Abstract is missing.
- The Effect of Personality Type on Deceptive Communication StyleTommaso Fornaciari, Fabio Celli, Massimo Poesio. 1-6 [doi]
- Issues for the Next Generation of Criminal Network Investigation ToolsUffe Kock Wiil. 7-14 [doi]
- Countering Plagiarism by Exposing Irregularities in Authors' GrammarMichael Tschuggnall, Günther Specht. 15-22 [doi]
- A Tool for Generating, Structuring, and Analyzing Multiple Hypotheses in Intelligence WorkTove Gustavi, Maja Karasalo, Christian Mårtenson. 23-30 [doi]
- How "Digital" is Traditional Crime?Lorena Montoya, Marianne Junger, Pieter Hartel. 31-37 [doi]
- Probability Analysis of Cyber Attack Paths against Business and Commercial Enterprise SystemsDmitry Dudorov, David Stupples, Martin Newby. 38-44 [doi]
- Analyzing Social Media Content for Security InformaticsRichard Colbaugh, Kristin Glass. 45-51 [doi]
- False Event Detection for Mobile Sinks in Wireless Sensor NetworksYuichi Sei, Akihiko Ohsuga. 52-59 [doi]
- Recent Advances in the Development of a Long-Text-Input Keystroke Biometric Authentication System for Arbitrary Text InputJohn V. Monaco, Ned Bakelman, Sung-Hyuk Cha, Charles C. Tappert. 60-66 [doi]
- The CriLiM Methodology: Crime Linkage with a Fuzzy MCDM ApproachFabrizio Albertetti, Paul Cotofrei, Lionel Grossrieder, Olivier Ribaux, Kilian Stoffel. 67-74 [doi]
- Crime Ridges: Exploring the Relationship between Crime Attractors and Offender MovementJustin Song, Valerie Spicer, Patricia L. Brantingham, Richard Frank. 75-82 [doi]
- A Bayesian Parametric Statistical Anomaly Detection Method for Finding Trends and Patterns in Criminal BehaviorAnders Holst, Björn Bjurling. 83-88 [doi]
- Challenges in Information Fusion Technology Capabilities for Modern Intelligence and Security ProblemsJames Llinas. 89-95 [doi]
- Semantic Linking and Contextualization for Social Forensic Text AnalysisZhaochun Ren, David van Dijk, David Graus, Nina van der Knaap, Hans Henseler, Maarten de Rijke. 96-99 [doi]
- Cross Domain Assessment of Document to HTML Conversion Tools to Quantify Text and Structural Loss during Document AnalysisKyle Goslin, Markus Hofmann. 100-105 [doi]
- Increasing NER Recall with Minimal Precision LossJasper Kuperus, Cor J. Veenman, Maurice van Keulen. 106-111 [doi]
- Digital-Forensics Based Pattern Recognition for Discovering Identities in Electronic EvidenceHans Henseler, Jop Hofste, Maurice van Keulen. 112-116 [doi]
- Cyber Crime in Privately Held Information Systems: Personal Data at StakeMariëlle den Hengst, Martijn Warnier. 117-120 [doi]
- Crime and Its Social Context: Analysis Using the Self-Organizing MapXingan Li, Martti Juhola. 121-124 [doi]
- Enabling Real Time Crime Intelligence Using Mobile GIS and Prediction MethodsM. Saravanan, Rakhi Thayyil, Shwetha Narayanan. 125-128 [doi]
- Visual Analysis of Heterogeneous NetworksBisharat Rasool Memon, Uffe Kock Wiil. 129-134 [doi]
- Semi-automatic Ontology Maintenance in the Virtuoso News Monitoring SystemFlorence Amardeilh, Wessel Kraaij, Martijn Spitters, Corné Versloot, Sinan Yurtsever. 135-138 [doi]
- Privacy and Security in Cyberspace: Training Perspectives on the Personal Data EcosystemJoni A. Amorim, Rose-Marie Åhlfeldt, Per M. Gustavsson, Sten F. Andler. 139-142 [doi]
- Integration of Media Sources for Situation Analysis in the Different Phases of Disaster Management: The QuOIMA ProjectGerhard Backfried, Johannes Göllner, Gerald Quirchmayr, Karin Rainer, Gert Kienast, Georg Thallinger, Christian Schmidt, Andreas Peer. 143-146 [doi]
- Consideration of Opportunity and Human Factor: Required Paradigm Shift for Information Security Risk ManagementLisa Rajbhandari. 147-150 [doi]
- Contextualisation of Geographical Scraped Data to Support Human Judgment and ClassificationLuca Mazzola, Aris Tsois, Tatyana Dimitrova, Elena Camossi. 151-154 [doi]
- Semantic Data Management: Sensor-Based Port Security Use CaseAnna Fensel, Michael Rogger, Tove Gustavi, Andreas Horndahl, Christian Mårtenson. 155-158 [doi]
- Physiological Signals: The Next Generation Authentication and Identification Methods!?Egon L. van den Broek, Martijn Spitters. 159-162 [doi]
- Tools and Methods for Security: Stimulating the Skill to PhilosophizeIordanis Kavathatzopoulos, Ryoko Asai, Mikael Laaksoharju. 163-165 [doi]
- Towards Offensive Cyber Counterintelligence: Adopting a Target-Centric View on Advanced Persistent ThreatsJohan Sigholm, Martin Bang. 166-171 [doi]
- National Security and Social Media Monitoring: A Presentation of the EMOTIVE and Related SystemsMartin D. Sykora, Thomas W. Jackson, Ann O'Brien, Suzanne Elayan. 172-175 [doi]
- Decentralized Fully Redundant Cyber Secure Governmental Communications ConceptJyri Rajamäki, Paresh Rathod, John Holmström. 176-181 [doi]
- Visualization of Container Movements through a Web-Based Geographical Information SystemTatyana Velikova Dimitrova, Aris Tsois, Elena Camossi. 182-185 [doi]
- Threats to Peace: Threat Perception and the Persistence or Desistance of Violent ConflictAmy Sliva, Mikhail Malyutov, Glenn Pierce, Xin Li. 186-189 [doi]
- Reconstruction and Exploration: Applications in CriminologyDennis Andersson, Mirko Thorstensson. 190-193 [doi]
- The Intelligence Cycle as a Tool for Effective Information Security Infrastructure DesignCarlos Francisco Lerma Resendez. 194-197 [doi]
- Law Enforcement Authorities' Legal Digital Evidence Gathering: Legal, Integrity and Chain-of-Custody RequirementJyri Rajamäki, Juha Knuuttila. 198-203 [doi]
- Keystroke Biometric Studies on Password and Numeric Keypad InputNed Bakelman, John V. Monaco, Sung-Hyuk Cha, Charles C. Tappert. 204-207 [doi]
- Detecting Key Players in Criminal Networks Using DynalinkAndrew J. Park, Herbert H. Tsang. 208-211 [doi]
- Societal Cyberwar Theory Applied: The Disruptive Power of State Actor Aggression for Public Sector Information SecurityJan Kallberg, Bhavani M. Thuraisingham, Erik Lakomaa. 212-215 [doi]
- Automated Counter-TerrorismLeslie Ball, Matthew Craven. 216 [doi]
- Fast Name Searching on GPUV. F. Pais, D. S. Ciobanu. 217 [doi]
- A New Redundant Tracking System for Emergency ResponseJyri Rajamäki, Paresh Rathod, Pasi Kamppi. 218 [doi]
- Radiated Emission from Handheld Devices with Touch-Screen LCDsKamaruddin Abdul Ghani, Kaharudin Dimyati, Khadijah Ismail, Latifah Sarah Supian. 219 [doi]
- Organization Network Construction and Understanding Based on Photo Face RecognitionBo Li, Duo-Yong Sun, Ju-Lei Fu, Zi-Han Lin. 220 [doi]
- Analysis of Terrorist Groups on FacebookAla Berzinji, Frzand Sherko Abdullah, Ali Hayder Kakei. 221 [doi]
- Assessment of Damage and Protective Capacity of Buildings Exposed to Weapon EffectsSebastian Bernhardsson, Rickard Forsen. 222 [doi]
- Service Standardization with Utility Computing and Service Oriented Architecture as a Tool for Public Protection and Disaster ReliefJyri Rajamäki, Paresh Rathod. 223 [doi]
- A Pilot Study of Using Honeypots as Cyber Intelligence SourcesUrban Bilstrup, Magdalena Rosenberg. 224 [doi]
- Browse and Search in Maritime Document CollectionsValentina Dragos. 225 [doi]
- Forensic Data Recovery from Android OS Devices: An Open Source ToolkitPatrick Dibb, Mohammad Hammoudeh. 226 [doi]
- Cloud Forensics: A Technical Approach to Virtual Machine AcquisitionLouis Antani Holt, Mohammad Hammoudeh. 227 [doi]
- Trusting Open Source InformationMarianela Garcia Lozano. 228 [doi]
- A Tool for Visualizing and Analyzing Users on Discussion BoardsAmendra Shrestha. 229 [doi]
- The Past, Present and Future of Text ClassificationNiklas Zechner. 230 [doi]
- Document Fraud Detection at the Border: Preliminary Observations on Human and Machine PerformanceMonica Gariup, Gustav Soederlind. 231-238 [doi]
- Exploiting Twitter for Border Security-Related Intelligence GatheringJakub Piskorski, Hristo Tanev, Alexandra Balahur. 239-246 [doi]
- Towards e-Passport Duplicate Enrollment Check in the European UnionMoazzam Butt, Sandra Marti, Alexander Nouak, Jörg Köplin, R. Raghavendra, Guoqiang Li. 247-251 [doi]
- The Checkpoint Simulation: A Tool for Informing Border Patrol Checkpoint Design and Resource AllocationJeffrey L. Jenkins, Jim Marquardson, Jeffrey Gainer Proudfoot, Joseph S. Valacich, Elyse Golob, Jay F. Nunamaker. 252-255 [doi]
- Mobile Digital Services for Border Protection: Standardization of Emergency Response VehiclesJyri Rajamäki. 256-261 [doi]
- Don't Lie to Me: The Impact of Deception on Vocalic and Linguistic SynchronyDebra L. Tower, Matthew L. Jensen, Norah E. Dunbar, Aaron C. Elkins. 262-265 [doi]
- Modeling Border Traffic Flow Using Cell Phone Header PacketsJoe S. Valacich, David W. Wilson, Jay F. Nunamaker, Elyse Golob. 266-268 [doi]
- Evaluating the Feasibility of Using Noncontact Sensors to Conduct a Targetless Concealed Information TestJeffrey Gainer Proudfoot. 269-272 [doi]
- OptaSense® Distributed Acoustic and Seismic Sensing Performance for Multi-threat, Multi-environment Border MonitoringGregory Duckworth, Archibald Owen, Jerry Worsley, Henry Stephenson. 273-276 [doi]
- A Multi-modal Biometric Fusion Implementation for ABC SystemsDaniel Cuesta Cantarero, David Antonio Perez Herrero, Fernando Martin Mendez. 277-280 [doi]
- Managing the Border, SmartlySandrine Trochu, Olivier Touret. 281-284 [doi]
- The 'Swiss Army Knife' Approach to Border Control: Multitasking in a Multi-threat WorldChris Hurrey. 285-288 [doi]
- Astute: Increased Situational Awareness through Proactive Decision Support and Adaptive Map-Centric User InterfacesBart Adams, Frank Suykens. 289-293 [doi]