Abstract is missing.
- Detecting Crime Series Based on Route Estimation and Behavioral SimilarityAnton Borg, Martin Boldt, Johan Eliasson. 1-8 [doi]
- An Inconvenient Truth: Algorithmic Transparency & Accountability in Criminal Intelligence ProfilingErik T. Zouave, Thomas Marquenie. 17-23 [doi]
- An Integrated Framework for the Timely Detection of Petty CrimesNikolaos Dimitriou, George Kioumourtzis, Anargyros Sideris, Georgios Stavropoulos, Evdoxia Taka, Nikolaos Zotos, George Leventakis, Dimitrios Tzovaras. 24-31 [doi]
- Towards a Breakthrough Speaker Identification Approach for Law Enforcement Agencies: SIIPKhaled Khelif, Yann Mombrun, Gerhard Backfried, Farhan Sahito, Luca Scarpato, Petr Motlícek, Srikanth R. Madikeri, Damien Kelly, Gideon Hazzani, Emmanouil Chatzigavriil. 32-39 [doi]
- Cyberbullying System Detection and AnalysisYee Jang Foong, Mourad Oussalah. 40-46 [doi]
- How Analysts Think: How Do Criminal Intelligence Analysts Recognise and Manage Significant Information?Celeste Groenewald, B. L. William Wong, Simon Attfield, Peter J. Passmore, Neesha Kodagoda. 47-53 [doi]
- Gender Classification with Data Independent Features in Multiple LanguagesTim Isbister, Lisa Kaati, Katie Cohen. 54-60 [doi]
- IoT Data Profiles: The Routines of Your Life Reveals Who You AreJohan Fernquist, Torbjorn Fangstrom, Lisa Kaati. 61-67 [doi]
- Interpretable Probabilistic Divisive Clustering of Large Node-Attributed NetworksLisa Kaati, Adam Ruul. 68-75 [doi]
- Text Mining in Unclean, Noisy or Scrambled Datasets for Digital Forensics AnalyticsKonstantinos F. Xylogiannopoulos, Panagiotis Karampelas, Reda Alhajj. 76-83 [doi]
- Detecting Periodic Subsequences in Cyber Security DataMatthew Price-Williams, Nick Heard, Melissa J. Turcotte. 84-90 [doi]
- Cyber Threat Intelligence Model: An Evaluation of Taxonomies, Sharing Standards, and Ontologies within Cyber Threat IntelligenceVasileios Mavroeidis, Siri Bromander. 91-98 [doi]
- Adversarial Machine Learning in Malware Detection: Arms Race between Evasion Attack and DefenseLingwei Chen, Yanfang Ye, Thirimachos Bourlai. 99-106 [doi]
- Customs Risk Analysis through the ConTraffic Visual Analytics ToolMikaela Poulymenopoulou, Aris Tsois. 107-114 [doi]
- Comparative Analysis of Crime Scripts: One CCTV Footage - Twenty-One ScriptsHervé Borrion, Hashem Dehghanniri, Yuanxi Li. 115-122 [doi]
- A Statistical Method for Detecting Significant Temporal Hotspots Using LISA StatisticsMartin Boldt, Anton Borg. 123-126 [doi]
- Whose Hands Are in the Finnish Cookie Jar?Jukka Ruohonen, Ville Leppänen. 127-130 [doi]
- A Survey of Intelligence Analysts' Perceptions of Analytic ToolsMandeep K. Dhami. 131-134 [doi]
- Large Scale Data Collection of Tattoo-Based Biometric Data from Social-Media WebsitesMichael Martin 0004, Jeremy M. Dawson, Thirimachos Bourlai. 135-138 [doi]
- Catchem: A Browser Plugin for the Panama Papers Using Approximate String MatchingPanos Kostakos, Miika Moilanen, Arttu Niemela, Mourad Oussalah. 139-142 [doi]
- Behavioural & Tempo-Spatial Knowledge Graph for Crime Matching through Graph TheoryNadeem Qazi, B. L. William Wong. 143-146 [doi]
- Behavioural Markers: Bridging the Gap between Art of Analysis and Science of Analytics in Criminal IntelligenceJunayed Islam, B. L. William Wong. 147-150 [doi]
- A Framework for Measuring Imagination in Visual Analytics SystemsMichael A. Bedek, Alexander Nussbaumer, Eva-Catherine Hillemann, Dietrich Albert. 151-154 [doi]
- Author Profiling in the WildLisa Kaati, Elias Lundeqvist, Amendra Shrestha, Maria Svensson. 155-158 [doi]
- Are We Really That Close Together? Tracing and Discussing Similarities and Differences between Greek Terrorist Groups Using Cluster AnalysisIoanna K. Lekea, Panagiotis Karampelas. 159-162 [doi]
- Photometrix (TM): A Digital Seal for Offline Identity Picture AuthenticationMarc M. Pic, Amine Ouddan. 163 [doi]
- How the Use of Ethically Sensitive Information Helps to Identify Co-Offenders via a Purposed Privacy Scale: A Pilot StudyPragya Paudyal, Chris Rooney, Neesha Kodagoda, B. L. William Wong, Penny Duquenoy, Nadeem Qazi. 164 [doi]
- Can an Automatic Tool Assess Risk of Radicalization Online? A Case Study on FacebookJavier Torregrosa, Irene Gilpérez-López, Raúl Lara-Cabrera, David Garriga, David Camacho. 165 [doi]
- A Monitoring Tool for Terrorism-Related Key-Players and Key-Communities in Social Media NetworksStelios Andreadis, Ilias Gialampoukidis, George Kalpakis, Theodora Tsikrika, Symeon Papadopoulos, Stefanos Vrochidis, Ioannis Kompatsiaris. 166 [doi]