researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
OR
AND
NOT
1
2008
Filter by Tag
[+]
OR
AND
NOT
1
Meta-Environment
access control
analysis
architecture
control systems
data-flow
data-flow analysis
design
e-science
meta-model
mobile
modeling
optimization
rule-based
security
social
systematic-approach
testing
watermarking
workflow
Filter by Author
[+]
OR
AND
NOT
1
Aaron Hunter
Ajith Abraham
Andrey Soares
Aneta Poniszewska-Maranda
Angelo Priamo
Arthit Srikaew
Atta Badii
Bon Sy
Boris Rozenberg
Cedric Ulmer
Chaoxin Wu
Clint Feher
Clinton Mielke
Daniel Ortiz Arroyo
Dil Muhammad Akbar Hussain
Hsinchun Chen
Shlomi Dolev
Steven R. Haynes
Thomas George Kannampallil
Yuval Elovici
Filter by Top terms
[+]
OR
AND
NOT
1
analysis
anti
approach
architecture
criminal
critical
dark
data
detection
distributed
framework
informatics
information
key
management
networks
security
social
systems
using
EuroISI (euroisi)
Editions
Publications
Viewing Publication 1 - 29 from 29
2008
Nature Inspired Online Real Risk Assessment Models for Security Systems
Ajith Abraham
.
euroisi 2008
:
3
[doi]
The Automatic Identification and Prioritisation of Criminal Networks from Police Crime Data
Richard Adderley
,
Atta Badii
,
Chaoxin Wu
.
euroisi 2008
:
5-14
[doi]
Designing Information Systems Which Manage or Avoid Privacy Incidents
Giannakis Antoniou
,
Lynn Margaret Batten
,
Parampalli Udaya
.
euroisi 2008
:
131-142
[doi]
An Information Theory Approach to Identify Sets of Key Players
Daniel Ortiz Arroyo
,
Dil Muhammad Akbar Hussain
.
euroisi 2008
:
15-26
[doi]
Intelligence and Security Informatics, First European Conference, EuroISI 2008, Esbjerg, Denmark, December 3-5, 2008. Proceedings
Daniel Ortiz Arroyo
,
Henrik Legind Larsen
,
Daniel Dajun Zeng
,
David L. Hicks
,
Gerhard Wagner
, editors,
Volume 5376 of
Lecture Notes in Computer Science
, Springer,
2008.
Reconfigurable Radio Systems for Public Safety Based on Low-Cost Platforms
Gianmarco Baldini
,
Raimondo Giuliani
,
Dimitrios Symeonidis
.
euroisi 2008
:
237-247
[doi]
Homeland Security Data Mining Using Social Network Analysis
Hsinchun Chen
.
euroisi 2008
:
4
[doi]
Nuclear Threat Detection Via the Nuclear Web and Dark Web: Framework and Preliminary Study
Hsinchun Chen
.
euroisi 2008
:
85-96
[doi]
Jihadi Video and Auto-radicalisation: Evidence from an Exploratory YouTube Study
Maura Conway
,
Lisa McInerney
.
euroisi 2008
:
108-118
[doi]
Evaluative Word Locations in Semantic Networks from News Stories about Al Qaeda and Implications for Optimal Communication Messages in Anti-terrorism Campaigns
James A. Danowski
.
euroisi 2008
:
271-273
[doi]
Methodology for Experimental ICT Industrial and Critical Infrastructure Security Tests
Igor Nai Fovino
,
Marcelo Masera
.
euroisi 2008
:
274-275
[doi]
Computational Modeling of Criminal Activity
Uwe Glässer
,
Mona Vajihollahi
.
euroisi 2008
:
39-50
[doi]
An Information Systems Design Theory for Supporting WMD Knowledge Reachback
Steven R. Haynes
,
Jonathan M. Singel
,
Thomas George Kannampallil
.
euroisi 2008
:
248-259
[doi]
Rampart: A Service and Agent-Based Architecture for Anti-Terrorism Planning and Resource Allocation
Steven R. Haynes
,
Thomas George Kannampallil
,
Mark A. Cohen
,
Andrey Soares
,
Frank E. Ritter
.
euroisi 2008
:
260-270
[doi]
Dissecting the Meaning of an Encrypted Message: An Approach to Discovering the Goals of an Adversary
Aaron Hunter
.
euroisi 2008
:
61-72
[doi]
Locating Key Actors in Social Networks Using Bayes Posterior Probability Framework
Dil Muhammad Akbar Hussain
,
Daniel Ortiz Arroyo
.
euroisi 2008
:
27-38
[doi]
Problem Analyses and Recommendations in DRM Security Policies
Youngseek Kim
,
Jessica Howard
,
Sharad Ravindranath
,
Joon S. Park
.
euroisi 2008
:
165-178
[doi]
Digital Audio Watermarking for Copyright Protection Based on Multiwavelet Transform
Prayoth Kumsawat
,
Kitti Attakitmongcol
,
Arthit Srikaew
.
euroisi 2008
:
155-164
[doi]
Fuzzy Distributed Workflows for Crisis Management Decision Makers
Jean-Francois Landry
,
Cedric Ulmer
,
Laurent Gomez
.
euroisi 2008
:
226-236
[doi]
Mobile and Stationary Sensors for Local Surveillance: System Architecture and Applications
Sandro Leuchter
,
Thomas Partmann
,
Lothar Berger
.
euroisi 2008
:
216-225
[doi]
Mapping Dark Web Geolocation
Clinton Mielke
,
Hsinchun Chen
.
euroisi 2008
:
97-107
[doi]
Unknown Malcode Detection Using OPCODE Representation
Robert Moskovitch
,
Clint Feher
,
Nir Tzachar
,
Eugene Berger
,
Marina Gitelman
,
Shlomi Dolev
,
Yuval Elovici
.
euroisi 2008
:
204-215
[doi]
SPYWatch, Overcoming Linguistic Barriers in Information Management
Federico Neri
,
Angelo Priamo
.
euroisi 2008
:
51-60
[doi]
Access Control of Federated Information Systems
Aneta Poniszewska-Maranda
.
euroisi 2008
:
119-130
[doi]
Optimization of NIDS Placement for Protection of Intercommunicating Critical Infrastructures
Rami Puzis
,
Marius David Klippel
,
Yuval Elovici
,
Shlomi Dolev
.
euroisi 2008
:
191-203
[doi]
A Distributed Framework for the Detection of New Worm-Related Malware
Boris Rozenberg
,
Ehud Gudes
,
Yuval Elovici
.
euroisi 2008
:
179-190
[doi]
Buzz Monitoring in Word Space
Magnus Sahlgren
,
Jussi Karlgren
.
euroisi 2008
:
73-84
[doi]
Secure Computation for Privacy Preserving Biometric Data Retrieval and Authentication
Bon Sy
.
euroisi 2008
:
143-154
[doi]
Intelligent Social Network Modeling and Analysis for Security Informatics
Ronald R. Yager
.
euroisi 2008
:
1-2
[doi]
Sign in
or
sign up
to see more results.