Abstract is missing.
- Predicting the Offender: Frequency versus BayesAugust Daniel Sutmuller, Mariëlle den Hengst, Ana Isabel Barros, Bob van der Vecht, Wouter Noordkamp, Pieter H. A. J. M. Van Gelder. 1-8 [doi]
- Prototype and Analytics for Discovery and Exploitation of Threat Networks on Social MediaOlga Simek, Danelle C. Shah, Andrew Heier. 9-16 [doi]
- A model of quantifying social relationshipsDisa Sariola. 17-23 [doi]
- Identification and Detection of Human Trafficking Using Language ModelsJessica Zhu, Lin Li, Cara Jones. 24-31 [doi]
- Statistical Analysis of Identity Risk of Exposure and Cost Using the Ecosystem of Identity AttributesChia-Ju Chen, Razieh Nokhbeh Zaeem, K. Suzanne Barber. 32-39 [doi]
- Attack Hypothesis GenerationAviad Elitzur, Rami Puzis, Polina Zilberman. 40-47 [doi]
- Continuous Authentication of Smartphone Users via Swipes and Taps AnalysisAlina Garbuz, Anna Epishkina, Konstantin Kogos. 48-53 [doi]
- A comparative study of clustering methods using word embeddingsNikolaos Bastas, George Kalpakis, Theodora Tsikrika, Stefanos Vrochidis, Ioannis Kompatsiaris. 54-61 [doi]
- Extracting Account Attributes for Analyzing Influence on TwitterJohan Fernquist, Ola Svenonius, Lisa Kaati, Fredrik Johansson. 62-69 [doi]
- Firearm Detection and Segmentation Using an Ensemble of Semantic Neural NetworksAlexander Egiazarov, Vasileios Mavroeidis, Fabio Massimo Zennaro, Kamer Vishi. 70-77 [doi]
- Devising and Optimizing Crowd Control Strategies Using Agent-Based Modeling and SimulationAndrew J. Park, Lee D. Patterson, Herbert H. Tsang, Ryan Ficocelli, Valerie Spicer, Justin Song. 78-84 [doi]
- Evaluation of Deep Learning Models for Ear Recognition Against Image DistortionsSusan El-Naggar, Thirimachos Bourlai. 85-93 [doi]
- HOTSPOT: Crossing the Air-Gap Between Isolated PCs and Nearby Smartphones Using TemperatureMordechai Guri. 94-100 [doi]
- Mining Security discussions in Suomi24Eetu Haapamäki, Juho Mikkola, Markus Hirsimäki, Mourad Oussalah 0002. 101-108 [doi]
- Identifying Deceptive Reviews: Feature Exploration, Model Transferability and Classification AttackMarianela García Lozano, Johan Fernquist. 109-116 [doi]
- Characterization of Disinformation Networks Using Graph Embeddings and Opinion MiningOlga Simek, Alyssa C. Mensch, Lin Li, Charlie K. Dagli. 117-120 [doi]
- Semi-Automatic Geometric Normalization of Profile FacesJustin Romeo, Thirimachos Bourlai. 121-125 [doi]
- Remote KYC: Attacks and Counter-MeasuresMarc Pic, Gaël Mahfoudi, Anis Trabelsi. 126-129 [doi]
- Privacy preserving sentiment analysis on multiple edge data streams with Apache NiFiAbhinay Pandya, Panos Kostakos, Hassan Mehmood, Marta Cortés, Ekaterina Gilman, Mourad Oussalah 0002, Susanna Pirttikangas. 130-133 [doi]
- Crime Prediction Using Hotel Reviews?Panos Kostakos, Somkiadcharoen Robroo, Bofan Lin, Mourad Oussalah 0002. 134-137 [doi]
- The Directive 2014/41/UE - The European Investigation OrderFabrizia Bemer. 138 [doi]
- Timing Covert Channels Detection Cases via Machine LearningAnna Epishkina, Mikhail Finoshin, Konstantin Kogos, Aleksandra Yazykova. 139 [doi]
- Mobile User Authentication Using Keystroke DynamicsDaria Frolova, Anna Epishkina, Konstantin Kogos. 140 [doi]