Login / Signup
EISIC
2011
2014
2019
2011
2019
Keyphrases
Publications
2019
Mordechai Guri
HOTSPOT: Crossing the Air-Gap Between Isolated PCs and Nearby Smartphones Using Temperature.
EISIC
(2019)
Fabrizia Bemer
The Directive 2014/41/UE - The European Investigation Order.
EISIC
(2019)
Andrew J. Park
,
Lee D. Patterson
,
Herbert H. Tsang
,
Ryan Ficocelli
,
Valerie Spicer
,
Justin Song
Devising and Optimizing Crowd Control Strategies Using Agent-Based Modeling and Simulation.
EISIC
(2019)
Susan El-Naggar
,
Thirimachos Bourlai
Evaluation of Deep Learning Models for Ear Recognition Against Image Distortions.
EISIC
(2019)
Marc Pic
,
Gaël Mahfoudi
,
Anis Trabelsi
Remote KYC: Attacks and Counter-Measures.
EISIC
(2019)
Anna Epishkina
,
Mikhail Finoshin
,
Konstantin Kogos
,
Aleksandra Yazykova
Timing Covert Channels Detection Cases via Machine Learning.
EISIC
(2019)
Justin Romeo
,
Thirimachos Bourlai
Semi-Automatic Geometric Normalization of Profile Faces.
EISIC
(2019)
Jessica Zhu
,
Lin Li
,
Cara Jones
Identification and Detection of Human Trafficking Using Language Models.
EISIC
(2019)
Eetu Haapamäki
,
Juho Mikkola
,
Markus Hirsimäki
,
Mourad Oussalah
Mining Security discussions in Suomi24.
EISIC
(2019)
European Intelligence and Security Informatics Conference, EISIC 2019, Oulu, Finland, November 26-27, 2019
EISIC
(2019)
Disa Sariola
A model of quantifying social relationships.
EISIC
(2019)
Olga Simek
,
Alyssa C. Mensch
,
Lin Li
,
Charlie K. Dagli
Characterization of Disinformation Networks Using Graph Embeddings and Opinion Mining.
EISIC
(2019)
Abhinay Pandya
,
Panos Kostakos
,
Hassan Mehmood
,
Marta Cortés
,
Ekaterina Gilman
,
Mourad Oussalah
,
Susanna Pirttikangas
Privacy preserving sentiment analysis on multiple edge data streams with Apache NiFi.
EISIC
(2019)
Nikolaos Bastas
,
George Kalpakis
,
Theodora Tsikrika
,
Stefanos Vrochidis
,
Ioannis Kompatsiaris
A comparative study of clustering methods using word embeddings.
EISIC
(2019)
Olga Simek
,
Danelle C. Shah
,
Andrew Heier
Prototype and Analytics for Discovery and Exploitation of Threat Networks on Social Media.
EISIC
(2019)
Marianela García Lozano
,
Johan Fernquist
Identifying Deceptive Reviews: Feature Exploration, Model Transferability and Classification Attack.
EISIC
(2019)
Chia-Ju Chen
,
Razieh Nokhbeh Zaeem
,
K. Suzanne Barber
Statistical Analysis of Identity Risk of Exposure and Cost Using the Ecosystem of Identity Attributes.
EISIC
(2019)
Johan Fernquist
,
Ola Svenonius
,
Lisa Kaati
,
Fredrik Johansson
Extracting Account Attributes for Analyzing Influence on Twitter.
EISIC
(2019)
Alina Garbuz
,
Anna Epishkina
,
Konstantin Kogos
Continuous Authentication of Smartphone Users via Swipes and Taps Analysis.
EISIC
(2019)
August Daniel Sutmuller
,
Mariëlle den Hengst
,
Ana Isabel Barros
,
Bob van der Vecht
,
Wouter Noordkamp
,
Pieter H. A. J. M. van Gelder
Predicting the Offender: Frequency versus Bayes.
EISIC
(2019)
Daria Frolova
,
Anna Epishkina
,
Konstantin Kogos
Mobile User Authentication Using Keystroke Dynamics.
EISIC
(2019)
Aviad Elitzur
,
Rami Puzis
,
Polina Zilberman
Attack Hypothesis Generation.
EISIC
(2019)
Alexander Egiazarov
,
Vasileios Mavroeidis
,
Fabio Massimo Zennaro
,
Kamer Vishi
Firearm Detection and Segmentation Using an Ensemble of Semantic Neural Networks.
EISIC
(2019)
Panos Kostakos
,
Somkiadcharoen Robroo
,
Bofan Lin
,
Mourad Oussalah
Crime Prediction Using Hotel Reviews?
EISIC
(2019)
2018
Johan Fernquist
,
Lisa Kaati
Online Monitoring of Large Events.
EISIC
(2018)
Ignacio Martín
,
José Alberto Hernández
,
Sergio de los Santos
,
Antonio Guzmán
Analysis and Evaluation of Antivirus Engines in Detecting Android Malware: A Data Analytics Approach.
EISIC
(2018)
Axel Weissenfeld
,
Andreas Zoufal
,
Christoph Weiss
,
Bernhard Strobl
,
Gustavo Fernández Domínguez
Towards Mobile Contactless 4-Fingerprint Authentication for Border Control.
EISIC
(2018)
Sarah McNary
,
Aaron Hunter
Using Wearable Device Data in a Criminal Investigation: A Preliminary Study.
EISIC
(2018)
Matthew Price-Williams
,
Melissa J. Turcotte
,
Nick Heard
Time of Day Anomaly Detection.
EISIC
(2018)
Umid Akhmedov
On Wash Trade Detection in Energy Markets.
EISIC
(2018)
Hamad Alsaleh
,
Lina Zhou
A Heuristic Method for Identifying Scam Ads on Craigslist.
EISIC
(2018)
David Schreiber
,
Martin Boyer
,
Elisabeth Broneder
,
Andreas Opitz
,
Stephan Veigl
Generic Object and Motion Analytics for Accelerating Video Analysis within VICTORIA.
EISIC
(2018)
Laura Salmela
,
Sirra Toivonen
,
Minna Kulju
,
Mari Ylikauppila
Digital Transformation in Border Checks: Mapping Border Guard Training in Automated Processes.
EISIC
(2018)
Mordechai Guri
Optical Covert Channel from Air-Gapped Networks via Remote Orchestration of Router/Switch LEDs.
EISIC
(2018)
European Intelligence and Security Informatics Conference, EISIC 2018, Karlskrona, Sweden, October 24-25, 2018
EISIC
(2018)
Sean Suehr
,
Chrysafis Vogiatzis
Now You See Me: Identifying Duplicate Network Personas.
EISIC
(2018)
Tatu Hyttinen
,
Saila Heinikoski
Harmonizing Criminal Law Provisions on Money Laundering - A Litmus Test of European Integration.
EISIC
(2018)
Matthew Hull
,
Thaddeus Eze
,
Lee Speakman
Policing The Cyber Threat: Exploring the Threat from Cyber Crime and the Ability of Local Law Enforcement to Respond.
EISIC
(2018)
Panos Kostakos
,
Abhinay Pandya
,
Olga Kyriakouli
,
Mourad Oussalah
Inferring Demographic Data of Marginalized Users in Twitter with Computer Vision APIs.
EISIC
(2018)
Martin Boldt
,
Veselka Boeva
,
Anton Borg
Multi-Expert Estimations of Burglars' Risk Exposure and Level of Pre-Crime Preparation Using Coded Crime Scene Data: Work in Progress.
EISIC
(2018)
2017
Vasileios Mavroeidis
,
Siri Bromander
Cyber Threat Intelligence Model: An Evaluation of Taxonomies, Sharing Standards, and Ontologies within Cyber Threat Intelligence.
EISIC
(2017)
Nadeem Qazi
,
B. L. William Wong
Behavioural & Tempo-Spatial Knowledge Graph for Crime Matching through Graph Theory.
EISIC
(2017)
Lingwei Chen
,
Yanfang Ye
,
Thirimachos Bourlai
Adversarial Machine Learning in Malware Detection: Arms Race between Evasion Attack and Defense.
EISIC
(2017)
Anton Borg
,
Martin Boldt
,
Johan Eliasson
Detecting Crime Series Based on Route Estimation and Behavioral Similarity.
EISIC
(2017)
Ioanna K. Lekea
,
Panagiotis Karampelas
Are We Really That Close Together? Tracing and Discussing Similarities and Differences between Greek Terrorist Groups Using Cluster Analysis.
EISIC
(2017)
Khaled Khelif
,
Yann Mombrun
,
Gerhard Backfried
,
Farhan Sahito
,
Luca Scarpato
,
Petr Motlícek
,
Srikanth R. Madikeri
,
Damien Kelly
,
Gideon Hazzani
,
Emmanouil Chatzigavriil
Towards a Breakthrough Speaker Identification Approach for Law Enforcement Agencies: SIIP.
EISIC
(2017)
Yee Jang Foong
,
Mourad Oussalah
Cyberbullying System Detection and Analysis.
EISIC
(2017)
Panos Kostakos
,
Miika Moilanen
,
Arttu Niemela
,
Mourad Oussalah
Catchem: A Browser Plugin for the Panama Papers Using Approximate String Matching.
EISIC
(2017)
European Intelligence and Security Informatics Conference, EISIC 2017, Athens, Greece, September 11-13, 2017
EISIC
(2017)
Michael Martin
,
Jeremy M. Dawson
,
Thirimachos Bourlai
Large Scale Data Collection of Tattoo-Based Biometric Data from Social-Media Websites.
EISIC
(2017)