Search dblp for Publications

export results for "toc:db/conf/eisic/eisic2011.bht:"

 download as .bib file

@inproceedings{DBLP:conf/eisic/AgrawalGJ11,
  author       = {P. K. Agrawal and
                  Brij B. Gupta and
                  Satbir Jain},
  title        = {{SVM} Based Scheme for Predicting Number of Zombies in a DDoS Attack},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {178--182},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.19},
  doi          = {10.1109/EISIC.2011.19},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/AgrawalGJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/AlrubanE11,
  author       = {Abdulrahman Alruban and
                  Emlyn Everitt},
  title        = {Two Novel 802.1x Denial of Service Attacks},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {183--190},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.49},
  doi          = {10.1109/EISIC.2011.49},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/AlrubanE11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/AnastopoulosKKA11,
  author       = {Vasileios Anastopoulos and
                  Panagiotis Karampelas and
                  Panagiotis Kalagiakos and
                  Reda Alhajj},
  title        = {A Hybrid Framework for Building a Web-Page Recommender System},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {385--390},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.40},
  doi          = {10.1109/EISIC.2011.40},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/AnastopoulosKKA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/ArgioluB11,
  author       = {Massimiliano Argiolu and
                  Fabio Bisogni},
  title        = {Video Analytics: Opportunity or Spoof Story? The State of the Art
                  of Intelligent Video Surveillance},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {294},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.46},
  doi          = {10.1109/EISIC.2011.46},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/ArgioluB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Barbian11,
  author       = {Guido Barbian},
  title        = {Detecting Hidden Friendship in Online Social Network},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {269--272},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.14},
  doi          = {10.1109/EISIC.2011.14},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/Barbian11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Barbian11a,
  author       = {Guido Barbian},
  title        = {Trust Centrality in Online Social Networks},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {372--377},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.17},
  doi          = {10.1109/EISIC.2011.17},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/Barbian11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Best11,
  author       = {Clive Best},
  title        = {Challenges in Open Source Intelligence},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {58--62},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.41},
  doi          = {10.1109/EISIC.2011.41},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/Best11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/BestH11,
  author       = {Clive Best and
                  David Horby},
  title        = {{IQ} - {A} Web Mining Tool},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {382--384},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.42},
  doi          = {10.1109/EISIC.2011.42},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/BestH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/BourassaFS11,
  author       = {M. A. J. Bourassa and
                  J. Fug{\`{e}}re and
                  David B. Skillicorn},
  title        = {Interestingness - Directing Analyst Focus to Significant Data},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {300--307},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.53},
  doi          = {10.1109/EISIC.2011.53},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/BourassaFS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Bowman-Grieve11,
  author       = {Lorraine Bowman{-}Grieve},
  title        = {A Psychological Perspective on Virtual Communities Supporting Terrorist
                  and Extremist Ideologies as a Tool for Recruitment},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {244--247},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.11},
  doi          = {10.1109/EISIC.2011.11},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/Bowman-Grieve11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Brantingham11,
  author       = {Patricia L. Brantingham},
  title        = {Computational Criminology},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {3},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.79},
  doi          = {10.1109/EISIC.2011.79},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/Brantingham11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/BrantinghamGB11,
  author       = {Paul J. Brantingham and
                  Amir H. Ghaseminejad and
                  Patricia L. Brantingham},
  title        = {The Distribution of Event Complexity in the British Columbia Court
                  System: An Analysis Based on the CourBC Analytical System},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {94--99},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.51},
  doi          = {10.1109/EISIC.2011.51},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/BrantinghamGB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Chen11,
  author       = {Hsinchun Chen},
  title        = {Dark Web: Exploring and Mining the Dark Side of the Web},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {1--2},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.78},
  doi          = {10.1109/EISIC.2011.78},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/Chen11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/ColbaughG11,
  author       = {Richard Colbaugh and
                  Kristin Glass},
  title        = {Agile Sentiment Analysis of Social Media Content for Security Informatics
                  Applications},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {327--331},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.65},
  doi          = {10.1109/EISIC.2011.65},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/ColbaughG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/DahlinS11,
  author       = {Johan Dahlin and
                  Pontus Svenson},
  title        = {A Method for Community Detection in Uncertain Networks},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {155--162},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.58},
  doi          = {10.1109/EISIC.2011.58},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/DahlinS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Danowski11,
  author       = {James A. Danowski},
  title        = {Changes in Muslim Nations' Centrality Mined from Open-Source World
                  Jihad News: {A} Comparison of Networks in Late 2010, Early 2011, and
                  Post-Bin Laden},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {314--321},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.69},
  doi          = {10.1109/EISIC.2011.69},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/Danowski11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/DanowskiP11,
  author       = {James A. Danowski and
                  Han Woo Park},
  title        = {Web Network and Content Changes Associated with the 2011 Muslim Middle-East
                  and North African Early Uprisings: {A} Naturalistic Field Experiment},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {100--107},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.67},
  doi          = {10.1109/EISIC.2011.67},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/DanowskiP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/DesmaraisC11,
  author       = {Bruce A. Desmarais and
                  Skyler J. Cranmer},
  title        = {Forecasting the Locational Dynamics of Transnational Terrorism: {A}
                  Network Analytic Approach},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {171--177},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.44},
  doi          = {10.1109/EISIC.2011.44},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/DesmaraisC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Diaz11,
  author       = {Alejandro Fern{\'{a}}ndez{-}Cernuda Diaz},
  title        = {Technology vs. Infoxication - The Challenges of Obtaining Intelligence
                  from the Buzz},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {391},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.74},
  doi          = {10.1109/EISIC.2011.74},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/Diaz11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/DickersonMS11,
  author       = {John P. Dickerson and
                  Aaron Mannes and
                  V. S. Subrahmanian},
  title        = {Dealing with Lashkar-e-Taiba: {A} Multi-player Game-Theoretic Perspective},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {354--359},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.33},
  doi          = {10.1109/EISIC.2011.33},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/DickersonMS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/DoulaverakisKKKS11,
  author       = {Charalampos Doulaverakis and
                  Nikolaos Konstantinou and
                  Thomas Knape and
                  Ioannis Kompatsiaris and
                  John Soldatos},
  title        = {An Approach to Intelligent Information Fusion in Sensor Saturated
                  Urban Environments},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {108--115},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.24},
  doi          = {10.1109/EISIC.2011.24},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/DoulaverakisKKKS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/EachusS11,
  author       = {Peter Eachus and
                  Ben Short},
  title        = {Decision Support System for Intelligence Analysts},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {291},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.20},
  doi          = {10.1109/EISIC.2011.20},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/EachusS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Elvy11,
  author       = {Dale Elvy},
  title        = {Terrorism, Threat and Time: The Mediating Effect of Terrorist Threat
                  on Public Willingness to Forego Civil Liberties},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {52--57},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.35},
  doi          = {10.1109/EISIC.2011.35},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/Elvy11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/FarahbodAGG11,
  author       = {Roozbeh Farahbod and
                  Vladimir Avram and
                  Uwe Gl{\"{a}}sser and
                  Adel Guitouni},
  title        = {Engineering Situation Analysis Decision Support Systems},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {10--18},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.64},
  doi          = {10.1109/EISIC.2011.64},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/FarahbodAGG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/ForsgrenHST11,
  author       = {Robert Forsgren and
                  Andreas Horndahl and
                  Pontus Svenson and
                  Edward Tj{\"{o}}rnhammar},
  title        = {Information Fusion for Port Security Decision Support},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {292},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.59},
  doi          = {10.1109/EISIC.2011.59},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/ForsgrenHST11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/FrankACB11,
  author       = {Richard Frank and
                  Martin A. Andresen and
                  Connie Cheng and
                  Patricia L. Brantingham},
  title        = {Finding Criminal Attractors Based on Offenders' Directionality of
                  Crimes},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {86--93},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.34},
  doi          = {10.1109/EISIC.2011.34},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/FrankACB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/GlassC11,
  author       = {Kristin Glass and
                  Richard Colbaugh},
  title        = {Web Analytics for Security Informatics},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {214--219},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.66},
  doi          = {10.1109/EISIC.2011.66},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/GlassC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Goujon11,
  author       = {B{\'{e}}n{\'{e}}dicte Goujon},
  title        = {Text Mining for Opinion Target Detection},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {322--326},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.45},
  doi          = {10.1109/EISIC.2011.45},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/Goujon11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/HoogstrateK11,
  author       = {Andre J. Hoogstrate and
                  Chris A. J. Klaassen},
  title        = {Minimizing the Average Number of Inspections for Detecting Rare Items
                  in Finite Populations},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {203--208},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.22},
  doi          = {10.1109/EISIC.2011.22},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/HoogstrateK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Howard11,
  author       = {Newton Howard},
  title        = {Global Defense Policy System of Laws: Graph Theory Approach to Balance
                  of Power Theory},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {248--258},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.73},
  doi          = {10.1109/EISIC.2011.73},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/Howard11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/HuangL11,
  author       = {Yin{-}Fu Huang and
                  Po{-}Lun Liou},
  title        = {Retrieving Representative Structures from {XML} Documents Using Clustering
                  Techniques},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {332--339},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.16},
  doi          = {10.1109/EISIC.2011.16},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/HuangL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/IwanskiFDRB11,
  author       = {Natalia Iwanski and
                  Richard Frank and
                  Vahid Dabbaghian and
                  Andrew A. Reid and
                  Patricia L. Brantingham},
  title        = {Analyzing an Offender's Journey to Crime: {A} Criminal Movement Model
                  (CriMM)},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {70--77},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.13},
  doi          = {10.1109/EISIC.2011.13},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/IwanskiFDRB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/JoffresBFW11,
  author       = {Kila Joffres and
                  Martin Bouchard and
                  Richard Frank and
                  Bryce Westlake},
  title        = {Strategies to Disrupt Online Child Pornography Networks},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {163--170},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.32},
  doi          = {10.1109/EISIC.2011.32},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/JoffresBFW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/JohanssonBHMMTR11,
  author       = {Fredrik Johansson and
                  Joel Brynielsson and
                  Pontus H{\"{o}}rling and
                  Michael Malm and
                  Christian M{\aa}rtenson and
                  Staffan Truv{\'{e}} and
                  Magnus Rosell},
  title        = {Detecting Emergent Conflicts through Web Mining and Visualization},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {346--353},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.21},
  doi          = {10.1109/EISIC.2011.21},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/JohanssonBHMMTR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/JohnsonMK11,
  author       = {James R. (Bob) Johnson and
                  Anita Miller and
                  Latifur Khan},
  title        = {Law Enforcement Ontology for Identification of Related Information
                  of Interest Across Free Text Dcouments},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {19--27},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.36},
  doi          = {10.1109/EISIC.2011.36},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/JohnsonMK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/KaatiS11,
  author       = {Lisa Kaati and
                  Pontus Svenson},
  title        = {Analysis of Competing Hypothesis for Investigating Lone Wolf Terrorist},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {295--299},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.60},
  doi          = {10.1109/EISIC.2011.60},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/KaatiS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/KasaeiK11,
  author       = {Seyed Hamidreza Mohades Kasaei and
                  Seyed Mohammadreza Mohades Kasaei},
  title        = {Extraction and Recognition of the Vehicle License Plate for Passing
                  under Outside Environment},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {234--237},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.50},
  doi          = {10.1109/EISIC.2011.50},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/KasaeiK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/KiesebergSMHW11,
  author       = {Peter Kieseberg and
                  Sebastian Schrittwieser and
                  Martin Mulazzani and
                  Markus Huber and
                  Edgar R. Weippl},
  title        = {Trees Cannot Lie: Using Data Structures for Forensics Purposes},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {282--285},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.18},
  doi          = {10.1109/EISIC.2011.18},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/KiesebergSMHW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/LiLT11,
  author       = {Xufang Li and
                  Peter K. K. Loh and
                  Freddy Tan},
  title        = {Mechanisms of Polymorphic and Metamorphic Viruses},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {149--154},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.77},
  doi          = {10.1109/EISIC.2011.77},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/LiLT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/MannesSSS11,
  author       = {Aaron Mannes and
                  J. Shakarian and
                  Amy Sliva and
                  V. S. Subrahmanian},
  title        = {A Computationally-Enabled Analysis of Lashkar-e-Taiba Attacks in Jammu
                  and Kashmir},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {224--229},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.61},
  doi          = {10.1109/EISIC.2011.61},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/MannesSSS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/MartinK11,
  author       = {Nicolas Martin and
                  Khaled Khelif},
  title        = {Focused Crawling Using Name Disambiguation on Search Engine Results},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {340--345},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.31},
  doi          = {10.1109/EISIC.2011.31},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/MartinK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Matz11,
  author       = {Soren Matz},
  title        = {Public-Private Resilience: State vs. Private Conceptions of Security
                  Risk Management in Danish Cyber-based Critical Infrastructures},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {135--141},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.52},
  doi          = {10.1109/EISIC.2011.52},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/Matz11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/MeskoB11,
  author       = {Gorazd Mesko and
                  Igor Bernik},
  title        = {Cybercrime: Awareness and Fear: Slovenian Perspectives},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {28--33},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.12},
  doi          = {10.1109/EISIC.2011.12},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/MeskoB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/MishraGJ11,
  author       = {Anupama Mishra and
                  Brij B. Gupta and
                  Ramesh Chandra Joshi},
  title        = {A Comparative Study of Distributed Denial of Service Attacks, Intrusion
                  Tolerance and Mitigation Techniques},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {286--289},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.15},
  doi          = {10.1109/EISIC.2011.15},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/MishraGJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/MontesinoF11,
  author       = {Raydel Montesino and
                  Stefan Fenz},
  title        = {Automation Possibilities in Information Security Management},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {259--262},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.39},
  doi          = {10.1109/EISIC.2011.39},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/MontesinoF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/MorrisAKD11,
  author       = {James F. Morris and
                  Keith Anthony and
                  Kevin T. Kennedy and
                  Richard F. Deckro},
  title        = {Extraction Distractions: {A} Comparison of Social Network Model Construction
                  Methods},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {273--276},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.63},
  doi          = {10.1109/EISIC.2011.63},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/MorrisAKD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/MouhtaropoulosGL11,
  author       = {Antonis Mouhtaropoulos and
                  Marthie Grobler and
                  Chang{-}Tsun Li},
  title        = {Digital Forensic Readiness: An Insight into Governmental and Academic
                  Initiatives},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {191--196},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.30},
  doi          = {10.1109/EISIC.2011.30},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/MouhtaropoulosGL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/MouradOA11,
  author       = {Azzam Mourad and
                  Hadi Otrok and
                  Sara Ayoubi},
  title        = {Toward Systematic Integration of Security Policies into Web Services},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {220--223},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.48},
  doi          = {10.1109/EISIC.2011.48},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/MouradOA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/NizamaniM11,
  author       = {Sarwat Nizamani and
                  Nasrullah Memon},
  title        = {Evolution of Terrorist Network Using Clustered Approach: {A} Case
                  Study},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {116--122},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.10},
  doi          = {10.1109/EISIC.2011.10},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/NizamaniM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/OnnerudWO11,
  author       = {Hans {\"{O}}nnerud and
                  Sara Wallin and
                  Henric {\"{O}}stmark},
  title        = {Localisation of Threat Substances in Urban Society - {LOTUS:} Tomorrow's
                  System for Finding Illicit Manufacturing of Drugs and Home Made Explosives},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {238--243},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.25},
  doi          = {10.1109/EISIC.2011.25},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/OnnerudWO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/ParkHSCBS11,
  author       = {Andrew J. Park and
                  Eunju Hwang and
                  Valerie Spicer and
                  Connie Cheng and
                  Patricia L. Brantingham and
                  Andrew Sixsmith},
  title        = {Testing Elderly People's Fear of Crime Using a Virtual Environment},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {63--69},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.68},
  doi          = {10.1109/EISIC.2011.68},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/ParkHSCBS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Parry11,
  author       = {Joe Parry},
  title        = {Visualisation for Decision-Makers},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {8},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.88},
  doi          = {10.1109/EISIC.2011.88},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/Parry11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/PetersenRW11,
  author       = {Rasmus Rosenqvist Petersen and
                  Christopher J. Rhodes and
                  Uffe Kock Wiil},
  title        = {Node Removal in Criminal Networks},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {360--365},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.57},
  doi          = {10.1109/EISIC.2011.57},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/PetersenRW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/PetersenW11,
  author       = {Rasmus Rosenqvist Petersen and
                  Uffe Kock Wiil},
  title        = {CrimeFighter Investigator: {A} Novel Tool for Criminal Network Investigation},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {197--202},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.55},
  doi          = {10.1109/EISIC.2011.55},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/PetersenW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/PiskorskiBA11,
  author       = {Jakub Piskorski and
                  Jenya Belayeva and
                  Martin Atkinson},
  title        = {On Refining Real-Time Multilingual News Event Extraction through Deployment
                  of Cross-Lingual Information Fusion Techniques},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {38--45},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.72},
  doi          = {10.1109/EISIC.2011.72},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/PiskorskiBA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/PlevnikP11,
  author       = {Mihael Plevnik and
                  Iztok Podbregar},
  title        = {The Need to Introduce a New Tactical Telecommunication System in the
                  Slovenian Army},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {230--233},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.9},
  doi          = {10.1109/EISIC.2011.9},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/PlevnikP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Poulatova11,
  author       = {Chaditsa Poulatova},
  title        = {The Media: {A} Terrorist Tool or a Silent Ally?},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {293},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.47},
  doi          = {10.1109/EISIC.2011.47},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/Poulatova11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/QureshiM11,
  author       = {Pir Abdul Rasool Qureshi and
                  Nasrullah Memon},
  title        = {Statistical Model for Content Extraction},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {129--134},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.75},
  doi          = {10.1109/EISIC.2011.75},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/QureshiM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/QureshiMWKS11,
  author       = {Pir Abdul Rasool Qureshi and
                  Nasrullah Memon and
                  Uffe Kock Wiil and
                  Panagiotis Karampelas and
                  Jose Ignacio Nieto Sancheze},
  title        = {Harvesting Information from Heterogeneous Sources},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {123--128},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.76},
  doi          = {10.1109/EISIC.2011.76},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/QureshiMWKS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Redford11,
  author       = {Mike Redford},
  title        = {{U.S.} and {EU} Legislation on Cybercrime},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {34--37},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.38},
  doi          = {10.1109/EISIC.2011.38},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/Redford11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Sakharova11,
  author       = {Irina Sakharova},
  title        = {Analysis of the Financial Crisis of 2007-2009 and Its Impact on Terrorism},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {290},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.62},
  doi          = {10.1109/EISIC.2011.62},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/Sakharova11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Sensidoni11,
  author       = {Gianluca Sensidoni},
  title        = {Who, What, When, Where and How: Semantics Semantics Help Connect the
                  Dots},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {9},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.89},
  doi          = {10.1109/EISIC.2011.89},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/Sensidoni11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/ShahO11,
  author       = {Mahmood Hussain Shah and
                  Romanus Izuchukwu Okeke},
  title        = {A Framework for Internal Identity Theft Prevention in Retail Industry},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {366--371},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.29},
  doi          = {10.1109/EISIC.2011.29},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/ShahO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/SpakL11,
  author       = {Ulrik Spak and
                  Mats Lind},
  title        = {Change Blindness in Intelligence: Effects of Attention Guidance by
                  Instructions},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {142--148},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.23},
  doi          = {10.1109/EISIC.2011.23},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/SpakL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/SunGLL11,
  author       = {Duo{-}Yong Sun and
                  Shu{-}Quan Guo and
                  Xiao{-}Peng Liu and
                  Jiang Li},
  title        = {Multi-relational Network Analysis for Covert Organizations},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {263--268},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.28},
  doi          = {10.1109/EISIC.2011.28},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/SunGLL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/TemurhanMCOCL11,
  author       = {M. Temurhan and
                  Ronald Meijer and
                  Sunil Choenni and
                  M. van Ooyen{-}Houben and
                  G. Cruts and
                  Margriet van Laar},
  title        = {Capture-Recapture Method for Estimating the Number of Problem Drug
                  Users: The Case of the Netherlands},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {46--51},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.26},
  doi          = {10.1109/EISIC.2011.26},
  timestamp    = {Wed, 10 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/TemurhanMCOCL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Thuraisingham11,
  author       = {Bhavani Thuraisingham},
  title        = {Data Mining for Malicious Code Detection and Security Applications},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {4--5},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.80},
  doi          = {10.1109/EISIC.2011.80},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/Thuraisingham11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/TikvesBTGDSCWRA11,
  author       = {Sukru Tikves and
                  Sujogya Banerjee and
                  Hamy Temkit and
                  Sedat Gokalp and
                  Hasan Davulcu and
                  Arunabha Sen and
                  Steven R. Corman and
                  Mark Woodward and
                  Inayah Rohmaniyah and
                  Ali Amin},
  title        = {A System for Ranking Organizations Using Social Scale Analysis},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {308--313},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.37},
  doi          = {10.1109/EISIC.2011.37},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/TikvesBTGDSCWRA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Torok11,
  author       = {Robyn Torok},
  title        = {The Online Institution: Psychiatric Power as an Explanatory Model
                  for the Normalisation of Radicalisation and Terrorism},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {78--85},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.43},
  doi          = {10.1109/EISIC.2011.43},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/Torok11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/UstunbasO11,
  author       = {Yonca Ustunbas and
                  Sule G{\"{u}}nd{\"{u}}z {\"{O}}g{\"{u}}d{\"{u}}c{\"{u}}},
  title        = {A Recommendation Model for Social Resource Sharing Systems Based on
                  Tripartite Graph Clustering},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {378--381},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.56},
  doi          = {10.1109/EISIC.2011.56},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/UstunbasO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/VybornovaSSKTCKO11,
  author       = {Olga Vybornova and
                  Ivan V. Smirnov and
                  Ilya Sochenkov and
                  Alexander Kiselyov and
                  Ilya Tikhomirov and
                  Natalya V. Chudova and
                  Yulia Kuznetsova and
                  Gennady S. Osipov},
  title        = {Social Tension Detection and Intention Recognition Using Natural Language
                  Semantic Analysis: On the Material of Russian-Speaking Social Networks
                  and Web Forums},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {277--281},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.27},
  doi          = {10.1109/EISIC.2011.27},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/VybornovaSSKTCKO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Wagner11,
  author       = {Gerhard Wagner},
  title        = {Desktop Text Mining for Open Source Intelligence},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {6},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.86},
  doi          = {10.1109/EISIC.2011.86},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/Wagner11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Wehinger11,
  author       = {Frank Wehinger},
  title        = {The Dark Net: Self-Regulation Dynamics of Illegal Online Markets for
                  Identities and Related Services},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {209--213},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.54},
  doi          = {10.1109/EISIC.2011.54},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/Wehinger11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/Yangarber11,
  author       = {Roman Yangarber},
  title        = {Discovering Complex Networks of Events and Relations in News Surveillance},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {7},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.87},
  doi          = {10.1109/EISIC.2011.87},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/Yangarber11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eisic/2011,
  title        = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/6059524/proceeding},
  isbn         = {978-1-4577-1464-1},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics