Abstract is missing.
- The Utilization of Forensic Evidence in IED IncidentsHenry C. Lee. 1-2 [doi]
- From Dark Web to GeoPolitical Web: Exploring the Value of Social Media InformaticsHsinchun Chen. 3 [doi]
- OSINT, the Internet and PrivacyClive Best. 4 [doi]
- Detecting Emergent Terrorism Events: Finding Needles in Information HaystacksJames R. (Bob) Johnson. 5-6 [doi]
- Detecting Fraud in Financial ReportsDavid B. Skillicorn, Lynnette D. Purda. 7-13 [doi]
- How Transparency Improves the Control of Law Enforcement Authorities' Activities?Jyri Rajamäki, Jutta Tervahartiala, Sofia Tervola, Sari Johansson, Leila Ovaska, Paresh Rathod. 14-21 [doi]
- Community of Intelligence: The Secret Behind Intelligence-Led PolicingMariëlle den Hengst, Jan ter Mors. 22-29 [doi]
- Framing the Attacker in Organized CybercrimeMuhammad Adnan Tariq, Joel Brynielsson, Henrik Artman. 30-37 [doi]
- SPORS: A Suspect Recommendation System Based on Offenders' Reconstructed Spatial ProfileRichard Frank. 38-45 [doi]
- To Incorporate Sequential Dynamic Features in Malware Detection EnginesMojtaba Eskandari, Zeinab Khorshidpour, Sattar Hashemi. 46-52 [doi]
- Extracting and Networking Emotions in Extremist PropagandaTravis Morris. 53-59 [doi]
- A Computational Model for Predicting the Location of Crime Attractors on a Road NetworkNatalia Iwanski, Richard Frank, Andrew Reid, Vahid Dabbaghian. 60-67 [doi]
- Countering Bioterrorism: Why Smart Buildings Should Have a Code of EthicsHervé Borrion, Timothy Mitchener-Nissen, Jonathon Taylor, Ka-Man Lai. 68-75 [doi]
- Detecting Anomalous Maritime Container Itineraries for Anti-fraud and Supply Chain SecurityElena Camossi, Tatyana Dimitrova, Aris Tsois. 76-83 [doi]
- Exploring a Warrior Paradigm to Design Out CybercrimeMortaza S. Bargh, Sunil Choenni, Ingrid Mulder, Roland Pastoor. 84-90 [doi]
- Laundering Sexual Deviance: Targeting Online Pornography through Anti-money LaunderingAlex Antoniou, Gauri Sinha. 91-98 [doi]
- How Many Ways Do Offenders Travel - Evaluating the Activity Paths of OffendersRichard Frank, Bryan Kinney. 99-106 [doi]
- Data Mining Applications for Fraud Detection in Securities MarketKoosha Golmohammadi, Osmar R. Zaïane. 107-114 [doi]
- A Model for Identity in the Cyber and Natural UniversesDuncan Hodges, Sadie Creese, Michael Goldsmith. 115-122 [doi]
- Mixed Holistic Reductionistic Approach for Impact Assessment of Cyber AttacksGiusj Digioia, Chiara Foglietta, Stefano Panzieri, Alessandro Falleni. 123-130 [doi]
- Identifying Important Nodes in Weighted Covert Networks Using Generalized Centrality MeasuresBisharat Rasool Memon. 131-140 [doi]
- A Machine Learning Approach to Android Malware DetectionJustin Sahs, Latifur Khan. 141-147 [doi]
- Measuring Relatedness and Augmentation of Information of Interest within Free Text Law Enforcement DocumentsJames R. (Bob) Johnson, Anita Miller, Latifur Khan, Bhavani M. Thuraisingham. 148-155 [doi]
- Comparing Methods for Detecting Child Exploitation Content OnlineBryce Westlake, Martin Bouchard, Richard Frank. 156-163 [doi]
- Semantic Network Analysis of Islamist Sources Using Time Slices as Nodes and Semantic Similarity as Link Strengths: Some Implications for Propaganda Analysis about JihadJames A. Danowski. 164-171 [doi]
- Can Computers Help Us to Better Understand Different Cultures? Toward a Computer-Based CULINTDanny Livshitz, Newton Howard, Yair Neuman. 172-179 [doi]
- A Prediction of Terrorist Distribution Range Radius and Elapsing Time: A Case Study in Southern Parts of ThailandAthakorn Kengpol, Pakorn Neungrit. 180-188 [doi]
- Estimating Citizen Alertness in Crises Using Social Media Monitoring and AnalysisFredrik Johansson, Joel Brynielsson, Maribel Narganes Quijano. 189-196 [doi]
- Analysis of Weak Signals for Detecting Lone Wolf TerroristsJoel Brynielsson, Andreas Horndahl, Fredrik Johansson, Lisa Kaati, Christian Mårtenson, Pontus Svenson. 197-204 [doi]
- Identifying Distinct Components of a Multi-author DocumentNavot Akiva, Moshe Koppel. 205-209 [doi]
- Developing a Keystroke Biometric System for Continual Authentication of Computer UsersJohn V. Monaco, Ned Bakelman, Sung-Hyuk Cha, Charles C. Tappert. 210-216 [doi]
- Dynalink: A Framework for Dynamic Criminal Network VisualizationAndrew J. Park, Herbert H. Tsang, Patricia L. Brantingham. 217-224 [doi]
- Data Base Investigation as a Ranking ProblemCor J. Veenman. 225-231 [doi]
- Association and Centrality in Criminal NetworksRasmus Rosenqvist Petersen. 232-241 [doi]
- Analyzing Chat Conversations of Pedophiles with Temporal Relational Semantic SystemsPaul Elzinga, Karl Erich Wolff, Jonas Poelmans. 242-249 [doi]
- Behavioral Analysis and Visualization of Fast-Flux DNSAndi Fitriah Abdul Kadir, Raja Azrina Raja Othman, Normaziah Abdul Aziz. 250-253 [doi]
- Open Source Intelligence in Disaster ManagementGerhard Backfried, Christian Schmidt, Mark Pfeiffer, Gerald Quirchmayr, Markus Glanzer, Karin Rainer. 254-258 [doi]
- Perception in International Conflict: An Agent-Based ApproachNewton Howard. 259-262 [doi]
- Al Qaeda Affiliates Operating in Failed States: The Next Front in the War on TerrorAnthony Celso. 263-267 [doi]
- Application of Natural Language Processing and Evidential Analysis to Web-Based Intelligence Information AcquisitionNatalia Danilova, David Stupples. 268-273 [doi]
- Structured Documents: Signatures and DeceptionAaron Hunter. 274-277 [doi]
- Technologies for Granting Balance between Security and Privacy in Video-SurveillancePaolo D'Arminio, Ricardo Buendia Iglesias, Janusz Cichowski, Piotr Dalka, Damian Ellwart, Sateesh Pedagadi, James Orwell, Inga Kroener, Daniel Neyland. 278-283 [doi]
- iCARE: A Scenario-Based Method for the RIBS ProjectHervé Borrion, Noémie Bouhana. 284 [doi]
- Resilience of Cyber-Physical System: A Case Study of Safe School EnvironmentJyri Rajamäki, Paresh Rathod, Anu Ahlgren, Johanna Aho, Mari Takari, Sami Ahlgren. 285 [doi]
- Information Security Aspects of the 22/7 AttacksHanno Langweg. 286 [doi]
- Network Intelligence: An Emerging DisciplineDavid E. A. Johnson, Newton Howard. 287-288 [doi]
- Proactive Digital Forensics: The Ever-Increasing Need for StandardizationAntonis Mouhtaropoulos, Chang-Tsun Li, Marthie Grobler. 289 [doi]
- Pattern Theory in Intelligence AnalysisTove Gustavi, Pontus Svenson. 290 [doi]
- The HiTS/ISAC Social Network Analysis Tool Hirad Asadi, Christian Mårtenson, Pontus Svenson, Magnus Sköld. 291-296 [doi]
- Detecting Key Players in Terrorist NetworksAla Berzinji, Lisa Kaati, Ahmed Rezine. 297-302 [doi]
- Sentiment Network Analysis of Taleban and RFE/RL Open-Source Content about AfghanistanJames A. Danowski. 303-310 [doi]
- Ten Reasons Why IRIS Needed 20: 20 Foresight: Some Lessons for Introducing Biometric Border Control SystemsAnthony J. Palmer, Chris Hurrey. 311-316 [doi]
- Multi-sensor Multi-target Tracking for Infrastructure ProtectionMaría Victoria Moreno Cano, Carolina Piñana-Diaz, Rafael Toledo-Moreo, Miguel A. Zamora-Izquierdo, Antonio Fernandez Gómez-Skarmeta. 317-322 [doi]
- Predicting Veracity from Linguistic IndicatorsJudee K. Burgoon, Lauren Hamel, Tiantian Qin. 323-328 [doi]
- Use of an Automatic Under-Vehicle Inspection System as a Tool to Streamline Vehicle Screening at Ports of Entry and Security CheckpointsErick E. Ruiz, K. Larry Head. 329-333 [doi]
- Refining Border Security News Event Geotagging through Deployment of Lexico-Semantic PatternsVanni Zavarella, Jakub Piskorski, Ana Sofia Esteves, Stefano Bucci. 334-339 [doi]
- Social Simulations for Border SecurityMaciej M. Latek, Seyed M. Mussavi Rizi, Andrew Crooks, Mark Fraser. 340-345 [doi]
- A Comparison of Invasive and Noninvasive Sensors in the Concealed Information TestJeffrey Gainer Proudfoot, Nathan W. Twyman, Judee K. Burgoon. 346-349 [doi]
- Performance and Risk Analysis for Border Management Applications: A Model-Driven Approach and a Perspective ViewMayra Sacanamboy, Bojan Cukic, Vittorio Cortellessa. 350-352 [doi]
- Benchmark Driven Framework for Development of Emotion Sensing Support SystemsSenya Polikovsky, Maria Alejandra Quiros-Ramirez, Yoshinari Kameda, Yuichi Ohta, Judee K. Burgoon. 353-355 [doi]
- Creation of an EU-Level Information Exchange Network in the Domain of Border SecurityGregorio Ameyugo, Michal Art, Ana Sofia Esteves, Jakub Piskorski. 356-358 [doi]
- The TALOS Project - Autonomous Robotic Patrol VehiclesMichal Tanas, Grzegorz Taberski, Witold Holubowicz, Krzysztof Samp, Agnieszka Spronska, Jakub Glówka, Mateusz Macias. 359-361 [doi]
- OptaSense: Fibre Optic Distributed Acoustic Sensing for Border MonitoringArchibald Owen, Gregory Duckworth, Jerry Worsley. 362-364 [doi]