2018 European Intelligence and Security Informatics Conference (EISIC)最新文献

筛选
英文 中文
Digital Transformation in Border Checks: Mapping Border Guard Training in Automated Processes 边境检查的数字化转型:在自动化过程中绘制边境警卫培训
2018 European Intelligence and Security Informatics Conference (EISIC) Pub Date : 2018-10-01 DOI: 10.1109/EISIC.2018.00017
Laura Salmela, Sirra Toivonen, Minna Kulju, Mari Ylikauppila
{"title":"Digital Transformation in Border Checks: Mapping Border Guard Training in Automated Processes","authors":"Laura Salmela, Sirra Toivonen, Minna Kulju, Mari Ylikauppila","doi":"10.1109/EISIC.2018.00017","DOIUrl":"https://doi.org/10.1109/EISIC.2018.00017","url":null,"abstract":"Automated border control represents one area in the digital transformation of border control. It is gradually becoming a commonplace particularly at air borders, where the concept of self-service has had the strongest business case also in other steps of the passenger's journey, such as check-in or baggage drop. Besides providing a means to enhance efficiency and security in passenger clearing processes, the new technology significantly reshapes current ways of conducting border checks from employee perspective. Successful implementation of automated border check technologies thus demands border organizations to equip their workforce with new skills and remodel existing ones. This paper presents a preliminary analysis on current technology training of border guards and assesses its effects on how the new technology is received among employees at the frontline. The results are based on field studies conducted in five EU member states. The study loosely applies a Technology Training Model that extends traditional Technology Acceptance Model by incorporating training as an additional variable to explain employee intention to use new technology.","PeriodicalId":110487,"journal":{"name":"2018 European Intelligence and Security Informatics Conference (EISIC)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128921407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using Wearable Device Data in a Criminal Investigation: A Preliminary Study 在刑事调查中使用可穿戴设备数据:初步研究
2018 European Intelligence and Security Informatics Conference (EISIC) Pub Date : 2018-10-01 DOI: 10.1109/EISIC.2018.00023
Sarah McNary, Aaron Hunter
{"title":"Using Wearable Device Data in a Criminal Investigation: A Preliminary Study","authors":"Sarah McNary, Aaron Hunter","doi":"10.1109/EISIC.2018.00023","DOIUrl":"https://doi.org/10.1109/EISIC.2018.00023","url":null,"abstract":"Wearable devices collect and share data through social networks accessed by a smartphone. We can therefore view the smartphone carried by a criminal suspect as a central repository of information that may be useful in a criminal investigation. In this paper, we look at a simple case study involving a wearable fitness tracker. In particular, we try to determine if a phone synced with a fitness tracker can provide evidence related to the execution of a violent act.","PeriodicalId":110487,"journal":{"name":"2018 European Intelligence and Security Informatics Conference (EISIC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132222625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optical Covert Channel from Air-Gapped Networks via Remote Orchestration of Router/Switch LEDs 通过路由器/开关led的远程编排从气隙网络的光隐蔽通道
2018 European Intelligence and Security Informatics Conference (EISIC) Pub Date : 2018-10-01 DOI: 10.1109/EISIC.2018.00016
Mordechai Guri
{"title":"Optical Covert Channel from Air-Gapped Networks via Remote Orchestration of Router/Switch LEDs","authors":"Mordechai Guri","doi":"10.1109/EISIC.2018.00016","DOIUrl":"https://doi.org/10.1109/EISIC.2018.00016","url":null,"abstract":"Air-gapped networks are separated from the Internet due to the sensitive information they stores. It is shown that attackers can use the status LEDs of routers and switches to exfiltrate data optically. However, the current methods require the compromise of the network device (e.g., router) by infecting its firmware. In this paper we show how attackers can covertly leak sensitive data from air-gapped networks via the row of status LEDs on non-compromised networking equipment such as LAN switches and routers. We introduce new types of attack called host-level attack, in which a malicious code run in a host connected to the network can indirectly control the LEDs, without requiring a code execution within the LAN switch or router. We present a version of the host-level attack that doesn't require special privileges (e.g., root or admin) and is also effective when running from within a Virtual Machine (VM), despite the network isolation. We provide the technical background and implementation details and discuss set of preventive countermeasures.","PeriodicalId":110487,"journal":{"name":"2018 European Intelligence and Security Informatics Conference (EISIC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125426607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Policing The Cyber Threat: Exploring the Threat from Cyber Crime and the Ability of Local Law Enforcement to Respond 网络威胁的监管:探讨网络犯罪的威胁和地方执法部门的应对能力
2018 European Intelligence and Security Informatics Conference (EISIC) Pub Date : 2018-10-01 DOI: 10.1109/EISIC.2018.00011
M. Hull, Ted C. Eze, Lee Speakman
{"title":"Policing The Cyber Threat: Exploring the Threat from Cyber Crime and the Ability of Local Law Enforcement to Respond","authors":"M. Hull, Ted C. Eze, Lee Speakman","doi":"10.1109/EISIC.2018.00011","DOIUrl":"https://doi.org/10.1109/EISIC.2018.00011","url":null,"abstract":"The landscape in which UK policing operates today is a dynamic one, and growing threats such as the proliferation of cyber crime are increasing the demand on police resources. The response to cyber crime by national and regional law enforcement agencies has been robust, with significant investment in mitigating against, and tackling cyber threats. However, at a local level, police forces have to deal with an unknown demand, whilst trying to come to terms with new crime types, terminology and criminal techniques which are far from traditional. This paper looks to identify the demand from cyber crime in one police force in the United Kingdom, and whether there is consistency in the recording of crime. As well as this, it looks to understand whether the force can deal with cyber crime from the point of view of the Police Officers and Police Staff in the organisation.","PeriodicalId":110487,"journal":{"name":"2018 European Intelligence and Security Informatics Conference (EISIC)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122695019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Towards Mobile Contactless 4-Fingerprint Authentication for Border Control 面向边境管制的移动非接触式4指纹认证
2018 European Intelligence and Security Informatics Conference (EISIC) Pub Date : 2018-10-01 DOI: 10.1109/EISIC.2018.00020
Axel Weissenfeld, A. Zoufal, Christoph Weiß, B. Strobl, G. F. Domínguez
{"title":"Towards Mobile Contactless 4-Fingerprint Authentication for Border Control","authors":"Axel Weissenfeld, A. Zoufal, Christoph Weiß, B. Strobl, G. F. Domínguez","doi":"10.1109/EISIC.2018.00020","DOIUrl":"https://doi.org/10.1109/EISIC.2018.00020","url":null,"abstract":"In the last years the importance of biometric authentication in border control procedures increased in a way that biometrics have become the core of most border management systems. Current commercial products for mobile border control have not satisfactorily solved both the demand for increasing security checks and the user requirements driven by security personnel such as border guards yet. Due to their flexibility, portable devices are commonly desired during the control process. This paper presents on-going work of an advanced mobile device for border control focusing on usability and integrating new technologies to envision next-generation of mobile devices. The device is based on the MobilePass device [13] but significantly improved. A key technology of the new device is a contactless 4-fingerprint authentication instead of only one in existing solutions. Results based on real data shows the advantages of 4-fingerprint versus 1-fingerprint authentication.","PeriodicalId":110487,"journal":{"name":"2018 European Intelligence and Security Informatics Conference (EISIC)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122331421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Inferring Demographic Data of Marginalized Users in Twitter with Computer Vision APIs 用计算机视觉api推断Twitter边缘用户的人口统计数据
2018 European Intelligence and Security Informatics Conference (EISIC) Pub Date : 2018-10-01 DOI: 10.1109/EISIC.2018.00022
Panos Kostakos, Abhinay Pandya, Olga Kyriakouli, M. Oussalah
{"title":"Inferring Demographic Data of Marginalized Users in Twitter with Computer Vision APIs","authors":"Panos Kostakos, Abhinay Pandya, Olga Kyriakouli, M. Oussalah","doi":"10.1109/EISIC.2018.00022","DOIUrl":"https://doi.org/10.1109/EISIC.2018.00022","url":null,"abstract":"Inferring demographic intelligence from unlabeled social media data is an actively growing area of research, challenged by low availability of ground truth annotated training corpora. High-accuracy approaches for labeling demographic traits of social media users employ various heuristics that do not scale up and often discount non-English texts and marginalized users. First, we present a framework for inferring the demographic attributes of Twitter users from their profile pictures (avatars) using the Microsoft Azure Face API. Second, we measure the inter-rater agreement between annotations made using our framework against two pre-labeled samples of Twitter users (N1=1163; N2=659) whose age labels were manually annotated. Our results indicate that the strength of the inter-rater agreement (Gwet's AC1=0.89; 0.90) between the gold standard and our approach is ‘very good’ for labelling the age group of users. The paper provides a use case of Computer Vision for enabling the development of large cross-sectional labeled datasets, and further advances novel solutions in the field of demographic inference from short social media texts.","PeriodicalId":110487,"journal":{"name":"2018 European Intelligence and Security Informatics Conference (EISIC)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133617719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
On Wash Trade Detection in Energy Markets 论能源市场的洗仓交易检测
2018 European Intelligence and Security Informatics Conference (EISIC) Pub Date : 2018-04-17 DOI: 10.1109/EISIC.2018.00018
U. Akhmedov
{"title":"On Wash Trade Detection in Energy Markets","authors":"U. Akhmedov","doi":"10.1109/EISIC.2018.00018","DOIUrl":"https://doi.org/10.1109/EISIC.2018.00018","url":null,"abstract":"A wash trade in energy markets refers to entering into arrangements for the sale or purchase of a financial or physical instrument, a related spot commodity contract, or an auctioned product based on emission allowances, where there is no change in beneficial interests or market risk or where beneficial interest or market risk is transferred between parties who are acting in concert or collusion. Market abuse scenarios such as wash trade compromise the efficiency and integrity of energy markets. The research of abusive trading behavior in financial markets is well ahead of peers in energy markets. Effective solutions for monitoring abusive scenarios such as wash trade in energy markets are yet to be developed. This paper describes a practical implementation example of detecting wash trade behavior in energy markets using simple techniques. An easily reusable method is then proposed to detect the potential wash trade activities involved in an instrument by first detecting trades resulting in no overall change in market risk and then further identifying the collusive behavior between the counterparties. The proposed method is tested and evaluated on energy instruments order data sets from the Trayport trading platform. We find that the proposed approach can effectively detect all primary wash trade indicators across energy instruments.","PeriodicalId":110487,"journal":{"name":"2018 European Intelligence and Security Informatics Conference (EISIC)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121840704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信