  author       = {Anna Jurek and
                  Yaxin Bi and
                  Maurice D. Mulvenna},
  title        = {Twitter Sentiment Analysis for Security-Related Information Gathering},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {48--55},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.17},
  doi          = {10.1109/JISIC.2014.17},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/JurekBM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/KodagodaANZXWWPBMB14,
  author       = {Neesha Kodagoda and
                  Simon Attfield and
                  Phong Hai Nguyen and
                  Leishi Zhang and
                  Kai Xu and
                  B. L. William Wong and
                  Adrian Wagstaff and
                  Graham Phillips and
                  James Bullock and
                  John Marshall and
                  Stewart Bertram},
  title        = {POLAR-An Interactive Patterns of Life Visualisation Tool for Intelligence
                  Analysis},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {327},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.72},
  doi          = {10.1109/JISIC.2014.72},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isi/KodagodaANZXWWPBMB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/KongMZW14,
  author       = {Qingchao Kong and
                  Wenji Mao and
                  Daniel Dajun Zeng and
                  Lei Wang},
  title        = {Predicting Popularity of Forum Threads for Public Events Security},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {99--106},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.24},
  doi          = {10.1109/JISIC.2014.24},
  timestamp    = {Wed, 17 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isi/KongMZW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/KootVHKVB14,
  author       = {Gijs Koot and
                  Mirjam A. A. Huis in 't Veld and
                  Joost Hendricksen and
                  Rianne Kaptein and
                  Arnout de Vries and
                  Egon L. van den Broek},
  title        = {Foraging Online Social Networks},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {312--315},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.62},
  doi          = {10.1109/JISIC.2014.62},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/KootVHKVB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/LathropO14,
  author       = {Joel Lathrop and
                  James B. O'Kane},
  title        = {A Case Study in Opportunity Reduction: Mitigating the Dirt Jumper
                  Drive-Smart Attack},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {224--227},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.41},
  doi          = {10.1109/JISIC.2014.41},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/LathropO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/LawsonRHA14,
  author       = {Daniel J. Lawson and
                  Patrick Rubin{-}Delanchy and
                  Nicholas A. Heard and
                  Niall M. Adams},
  title        = {Statistical Frameworks for Detecting Tunnelling in Cyber Defence Using
                  Big Data},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {248--251},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.47},
  doi          = {10.1109/JISIC.2014.47},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isi/LawsonRHA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/LiC14,
  author       = {Weifeng Li and
                  Hsinchun Chen},
  title        = {Identifying Top Sellers In Underground Economy Using Deep Learning-Based
                  Sentiment Analysis},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {64--67},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.19},
  doi          = {10.1109/JISIC.2014.19},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/LiC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/LiaoL14,
  author       = {Yi{-}Ching Liao and
                  Hanno Langweg},
  title        = {Resource-Based Event Reconstruction of Digital Crime Scenes},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {129--136},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.28},
  doi          = {10.1109/JISIC.2014.28},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/LiaoL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/LuoCZZ14,
  author       = {Chuan Luo and
                  Kainan Cui and
                  Xiaolong Zheng and
                  Daniel Dajun Zeng},
  title        = {Time Critical Disinformation Influence Minimization in Online Social
                  Networks},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {68--74},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.20},
  doi          = {10.1109/JISIC.2014.20},
  timestamp    = {Thu, 21 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isi/LuoCZZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/LuoZZ14,
  author       = {Chuan Luo and
                  Xiaolong Zheng and
                  Daniel Dajun Zeng},
  title        = {Causal Inference in Social Media Using Convergent Cross Mapping},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {260--263},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.50},
  doi          = {10.1109/JISIC.2014.50},
  timestamp    = {Thu, 21 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isi/LuoZZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/MemonW14,
  author       = {Bisharat Rasool Memon and
                  Uffe Kock Wiil},
  title        = {Predicting Links in Multi-relational Networks},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {107--114},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.25},
  doi          = {10.1109/JISIC.2014.25},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isi/MemonW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/MetelliH14,
  author       = {Silvia Metelli and
                  Nicholas A. Heard},
  title        = {Modelling New Edge Formation in a Computer Network through Bayesian
                  Variable Selection},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {272--275},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.53},
  doi          = {10.1109/JISIC.2014.53},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/MetelliH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/MolchoMMA14,
  author       = {Gila Molcho and
                  Sebastian Maier and
                  Felipe Melero and
                  Carlo Aliprandi},
  title        = {{CAPER:} Collaborative Information, Acquisition, Processing, Exploitation
                  and Reporting for the Prevention of Organised Crime},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {316},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.63},
  doi          = {10.1109/JISIC.2014.63},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/MolchoMMA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/MusgroveCC14,
  author       = {Jesse Musgrove and
                  Bojan Cukic and
                  Vittorio Cortellessa},
  title        = {On the Adequacy of Performance Models in an Adaptive Border Inspection
                  Management System},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {200--207},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.37},
  doi          = {10.1109/JISIC.2014.37},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/MusgroveCC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/NissimCMSEBE14,
  author       = {Nir Nissim and
                  Aviad Cohen and
                  Robert Moskovitch and
                  Asaf Shabtai and
                  Mattan Edry and
                  Oren Bar{-}Ad and
                  Yuval Elovici},
  title        = {{ALPD:} Active Learning Framework for Enhancing the Detection of Malicious
                  {PDF} Files},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {91--98},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.23},
  doi          = {10.1109/JISIC.2014.23},
  timestamp    = {Fri, 26 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isi/NissimCMSEBE14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/NordvikLL14,
  author       = {Rune Nordvik and
                  Yi{-}Ching Liao and
                  Hanno Langweg},
  title        = {AccountabilityFS: {A} File System Monitor for Forensic Readiness},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {308--311},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.61},
  doi          = {10.1109/JISIC.2014.61},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/NordvikLL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/Oey14,
  author       = {Herman{-}Dick Giok Tjiang Oey},
  title        = {Military Geospatial Profiling Analysis},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {329--330},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.74},
  doi          = {10.1109/JISIC.2014.74},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/Oey14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/PattonGCFWC14,
  author       = {Mark W. Patton and
                  Eric Gross and
                  Ryan Chinn and
                  Samantha Forbis and
                  Leon Walker and
                  Hsinchun Chen},
  title        = {Uninvited Connections: {A} Study of Vulnerable Devices on the Internet
                  of Things (IoT)},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {232--235},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.43},
  doi          = {10.1109/JISIC.2014.43},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/PattonGCFWC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/PicMHW14,
  author       = {Marc Michel Pic and
                  Clarisse Mandridake and
                  Mathieu Hoarau and
                  Kevin Win{-}Lime},
  title        = {{DOCSCOPE:} {ID} Printing Techniques Signatures},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {334},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.77},
  doi          = {10.1109/JISIC.2014.77},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/PicMHW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/PiniPVBLS14,
  author       = {Marco Pini and
                  Luca Pilosu and
                  Lene Vesterlund and
                  David Blanco and
                  Fredrik Lindstr{\"{o}}m and
                  Emiliano Spaltro},
  title        = {Robust Navigation and Communication in the Maritime Domain: The {TRITON}
                  Project},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {331},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.75},
  doi          = {10.1109/JISIC.2014.75},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/PiniPVBLS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/Pirinen14,
  author       = {Rauno Pirinen},
  title        = {Studies of Integration Readiness Levels: Case Shared Maritime Situational
                  Awareness System},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {212--215},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.79},
  doi          = {10.1109/JISIC.2014.79},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/Pirinen14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/PohlWPAW14,
  author       = {Margit Pohl and
                  Lisa{-}Christina Winter and
                  Chris Pallaris and
                  Simon Attfield and
                  B. L. William Wong},
  title        = {Sensemaking and Cognitive Bias Mitigation in Visual Analytics},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {323},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.68},
  doi          = {10.1109/JISIC.2014.68},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/PohlWPAW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/PonzoniZCCS14,
  author       = {Andrea Ponzoni and
                  Dario Zappa and
                  Cristina Cerqui and
                  Elisabetta Comini and
                  Giorgio Sberveglieri},
  title        = {Metal Oxide Gas Sensors Technologies for Hidden People Detection},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {324},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.69},
  doi          = {10.1109/JISIC.2014.69},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/PonzoniZCCS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/PrueJSP14,
  author       = {Brian Prue and
                  Michael Jenkins and
                  Lauren D. Stern and
                  Jonathan D. Pfautz},
  title        = {Overcoming Limited Collaboration Channels in Distributed Intelligence
                  Analysis: Visualization Tools and Design Seeds},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {17--24},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.13},
  doi          = {10.1109/JISIC.2014.13},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/PrueJSP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/Rajamaki14,
  author       = {Jyri Rajam{\"{a}}ki},
  title        = {Challenges to a Smooth-Running Data Security Audits. Case: {A} Finnish
                  National Security Auditing Criteria {KATAKRI}},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {240--243},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.45},
  doi          = {10.1109/JISIC.2014.45},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/Rajamaki14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/Rubin-DelanchyLTHA14,
  author       = {Patrick Rubin{-}Delanchy and
                  Daniel J. Lawson and
                  Melissa J. Turcotte and
                  Nicholas A. Heard and
                  Niall M. Adams},
  title        = {Three Statistical Approaches to Sessionizing Network Flow Data},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {244--247},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.46},
  doi          = {10.1109/JISIC.2014.46},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isi/Rubin-DelanchyLTHA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/SepetnitskyGE14,
  author       = {Vitali Sepetnitsky and
                  Mordechai Guri and
                  Yuval Elovici},
  title        = {Exfiltration of Information from Air-Gapped Machines Using Monitor's
                  {LED} Indicator},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {264--267},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.51},
  doi          = {10.1109/JISIC.2014.51},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isi/SepetnitskyGE14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/ShahirGNW14,
  author       = {Hamed Yaghoubi Shahir and
                  Uwe Gl{\"{a}}sser and
                  Narek Nalbandyan and
                  Hans Wehn},
  title        = {Maritime Situation Analysis: {A} Multi-vessel Interaction and Anomaly
                  Detection Framework},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {192--199},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.36},
  doi          = {10.1109/JISIC.2014.36},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/ShahirGNW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/SikosDHF14,
  author       = {Jennifer Sikos and
                  Peter David and
                  Nizar Habash and
                  Reem Faraj},
  title        = {Authorship Analysis of Inspire Magazine through Stylometric and Psychological
                  Features},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {33--40},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.15},
  doi          = {10.1109/JISIC.2014.15},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/SikosDHF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/SilvaSAG14,
  author       = {Carlo Marcelo Revoredo da Silva and
                  Jose Lutiano Costa da Silva and
                  Rodrigo Elia Assad and
                  Ruy Jose Guerra Barretto Garcia},
  title        = {Aegis: {A} Lightweight Tool for Prevent Frauds in Web Browsers},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.11},
  doi          = {10.1109/JISIC.2014.11},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/SilvaSAG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/SpittersEWB14,
  author       = {Martijn Spitters and
                  Pieter T. Eendebak and
                  Dani{\"{e}}l T. H. Worm and
                  Henri Bouma},
  title        = {Threat Detection in Tweets with Trigger Patterns and Contextual Cues},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {216--219},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.39},
  doi          = {10.1109/JISIC.2014.39},
  timestamp    = {Mon, 21 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isi/SpittersEWB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/SpittersVS14,
  author       = {Martijn Spitters and
                  Stefan Verbruggen and
                  Mark van Staalduinen},
  title        = {Towards a Comprehensive Insight into the Thematic Organization of
                  the Tor Hidden Services},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {220--223},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.40},
  doi          = {10.1109/JISIC.2014.40},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/SpittersVS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/Sureka014,
  author       = {Ashish Sureka and
                  Swati Agarwal},
  title        = {Learning to Classify Hate and Extremism Promoting Tweets},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {320},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.65},
  doi          = {10.1109/JISIC.2014.65},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/Sureka014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/TyshchukWLJK14,
  author       = {Yulia Tyshchuk and
                  William A. Wallace and
                  Hao Li and
                  Heng Ji and
                  Sue E. Kase},
  title        = {The Nature of Communications and Emerging Communities on Twitter Following
                  the 2013 Syria Sarin Gas Attacks},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {41--47},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.16},
  doi          = {10.1109/JISIC.2014.16},
  timestamp    = {Mon, 06 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/TyshchukWLJK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/WeissenfeldKS14,
  author       = {Axel Weissenfeld and
                  Andreas Kriechbaum{-}Zabini and
                  Lukasz Szklarski},
  title        = {Security Components in a One-Stop-Shop Border Control System},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {228--231},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.42},
  doi          = {10.1109/JISIC.2014.42},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/WeissenfeldKS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/WestlingBG14,
  author       = {Anders Westling and
                  Joel Brynielsson and
                  Tove Gustavi},
  title        = {Mining the Web for Sympathy: The Pussy Riot Case},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {123--128},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.27},
  doi          = {10.1109/JISIC.2014.27},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/WestlingBG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/Wong14,
  author       = {B. L. William Wong},
  title        = {How Analysts Think (?): Early Observations},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {296--299},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.59},
  doi          = {10.1109/JISIC.2014.59},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/Wong14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/YangMB14,
  author       = {Yongpeng Yang and
                  Monisha Manoharan and
                  K. Suzanne Barber},
  title        = {Modelling and Analysis of Identity Threat Behaviors through Text Mining
                  of Identity Theft Stories},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {184--191},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.35},
  doi          = {10.1109/JISIC.2014.35},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/YangMB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/YanoBGA14,
  author       = {Edgar Toshiro Yano and
                  Parth Bhatt and
                  Per M. Gustavsson and
                  Rose{-}Mharie {\AA}hlfeldt},
  title        = {Towards a Methodology for Cybersecurity Risk Management Using Agents
                  Paradigm},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {325},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.70},
  doi          = {10.1109/JISIC.2014.70},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/YanoBGA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/YlikauppilaTKJ14,
  author       = {Mari Ylikauppila and
                  Sirra Toivonen and
                  Minna Kulju and
                  Minna Jokela},
  title        = {Understanding the Factors Affecting {UX} and Technology Acceptance
                  in the Context of Automated Border Controls},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {168--175},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.33},
  doi          = {10.1109/JISIC.2014.33},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/YlikauppilaTKJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/ZhangMZZB14,
  author       = {Yuhao Zhang and
                  Wenji Mao and
                  Daniel Dajun Zeng and
                  Ning Zhao and
                  Xiuguo Bao},
  title        = {Exploring Opinion Dynamics in Security-Related Microblog Data},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {284--287},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.56},
  doi          = {10.1109/JISIC.2014.56},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/ZhangMZZB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isi/2014,
  title        = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/6968676/proceeding},
  isbn         = {978-1-4799-6363-8},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics