Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/eisic/eisic2017.bht:"
@inproceedings{DBLP:conf/eisic/0004DB17, author = {Michael Martin and Jeremy M. Dawson and Thirimachos Bourlai}, editor = {Joel Brynielsson}, title = {Large Scale Data Collection of Tattoo-Based Biometric Data from Social-Media Websites}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2017, Athens, Greece, September 11-13, 2017}, pages = {135--138}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/EISIC.2017.27}, doi = {10.1109/EISIC.2017.27}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/0004DB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/AndreadisGKTPVK17, author = {Stelios Andreadis and Ilias Gialampoukidis and George Kalpakis and Theodora Tsikrika and Symeon Papadopoulos and Stefanos Vrochidis and Ioannis Kompatsiaris}, editor = {Joel Brynielsson}, title = {A Monitoring Tool for Terrorism-Related Key-Players and Key-Communities in Social Media Networks}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2017, Athens, Greece, September 11-13, 2017}, pages = {166}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/EISIC.2017.41}, doi = {10.1109/EISIC.2017.41}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/AndreadisGKTPVK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/BedekNHA17, author = {Michael A. Bedek and Alexander Nussbaumer and Eva{-}Catherine Hillemann and Dietrich Albert}, editor = {Joel Brynielsson}, title = {A Framework for Measuring Imagination in Visual Analytics Systems}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2017, Athens, Greece, September 11-13, 2017}, pages = {151--154}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/EISIC.2017.31}, doi = {10.1109/EISIC.2017.31}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/BedekNHA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/BoldtB17, author = {Martin Boldt and Anton Borg}, editor = {Joel Brynielsson}, title = {A Statistical Method for Detecting Significant Temporal Hotspots Using {LISA} Statistics}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2017, Athens, Greece, September 11-13, 2017}, pages = {123--126}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/EISIC.2017.24}, doi = {10.1109/EISIC.2017.24}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/BoldtB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/BorgBE17, author = {Anton Borg and Martin Boldt and Johan Eliasson}, editor = {Joel Brynielsson}, title = {Detecting Crime Series Based on Route Estimation and Behavioral Similarity}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2017, Athens, Greece, September 11-13, 2017}, pages = {1--8}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/EISIC.2017.10}, doi = {10.1109/EISIC.2017.10}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/BorgBE17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/BorrionDL17, author = {Herv{\'{e}} Borrion and Hashem Dehghanniri and Yuanxi Li}, editor = {Joel Brynielsson}, title = {Comparative Analysis of Crime Scripts: One {CCTV} Footage - Twenty-One Scripts}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2017, Athens, Greece, September 11-13, 2017}, pages = {115--122}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/EISIC.2017.23}, doi = {10.1109/EISIC.2017.23}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/BorrionDL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/ChenYB17, author = {Lingwei Chen and Yanfang Ye and Thirimachos Bourlai}, editor = {Joel Brynielsson}, title = {Adversarial Machine Learning in Malware Detection: Arms Race between Evasion Attack and Defense}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2017, Athens, Greece, September 11-13, 2017}, pages = {99--106}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/EISIC.2017.21}, doi = {10.1109/EISIC.2017.21}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/ChenYB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Dhami17, author = {Mandeep K. Dhami}, editor = {Joel Brynielsson}, title = {A Survey of Intelligence Analysts' Perceptions of Analytic Tools}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2017, Athens, Greece, September 11-13, 2017}, pages = {131--134}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/EISIC.2017.26}, doi = {10.1109/EISIC.2017.26}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/Dhami17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/DimitriouKSSTZL17, author = {Nikolaos Dimitriou and George Kioumourtzis and Anargyros Sideris and Georgios Stavropoulos and Evdoxia Taka and Nikolaos Zotos and George Leventakis and Dimitrios Tzovaras}, editor = {Joel Brynielsson}, title = {An Integrated Framework for the Timely Detection of Petty Crimes}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2017, Athens, Greece, September 11-13, 2017}, pages = {24--31}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/EISIC.2017.13}, doi = {10.1109/EISIC.2017.13}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/DimitriouKSSTZL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/FernquistFK17, author = {Johan Fernquist and Torbjorn Fangstrom and Lisa Kaati}, editor = {Joel Brynielsson}, title = {IoT Data Profiles: The Routines of Your Life Reveals Who You Are}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2017, Athens, Greece, September 11-13, 2017}, pages = {61--67}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/EISIC.2017.17}, doi = {10.1109/EISIC.2017.17}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/FernquistFK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/FoongO17, author = {Yee Jang Foong and Mourad Oussalah}, editor = {Joel Brynielsson}, title = {Cyberbullying System Detection and Analysis}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2017, Athens, Greece, September 11-13, 2017}, pages = {40--46}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/EISIC.2017.43}, doi = {10.1109/EISIC.2017.43}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/FoongO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/GroenewaldWAPK17, author = {Celeste Groenewald and B. L. William Wong and Simon Attfield and Peter J. Passmore and Neesha Kodagoda}, editor = {Joel Brynielsson}, title = {How Analysts Think: How Do Criminal Intelligence Analysts Recognise and Manage Significant Information?}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2017, Athens, Greece, September 11-13, 2017}, pages = {47--53}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/EISIC.2017.15}, doi = {10.1109/EISIC.2017.15}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/GroenewaldWAPK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/IsbisterKC17, author = {Tim Isbister and Lisa Kaati and Katie Cohen}, editor = {Joel Brynielsson}, title = {Gender Classification with Data Independent Features in Multiple Languages}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2017, Athens, Greece, September 11-13, 2017}, pages = {54--60}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/EISIC.2017.16}, doi = {10.1109/EISIC.2017.16}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/IsbisterKC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/IslamW17, author = {Junayed Islam and B. L. William Wong}, editor = {Joel Brynielsson}, title = {Behavioural Markers: Bridging the Gap between Art of Analysis and Science of Analytics in Criminal Intelligence}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2017, Athens, Greece, September 11-13, 2017}, pages = {147--150}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/EISIC.2017.30}, doi = {10.1109/EISIC.2017.30}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/IslamW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/KaatiLSS17, author = {Lisa Kaati and Elias Lundeqvist and Amendra Shrestha and Maria Svensson}, editor = {Joel Brynielsson}, title = {Author Profiling in the Wild}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2017, Athens, Greece, September 11-13, 2017}, pages = {155--158}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/EISIC.2017.32}, doi = {10.1109/EISIC.2017.32}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/KaatiLSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/KaatiR17, author = {Lisa Kaati and Adam Ruul}, editor = {Joel Brynielsson}, title = {Interpretable Probabilistic Divisive Clustering of Large Node-Attributed Networks}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2017, Athens, Greece, September 11-13, 2017}, pages = {68--75}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/EISIC.2017.18}, doi = {10.1109/EISIC.2017.18}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/KaatiR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/KhelifMBSSMMKHC17, author = {Khaled Khelif and Yann Mombrun and Gerhard Backfried and Farhan Sahito and Luca Scarpato and Petr Motl{\'{\i}}cek and Srikanth R. Madikeri and Damien Kelly and Gideon Hazzani and Emmanouil Chatzigavriil}, editor = {Joel Brynielsson}, title = {Towards a Breakthrough Speaker Identification Approach for Law Enforcement Agencies: {SIIP}}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2017, Athens, Greece, September 11-13, 2017}, pages = {32--39}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/EISIC.2017.14}, doi = {10.1109/EISIC.2017.14}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/KhelifMBSSMMKHC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/KostakosMNO17, author = {Panos Kostakos and Miika Moilanen and Arttu Niemel{\"{a}} and Mourad Oussalah}, editor = {Joel Brynielsson}, title = {Catchem: {A} Browser Plugin for the Panama Papers Using Approximate String Matching}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2017, Athens, Greece, September 11-13, 2017}, pages = {139--142}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/EISIC.2017.28}, doi = {10.1109/EISIC.2017.28}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/KostakosMNO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/LekeaK17, author = {Ioanna K. Lekea and Panagiotis Karampelas}, editor = {Joel Brynielsson}, title = {Are We Really That Close Together? Tracing and Discussing Similarities and Differences between Greek Terrorist Groups Using Cluster Analysis}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2017, Athens, Greece, September 11-13, 2017}, pages = {159--162}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/EISIC.2017.33}, doi = {10.1109/EISIC.2017.33}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/LekeaK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/MavroeidisB17, author = {Vasileios Mavroeidis and Siri Bromander}, editor = {Joel Brynielsson}, title = {Cyber Threat Intelligence Model: An Evaluation of Taxonomies, Sharing Standards, and Ontologies within Cyber Threat Intelligence}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2017, Athens, Greece, September 11-13, 2017}, pages = {91--98}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/EISIC.2017.20}, doi = {10.1109/EISIC.2017.20}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/MavroeidisB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/PaudyalRKWDQ17, author = {Pragya Paudyal and Chris Rooney and Neesha Kodagoda and B. L. William Wong and Penny Duquenoy and Nadeem Qazi}, editor = {Joel Brynielsson}, title = {How the Use of Ethically Sensitive Information Helps to Identify Co-Offenders via a Purposed Privacy Scale: {A} Pilot Study}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2017, Athens, Greece, September 11-13, 2017}, pages = {164}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/EISIC.2017.35}, doi = {10.1109/EISIC.2017.35}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/PaudyalRKWDQ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/PicO17, author = {Marc Michel Pic and Amine Ouddan}, editor = {Joel Brynielsson}, title = {Photometrix {(TM):} {A} Digital Seal for Offline Identity Picture Authentication}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2017, Athens, Greece, September 11-13, 2017}, pages = {163}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/EISIC.2017.34}, doi = {10.1109/EISIC.2017.34}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/PicO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Poulymenopoulou17, author = {Mikaela Poulymenopoulou and Aris Tsois}, editor = {Joel Brynielsson}, title = {Customs Risk Analysis through the ConTraffic Visual Analytics Tool}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2017, Athens, Greece, September 11-13, 2017}, pages = {107--114}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/EISIC.2017.22}, doi = {10.1109/EISIC.2017.22}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/Poulymenopoulou17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Price-WilliamsH17, author = {Matthew Price{-}Williams and Nick Heard and Melissa J. Turcotte}, editor = {Joel Brynielsson}, title = {Detecting Periodic Subsequences in Cyber Security Data}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2017, Athens, Greece, September 11-13, 2017}, pages = {84--90}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/EISIC.2017.40}, doi = {10.1109/EISIC.2017.40}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/Price-WilliamsH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/QaziW17, author = {Nadeem Qazi and B. L. William Wong}, editor = {Joel Brynielsson}, title = {Behavioural {\&} Tempo-Spatial Knowledge Graph for Crime Matching through Graph Theory}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2017, Athens, Greece, September 11-13, 2017}, pages = {143--146}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/EISIC.2017.29}, doi = {10.1109/EISIC.2017.29}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/QaziW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/RuohonenL17, author = {Jukka Ruohonen and Ville Lepp{\"{a}}nen}, editor = {Joel Brynielsson}, title = {Whose Hands Are in the Finnish Cookie Jar?}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2017, Athens, Greece, September 11-13, 2017}, pages = {127--130}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/EISIC.2017.25}, doi = {10.1109/EISIC.2017.25}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/RuohonenL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/TorregrosaGLGC17, author = {Javier Torregrosa and Irene Gilp{\'{e}}rez{-}L{\'{o}}pez and Ra{\'{u}}l Lara{-}Cabrera and David Garriga and David Camacho}, editor = {Joel Brynielsson}, title = {Can an Automatic Tool Assess Risk of Radicalization Online? {A} Case Study on Facebook}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2017, Athens, Greece, September 11-13, 2017}, pages = {165}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/EISIC.2017.36}, doi = {10.1109/EISIC.2017.36}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/TorregrosaGLGC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/Xylogiannopoulos17, author = {Konstantinos F. Xylogiannopoulos and Panagiotis Karampelas and Reda Alhajj}, editor = {Joel Brynielsson}, title = {Text Mining in Unclean, Noisy or Scrambled Datasets for Digital Forensics Analytics}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2017, Athens, Greece, September 11-13, 2017}, pages = {76--83}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/EISIC.2017.19}, doi = {10.1109/EISIC.2017.19}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/Xylogiannopoulos17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/ZouaveM17, author = {Erik T. Zouave and Thomas Marquenie}, editor = {Joel Brynielsson}, title = {An Inconvenient Truth: Algorithmic Transparency {\&} Accountability in Criminal Intelligence Profiling}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2017, Athens, Greece, September 11-13, 2017}, pages = {17--23}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/EISIC.2017.12}, doi = {10.1109/EISIC.2017.12}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/ZouaveM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eisic/2017, editor = {Joel Brynielsson}, title = {European Intelligence and Security Informatics Conference, {EISIC} 2017, Athens, Greece, September 11-13, 2017}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://ieeexplore.ieee.org/xpl/conhome/8234922/proceeding}, isbn = {978-1-5386-2385-5}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.