2013 European Intelligence and Security Informatics Conference最新文献

筛选
英文 中文
The CriLiM Methodology: Crime Linkage with a Fuzzy MCDM Approach 犯罪管理方法论:模糊MCDM方法下的犯罪联系
2013 European Intelligence and Security Informatics Conference Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.17
Fabrizio Albertetti, Paul Cotofrei, Lionel Grossrieder, O. Ribaux, K. Stoffel
{"title":"The CriLiM Methodology: Crime Linkage with a Fuzzy MCDM Approach","authors":"Fabrizio Albertetti, Paul Cotofrei, Lionel Grossrieder, O. Ribaux, K. Stoffel","doi":"10.1109/EISIC.2013.17","DOIUrl":"https://doi.org/10.1109/EISIC.2013.17","url":null,"abstract":"Grouping events having similarities has always been interesting for analysts. Actually, when a label is put on top of a set of events to denote they share common properties, the automation and the capability to conduct reasoning with this set drastically increase. This is particularly true when considering criminal events for crime analysts, conjunction, interpretation and explanation can be key success factors to apprehend criminals. In this paper, we present the CriLiM methodology for investigating both serious and high-volume crime. Our artifact consists in implementing a tailored computerized crime linkage system, based on a fuzzy MCDM approach in order to combine spatio-temporal, behavioral, and forensic information. As a proof of concept, series in burglaries are examined from real data and compared to expert results.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115755527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A Pilot Study of Using Honeypots as Cyber Intelligence Sources 蜜罐作为网络情报来源的初步研究
2013 European Intelligence and Security Informatics Conference Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.56
U. Bilstrup, M. Rosenberg
{"title":"A Pilot Study of Using Honeypots as Cyber Intelligence Sources","authors":"U. Bilstrup, M. Rosenberg","doi":"10.1109/EISIC.2013.56","DOIUrl":"https://doi.org/10.1109/EISIC.2013.56","url":null,"abstract":"There will always be a security gap between our ability to secure our networks and the actual level of security needed. When securing our networks we need good intelligence to direct our efforts and focus on the right spots. We need to find those spots and they can be found, with the right tools. Survival time is a method that provides possibilities to make decisions concerning information security risks based on true knowledge and hard facts, in a repeatable and scientific manner. This presented work aim to investigate the possibility to use survival time of an unprotected system as an intelligence source and measure the current survival time for a given unprotected system. By the deployment of a decoy, an unprotected system, data is captured and collected through port monitoring. Mainly focus lie on building a time curve presenting the estimated time for an unprotected public system to get detected on the Internet and the elapsed time hence the system gets attacked.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116463870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analyzing Social Media Content for Security Informatics 分析社会媒体内容的安全信息学
2013 European Intelligence and Security Informatics Conference Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.14
R. Colbaugh, K. Glass
{"title":"Analyzing Social Media Content for Security Informatics","authors":"R. Colbaugh, K. Glass","doi":"10.1109/EISIC.2013.14","DOIUrl":"https://doi.org/10.1109/EISIC.2013.14","url":null,"abstract":"Inferring public opinion regarding an issue or event by analyzing social media content is of great interest to security analysts but is also technically challenging to accomplish. This paper presents a new method for estimating sentiment and/or emotion expressed in social media which addresses the challenges associated with Web-based analysis. We formulate the problem as one of text classification, model the data as a bipartite graph of documents and words, and construct the sentiment/emotion classifier through a combination of semi-supervised learning and graph transduction. Interestingly, the proposed approach requires no labeled training documents and is able to provides accurate text classification using only a small lexicon of words of known sentiment/ emotion. The classification algorithm is shown to outperform state of the art methods on a benchmark task involving sentiment analysis of online consumer product reviews. We illustrate the utility of the approach for security informatics through two case studies, one examining the possibility that online sentiment about suicide bombing predicts bombing event frequency, and one investigating public sentiment about vaccination and its implications for population health and security.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128808531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Analysis of Terrorist Groups on Facebook 分析Facebook上的恐怖组织
2013 European Intelligence and Security Informatics Conference Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.53
Ala Berzinji, Frzand Sherko Abdullah, Ali Hayder Kakei
{"title":"Analysis of Terrorist Groups on Facebook","authors":"Ala Berzinji, Frzand Sherko Abdullah, Ali Hayder Kakei","doi":"10.1109/EISIC.2013.53","DOIUrl":"https://doi.org/10.1109/EISIC.2013.53","url":null,"abstract":"Nowadays using the Social Networking Sites (SNS) especially Facebook by terrorist groups to spread their ideas among people has grown. In this work we try to monitor those groups by Facebook Operation techniques and then apply an algorithm to detect most active node in the group that can recruit most nodes on Facebook. The algorithm works on centralities to find out the node that is most central in the group.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125340567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Reconstruction and Exploration: Applications in Criminology 重构与探索:在犯罪学中的应用
2013 European Intelligence and Security Informatics Conference Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.42
Dennis Andersson, Mirko Thorstensson
{"title":"Reconstruction and Exploration: Applications in Criminology","authors":"Dennis Andersson, Mirko Thorstensson","doi":"10.1109/EISIC.2013.42","DOIUrl":"https://doi.org/10.1109/EISIC.2013.42","url":null,"abstract":"Reconstruction and Exploration (R&E) is an approach developed to support after-action reviews in military and emergency response exercises. With the development of new technology and software, data sets grow larger and more complex in many domains, increasing the need for visual exploration approaches such as R&E. This paper briefly presents the R&E approach and introduces it to the criminology community. Three areas within the field are discussed that may benefit from using structured approaches to data collection and presentation such as R&E: (1) vicarious learning, (2) police intelligence operations, and (3) evidence presentation in trials. In conclusion, the approach looks promising as a complement to existing methods in criminology, and further investigations are recommended to clarify needs, possibilities and challenges ahead.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116649873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信