Abstract is missing.
- Quality Assurance for Security Applications of Big DataRoger Clarke. 1-8 [doi]
- On Interoperability of Security Document Reading DevicesSvorad Stolc, Peter Wild, Kristián Valentín, Franz Daubner, Markus Clabian. 9-15 [doi]
- Location, Location, Location: Mapping Potential Canadian Targets in Online Hacker Discussion ForumsRichard Frank, Mitch Macdonald, Bryan Monk. 16-23 [doi]
- The Role of Internet Service Providers in Botnet MitigationJeroen Pijpker, Harald P. E. Vranken. 24-31 [doi]
- Risk Kit: Highlighting Vulnerable Identity Assets for Specific Age GroupsRazieh Nokhbeh Zaeem, Monisha Manoharan, K. Suzanne Barber. 32-38 [doi]
- How to Support the Decision Making in Crisis Context?Bénédicte Goujon. 39-44 [doi]
- Providing Extensibility to Threat Modelling in Cloud-COVER's Underlying Analysis ModelMustafa Aydin, Jeremy L. Jacob. 45-51 [doi]
- Methodology and Tool to Facilitate Structured Analysis of Multiple HypothesesMagdalena Granåsen, Maja Karasalo. 52-59 [doi]
- Towards Designing a Multipurpose Cybercrime Intelligence FrameworkMariam Nouh, Jason R. C. Nurse, Michael Goldsmith. 60-67 [doi]
- How Analysts Think: Think-steps as a Tool for Structuring Sensemaking in Criminal Intelligence AnalysisNallini Selvaraj, Simon Attfield, Peter J. Passmore, B. L. William Wong. 68-75 [doi]
- Compression Effects on Security Document ImagesPeter Wild, Svorad Stolc, Kristián Valentin, Franz Daubner, Markus Clabian. 76-79 [doi]
- Cards, Money and Two Hacking Forums: An Analysis of Online Money Laundering SchemesAlexander Mikhaylov, Richard Frank. 80-83 [doi]
- Information Security Aspects of the Public Safety Data Interoperability NetworkBlaz Ivanc, Borka Jerman-Blazic. 88-91 [doi]
- Filtering Estimated Crime Series Based on Route Calculations on Spatio-temporal DataMartin Boldt, Jaswanth Bala. 92-95 [doi]
- Disaster Risk Reduction for International Residents in Japan: Barriers and Facilitators to Knowledge Sharing in Times of DisasterJiro Usugami. 96-99 [doi]
- Discovering Knowledge in Online Drug Transactions Using Conceptual Graphs and Formal Concept AnalysisConstantinos Orphanides, Babak Akhgar, Petra Saskia Bayerl. 100-103 [doi]
- Sentiment-based Classification of Radical Text on the WebRyan Scrivens, Richard Frank. 104-107 [doi]
- My Name is Legion: Estimating Author Counts Based on Stylistic DiversityJohanna Björklund, Niklas Zechner. 108-111 [doi]
- Key Player Identification in Terrorism-Related Social Media Networks Using Centrality MeasuresIlias Gialampoukidis, George Kalpakis, Theodora Tsikrika, Stefanos Vrochidis, Ioannis Kompatsiaris. 112-115 [doi]
- QUIN: Providing Integrated Analysis Support to Crime InvestigatorsSelmar Smit, Bob van der Vecht, Freek van Wermeskerken, Jan Willem Streefkerk. 120-123 [doi]
- But I did not Mean It! - Intent Classification of Racist Posts on TumblrSwati Agarwal 0001, Ashish Sureka. 124-127 [doi]
- Missing Solutions in the Fight against Cybercrime and Cyberterrorism - The New EU Research AgendaBorka Jerman-Blazic, Tomaz Klobucar. 128-131 [doi]
- How Analysts Think: Decision Making in the Absence of Clear FactsMatylda Gerber, B. L. William Wong, Neesha Kodagoda. 132-135 [doi]
- Personal Information Leakage During Password Recovery of Internet ServicesMordechai Guri, Eyal Shemer, Dov Shirtz, Yuval Elovici. 136-139 [doi]
- Design for Intelligence Analysis of Complex Systems: Evolution of Criminal NetworksPatrick Seidler, Johanna Haider, Neesha Kodagoda, B. L. William Wong, Margit Pohl, Richard Adderley. 140-143 [doi]
- A Post-Mortem Empirical Investigation of the Popularity and Distribution of Malware Files in the Contemporary Web-Facing InternetJukka Ruohonen, Sanja Scepanovic, Sami Hyrynsalmi, Igor Mishkovski, Tuomas Aura, Ville Leppänen. 144-147 [doi]
- A Framework for Cognitive Bias Detection and Feedback in a Visual Analytics EnvironmentAlexander Nussbaumer, Katrien Verbert, Eva-Catherine Hillemann, Michael A. Bedek, Dietrich Albert. 148-151 [doi]
- Critical Review of Analytic TechniquesMandeep K. Dhami, Ian K. Belton, Kathryn E. Careless. 152-155 [doi]
- Modified Graphstega Based on Chart Scale ModificationAprianti Nanda Sari, Ari Moesriami Barmawi. 156-159 [doi]
- A Security Analysis on Apple PayAshay S. Jawale, Joon S. Park. 160-163 [doi]
- Enhancing Risk-Based Decisions by Leveraging Cyber Security AutomationTina Alsadhan, Joon S. Park. 164-167 [doi]
- Text Authorship Verification through WatermarkingStefano Giovanni Rizzo, Flavio Bertini, Danilo Montesi. 168-171 [doi]
- On Privacy and Security Challenges in Smart Connected HomesJoseph Bugeja, Andreas Jacobsson, Paul Davidsson. 172-175 [doi]
- An Argumentative-Narrative Risk Assessment ModelFloris Bex, Bas Hovestad. 176-179 [doi]
- A Quantitative Approach to Risk and Cost Assessment in Supply Chain ManagementLinus Gisslén, Andreas Horndahl. 180-183 [doi]
- A Behavioral Biometrics User Authentication Study Using Motion Data from Android SmartphonesJavid Maghsoudi, Charles C. Tappert. 184-187 [doi]
- Random Delays to Limit Timing Covert ChannelAnna Belozubova, Anna Epishkina, Konstantin Kogos. 188-191 [doi]
- A Framework and Prototype for A Socio-Technical Security Information and Event Management System (ST-SIEM)Bilal Al Sabbagh, Stewart Kowalski. 192-195 [doi]
- Forecasting the Underlying Psychological Forces to Political Violence through Big Data Symbol MiningNiklas Hageback. 196 [doi]
- Role of Author Personality Traits for Identifying Intent Based Racist PostsSwati Agarwal 0001, Ashish Sureka. 197 [doi]
- Towards Efficient Law Enforcement Decision Support Systems in the Area of Community Policing: The Use of Mobile ApplicationsGeorge Leventakis, George Papalexandratos, George Kokkinis, Elisavet Charalambous, Nikolaos Koutras. 198 [doi]
- Multilayer Analysis of Online Illicit MarketplacesMichael Ashcroft, Matteo Magnani, Davide Vega, Danilo Montesi, Luca Rossi 0003. 199 [doi]
- The IPATCH System for Maritime Surveillance and Piracy Threat ClassificationMaria Andersson, Ronnie Johansson, Karl-Goran Stenborg, Robert Forsgren, Thomas Cane, Grzegorz Taberski, Luis Patino, James M. Ferryman. 200 [doi]
- Present Status and Challenges in Cloud Monitoring Framework: A SurveyAws Naser, Mohamed Fadli Bin Zolkipli, Shahid Anwar, Muna Sulieman Al-Hawawreh. 201 [doi]
- A Dedicated Crawling Engine to Reduce Apps Distribution RisksMarc Michel Pic. 202 [doi]
- Harnessing Crowds to Avert or Mitigate Acts Terrorism: A Collective Intelligence Call for ActionHaibo Li 0001, Anders Hedman. 203 [doi]