2013 European Intelligence and Security Informatics Conference最新文献

筛选
英文 中文
Modeling Border Traffic Flow Using Cell Phone Header Packets 使用手机报头包建模边界交通流
2013 European Intelligence and Security Informatics Conference Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.68
J. Valacich, David W. Wilson, J. Nunamaker, E. Golob
{"title":"Modeling Border Traffic Flow Using Cell Phone Header Packets","authors":"J. Valacich, David W. Wilson, J. Nunamaker, E. Golob","doi":"10.1109/EISIC.2013.68","DOIUrl":"https://doi.org/10.1109/EISIC.2013.68","url":null,"abstract":"This research in progress paper describes a novel approach for improving resource allocation decision-making at ports of entry along a border. The approach involves the collection of cell phone header packets to estimate density of a population around a port of entry, and proposes that such data, if collected in real-time, could allow border agents to more effectively respond to random increases or decreases in border traffic. It is further suggested that such data could be incorporated continuously to update border flow models and help identify trends in traffic flow. The overall result of these advantages could lead to decision-makers at ports of entry being able to reduce queue times and thereby use resources more efficiently.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129248218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Semantic Data Management: Sensor-Based Port Security Use Case 语义数据管理:基于传感器的端口安全用例
2013 European Intelligence and Security Informatics Conference Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.34
A. Fensel, Michael Rogger, T. Gustavi, Andreas Horndahl, Christian Mårtenson
{"title":"Semantic Data Management: Sensor-Based Port Security Use Case","authors":"A. Fensel, Michael Rogger, T. Gustavi, Andreas Horndahl, Christian Mårtenson","doi":"10.1109/EISIC.2013.34","DOIUrl":"https://doi.org/10.1109/EISIC.2013.34","url":null,"abstract":"This work is part of the EU FP-7 project Support and describes a system-architecture to enhance port security by processing sensor data. The goal is to process vast amount of sensor readings of all types, reduce the noise in the data stream, cope with heterogeneities, detect patterns, fuse data streams and provide decision support in near real-time. We define an ontology to model the domain of sensors and events in the context of port security. The ontology is used as a common basis for our envisioned architecture. The architecture incorporates Spark wave, a schema-enhanced pattern matcher, and Impactorium, a decision support system. Finally we present an evaluation approach for our use case and conclude with on-going future work.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126916998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Privacy and Security in Cyberspace: Training Perspectives on the Personal Data Ecosystem 网络空间的隐私和安全:个人数据生态系统的培训视角
2013 European Intelligence and Security Informatics Conference Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.30
J. A. Amorim, Rose-Mharie Åhlfeldt, Per M. Gustavsson, S. F. Andler
{"title":"Privacy and Security in Cyberspace: Training Perspectives on the Personal Data Ecosystem","authors":"J. A. Amorim, Rose-Mharie Åhlfeldt, Per M. Gustavsson, S. F. Andler","doi":"10.1109/EISIC.2013.30","DOIUrl":"https://doi.org/10.1109/EISIC.2013.30","url":null,"abstract":"There is a growing understanding that privacy is an essential component of security. In order to decrease the probability of having data breaches, the design of information systems, processes and architectures should incorporate considerations related to both privacy and security. This incorporation may benefit from the offering of appropriate training. In this way, this paper intends to discuss how to better offer training while considering new developments that involve both multimedia production and the \"gamification\" of training. The paper suggests the use in conjunction of two frameworks: the EduPMO Framework, useful for the management of large scale projects that may involve a consortium of organizations developing multimedia for the offering of training, and the Game Development Framework, useful for the identification of the main components of the serious game for training on privacy by design to be developed as part of the training offering.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122728351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Multi-modal Biometric Fusion Implementation for ABC Systems ABC系统的多模态生物特征融合实现
2013 European Intelligence and Security Informatics Conference Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.71
Daniel Cuesta Cantarero, David Antonio Perez Herrero, Fernando Martin Mendez
{"title":"A Multi-modal Biometric Fusion Implementation for ABC Systems","authors":"Daniel Cuesta Cantarero, David Antonio Perez Herrero, Fernando Martin Mendez","doi":"10.1109/EISIC.2013.71","DOIUrl":"https://doi.org/10.1109/EISIC.2013.71","url":null,"abstract":"In this paper, we introduce a multi-modal approach for traveller biometric identity verification, in the context of the Spanish Automated Border Control (ABC) implementation. An ABC is an automated system which reads and authenticates the electronic travel document, verifies the identity of the document holder, performs background checks and resolves the eligibility for border crossing. This paper focuses on the second stage of the automated process, the identity verification, based on the biometric data available in the electronic travel document. According to the nature of the travel document, a standardized facial image (1st and 2nd generation electronic Passport, Spanish electronic ID card), two standardized fingerprint images (2nd generation electronic Passport) or fingerprint Match-on-Card features (Spanish electronic ID card) are available. While the facial image can be considered the de facto standard biometric modality for ABC systems, fingerprint availability allows for security enhancement and false rejection rates improvement.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122950424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Decentralized Fully Redundant Cyber Secure Governmental Communications Concept 分散的全冗余网络安全政府通信概念
2013 European Intelligence and Security Informatics Conference Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.39
J. Rajamäki, Paresh Rathod, Jonathan Holmström
{"title":"Decentralized Fully Redundant Cyber Secure Governmental Communications Concept","authors":"J. Rajamäki, Paresh Rathod, Jonathan Holmström","doi":"10.1109/EISIC.2013.39","DOIUrl":"https://doi.org/10.1109/EISIC.2013.39","url":null,"abstract":"This paper focuses on future requirements of broadband data transmission of public protection and disaster relief, critical infrastructure protection and military, and presents the concept of redundant and secure data communication network system in the multi-organizational environment. We are proposing a fully decentralized architecture with optimized critical communication channels. Here, network actors and elements identify and authenticate by establishing physical connection. This concept also recommends, group level user-authorization mechanism for each participating organization. Their respective users of command and control centers are identified, authorized and authenticated to various data sources. The decentralized architecture concept is using the Distributed Systems intercommunication Protocol (DSiP). The concept is highly fault-tolerant in routine as well as crises operations. The software-based approach is independent of heterogeneous data communication technologies, IP networks and telecommunication operator services. The solution enables to build an effective and lasting cyber secure data network for multi organizational environment. Being a fully decentralized concept, networks of individual member organizations are virtually autonomous and hard to upset each other. That allows smooth message and information exchange to enable interoperability.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116506227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
The 'Swiss Army Knife' Approach to Border Control: Multitasking in a Multi-threat World 边境控制的“瑞士军刀”方法:多威胁世界中的多任务处理
2013 European Intelligence and Security Informatics Conference Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.73
Chris Hurrey
{"title":"The 'Swiss Army Knife' Approach to Border Control: Multitasking in a Multi-threat World","authors":"Chris Hurrey","doi":"10.1109/EISIC.2013.73","DOIUrl":"https://doi.org/10.1109/EISIC.2013.73","url":null,"abstract":"The Border Control community uses a number of skills, techniques and technologies to achieve its objectives: everything from the skilled eye, ear and feel of the border officer to sophisticated data, image and biometric analytics. These are often used singly or in small combinations or at different stages. What might a border control system look like which used a larger number of near-simultaneous scans, checks and queries on each passenger? And how might it be evaluated? This paper examines what a 'Swiss Army Knife', multi-tool approach to border, visas and internal migration control might involve and how this multi-tool approach might solve a number of common problems. It briefly touches on the erasing of boundaries between traditional 'immigration' information systems and those of port security, carrier reservations, economic and demographic statistics, police and counter-terrorism agencies.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134149600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Crime Ridges: Exploring the Relationship between Crime Attractors and Offender Movement 犯罪脊:探讨犯罪吸引因素与罪犯运动的关系
2013 European Intelligence and Security Informatics Conference Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.18
Justin Song, Valerie Spicer, P. Brantingham, Richard Frank
{"title":"Crime Ridges: Exploring the Relationship between Crime Attractors and Offender Movement","authors":"Justin Song, Valerie Spicer, P. Brantingham, Richard Frank","doi":"10.1109/EISIC.2013.18","DOIUrl":"https://doi.org/10.1109/EISIC.2013.18","url":null,"abstract":"In this paper we present a new approach in the analysis of crime patterns by creating a formal framework for merging the concepts of crime attractors and the pull of certain locations on offender movement. This directionality, inherent to city infrastructure, underlies the decision processes of offenders when choosing movement paths towards attractors. We explore the aggregate movement patterns of offenders within six municipalities of metropolitan Vancouver. In particular, this research focuses on the relationship between multiple strong crime attractors, offender movement and the formation of crime ridges. We use a visualization technique to show how the flow of offenders towards crime attractors creates associated crime ridges connecting the crime attractors.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130329928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Semantic Linking and Contextualization for Social Forensic Text Analysis 社会司法文本分析的语义连接和语境化
2013 European Intelligence and Security Informatics Conference Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.21
Z. Ren, D. V. Dijk, David Graus, N. V. D. Knaap, Hans Henseler, M. de Rijke
{"title":"Semantic Linking and Contextualization for Social Forensic Text Analysis","authors":"Z. Ren, D. V. Dijk, David Graus, N. V. D. Knaap, Hans Henseler, M. de Rijke","doi":"10.1109/EISIC.2013.21","DOIUrl":"https://doi.org/10.1109/EISIC.2013.21","url":null,"abstract":"With the development of social media, forensic text analysis is becoming more and more challenging as forensic analysts have begun to include this information source in their practice. In this paper, we report on our recent work related to semantic search in e-discovery and propose the use of entity and topic extraction for social media text analysis. We first describe our approach for entity linking at the 2012 Text Analysis Conference Knowledge Base Population track and then introduce the personalized tweets summarization task, where entity linking is used for semantically enriching information in a social media context.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123735327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Consideration of Opportunity and Human Factor: Required Paradigm Shift for Information Security Risk Management 机遇与人为因素的考虑:信息安全风险管理的必要范式转变
2013 European Intelligence and Security Informatics Conference Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.32
Lisa Rajbhandari
{"title":"Consideration of Opportunity and Human Factor: Required Paradigm Shift for Information Security Risk Management","authors":"Lisa Rajbhandari","doi":"10.1109/EISIC.2013.32","DOIUrl":"https://doi.org/10.1109/EISIC.2013.32","url":null,"abstract":"Most of the existing Risk Analysis and Management Methods (RAMMs) focus on threat without taking account of the available opportunity to an entity. Besides, human aspects are not often given much importance in these methods. These issues create a considerable drawback as the available opportunities to an entity (organization, system, etc.) might go unnoticed which might hamper the entity from achieving its objectives. Moreover, understanding the motives of humans play an important role in guiding the risk analysis. This paper reviews several existing RAMMs to highlight the above issues and provides reasoning as to emphasize the importance of these two issues in information security management. From the analysis of the selected methods, we identified that a majority of the methods acknowledge only threat and the consideration of human factors have not been reflected. Although, the issues are not new, these still remain open and the field of risk management needs to be directed towards addressing them. The review is expected to be helpful both to the researchers and practitioners in providing relevant information to consider these issues for further improving the existing RAMMs or when developing new methods.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125592419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Browse and Search in Maritime Document Collections 浏览和搜索海事文件集
2013 European Intelligence and Security Informatics Conference Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.57
V. Dragos
{"title":"Browse and Search in Maritime Document Collections","authors":"V. Dragos","doi":"10.1109/EISIC.2013.57","DOIUrl":"https://doi.org/10.1109/EISIC.2013.57","url":null,"abstract":"This paper presents an approach to explore collection of documents in the maritime domain. Documents are reports created by experts in order to explain suspicious vessel behaviours and the collection is semantically integrated by using a domain ontology and associated instance elements. Browse and search strategies allows us to find events occurring in various maritime areas and to highlight clues explaining abnormal behaviour of vessels.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129051752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信