European Intelligence
and Security Informatics Conference (EISIC) 2011
September 12-14, 2011
Athens, Greece

The Premier European Conference on Counterterrorism and Criminology

Accepted Papers

Acceptance rate: 27% for regular papers

Regular papers

  • 16 Natalia Iwanski, Richard Frank, Vahid Dabbaghian, Andrew Reid and Patricia Brantingham
    Analyzing an Offender’s Journey to Crime: A Criminal Movement Model (CriMM)
  • 20 Kila Joffres, Martin Bouchard, Richard Frank and Bryce Westlake
    Strategies to Disrupt Online Child Pornography Networks
  • 66 Antonis Mouhtaropoulos, Marthie Grobler and Chang-Tsun Li
    Digital Forensic Readiness: An insight into Governmental and Academic Initiatives
  • 85 Artur Dubrawski, Saswati Ray, Simon Labov and Karl Nelson
    Learning to adjudicate nuclear threat
  • 71 Bruce Desmarais and Skyler Cranmer
    Forecasting the Locational Dynamics of Transnational Terrorism: A Network Analytic Approach
  • 92 Roozbeh Farahbod, Vladimir Avram, Uwe Glässer and Adel Guitouni
    Engineering Situation Analysis Decision Support Systems
  • 11 Dale Elvy
    Terrorism, Threat and Time: The mediating effect of terrorist threat on public willingness to forego civil liberties
  • 42 Richard Frank, Martin Andresen, Connie Cheng and Patricia Brantingham
    Finding Criminal Attractors based on Offenders’ Directionality of Crimes
  • 10 Xufang Li, Loh Kok Keong Peter and Freddy Tan
    Mechanisms of Polymorphic and Metamorphic Viruses
  • 53 Ulrik Spak and Mats Lind
    Change blindness in intelligence - Effects of attention guidance by instructions
  • 61 James Johnson, Anita Miller and Latifur Khan
    Law Enforcement Ontology for Identification of Related Information of Interest Across Free Text Documents
  • 63 Guoyan Zhang
    A Generic Construction for Proxy Signature Scheme
  • 6 Luuk Ritzen
    Legitimate Market or Mafia Playground? Crime Pattern Theory and the Detection of 'Dirty' Bricks
  • 33 Johan Dahlin and Pontus Svenson
    A Method for Community Detection in Uncertain Networks
  • 4 Abdulrahman Alruban and Emlyn Everitt
    Two Novel 802.1x Denial of Service Attacks
  • 36 Charalampos Doulaverakis, Nikolaos Konstantinou, Thomas Knape, Ioannis Kompatsiaris and John Soldatos
    An approach to Intelligent Information Fusion in Sensor Saturated Urban Environments
  • 46 Mine Temürhan, Guus Cruts, Ronald Meijer, Sunil Choenni, Margriet Van Laar and Marianne Van Ooyen-Houben
    Capture-recapture method for estimating the number of problem drug users: the case of the Netherlands
  • 1 Mike Redford and Mike Redford
    U.S. AND EU LEGISLATION ON CYBERCRIME
  • 23 Brij Gupta
    SVM Based scheme for Predicting Number of Zombies in a DDoS Attack
  • 31 Robyn Torok
    The Online Institution: Psychiatric Power as an explanatory model for the normalisation of radicalisation and terrorism
  • 93 James Danowski and Han Woo Park
    Web Network & Content Changes Associated with the 2011 Muslim Middle- East Uprisings: A Naturalistic Field Experiment
  • 58 Søren Matz
    Public-Private Resilience: Benchmarking Danish security risk management in cyber-based critical infrastructures
  • 95 Gorazd Mesko and Igor Bernik
    Cybercrime: Awareness and Fear Slovenian Perspectives
  • 107 Pir Abdul Rasool Qureshi, Nasrullah Memon, Uffe Kock Wiil, Panagiotis Karampelas
    Harvesting Information from Heterogeneous Sources
  • 90 Jakub Piskorski, Jenya Belayeva and Martin Atkinson
    Cross-lingual information fusion for refining real-time news event extraction
  • 96 Andrew Park, Eunju Hwang, Valerie Spicer, Connie Cheng, Patricia Brantingham and Andrew Sixsmith
    Testing Elderly People’s Fear of Crime using a Virtual Environment
  • 89 Amir Hassan Ghaseminejad Tafreshi, Patricia Brantingham and Paul Brantingham
    The Distribution of Event Complexity in the British Columbia Court System: An analysis based on the CourBC Analytical System
  • 108 Pir Abdul Rasool Qureshi, Nasrullah Memon
    Statistical Model for Content Extraction
  • 111 Sarwat Nizamani, Nasrullah Memon
    Evolution of Terrorist Network using Clustered approach: A Case study
  • 57 Clive Best
    Challenges in Open Source Intelligence

Short papers

  • 9 Guido Barbian
    Detecting Hidden Friendship in Online Social Networks
  • 62 Raydel Montesino and Stefan Fenz
    Automation possibilities in information security management
  • 77 Peter Kieseberg, Sebastian Schrittwieser, Martin Mulazzani, Markus Huber and Edgar Weippl
    Trees Cannot Lie: Using Data-structures for Forensics Purposes
  • 104 Rasmus Rosenqvist Petersen and Uffe Kock Wiil
    CrimeFighter Investigator: A Novel Tool for Criminal Network Investigation
  • 105 Aaron Mannes, Jana Shakarian, Amy Sliva and V.S. Subrahmanian
    A Computationally-Enabled Analysis of Lashkar-e-Taiba Attacks in Jammu & Kashmir
  • 37 Olga Vybornova, Ivan Smirnov, Ilya Sochenkov, Alexander Kiselyov, Ilya Tikhomirov, Natalya Chudova, Yulia Kuznetsova and Gennady Osipov
    Social Tension Detection and Intention Recognition Using Natural Language Semantic Analysis (on the material of Russian-speaking social networks and web forums)
  • 70 Kristin Glass and Richard Colbaugh
    Web Analytics for Security Informatics
  • 74 James Morris, Keith Anthony and Kevin Kennedy
    Extraction Distractions: An Analysis of Social Network Model Construction Methods
  • 43 B B Gupta
    A Comparative study of Distributed Denial of Service Attacks, Intrusion Tolerance and mitigation Techniques
  • 2 Nashwa El-Bendary, Mostafa A. Salama, Aboul Ella Hassanien and Mohamed Kouta
    Towards Secure Mobile Agent Based E-Cash System
  • 48 Dr. William Mitchell
    Flatlining the Battlespace: The Effect of Networked Situational Awareness on Hierarchal Intelligence C2 in Helmand.
  • 55 Frank Wehinger
    The Dark Net: Illegal Online Markets for Identities and Related Services
  • 18 Lorraine Bowman-Grieve
    A psychological perspective on virtual communities supporting terrorist & extremist ideologies as a tool for recruitment
  • 38 Mihael Plevnik and Iztok Podbregar
    The need to introduce a new tactical telecommunication system in the Slovenian Army
  • 44 André J. Hoogstrate and Chris A.J. Klaassen
    Minimizing the average number of inspections for detecting rare items in finite populations
  • 82 Hans Oennerud, Sara Wallin and Henric Oestmark
    LOCALISATION OF THREAT SUBSTANCES IN URBAN SOCIETY – LOTUS: Tomorrow’s system for finding illicit manufacturing of drugs and home made explosives
  • 100 Sergey Evseev, Olga Korol and Nataliya Suhanova
    Results of the statistical test security HASH Algorithms candidates competition for selecting standart HASH Algorithm SHA-3
  • 101 S.V. Kavun, N.I. Kalashnykova, I.V. Mykhalchuk and O.G. Zyma
    Using of the Method of Internet-Analysis for Activity’s definition in sphere of Intelligence and Security Informatics
  • 28 Seyed Hamidreza Mohades Kasaei
    Car License Plate Extraction And Recognition From Complex Scene Under Outside Environment
  • 39 Duo-Yong Sun, Shu-Quan Guo and Xiao-Peng Liu
    Multi-relational Network Analysis for Covert Organizations and Disintegration Strategies
  • 40 Newton Howard
    Global Defense Policy of Laws: Graph Theory Approach to Balance of Power Theory
  • 75 Dr. Azzam Mourad, Dr. Hadi Otrok and Sara Ayoubi
    Aspect-Oriented Approach for WSPL Security Policies

Posters

  • 27 Wim De Koning
    Strategic Red Teaming for Critical Infrastructure Protection
  • 81 Philipp Amann, Mark Dillon and Gerald Quirchmayr
    Challenges in Electronic Evidence Management in an International Court Environment
  • 17 Amir Nazir, Abdul Rauf and Mehmood Ul Hassan
    Secure Digital Anti Forensics Model
  • 24 Brij Gupta
    Estimating Strength of a DDoS Attack in Real Time using ANN Based Scheme
  • 29 Siew Yong
    Risk Mitigation Strategies for Mobile Wi-Fi Robot Toys from Online Pedophiles
  • 72 Adriana E. Oliveira and Gustavo H. M. B. Motta
    Security and Persistence APIs of a Multimodal Access Control Architecture for Continuous Authentication
  • 106 Peter Eachus and Ben Short
    A Decision Support System for Intelligence Analysts
  • 102 Alexander Kuznetsov, Roman Serhiienko and Serhii Isaev
    Differential and Linear Properties of Mini-Versions of Block Symmetric Ciphers
  • 52 Saurav Mallik
    A Proposed Novel with Possible Prevention of Password Guessing
  • 83 Massimiliano Argiolu and Fabio Bisogni
    Video Analytics: opportunity or spoof story?
  • 87 Adela Mihaita
    A key agreement protocol based on Identity-based Proxy Re-encryption Scheme
  • 35 Osnat Rosen-Kremer and Iris Aravot
    Times of War, Networks and Spaces of Flows: The Emergence of “Ba’ada Haifa” Perceived Region
  • 30 Maria Laura Quiñones Urquiza and Pablo Germán Cepeda
    Criminal Profiling Technique on Cyber Sex Offenders
  • 50 Chaditsa Poulatova
    The Media: a Terrorist tool or a silent ally?
  • 54 Li Benxian
    Game Analysis in International Anti-terrorism cooperation
  • 76 Pontus Svenson
    Information fusion for port security decision support
  • 19 Raphael Cohen-Almagor
    International Cyber Security – Fighting Online Terror and Child Pornography
  • 79 Irina Sakharova and Bhavani Thuraisingham
    Analysis Of The Financial Crisis Of 2007-2009 And Its Impact On Terrorism