Abstract is missing.
- Aegis: A Lightweight Tool for Prevent Frauds in Web BrowsersCarlo Marcelo Revoredo da Silva, Jose Lutiano Costa da Silva, Rodrigo Elia Assad, Ruy Jose Guerra Barretto Garcia. 1-8 [doi]
- DNSSEC Misconfigurations: How Incorrectly Configured Security Leads to UnreachabilityNiels L. M. van Adrichem, Antonio Reyes Lua, Xin Wang, Muhammad Wasif, Ficky Fatturrahman, Fernando A. Kuipers. 9-16 [doi]
- Overcoming Limited Collaboration Channels in Distributed Intelligence Analysis: Visualization Tools and Design SeedsBrian Prue, Michael Jenkins, Lauren D. Stern, Jonathan D. Pfautz. 17-24 [doi]
- Time-to-Event Modeling for Predicting Hacker IRC Community Participant TrajectoryVictor A. Benjamin, Hsinchun Chen. 25-32 [doi]
- Authorship Analysis of Inspire Magazine through Stylometric and Psychological FeaturesJennifer Sikos, Peter David, Nizar Habash, Reem Faraj. 33-40 [doi]
- The Nature of Communications and Emerging Communities on Twitter Following the 2013 Syria Sarin Gas AttacksYulia Tyshchuk, William A. Wallace, Hao Li, Heng Ji, Sue E. Kase. 41-47 [doi]
- Twitter Sentiment Analysis for Security-Related Information GatheringAnna Jurek, Yaxin Bi, Maurice D. Mulvenna. 48-55 [doi]
- Descriptive Analytics: Examining Expert Hackers in Web ForumsAhmed Abbasi, Weifeng Li, Victor A. Benjamin, Shiyu Hu, Hsinchun Chen. 56-63 [doi]
- Identifying Top Sellers In Underground Economy Using Deep Learning-Based Sentiment AnalysisWeifeng Li, Hsinchun Chen. 64-67 [doi]
- Time Critical Disinformation Influence Minimization in Online Social NetworksChuan Luo, Kainan Cui, Xiaolong Zheng, Daniel Dajun Zeng. 68-74 [doi]
- A Selective Defense for Application Layer DDoS AttacksYuri Gil Dantas, Vivek Nigam, Iguatemi E. Fonseca. 75-82 [doi]
- Time Profiles for Identifying Users in Online EnvironmentsFredrik Johansson, Lisa Kaati, Amendra Shrestha. 83-90 [doi]
- ALPD: Active Learning Framework for Enhancing the Detection of Malicious PDF FilesNir Nissim, Aviad Cohen, Robert Moskovitch, Asaf Shabtai, Mattan Edry, Oren Bar-Ad, Yuval Elovici. 91-98 [doi]
- Predicting Popularity of Forum Threads for Public Events SecurityQingchao Kong, Wenji Mao, Daniel Dajun Zeng, Lei Wang. 99-106 [doi]
- Predicting Links in Multi-relational NetworksBisharat Rasool Memon, Uffe Kock Wiil. 107-114 [doi]
- Practical Interception of DECT Encrypted Voice Communication in Unified Communications EnvironmentsIwen Coisel, Ignacio Sanchez. 115-122 [doi]
- Mining the Web for Sympathy: The Pussy Riot CaseAnders Westling, Joel Brynielsson, Tove Gustavi. 123-128 [doi]
- Resource-Based Event Reconstruction of Digital Crime ScenesYi-Ching Liao, Hanno Langweg. 129-136 [doi]
- Inferring itineraries of containerized cargo through the application of Conditional Random FieldsPedro Chahuara, Luca Mazzola, Michail Makridis, Claudio Schifanella, Aris Tsois, Mauro Pedone. 137-144 [doi]
- Trusted Detection of Sensitive Activities on Mobile Phones Using Power Consumption MeasurementsMordechai Guri, Gabi Kedma, Boris Zadov, Yuval Elovici. 145-151 [doi]
- Resilience of Anti-malware Programs to Naïve Modifications of Malicious BinariesMordechai Guri, Gabi Kedma, Assaf Kachlon, Yuval Elovici. 152-159 [doi]
- On the Usability of Augmented Reality for Information Exchange in Teams from the Security DomainDragos Datcu, Marina-Anca Cidotã, Heide Lukosch, Stephan Lukosch. 160-167 [doi]
- Understanding the Factors Affecting UX and Technology Acceptance in the Context of Automated Border ControlsMari Ylikauppila, Sirra Toivonen, Minna Kulju, Minna Jokela. 168-175 [doi]
- Addressing the Increasing Volume and Variety of Digital Evidence Using an OntologyOwen Brady, Richard E. Overill, Jeroen Keppens. 176-183 [doi]
- Modelling and Analysis of Identity Threat Behaviors through Text Mining of Identity Theft StoriesYongpeng Yang, Monisha Manoharan, K. Suzanne Barber. 184-191 [doi]
- Maritime Situation Analysis: A Multi-vessel Interaction and Anomaly Detection FrameworkHamed Yaghoubi Shahir, Uwe Glässer, Narek Nalbandyan, Hans Wehn. 192-199 [doi]
- On the Adequacy of Performance Models in an Adaptive Border Inspection Management SystemJesse Musgrove, Bojan Cukic, Vittorio Cortellessa. 200-207 [doi]
- Land Border Permeability and Irregular Migration Using Geospatial Intelligence from Satellite DataA. C. van den Broek, R. M. Schoemaker, R. J. Dekker. 208-211 [doi]
- Studies of Integration Readiness Levels: Case Shared Maritime Situational Awareness SystemRauno Pirinen. 212-215 [doi]
- Threat Detection in Tweets with Trigger Patterns and Contextual CuesMartijn Spitters, Pieter T. Eendebak, Daniel T. H. Worm, Henri Bouma. 216-219 [doi]
- Towards a Comprehensive Insight into the Thematic Organization of the Tor Hidden ServicesMartijn Spitters, Stefan Verbruggen, Mark van Staalduinen. 220-223 [doi]
- A Case Study in Opportunity Reduction: Mitigating the Dirt Jumper Drive-Smart AttackJoel Lathrop, James B. O'Kane. 224-227 [doi]
- Security Components in a One-Stop-Shop Border Control SystemAxel Weissenfeld, Andreas Kriechbaum-Zabini, Lukasz Szklarski. 228-231 [doi]
- Uninvited Connections: A Study of Vulnerable Devices on the Internet of Things (IoT)Mark Patton, Eric Gross, Ryan Chinn, Samantha Forbis, Leon Walker, Hsinchun Chen. 232-235 [doi]
- Ranking Online Memes in Emergency Events Based on Transfer EntropySaike He, Xiaolong Zheng, Xiuguo Bao, Hongyuan Ma, Daniel Dajun Zeng, Bo Xu, Guanhua Tian, Hongwei Hao. 236-239 [doi]
- Challenges to a Smooth-Running Data Security Audits. Case: A Finnish National Security Auditing Criteria KATAKRIJyri Rajamäki. 240-243 [doi]
- Three Statistical Approaches to Sessionizing Network Flow DataPatrick Rubin-Delanchy, Daniel J. Lawson, Melissa J. Turcotte, Nicholas Heard, Niall M. Adams. 244-247 [doi]
- Statistical Frameworks for Detecting Tunnelling in Cyber Defence Using Big DataDaniel J. Lawson, Patrick Rubin-Delanchy, Nicholas Heard, Niall M. Adams. 248-251 [doi]
- Adaptive Change Detection for Relay-Like BehaviourDean Adam Bodenham, Niall M. Adams. 252-255 [doi]
- An Approximate Framework for Flexible Network Flow ScreeningNiall M. Adams, Daniel J. Lawson. 256-259 [doi]
- Causal Inference in Social Media Using Convergent Cross MappingChuan Luo, Xiaolong Zheng, Daniel Dajun Zeng. 260-263 [doi]
- Exfiltration of Information from Air-Gapped Machines Using Monitor's LED IndicatorVitali Sepetnitsky, Mordechai Guri, Yuval Elovici. 264-267 [doi]
- Filtering Automated Polling Traffic in Computer Network Flow DataNick Heard, Patrick Rubin-Delanchy, Daniel J. Lawson. 268-271 [doi]
- Modelling New Edge Formation in a Computer Network through Bayesian Variable SelectionSilvia Metelli, Nicholas Heard. 272-275 [doi]
- Automatic Timeline Construction and Analysis for Computer Forensics PurposesYoan Chabot, Aurélie Bertaux, Christophe Nicolle, M. Tahar Kechadi. 276-279 [doi]
- A Service-Indepenent Model for Linking Online User Profile InformationMatthew John Edwards, Awais Rashid, Paul Rayson. 280-283 [doi]
- Exploring Opinion Dynamics in Security-Related Microblog DataYuhao Zhang, Wenji Mao, Daniel Dajun Zeng, Ning Zhao, Xiuguo Bao. 284-287 [doi]
- Multiagent Models for Police Resource Allocation and DispatchRicardo Guedes, Vasco Furtado, Tarcisio H. C. Pequeno. 288-291 [doi]
- Application of a Linear Time Method for Change Point Detection to the Classification of SoftwareAlexander Bolton, Nicholas Heard. 292-295 [doi]
- How Analysts Think (?): Early ObservationsB. L. William Wong. 296-299 [doi]
- Optical Security Document Simulator for Black-Box Testing of ABC SystemsMichael Gschwandtner, Svorad Stolc, Franz Daubner. 300-303 [doi]
- Forecasting Country Stability in North AfricaSteven Banaszak, Elizabeth K. Bowman, John P. Dickerson, V. S. Subrahmanian. 304-307 [doi]
- AccountabilityFS: A File System Monitor for Forensic ReadinessRune Nordvik, Yi-Ching Liao, Hanno Langweg. 308-311 [doi]
- Foraging Online Social NetworksGijs Koot, Mirjam A. A. Huis in 't Veld, Joost Hendricksen, Rianne Kaptein, Arnout de Vries, Egon L. van den Broek. 312-315 [doi]
- CAPER: Collaborative Information, Acquisition, Processing, Exploitation and Reporting for the Prevention of Organised CrimeGila Molcho, Sebastian Maier, Felipe Melero, Carlo Aliprandi. 316 [doi]
- Detecting Threats of Violence in Online Discussions Using Bigrams of Important WordsHugo Lewi Hammer. 319 [doi]
- Learning to Classify Hate and Extremism Promoting TweetsAshish Sureka, Swati Agarwal 0001. 320 [doi]
- Recommending Documents for Complex Question Exploration by Analyzing Browsing BehaviorAlya Abbott, Olga Simek. 321 [doi]
- Passwords are Dead: Alternative Authentication MethodsMichael Bachmann. 322 [doi]
- Sensemaking and Cognitive Bias Mitigation in Visual AnalyticsMargit Pohl, Lisa-Christina Winter, Chris Pallaris, Simon Attfield, B. L. William Wong. 323 [doi]
- Metal Oxide Gas Sensors Technologies for Hidden People DetectionAndrea Ponzoni, Dario Zappa, Cristina Cerqui, Elisabetta Comini, Giorgio Sberveglieri. 324 [doi]
- Towards a Methodology for Cybersecurity Risk Management Using Agents ParadigmEdgar Toshiro Yano, Parth Bhatt, Per M. Gustavsson, Rose-Marie Åhlfeldt. 325 [doi]
- Computational Approach for Detection of Illegal Activity over the InternetRasim Alguliyev, Davud Rustamov, Mirza Rzayev. 326 [doi]
- POLAR-An Interactive Patterns of Life Visualisation Tool for Intelligence AnalysisNeesha Kodagoda, Simon Attfield, Phong H. Nguyen, Leishi Zhang, Kai Xu, B. L. William Wong, Adrian Wagstaff, Graham Phillips, James Bulloch, John Marshall, Stewart Bertram. 327 [doi]
- Modeling Flash Mobs in Cybernetic Space: Evaluating Threats of Emerging Socio-Technical Behaviors to Human SecuritySamer Al-khateeb, Nitin Agarwal. 328 [doi]
- Military Geospatial Profiling AnalysisHerman-Dick Giok Tjiang Oey. 329-330 [doi]
- Robust Navigation and Communication in the Maritime Domain: The TRITON ProjectMarco Pini, Luca Pilosu, Lene Vesterlund, David Blanco, Fredrik Lindström, Emiliano Spaltro. 331 [doi]
- Detection of Olfactory Traces by Orthogonal Gas Identification Technologies - DOGGIESI. Daniilidis, J.-J. Filippi, Wolfgang Vautz, Enrico Dalcanale, Stefano Zampolli, George Leventakis, I. Kauppinen, S. Sinisalo, Vasilis Tsoulkas, V. Kassouras, M. Carras, B. Gerard, R. Pinalli, A. Ragnoni, L. Dujourdy, D. Zavali, M. Brun, V. Grizis, Apostolos Argyris, Dimitris Syvridis. 332 [doi]
- When Counting is Not Enough: Limitations of NSA's Effectiveness Assessment of Surveillance TechnologyMichelle Cayford, Coen van Gulijk, P. H. A. J. M. Van Gelder. 333 [doi]
- DOCSCOPE: ID Printing Techniques SignaturesMarc Michel Pic, Clarisse Mandridake, Mathieu Hoarau, Kevin Win-Lime. 334 [doi]