JISIC 2014 Sept. 24, 2014 to Sept. 26, 2014, Hague,netherlands

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Developing Bayesian Models for Assessing the Value of Evidence Jeroen Keppens The standard Bayesian approach to assess the value of a piece of evidence e in ...
The Value of Visualization for Understanding Data and Making Decisions John Stasko Investigators have an ever-growing suite of tools available for analyzing and understanding their data. While ...
The Global CyberVulnerability Report V.s. Subrahmanian We report the result of a study of over 4M machines worldwide in 2010 and ...
Plastic card transaction fraud detection Niall Adams We begin with a review of plastic card fraud: The nature and magnitude of the ...
Assessing the Role of Forums in Facilitating Technological Skill in the White Supremacist Movement Thomas J. Holt Research surrounding radicalization to and use of violence among extremist and terror groups has expanded ...
Detecting Security Risks from Automated Analysis of Verbal and Nonverbal Signals Judee Burgoon Border guards face a daunting task in rapidly detecting from the daily flood of border ...
Trusted Detection of Sensitive Activities on Mobile Phones using Power Consumption Measurements Yuval Elovici , Mordechai Guri , Gabi Kedma , Boris Zadov The unprecedented popularity of modern mobile phones has made them a lucrative target for skillful ...
ALPD: Active Learning Framework for Enhancing the Detection of Malicious PDF Files Yuval Elovici , Nir Nissim , Aviad Cohen , Robert Moskovitch , Assaf Shabtai , Mattan Edry , Oren Bar-ad Email communication carrying malicious attachments or links is often used as an attack vector for ...
Resilience of Anti-Malware Programs to Naïve Modifications of Malicious Binaries Yuval Elovici , Mordechai Guri , Gabi Kedma , Assaf Kachlon The massive amounts of malware variants which are released each day demand fast in-lab analysis, ...
Overcoming Limited Collaboration Channels in Distributed Intelligence Analysis: Visualization Tools and Design Seeds Brian Prue , Michael Jenkins , Lauren Stern , Jonathan Pfautz Military intelligence analysis (IA) support tools are often developed using generalized models of IA that ...
On the Usability of Augmented Reality for Information Exchange in Teams from the Security Domain Drago , Datcu , Marina Cidota , Heide Lukosch , Stephan Lukosch For operational units in the security domain that work together in teams it is important ...
Maritime Situation Analysis: A Multi-vessel Interaction and Anomaly Detection Framework Hamed Yaghoubi Shahir , Uwe Glässer , Narek Nalbandyan , Hans Wehn Maritime security is critical for protecting sea lanes, ports, harborsand other critical infrastructure against a ...
Land border permeability and irregular migration using geospatial intelligence from satellite data A.c. Broek , R.m. Schoemaker , R. J. Dekker Prediction about how migrants move in the preborder terrain is important for effective border control. ...
Studies of Integration Readiness Levels:Case Shared Maritime Situational Awareness System Rauno , Pirinen The research question of this study is: How Integration Readiness Level (IRL) metrics can be ...
Security Components in a One-Stop-Shop Border Control System Axel Weissenfeld , Lukasz Szklarski , Andreas Kriechbaum-zabini Each year the number of passengers travelling around the world is steadily increasing. Hence, the ...
Statistical frameworks for detecting tunnelling in cyber defence using big data Niall Adams , Daniel John Lawson , Patrick Rubin-delanchy , Nicholas Heard How can we effectively use costly statistical models in the defence of large computer networks? ...
Adaptive change detection for relay-like behaviour Dean Adam Bodenham , Niall Michael Adams Detecting anomalous behaviour in network flow data is challenging for a number of reasons, including ...
An approximate framework for flexible network flow screening Daniel John Lawson , Niall M. Adams Network security analysts presently lack tools for routinely screening large collections of network traffic for ...
Threat detection in tweets with trigger patterns and contextual cues Martijn Spitters , Pieter Eendebak , Daniël Worm , Henri Bouma Many threats in the real world can be related to activities in public sources on ...
A Service-indepenent Model for Linking Online User Profile Information Awais Rashid , Matthew John Edwards , Paul Rayson Public user profile information is a common feature of modern websites. These profiles can provide ...
Exploring Opinion Dynamics in Security-Related Microblog Data Daniel Zeng , Yuhao Zhang , Wenji Mao , Ning Zhao , Xiuguo Bao Web social media has become one of the major channels for people to express their ...
Automatic Timeline Construction and Analysis for Computer Forensics Purposes Tahar m. Kechadi , Yoan Chabot , Aurelie Bertaux , Christophe Nicolle To determine the circumstances of an incident, investigators need to reconstruct events that occurred in ...
How Analysts Think (?): Early Observations B.l. William Wong In this paper we describe work-in-progress to develop a description of the ways by which ...
Optical Security Document Simulator for Black-Box Testing of ABC Systems Michael Gschwandtner , Svorad Štolc , Franz Daubner Ever increasing passenger numbers have prompted the rise of automated border control (ABC) systems. Such ...
Filtering automated polling traffic in computer network flow data Daniel John Lawson , Patrick Rubin-delanchy , Nick Heard Detecting polling behaviour in a computer network has two important applications. First, the polling can ...
Modelling new edge formation in a computer network through Bayesian variable selection Nicholas Heard , Silvia Metelli Anomalous connections in a computer network graph can be a signal of malicious behaviours. For ...
Application of a linear time method for change point detection to the classification of software Nicholas Heard , Alexander Bolton A computer program’s dynamic instruction trace is the sequence of instructions it generates during run-time. ...
Three statistical approaches to sessionizing network flow data Patrick Rubin-delanchy , Daniel J Lawson , Melissa J Turcotte , Nicholas A Heard , Niall M Adams The network traffic generated by a computer, or a pair of computers, is often well ...
Exfiltration of information from air-gapped machines using monitor’s LED indicator Yuval Elovici , Mordechai Guri , Vitali Sepetnitsky In this paper we present a new approach for data exfiltration by leaking data from ...
AccountabilityFS: A file system monitor for forensic readiness Rune Nordvik , Yi-ching Liao , Hanno Langweg We present a file system monitor, AccountabilityFS, which prepares an organization for forensic analysis and ...
Understanding the factors affecting UX and technology acceptance in the context of automated border controls Mari Ylikauppila , Sirra Toivonen , Minna Kulju , Minna Jokela The purpose of this paper is to describe the complexity of an Automated Border Control ...
On the adequacy of performance models in an adaptive Border Inspection Management system Jesse Musgrove , Bojan Cukic , And Vittorio Cortellessa In this paper, we present an approach to validation of system performance models for a ...
Resource-based Event Reconstruction of Digital Crime Scenes Yi-ching Liao , Hanno Langweg To ensure that the potential evidence is readily available in an acceptable form when an ...
Addressing the Increasing Volume and Variety of Digital Evidence Using an Ontology Richard Overill , Jeroen Keppens , Owen Brady The field of digital evidence must contend with an increasing number of devices to be ...
Authorship Analysis of Inspire Magazine through Stylometric and Psychological Features Jennifer Sikos , Peter David , Nizar Habash , Reem Faraj When we read a piece of writing, the meaning we derive from that text often ...
Identifying Top Sellers In Underground Economy Using Deep Learning-based Sentiment Analysis Hsinchun Chen The underground economy is a key component in cyber carding crime ecosystems because it provides ...
Modelling and Analysis of Identity Threat Behaviors Through Text Mining of Identity Theft Stories Yongpeng Yang , Monisha Manoharan , K. Suzanne Barber Identity theft, fraud, and abuse are problems affecting all market sectors in society. Identity theft ...
Predicting Links in Multi-relational Networks Bisharat Rasool Memon , Uffe Kock Wiil Most traditional methods of link prediction in networks deal with homogeneous networks, i.e., networks with ...
Time Critical Disinformation Influence Minimization in Online Social Networks Daniel Zeng , Chuan Luo , Kainan Cui , Xiaolong Zheng If a piece of disinformation released from a terrorist organization propagates on Twitter and this ...
A Selective Defense for Application Layer DDoS Attacks Yuri Gil Dantas , Vivek Nigam , Iguatemi Fonseca Distributed Denial of Service (DDoS) attacks remain among the most dangerous and noticeable attacks on ...
Mining the Web for Sympathy: The Pussy Riot Case Anders Westling , Joel Brynielsson , Tove Gustavi With social media services becoming more and more popular, there now exists a constant stream ...
Twitter Sentiment Analysis for Security-Related Information Gathering Maurice Mulvenna , Anna Jurek , Yaxin Bi Analysing public sentiment about future events, such as demonstration or parades, may provide valuable information ...
DNSSEC Misconfigurations: How incorrectly configured security leads to unreachability Xin Wang , Niels Adrichem , Antonio Reyes L , Muhammad Wasif , Ficky Fatturrahman , Fernando A. Kuipers DNSSEC offers protection against spoofing of DNS data by providing authentication of its origin, ensuring ...
Time-to-event Modeling for Predicting Hacker IRC Community Participant Trajectory Hsinchun Chen , Victor Benjamin As computing and communication technologies become ubiquitous throughout society, researchers and practitioners have become motivated ...
Practical interception of DECT encrypted voice communication in Unified Communications environments Iwen Coisel , Ignacio Sanchez Digital Enhanced Cordless Telephony, DECT, is a worldwide standard for cordless telephony that is frequently ...
The Nature of Communications and Emerging Communities on Twitter following the 2013 Syria Sarin Gas Attacks Yulia Tyshchuk , William Wallace , Hao Li , Heng Ji , Sue Kase Social media has become an important communication tool especially following an extreme event. Research in ...
Time Profiles for Identifying Users in Online Environments Fredrik Johansson , Lisa Kaati , Amendra Shrestha Many people who discuss sensitive or private is- sues on web forums and other social ...
Predicting Popularity of Forum Threads for Public Events Security Lei Wang , Daniel Zeng , Wenji Mao , Qingchao Kong Web user’s online interactive behavior with others often makes some user generated contents popular. The ...
A Case Study in Opportunity Reduction: Mitigating the Dirt Jumper Drive -smart attack Joel Lathrop , James B. O'kane Over the past few years, a particularly virulent strain of distributed denial-of-service (DDoS) malware known ...
Multiagent Models for Police Resource Allocation and Dispatch Ricardo Guedes , Vasco Furtado , Tarcísio Pequeno n this article we investigate Multi-agent simulation as a way for modeling strategies for resource ...
Uninvited Connections A Study of Vulnerable Devices on the Internet of Things (IoT) Hsinchun Chen , Mark Patton , Eric Gross , Ryan Chinn , Samantha Forbis , Leon Walker The Internet of Things (IoT) continues to grow as uniquely identifiable objects are added to ...
Challenges to a smooth-running data security audits. Case: A Finnish national security auditing criteria KATAKRI Jyri Rajamäki An information security management system (ISMS) provides controls to protect organizations’ most fundamental asset, information. ...
Ranking Online Memes in Emergency Events Based on Transfer Entropy Daniel Zeng , Xiaolong Zheng , Saike He , Xiuguo Bao2 , Hongyuan Ma , Bo Xu , Guanhua Tian , Hongwei Hao The rapid proliferation of online social networks has greatly boosted the dissemination and evolution of ...
Causal Inference in Social Media Using Convergent Cross Mapping Daniel Zeng , Chuan Luo , Xiaolong Zheng Revealing underlying causal structure in social media is critical to understanding how users interact, on ...
Aegis: A Lightweight Tool for Prevent Frauds in Web Browsers José Luís Silva , Carlo Silva , Rodrigo Elia Assad , Ruy Garcia Based on its daily use and volume of its applications – both domestic and corporate ...
Descriptive Analytics: Examining Expert Hackers in Web Forums Ahmed Abbasi , Hsinchun Chen , Victor Benjamin , Weifeng Li , Shiyu Hu In recent years, understanding the people behind cybercrime from a hacker-centric perspective has drawn increased ...
Inferring itineraries of containerized cargo through the application of Conditional Random Fields Pedro Chahuara , Luca Mazzola , Michail Makridis , Claudio Schifanella , Aris Tsois , Mauro Pedone This paper proposes a method to infer the itinerary of cargo transported in shipping containers ...
Forecasting Country Stability in North Africa V.s. Subrahmanian , Steven Banaszak , Elizabeth Bowman , John P. Dickerson We develop a novel approach to predict certain type of stability events (battles, battles won ...
Foraging Online Social Networks Gijs Koot , Mirjam Veld , Joost Hendricksen , Rianne Kaptein , Arnout De Vries , Egon Broek A concise and practical introduction is given on Online Social Networks (OSN) and their application ...
Towards a comprehensive insight into the thematic organization of the Tor hidden services Martijn Spitters , Stefan Verbruggen , Mark Van Staalduinen Tor is a popular ‘darknet’, a network that aims to conceal its users’ identities and ...
CAPER - Collaborative information, Acquisition, Processing, Exploitation and Reporting for the prevention of organised crime Carlo Aliprandi , Juan Arraiza , Sebastian Maier , Gila Molcho , Felipe Melero European Law Enforcement Agencies are increasingly more reliant on information and communication technologies and are ...
Detecting threats of violence in online discussions using bigrams of important words Hugo Lewi Hammer Making violent threats towards minorities like immigrants or homosexuals is increasingly common on the Internet. ...
Learning to Classify Hate and Extremism Promoting Tweets Swati Agarwal , Ashish Sureka Research shows that Twitter is being misused as a platform for online radicalization and contains ...
Recommending Documents for Complex Question Exploration by Analyzing Browsing Behavior Alya Abbott , Olga Simek We present a novel approach for recommending documents to users by analyzing user browsing behavior, ...
Passwords are dead: Alternative authentication methods Michael Bachmann The idea of protecting information has been around for many centuries. Modern computers use a ...
Sensemaking and Cognitive Bias Mitigation in Visual Analytics Simon , B.l. William Wong , Margit Pohl , Lisa-christina Winter , Chris Pallaris , Attfield The purpose of the VALCRI project is to develop a new system prototype for information ...
Metal oxide gas sensors technologies for hidden people detection Andrea Ponzoni , Dario Zappa , Cristina Cerqui , Elisabetta Comini , Giorgio Sberveglieri This work describes metal oxide gas sensor technologies based on chemiresistor and surface ionization devices ...
Towards a Methodology for Cybersecurity Risk Management Using Agents Paradigm Parth Bhatt , Per M Gustavsson , Rose-mharie Ahlfeldt In order to deal with shortcomings of security management systems, this work proposes a methodology ...
Computational approach for detection of illegal activity over the internet Rasim Alguliyev , Davud Rustamov , Mirza Rzayev No illegal activity is carried out at once. Usually, parties of illegal activity collect and ...
An interactive Patterns of Life visualisation tool for Intelligence Analysis Neesha Kodagoda , Simon Attfield , Phong H. Nguyen , Leishi Zhang , Kai Xu , B Wong , Adrian Wagstaff , Graham Phillips , James Bulloch , John Marshall , Stewart Bertram POLAR is an experimental test-bed visualisation tool for Patterns of Life analysis, developed on the ...
Military Geospatial Profiling Analysis Oey , Herman-dick Giok Tjiang One of the most utilised premeditated terrorist weapons of choice in conflict areas is the ...
Modeling Flash Mobs in Cybernetic Space: Evaluating Threats of Emerging Socio-Technical Behaviors to Human Security Samer Al-khateeb , Nitin Agarwal Since the occurrence of the first 'Flash Mob' organized by Bill Wasik in Manhattan in ...
Robust Navigation and Communication in the Maritime Domain: the TRITON Project Marco Pini , Luca Pilosu , Lene Vesterlund , David Blanco , Fredrik Lindström , Emiliano Spaltro Intentional jamming and spoofing are growing concerns for communication and positioning systems based on Global ...
Detection of Olfactory Traces by Orthogonal Gas Identification Technologies - DOGGIES I. Daniilidis , J.-j. Filippi , W. Vautz , E. Dalcanale , S. Zampolli , G. Leventakis , I. Kauppinen , S.sinisalo , V. Tsoulkas , V. Kassouras , M. Carras , B. Gerard , R. Pinalli , A. Ragnoni , L. Dujourdy , D. Zavali , M. Brun , V. Grizis , A. Argyris , D. Syvridis Border security is one of the key challenges to be taken up by Europe in ...
When Counting is Not Enough: Limitations of NSA's effectiveness assessment of surveillance technology Michelle Cayford , Coen Van Gulijk , P.h.a.j.m. Van Gelder The NSA has justified their surveillance programs by presenting the number of terrorist activities these ...
DOCSCOPE: ID Printing Techniques Signatures Marc Pic , Clarisse Mandridake , Mathieu Hoarau , Kevin Win-lime DOCSCOPE is an ANR project dedicated to the exploration of new approaches to authenticate ID ...
Lawfully-Authorized Electronic Surveillance in Wireless Communications Systems: Standard and Requirements Overview Kafi Hassan Abstract—Voice and data wireless communication devices have become important and convenient way of communication for ...