Accepted Papers
Acceptance rate: 27% for regular papers
Regular papers
- 16 Natalia Iwanski, Richard Frank, Vahid Dabbaghian, Andrew Reid and Patricia Brantingham
Analyzing an Offender’s Journey to Crime: A Criminal Movement Model (CriMM)
- 20 Kila Joffres, Martin Bouchard, Richard Frank and Bryce Westlake
Strategies to Disrupt Online Child Pornography Networks
- 66 Antonis Mouhtaropoulos, Marthie Grobler and Chang-Tsun Li
Digital Forensic Readiness: An insight into Governmental and Academic Initiatives
- 85 Artur Dubrawski, Saswati Ray, Simon Labov and Karl Nelson
Learning to adjudicate nuclear threat
- 71 Bruce Desmarais and Skyler Cranmer
Forecasting the Locational Dynamics of Transnational Terrorism: A Network Analytic Approach
- 92 Roozbeh Farahbod, Vladimir Avram, Uwe Glässer and Adel Guitouni
Engineering Situation Analysis Decision Support Systems
- 11 Dale Elvy
Terrorism, Threat and Time: The mediating effect of terrorist threat on public willingness to forego civil liberties
- 42 Richard Frank, Martin Andresen, Connie Cheng and Patricia Brantingham
Finding Criminal Attractors based on Offenders’ Directionality of Crimes
- 10 Xufang Li, Loh Kok Keong Peter and Freddy Tan
Mechanisms of Polymorphic and Metamorphic Viruses
- 53 Ulrik Spak and Mats Lind
Change blindness in intelligence - Effects of attention guidance by instructions
- 61 James Johnson, Anita Miller and Latifur Khan
Law Enforcement Ontology for Identification of Related Information of Interest Across Free Text Documents
- 63 Guoyan Zhang
A Generic Construction for Proxy Signature Scheme
- 6 Luuk Ritzen
Legitimate Market or Mafia Playground? Crime Pattern Theory and the Detection of 'Dirty' Bricks
- 33 Johan Dahlin and Pontus Svenson
A Method for Community Detection in Uncertain Networks
- 4 Abdulrahman Alruban and Emlyn Everitt
Two Novel 802.1x Denial of Service Attacks
- 36 Charalampos Doulaverakis, Nikolaos Konstantinou, Thomas Knape, Ioannis Kompatsiaris and John Soldatos
An approach to Intelligent Information Fusion in Sensor Saturated Urban Environments
- 46 Mine Temürhan, Guus Cruts, Ronald Meijer, Sunil Choenni, Margriet Van Laar and Marianne Van Ooyen-Houben
Capture-recapture method for estimating the number of problem drug users: the case of the Netherlands
- 1 Mike Redford and Mike Redford
U.S. AND EU LEGISLATION ON CYBERCRIME
- 23 Brij Gupta
SVM Based scheme for Predicting Number of Zombies in a DDoS Attack
- 31 Robyn Torok
The Online Institution: Psychiatric Power as an explanatory model for the normalisation of radicalisation and terrorism
- 93 James Danowski and Han Woo Park
Web Network & Content Changes Associated with the 2011 Muslim Middle- East Uprisings: A Naturalistic Field Experiment
- 58 Søren Matz
Public-Private Resilience: Benchmarking Danish security risk management in cyber-based critical infrastructures
- 95 Gorazd Mesko and Igor Bernik
Cybercrime: Awareness and Fear Slovenian Perspectives
- 107 Pir Abdul Rasool Qureshi, Nasrullah Memon, Uffe Kock Wiil, Panagiotis Karampelas
Harvesting Information from Heterogeneous Sources
- 90 Jakub Piskorski, Jenya Belayeva and Martin Atkinson
Cross-lingual information fusion for refining real-time news event extraction
- 96 Andrew Park, Eunju Hwang, Valerie Spicer, Connie Cheng, Patricia Brantingham and Andrew Sixsmith
Testing Elderly People’s Fear of Crime using a Virtual Environment
- 89 Amir Hassan Ghaseminejad Tafreshi, Patricia Brantingham and Paul Brantingham
The Distribution of Event Complexity in the British Columbia Court System: An analysis based on the CourBC Analytical System
- 108 Pir Abdul Rasool Qureshi, Nasrullah Memon
Statistical Model for Content Extraction
- 111 Sarwat Nizamani, Nasrullah Memon
Evolution of Terrorist Network using Clustered approach: A Case study
- 57 Clive Best
Challenges in Open Source Intelligence
Short papers
- 9 Guido Barbian
Detecting Hidden Friendship in Online Social Networks
- 62 Raydel Montesino and Stefan Fenz
Automation possibilities in information security management
- 77 Peter Kieseberg, Sebastian Schrittwieser, Martin Mulazzani, Markus Huber and Edgar Weippl
Trees Cannot Lie: Using Data-structures for Forensics Purposes
- 104 Rasmus Rosenqvist Petersen and Uffe Kock Wiil
CrimeFighter Investigator: A Novel Tool for Criminal Network Investigation
- 105 Aaron Mannes, Jana Shakarian, Amy Sliva and V.S. Subrahmanian
A Computationally-Enabled Analysis of Lashkar-e-Taiba Attacks in Jammu & Kashmir
- 37 Olga Vybornova, Ivan Smirnov, Ilya Sochenkov, Alexander Kiselyov, Ilya Tikhomirov, Natalya Chudova, Yulia Kuznetsova and Gennady Osipov
Social Tension Detection and Intention Recognition Using Natural Language Semantic Analysis (on the material of Russian-speaking social networks and web forums)
- 70 Kristin Glass and Richard Colbaugh
Web Analytics for Security Informatics
- 74 James Morris, Keith Anthony and Kevin Kennedy
Extraction Distractions: An Analysis of Social Network Model Construction Methods
- 43 B B Gupta
A Comparative study of Distributed Denial of Service Attacks, Intrusion Tolerance and mitigation Techniques
- 2 Nashwa El-Bendary, Mostafa A. Salama, Aboul Ella Hassanien and Mohamed Kouta
Towards Secure Mobile Agent Based E-Cash System
- 48 Dr. William Mitchell
Flatlining the Battlespace: The Effect of Networked Situational Awareness on Hierarchal Intelligence C2 in Helmand.
- 55 Frank Wehinger
The Dark Net: Illegal Online Markets for Identities and Related Services
- 18 Lorraine Bowman-Grieve
A psychological perspective on virtual communities supporting terrorist & extremist ideologies as a tool for recruitment
- 38 Mihael Plevnik and Iztok Podbregar
The need to introduce a new tactical telecommunication system in the Slovenian Army
- 44 André J. Hoogstrate and Chris A.J. Klaassen
Minimizing the average number of inspections for detecting rare items in finite populations
- 82 Hans Oennerud, Sara Wallin and Henric Oestmark
LOCALISATION OF THREAT SUBSTANCES IN URBAN SOCIETY – LOTUS: Tomorrow’s system for finding illicit manufacturing of drugs and home made explosives
- 100 Sergey Evseev, Olga Korol and Nataliya Suhanova
Results of the statistical test security HASH Algorithms candidates competition for selecting standart HASH Algorithm SHA-3
- 101 S.V. Kavun, N.I. Kalashnykova, I.V. Mykhalchuk and O.G. Zyma
Using of the Method of Internet-Analysis for Activity’s definition in sphere of Intelligence and Security Informatics
- 28 Seyed Hamidreza Mohades Kasaei
Car License Plate Extraction And Recognition From Complex Scene Under Outside Environment
- 39 Duo-Yong Sun, Shu-Quan Guo and Xiao-Peng Liu
Multi-relational Network Analysis for Covert Organizations and Disintegration Strategies
- 40 Newton Howard
Global Defense Policy of Laws: Graph Theory Approach to Balance of Power Theory
- 75 Dr. Azzam Mourad, Dr. Hadi Otrok and Sara Ayoubi
Aspect-Oriented Approach for WSPL Security Policies
Posters
- 27 Wim De Koning
Strategic Red Teaming for Critical Infrastructure Protection
- 81 Philipp Amann, Mark Dillon and Gerald Quirchmayr
Challenges in Electronic Evidence Management in an International Court Environment
- 17 Amir Nazir, Abdul Rauf and Mehmood Ul Hassan
Secure Digital Anti Forensics Model
- 24 Brij Gupta
Estimating Strength of a DDoS Attack in Real Time using ANN Based Scheme
- 29 Siew Yong
Risk Mitigation Strategies for Mobile Wi-Fi Robot Toys from Online Pedophiles
- 72 Adriana E. Oliveira and Gustavo H. M. B. Motta
Security and Persistence APIs of a Multimodal Access Control Architecture for Continuous Authentication
- 106 Peter Eachus and Ben Short
A Decision Support System for Intelligence Analysts
- 102 Alexander Kuznetsov, Roman Serhiienko and Serhii Isaev
Differential and Linear Properties of Mini-Versions of Block Symmetric Ciphers
- 52 Saurav Mallik
A Proposed Novel with Possible Prevention of Password Guessing
- 83 Massimiliano Argiolu and Fabio Bisogni
Video Analytics: opportunity or spoof story?
- 87 Adela Mihaita
A key agreement protocol based on Identity-based Proxy Re-encryption Scheme
- 35 Osnat Rosen-Kremer and Iris Aravot
Times of War, Networks and Spaces of Flows: The Emergence of “Ba’ada Haifa” Perceived Region
- 30 Maria Laura Quiñones Urquiza and Pablo Germán Cepeda
Criminal Profiling Technique on Cyber Sex Offenders
- 50 Chaditsa Poulatova
The Media: a Terrorist tool or a silent ally?
- 54 Li Benxian
Game Analysis in International Anti-terrorism cooperation
- 76 Pontus Svenson
Information fusion for port security decision support
- 19 Raphael Cohen-Almagor
International Cyber Security – Fighting Online Terror and Child Pornography
- 79 Irina Sakharova and Bhavani Thuraisingham
Analysis Of The Financial Crisis Of 2007-2009 And Its Impact On Terrorism