Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/eisic/eisic2011.bht:"
@inproceedings{DBLP:conf/eisic/AgrawalGJ11, author = {P. K. Agrawal and Brij B. Gupta and Satbir Jain}, title = {{SVM} Based Scheme for Predicting Number of Zombies in a DDoS Attack}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {178--182}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.19}, doi = {10.1109/EISIC.2011.19}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/AgrawalGJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/AlrubanE11, author = {Abdulrahman Alruban and Emlyn Everitt}, title = {Two Novel 802.1x Denial of Service Attacks}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {183--190}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.49}, doi = {10.1109/EISIC.2011.49}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/AlrubanE11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/AnastopoulosKKA11, author = {Vasileios Anastopoulos and Panagiotis Karampelas and Panagiotis Kalagiakos and Reda Alhajj}, title = {A Hybrid Framework for Building a Web-Page Recommender System}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {385--390}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.40}, doi = {10.1109/EISIC.2011.40}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/AnastopoulosKKA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/ArgioluB11, author = {Massimiliano Argiolu and Fabio Bisogni}, title = {Video Analytics: Opportunity or Spoof Story? The State of the Art of Intelligent Video Surveillance}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {294}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.46}, doi = {10.1109/EISIC.2011.46}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/ArgioluB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Barbian11, author = {Guido Barbian}, title = {Detecting Hidden Friendship in Online Social Network}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {269--272}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.14}, doi = {10.1109/EISIC.2011.14}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/Barbian11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Barbian11a, author = {Guido Barbian}, title = {Trust Centrality in Online Social Networks}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {372--377}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.17}, doi = {10.1109/EISIC.2011.17}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/Barbian11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Best11, author = {Clive Best}, title = {Challenges in Open Source Intelligence}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {58--62}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.41}, doi = {10.1109/EISIC.2011.41}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/Best11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/BestH11, author = {Clive Best and David Horby}, title = {{IQ} - {A} Web Mining Tool}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {382--384}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.42}, doi = {10.1109/EISIC.2011.42}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/BestH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/BourassaFS11, author = {M. A. J. Bourassa and J. Fug{\`{e}}re and David B. Skillicorn}, title = {Interestingness - Directing Analyst Focus to Significant Data}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {300--307}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.53}, doi = {10.1109/EISIC.2011.53}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/BourassaFS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Bowman-Grieve11, author = {Lorraine Bowman{-}Grieve}, title = {A Psychological Perspective on Virtual Communities Supporting Terrorist and Extremist Ideologies as a Tool for Recruitment}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {244--247}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.11}, doi = {10.1109/EISIC.2011.11}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/Bowman-Grieve11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Brantingham11, author = {Patricia L. Brantingham}, title = {Computational Criminology}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {3}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.79}, doi = {10.1109/EISIC.2011.79}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/Brantingham11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/BrantinghamGB11, author = {Paul J. Brantingham and Amir H. Ghaseminejad and Patricia L. Brantingham}, title = {The Distribution of Event Complexity in the British Columbia Court System: An Analysis Based on the CourBC Analytical System}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {94--99}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.51}, doi = {10.1109/EISIC.2011.51}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/BrantinghamGB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Chen11, author = {Hsinchun Chen}, title = {Dark Web: Exploring and Mining the Dark Side of the Web}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {1--2}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.78}, doi = {10.1109/EISIC.2011.78}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/Chen11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/ColbaughG11, author = {Richard Colbaugh and Kristin Glass}, title = {Agile Sentiment Analysis of Social Media Content for Security Informatics Applications}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {327--331}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.65}, doi = {10.1109/EISIC.2011.65}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/ColbaughG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/DahlinS11, author = {Johan Dahlin and Pontus Svenson}, title = {A Method for Community Detection in Uncertain Networks}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {155--162}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.58}, doi = {10.1109/EISIC.2011.58}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/DahlinS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Danowski11, author = {James A. Danowski}, title = {Changes in Muslim Nations' Centrality Mined from Open-Source World Jihad News: {A} Comparison of Networks in Late 2010, Early 2011, and Post-Bin Laden}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {314--321}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.69}, doi = {10.1109/EISIC.2011.69}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/Danowski11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/DanowskiP11, author = {James A. Danowski and Han Woo Park}, title = {Web Network and Content Changes Associated with the 2011 Muslim Middle-East and North African Early Uprisings: {A} Naturalistic Field Experiment}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {100--107}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.67}, doi = {10.1109/EISIC.2011.67}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/DanowskiP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/DesmaraisC11, author = {Bruce A. Desmarais and Skyler J. Cranmer}, title = {Forecasting the Locational Dynamics of Transnational Terrorism: {A} Network Analytic Approach}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {171--177}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.44}, doi = {10.1109/EISIC.2011.44}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/DesmaraisC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Diaz11, author = {Alejandro Fern{\'{a}}ndez{-}Cernuda Diaz}, title = {Technology vs. Infoxication - The Challenges of Obtaining Intelligence from the Buzz}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {391}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.74}, doi = {10.1109/EISIC.2011.74}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/Diaz11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/DickersonMS11, author = {John P. Dickerson and Aaron Mannes and V. S. Subrahmanian}, title = {Dealing with Lashkar-e-Taiba: {A} Multi-player Game-Theoretic Perspective}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {354--359}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.33}, doi = {10.1109/EISIC.2011.33}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/DickersonMS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/DoulaverakisKKKS11, author = {Charalampos Doulaverakis and Nikolaos Konstantinou and Thomas Knape and Ioannis Kompatsiaris and John Soldatos}, title = {An Approach to Intelligent Information Fusion in Sensor Saturated Urban Environments}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {108--115}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.24}, doi = {10.1109/EISIC.2011.24}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/DoulaverakisKKKS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/EachusS11, author = {Peter Eachus and Ben Short}, title = {Decision Support System for Intelligence Analysts}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {291}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.20}, doi = {10.1109/EISIC.2011.20}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/EachusS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Elvy11, author = {Dale Elvy}, title = {Terrorism, Threat and Time: The Mediating Effect of Terrorist Threat on Public Willingness to Forego Civil Liberties}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {52--57}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.35}, doi = {10.1109/EISIC.2011.35}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/Elvy11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/FarahbodAGG11, author = {Roozbeh Farahbod and Vladimir Avram and Uwe Gl{\"{a}}sser and Adel Guitouni}, title = {Engineering Situation Analysis Decision Support Systems}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {10--18}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.64}, doi = {10.1109/EISIC.2011.64}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/FarahbodAGG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/ForsgrenHST11, author = {Robert Forsgren and Andreas Horndahl and Pontus Svenson and Edward Tj{\"{o}}rnhammar}, title = {Information Fusion for Port Security Decision Support}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {292}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.59}, doi = {10.1109/EISIC.2011.59}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/ForsgrenHST11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/FrankACB11, author = {Richard Frank and Martin A. Andresen and Connie Cheng and Patricia L. Brantingham}, title = {Finding Criminal Attractors Based on Offenders' Directionality of Crimes}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {86--93}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.34}, doi = {10.1109/EISIC.2011.34}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/FrankACB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/GlassC11, author = {Kristin Glass and Richard Colbaugh}, title = {Web Analytics for Security Informatics}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {214--219}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.66}, doi = {10.1109/EISIC.2011.66}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/GlassC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Goujon11, author = {B{\'{e}}n{\'{e}}dicte Goujon}, title = {Text Mining for Opinion Target Detection}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {322--326}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.45}, doi = {10.1109/EISIC.2011.45}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/Goujon11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/HoogstrateK11, author = {Andre J. Hoogstrate and Chris A. J. Klaassen}, title = {Minimizing the Average Number of Inspections for Detecting Rare Items in Finite Populations}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {203--208}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.22}, doi = {10.1109/EISIC.2011.22}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/HoogstrateK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Howard11, author = {Newton Howard}, title = {Global Defense Policy System of Laws: Graph Theory Approach to Balance of Power Theory}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {248--258}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.73}, doi = {10.1109/EISIC.2011.73}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/Howard11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/HuangL11, author = {Yin{-}Fu Huang and Po{-}Lun Liou}, title = {Retrieving Representative Structures from {XML} Documents Using Clustering Techniques}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {332--339}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.16}, doi = {10.1109/EISIC.2011.16}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/HuangL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/IwanskiFDRB11, author = {Natalia Iwanski and Richard Frank and Vahid Dabbaghian and Andrew A. Reid and Patricia L. Brantingham}, title = {Analyzing an Offender's Journey to Crime: {A} Criminal Movement Model (CriMM)}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {70--77}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.13}, doi = {10.1109/EISIC.2011.13}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/IwanskiFDRB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/JoffresBFW11, author = {Kila Joffres and Martin Bouchard and Richard Frank and Bryce Westlake}, title = {Strategies to Disrupt Online Child Pornography Networks}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {163--170}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.32}, doi = {10.1109/EISIC.2011.32}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/JoffresBFW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/JohanssonBHMMTR11, author = {Fredrik Johansson and Joel Brynielsson and Pontus H{\"{o}}rling and Michael Malm and Christian M{\aa}rtenson and Staffan Truv{\'{e}} and Magnus Rosell}, title = {Detecting Emergent Conflicts through Web Mining and Visualization}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {346--353}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.21}, doi = {10.1109/EISIC.2011.21}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/JohanssonBHMMTR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/JohnsonMK11, author = {James R. (Bob) Johnson and Anita Miller and Latifur Khan}, title = {Law Enforcement Ontology for Identification of Related Information of Interest Across Free Text Dcouments}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {19--27}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.36}, doi = {10.1109/EISIC.2011.36}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/JohnsonMK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/KaatiS11, author = {Lisa Kaati and Pontus Svenson}, title = {Analysis of Competing Hypothesis for Investigating Lone Wolf Terrorist}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {295--299}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.60}, doi = {10.1109/EISIC.2011.60}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/KaatiS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/KasaeiK11, author = {Seyed Hamidreza Mohades Kasaei and Seyed Mohammadreza Mohades Kasaei}, title = {Extraction and Recognition of the Vehicle License Plate for Passing under Outside Environment}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {234--237}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.50}, doi = {10.1109/EISIC.2011.50}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/KasaeiK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/KiesebergSMHW11, author = {Peter Kieseberg and Sebastian Schrittwieser and Martin Mulazzani and Markus Huber and Edgar R. Weippl}, title = {Trees Cannot Lie: Using Data Structures for Forensics Purposes}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {282--285}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.18}, doi = {10.1109/EISIC.2011.18}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/KiesebergSMHW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/LiLT11, author = {Xufang Li and Peter K. K. Loh and Freddy Tan}, title = {Mechanisms of Polymorphic and Metamorphic Viruses}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {149--154}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.77}, doi = {10.1109/EISIC.2011.77}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/LiLT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/MannesSSS11, author = {Aaron Mannes and J. Shakarian and Amy Sliva and V. S. Subrahmanian}, title = {A Computationally-Enabled Analysis of Lashkar-e-Taiba Attacks in Jammu and Kashmir}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {224--229}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.61}, doi = {10.1109/EISIC.2011.61}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/MannesSSS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/MartinK11, author = {Nicolas Martin and Khaled Khelif}, title = {Focused Crawling Using Name Disambiguation on Search Engine Results}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {340--345}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.31}, doi = {10.1109/EISIC.2011.31}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/MartinK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Matz11, author = {Soren Matz}, title = {Public-Private Resilience: State vs. Private Conceptions of Security Risk Management in Danish Cyber-based Critical Infrastructures}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {135--141}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.52}, doi = {10.1109/EISIC.2011.52}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/Matz11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/MeskoB11, author = {Gorazd Mesko and Igor Bernik}, title = {Cybercrime: Awareness and Fear: Slovenian Perspectives}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {28--33}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.12}, doi = {10.1109/EISIC.2011.12}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/MeskoB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/MishraGJ11, author = {Anupama Mishra and Brij B. Gupta and Ramesh Chandra Joshi}, title = {A Comparative Study of Distributed Denial of Service Attacks, Intrusion Tolerance and Mitigation Techniques}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {286--289}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.15}, doi = {10.1109/EISIC.2011.15}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/MishraGJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/MontesinoF11, author = {Raydel Montesino and Stefan Fenz}, title = {Automation Possibilities in Information Security Management}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {259--262}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.39}, doi = {10.1109/EISIC.2011.39}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/MontesinoF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/MorrisAKD11, author = {James F. Morris and Keith Anthony and Kevin T. Kennedy and Richard F. Deckro}, title = {Extraction Distractions: {A} Comparison of Social Network Model Construction Methods}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {273--276}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.63}, doi = {10.1109/EISIC.2011.63}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/MorrisAKD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/MouhtaropoulosGL11, author = {Antonis Mouhtaropoulos and Marthie Grobler and Chang{-}Tsun Li}, title = {Digital Forensic Readiness: An Insight into Governmental and Academic Initiatives}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {191--196}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.30}, doi = {10.1109/EISIC.2011.30}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/MouhtaropoulosGL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/MouradOA11, author = {Azzam Mourad and Hadi Otrok and Sara Ayoubi}, title = {Toward Systematic Integration of Security Policies into Web Services}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {220--223}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.48}, doi = {10.1109/EISIC.2011.48}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/MouradOA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/NizamaniM11, author = {Sarwat Nizamani and Nasrullah Memon}, title = {Evolution of Terrorist Network Using Clustered Approach: {A} Case Study}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {116--122}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.10}, doi = {10.1109/EISIC.2011.10}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/NizamaniM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/OnnerudWO11, author = {Hans {\"{O}}nnerud and Sara Wallin and Henric {\"{O}}stmark}, title = {Localisation of Threat Substances in Urban Society - {LOTUS:} Tomorrow's System for Finding Illicit Manufacturing of Drugs and Home Made Explosives}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {238--243}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.25}, doi = {10.1109/EISIC.2011.25}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/OnnerudWO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/ParkHSCBS11, author = {Andrew J. Park and Eunju Hwang and Valerie Spicer and Connie Cheng and Patricia L. Brantingham and Andrew Sixsmith}, title = {Testing Elderly People's Fear of Crime Using a Virtual Environment}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {63--69}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.68}, doi = {10.1109/EISIC.2011.68}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/ParkHSCBS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Parry11, author = {Joe Parry}, title = {Visualisation for Decision-Makers}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {8}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.88}, doi = {10.1109/EISIC.2011.88}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/Parry11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/PetersenRW11, author = {Rasmus Rosenqvist Petersen and Christopher J. Rhodes and Uffe Kock Wiil}, title = {Node Removal in Criminal Networks}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {360--365}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.57}, doi = {10.1109/EISIC.2011.57}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/PetersenRW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/PetersenW11, author = {Rasmus Rosenqvist Petersen and Uffe Kock Wiil}, title = {CrimeFighter Investigator: {A} Novel Tool for Criminal Network Investigation}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {197--202}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.55}, doi = {10.1109/EISIC.2011.55}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/PetersenW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/PiskorskiBA11, author = {Jakub Piskorski and Jenya Belayeva and Martin Atkinson}, title = {On Refining Real-Time Multilingual News Event Extraction through Deployment of Cross-Lingual Information Fusion Techniques}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {38--45}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.72}, doi = {10.1109/EISIC.2011.72}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/PiskorskiBA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/PlevnikP11, author = {Mihael Plevnik and Iztok Podbregar}, title = {The Need to Introduce a New Tactical Telecommunication System in the Slovenian Army}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {230--233}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.9}, doi = {10.1109/EISIC.2011.9}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/PlevnikP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Poulatova11, author = {Chaditsa Poulatova}, title = {The Media: {A} Terrorist Tool or a Silent Ally?}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {293}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.47}, doi = {10.1109/EISIC.2011.47}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/Poulatova11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/QureshiM11, author = {Pir Abdul Rasool Qureshi and Nasrullah Memon}, title = {Statistical Model for Content Extraction}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {129--134}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.75}, doi = {10.1109/EISIC.2011.75}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/QureshiM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/QureshiMWKS11, author = {Pir Abdul Rasool Qureshi and Nasrullah Memon and Uffe Kock Wiil and Panagiotis Karampelas and Jose Ignacio Nieto Sancheze}, title = {Harvesting Information from Heterogeneous Sources}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {123--128}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.76}, doi = {10.1109/EISIC.2011.76}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/QureshiMWKS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Redford11, author = {Mike Redford}, title = {{U.S.} and {EU} Legislation on Cybercrime}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {34--37}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.38}, doi = {10.1109/EISIC.2011.38}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/Redford11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Sakharova11, author = {Irina Sakharova}, title = {Analysis of the Financial Crisis of 2007-2009 and Its Impact on Terrorism}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {290}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.62}, doi = {10.1109/EISIC.2011.62}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/Sakharova11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Sensidoni11, author = {Gianluca Sensidoni}, title = {Who, What, When, Where and How: Semantics Semantics Help Connect the Dots}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {9}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.89}, doi = {10.1109/EISIC.2011.89}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/Sensidoni11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/ShahO11, author = {Mahmood Hussain Shah and Romanus Izuchukwu Okeke}, title = {A Framework for Internal Identity Theft Prevention in Retail Industry}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {366--371}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.29}, doi = {10.1109/EISIC.2011.29}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/ShahO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/SpakL11, author = {Ulrik Spak and Mats Lind}, title = {Change Blindness in Intelligence: Effects of Attention Guidance by Instructions}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {142--148}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.23}, doi = {10.1109/EISIC.2011.23}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/SpakL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/SunGLL11, author = {Duo{-}Yong Sun and Shu{-}Quan Guo and Xiao{-}Peng Liu and Jiang Li}, title = {Multi-relational Network Analysis for Covert Organizations}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {263--268}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.28}, doi = {10.1109/EISIC.2011.28}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/SunGLL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/TemurhanMCOCL11, author = {M. Temurhan and Ronald Meijer and Sunil Choenni and M. van Ooyen{-}Houben and G. Cruts and Margriet van Laar}, title = {Capture-Recapture Method for Estimating the Number of Problem Drug Users: The Case of the Netherlands}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {46--51}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.26}, doi = {10.1109/EISIC.2011.26}, timestamp = {Wed, 10 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/TemurhanMCOCL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Thuraisingham11, author = {Bhavani Thuraisingham}, title = {Data Mining for Malicious Code Detection and Security Applications}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {4--5}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.80}, doi = {10.1109/EISIC.2011.80}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/Thuraisingham11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/TikvesBTGDSCWRA11, author = {Sukru Tikves and Sujogya Banerjee and Hamy Temkit and Sedat Gokalp and Hasan Davulcu and Arunabha Sen and Steven R. Corman and Mark Woodward and Inayah Rohmaniyah and Ali Amin}, title = {A System for Ranking Organizations Using Social Scale Analysis}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {308--313}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.37}, doi = {10.1109/EISIC.2011.37}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/TikvesBTGDSCWRA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Torok11, author = {Robyn Torok}, title = {The Online Institution: Psychiatric Power as an Explanatory Model for the Normalisation of Radicalisation and Terrorism}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {78--85}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.43}, doi = {10.1109/EISIC.2011.43}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/Torok11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/UstunbasO11, author = {Yonca Ustunbas and Sule G{\"{u}}nd{\"{u}}z {\"{O}}g{\"{u}}d{\"{u}}c{\"{u}}}, title = {A Recommendation Model for Social Resource Sharing Systems Based on Tripartite Graph Clustering}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {378--381}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.56}, doi = {10.1109/EISIC.2011.56}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/UstunbasO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/VybornovaSSKTCKO11, author = {Olga Vybornova and Ivan V. Smirnov and Ilya Sochenkov and Alexander Kiselyov and Ilya Tikhomirov and Natalya V. Chudova and Yulia Kuznetsova and Gennady S. Osipov}, title = {Social Tension Detection and Intention Recognition Using Natural Language Semantic Analysis: On the Material of Russian-Speaking Social Networks and Web Forums}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {277--281}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.27}, doi = {10.1109/EISIC.2011.27}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/VybornovaSSKTCKO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Wagner11, author = {Gerhard Wagner}, title = {Desktop Text Mining for Open Source Intelligence}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {6}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.86}, doi = {10.1109/EISIC.2011.86}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/Wagner11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Wehinger11, author = {Frank Wehinger}, title = {The Dark Net: Self-Regulation Dynamics of Illegal Online Markets for Identities and Related Services}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {209--213}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.54}, doi = {10.1109/EISIC.2011.54}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/Wehinger11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Yangarber11, author = {Roman Yangarber}, title = {Discovering Complex Networks of Events and Relations in News Surveillance}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {7}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.87}, doi = {10.1109/EISIC.2011.87}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/Yangarber11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eisic/2011, title = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://ieeexplore.ieee.org/xpl/conhome/6059524/proceeding}, isbn = {978-1-4577-1464-1}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.