Title |
Speakers |
Summary |
Topic Types |
Developing Bayesian Models for Assessing the Value of Evidence |
Jeroen Keppens
|
The standard Bayesian approach to assess the value of a piece of evidence e in ... |
|
The Value of Visualization for Understanding Data and Making Decisions |
John Stasko
|
Investigators have an ever-growing suite of tools available for analyzing and understanding their data. While ... |
|
The Global CyberVulnerability Report |
V.s. Subrahmanian
|
We report the result of a study of over 4M machines worldwide in 2010 and ... |
|
Plastic card transaction fraud detection |
Niall Adams
|
We begin with a review of plastic card fraud: The nature and magnitude of the ... |
|
Assessing the Role of Forums in Facilitating Technological Skill in the White Supremacist Movement |
Thomas J. Holt
|
Research surrounding radicalization to and use of violence among extremist and terror groups has expanded ... |
|
Detecting Security Risks from Automated Analysis of Verbal and Nonverbal Signals |
Judee Burgoon
|
Border guards face a daunting task in rapidly detecting from the daily flood of border ... |
|
Trusted Detection of Sensitive Activities on Mobile Phones using Power Consumption Measurements |
Yuval Elovici
,
Mordechai Guri
,
Gabi Kedma
,
Boris Zadov
|
The unprecedented popularity of modern mobile phones has made them a lucrative target for skillful ... |
|
ALPD: Active Learning Framework for Enhancing the Detection of Malicious PDF Files |
Yuval Elovici
,
Nir Nissim
,
Aviad Cohen
,
Robert Moskovitch
,
Assaf Shabtai
,
Mattan Edry
,
Oren Bar-ad
|
Email communication carrying malicious attachments or links is often used as an attack vector for ... |
|
Resilience of Anti-Malware Programs to Naïve Modifications of Malicious Binaries |
Yuval Elovici
,
Mordechai Guri
,
Gabi Kedma
,
Assaf Kachlon
|
The massive amounts of malware variants which are released each day demand fast in-lab analysis, ... |
|
Overcoming Limited Collaboration Channels in Distributed Intelligence Analysis: Visualization Tools and Design Seeds |
Brian Prue
,
Michael Jenkins
,
Lauren Stern
,
Jonathan Pfautz
|
Military intelligence analysis (IA) support tools are often developed using generalized models of IA that ... |
|
On the Usability of Augmented Reality for Information Exchange in Teams from the Security Domain |
Drago
,
Datcu
,
Marina Cidota
,
Heide Lukosch
,
Stephan Lukosch
|
For operational units in the security domain that work together in teams it is important ... |
|
Maritime Situation Analysis: A Multi-vessel Interaction and Anomaly Detection Framework |
Hamed Yaghoubi Shahir
,
Uwe Glässer
,
Narek Nalbandyan
,
Hans Wehn
|
Maritime security is critical for protecting sea lanes, ports, harborsand other critical infrastructure against a ... |
|
Land border permeability and irregular migration using geospatial intelligence from satellite data |
A.c. Broek
,
R.m. Schoemaker
,
R. J. Dekker
|
Prediction about how migrants move in the preborder terrain is important for effective border control. ... |
|
Studies of Integration Readiness Levels:Case Shared Maritime Situational Awareness System |
Rauno
,
Pirinen
|
The research question of this study is: How Integration Readiness Level (IRL) metrics can be ... |
|
Security Components in a One-Stop-Shop Border Control System |
Axel Weissenfeld
,
Lukasz Szklarski
,
Andreas Kriechbaum-zabini
|
Each year the number of passengers travelling around the world is steadily increasing. Hence, the ... |
|
Statistical frameworks for detecting tunnelling in cyber defence using big data |
Niall Adams
,
Daniel John Lawson
,
Patrick Rubin-delanchy
,
Nicholas Heard
|
How can we effectively use costly statistical models in the defence of large computer networks? ... |
|
Adaptive change detection for relay-like behaviour |
Dean Adam Bodenham
,
Niall Michael Adams
|
Detecting anomalous behaviour in network flow data is challenging for a number of reasons, including ... |
|
An approximate framework for flexible network flow screening |
Daniel John Lawson
,
Niall M. Adams
|
Network security analysts presently lack tools for routinely screening large collections of network traffic for ... |
|
Threat detection in tweets with trigger patterns and contextual cues |
Martijn Spitters
,
Pieter Eendebak
,
Daniël Worm
,
Henri Bouma
|
Many threats in the real world can be related to activities in public sources on ... |
|
A Service-indepenent Model for Linking Online User Profile Information |
Awais Rashid
,
Matthew John Edwards
,
Paul Rayson
|
Public user profile information is a common feature of modern websites. These profiles can provide ... |
|
Exploring Opinion Dynamics in Security-Related Microblog Data |
Daniel Zeng
,
Yuhao Zhang
,
Wenji Mao
,
Ning Zhao
,
Xiuguo Bao
|
Web social media has become one of the major channels for people to express their ... |
|
Automatic Timeline Construction and Analysis for Computer Forensics Purposes |
Tahar m. Kechadi
,
Yoan Chabot
,
Aurelie Bertaux
,
Christophe Nicolle
|
To determine the circumstances of an incident, investigators need to reconstruct events that occurred in ... |
|
How Analysts Think (?): Early Observations |
B.l. William Wong
|
In this paper we describe work-in-progress to develop a description of the ways by which ... |
|
Optical Security Document Simulator for Black-Box Testing of ABC Systems |
Michael Gschwandtner
,
Svorad Štolc
,
Franz Daubner
|
Ever increasing passenger numbers have prompted the rise of automated border control (ABC) systems. Such ... |
|
Filtering automated polling traffic in computer network flow data |
Daniel John Lawson
,
Patrick Rubin-delanchy
,
Nick Heard
|
Detecting polling behaviour in a computer network has two important applications. First, the polling can ... |
|
Modelling new edge formation in a computer network through Bayesian variable selection |
Nicholas Heard
,
Silvia Metelli
|
Anomalous connections in a computer network graph can be a signal of malicious behaviours. For ... |
|
Application of a linear time method for change point detection to the classification of software |
Nicholas Heard
,
Alexander Bolton
|
A computer program’s dynamic instruction trace is the sequence of instructions it generates during run-time. ... |
|
Three statistical approaches to sessionizing network flow data |
Patrick Rubin-delanchy
,
Daniel J Lawson
,
Melissa J Turcotte
,
Nicholas A Heard
,
Niall M Adams
|
The network traffic generated by a computer, or a pair of computers, is often well ... |
|
Exfiltration of information from air-gapped machines using monitor’s LED indicator |
Yuval Elovici
,
Mordechai Guri
,
Vitali Sepetnitsky
|
In this paper we present a new approach for data exfiltration by leaking data from ... |
|
AccountabilityFS: A file system monitor for forensic readiness |
Rune Nordvik
,
Yi-ching Liao
,
Hanno Langweg
|
We present a file system monitor, AccountabilityFS, which prepares an organization for forensic analysis and ... |
|
Understanding the factors affecting UX and technology acceptance in the context of automated border controls |
Mari Ylikauppila
,
Sirra Toivonen
,
Minna Kulju
,
Minna Jokela
|
The purpose of this paper is to describe the complexity of an Automated Border Control ... |
|
On the adequacy of performance models in an adaptive Border Inspection Management system |
Jesse Musgrove
,
Bojan Cukic
,
And Vittorio Cortellessa
|
In this paper, we present an approach to validation of system performance models for a ... |
|
Resource-based Event Reconstruction of Digital Crime Scenes |
Yi-ching Liao
,
Hanno Langweg
|
To ensure that the potential evidence is readily available in an acceptable form when an ... |
|
Addressing the Increasing Volume and Variety of Digital Evidence Using an Ontology |
Richard Overill
,
Jeroen Keppens
,
Owen Brady
|
The field of digital evidence must contend with an increasing number of devices to be ... |
|
Authorship Analysis of Inspire Magazine through Stylometric and Psychological Features |
Jennifer Sikos
,
Peter David
,
Nizar Habash
,
Reem Faraj
|
When we read a piece of writing, the meaning we derive from that text often ... |
|
Identifying Top Sellers In Underground Economy Using Deep Learning-based Sentiment Analysis |
Hsinchun Chen
|
The underground economy is a key component in cyber carding crime ecosystems because it provides ... |
|
Modelling and Analysis of Identity Threat Behaviors Through Text Mining of Identity Theft Stories |
Yongpeng Yang
,
Monisha Manoharan
,
K. Suzanne Barber
|
Identity theft, fraud, and abuse are problems affecting all market sectors in society. Identity theft ... |
|
Predicting Links in Multi-relational Networks |
Bisharat Rasool Memon
,
Uffe Kock Wiil
|
Most traditional methods of link prediction in networks deal with homogeneous networks, i.e., networks with ... |
|
Time Critical Disinformation Influence Minimization in Online Social Networks |
Daniel Zeng
,
Chuan Luo
,
Kainan Cui
,
Xiaolong Zheng
|
If a piece of disinformation released from a terrorist organization propagates on Twitter and this ... |
|
A Selective Defense for Application Layer DDoS Attacks |
Yuri Gil Dantas
,
Vivek Nigam
,
Iguatemi Fonseca
|
Distributed Denial of Service (DDoS) attacks remain among the most dangerous and noticeable attacks on ... |
|
Mining the Web for Sympathy: The Pussy Riot Case |
Anders Westling
,
Joel Brynielsson
,
Tove Gustavi
|
With social media services becoming more and more popular, there now exists a constant stream ... |
|
Twitter Sentiment Analysis for Security-Related Information Gathering |
Maurice Mulvenna
,
Anna Jurek
,
Yaxin Bi
|
Analysing public sentiment about future events, such as demonstration or parades, may provide valuable information ... |
|
DNSSEC Misconfigurations: How incorrectly configured security leads to unreachability |
Xin Wang
,
Niels Adrichem
,
Antonio Reyes L
,
Muhammad Wasif
,
Ficky Fatturrahman
,
Fernando A. Kuipers
|
DNSSEC offers protection against spoofing of DNS data by providing authentication of its origin, ensuring ... |
|
Time-to-event Modeling for Predicting Hacker IRC Community Participant Trajectory |
Hsinchun Chen
,
Victor Benjamin
|
As computing and communication technologies become ubiquitous throughout society, researchers and practitioners have become motivated ... |
|
Practical interception of DECT encrypted voice communication in Unified Communications environments |
Iwen Coisel
,
Ignacio Sanchez
|
Digital Enhanced Cordless Telephony, DECT, is a worldwide standard for cordless telephony that is frequently ... |
|
The Nature of Communications and Emerging Communities on Twitter following the 2013 Syria Sarin Gas Attacks |
Yulia Tyshchuk
,
William Wallace
,
Hao Li
,
Heng Ji
,
Sue Kase
|
Social media has become an important communication tool especially following an extreme event. Research in ... |
|
Time Profiles for Identifying Users in Online Environments |
Fredrik Johansson
,
Lisa Kaati
,
Amendra Shrestha
|
Many people who discuss sensitive or private is- sues on web forums and other social ... |
|
Predicting Popularity of Forum Threads for Public Events Security |
Lei Wang
,
Daniel Zeng
,
Wenji Mao
,
Qingchao Kong
|
Web user’s online interactive behavior with others often makes some user generated contents popular. The ... |
|
A Case Study in Opportunity Reduction: Mitigating the Dirt Jumper Drive -smart attack |
Joel Lathrop
,
James B. O'kane
|
Over the past few years, a particularly virulent strain of distributed denial-of-service (DDoS) malware known ... |
|
Multiagent Models for Police Resource Allocation and Dispatch |
Ricardo Guedes
,
Vasco Furtado
,
Tarcísio Pequeno
|
n this article we investigate Multi-agent simulation as a way for modeling strategies for resource ... |
|
Uninvited Connections A Study of Vulnerable Devices on the Internet of Things (IoT) |
Hsinchun Chen
,
Mark Patton
,
Eric Gross
,
Ryan Chinn
,
Samantha Forbis
,
Leon Walker
|
The Internet of Things (IoT) continues to grow as uniquely identifiable objects are added to ... |
|
Challenges to a smooth-running data security audits. Case: A Finnish national security auditing criteria KATAKRI |
Jyri Rajamäki
|
An information security management system (ISMS) provides controls to protect organizations’ most fundamental asset, information. ... |
|
Ranking Online Memes in Emergency Events Based on Transfer Entropy |
Daniel Zeng
,
Xiaolong Zheng
,
Saike He
,
Xiuguo Bao2
,
Hongyuan Ma
,
Bo Xu
,
Guanhua Tian
,
Hongwei Hao
|
The rapid proliferation of online social networks has greatly boosted the dissemination and evolution of ... |
|
Causal Inference in Social Media Using Convergent Cross Mapping |
Daniel Zeng
,
Chuan Luo
,
Xiaolong Zheng
|
Revealing underlying causal structure in social media is critical to understanding how users interact, on ... |
|
Aegis: A Lightweight Tool for Prevent Frauds in Web Browsers |
José Luís Silva
,
Carlo Silva
,
Rodrigo Elia Assad
,
Ruy Garcia
|
Based on its daily use and volume of its applications – both domestic and corporate ... |
|
Descriptive Analytics: Examining Expert Hackers in Web Forums |
Ahmed Abbasi
,
Hsinchun Chen
,
Victor Benjamin
,
Weifeng Li
,
Shiyu Hu
|
In recent years, understanding the people behind cybercrime from a hacker-centric perspective has drawn increased ... |
|
Inferring itineraries of containerized cargo through the application of Conditional Random Fields |
Pedro Chahuara
,
Luca Mazzola
,
Michail Makridis
,
Claudio Schifanella
,
Aris Tsois
,
Mauro Pedone
|
This paper proposes a method to infer the itinerary of cargo transported in shipping containers ... |
|
Forecasting Country Stability in North Africa |
V.s. Subrahmanian
,
Steven Banaszak
,
Elizabeth Bowman
,
John P. Dickerson
|
We develop a novel approach to predict certain type of stability events (battles, battles won ... |
|
Foraging Online Social Networks |
Gijs Koot
,
Mirjam Veld
,
Joost Hendricksen
,
Rianne Kaptein
,
Arnout De Vries
,
Egon Broek
|
A concise and practical introduction is given on Online Social Networks (OSN) and their application ... |
|
Towards a comprehensive insight into the thematic organization of the Tor hidden services |
Martijn Spitters
,
Stefan Verbruggen
,
Mark Van Staalduinen
|
Tor is a popular ‘darknet’, a network that aims to conceal its users’ identities and ... |
|
CAPER - Collaborative information, Acquisition, Processing, Exploitation and Reporting for the prevention of organised crime |
Carlo Aliprandi
,
Juan Arraiza
,
Sebastian Maier
,
Gila Molcho
,
Felipe Melero
|
European Law Enforcement Agencies are increasingly more reliant on information and communication technologies and are ... |
|
Detecting threats of violence in online discussions using bigrams of important words |
Hugo Lewi Hammer
|
Making violent threats towards minorities like immigrants or homosexuals is increasingly common on the Internet. ... |
|
Learning to Classify Hate and Extremism Promoting Tweets |
Swati Agarwal
,
Ashish Sureka
|
Research shows that Twitter is being misused as a platform for online radicalization and contains ... |
|
Recommending Documents for Complex Question Exploration by Analyzing Browsing Behavior |
Alya Abbott
,
Olga Simek
|
We present a novel approach for recommending documents to users by analyzing user browsing behavior, ... |
|
Passwords are dead: Alternative authentication methods |
Michael Bachmann
|
The idea of protecting information has been around for many centuries. Modern computers use a ... |
|
Sensemaking and Cognitive Bias Mitigation in Visual Analytics |
Simon
,
B.l. William Wong
,
Margit Pohl
,
Lisa-christina Winter
,
Chris Pallaris
,
Attfield
|
The purpose of the VALCRI project is to develop a new system prototype for information ... |
|
Metal oxide gas sensors technologies for hidden people detection |
Andrea Ponzoni
,
Dario Zappa
,
Cristina Cerqui
,
Elisabetta Comini
,
Giorgio Sberveglieri
|
This work describes metal oxide gas sensor technologies based on chemiresistor and surface ionization devices ... |
|
Towards a Methodology for Cybersecurity Risk Management Using Agents Paradigm |
Parth Bhatt
,
Per M Gustavsson
,
Rose-mharie Ahlfeldt
|
In order to deal with shortcomings of security management systems, this work proposes a methodology ... |
|
Computational approach for detection of illegal activity over the internet |
Rasim Alguliyev
,
Davud Rustamov
,
Mirza Rzayev
|
No illegal activity is carried out at once. Usually, parties of illegal activity collect and ... |
|
An interactive Patterns of Life visualisation tool for Intelligence Analysis |
Neesha Kodagoda
,
Simon Attfield
,
Phong H. Nguyen
,
Leishi Zhang
,
Kai Xu
,
B Wong
,
Adrian Wagstaff
,
Graham Phillips
,
James Bulloch
,
John Marshall
,
Stewart Bertram
|
POLAR is an experimental test-bed visualisation tool for Patterns of Life analysis, developed on the ... |
|
Military Geospatial Profiling Analysis |
Oey
,
Herman-dick Giok Tjiang
|
One of the most utilised premeditated terrorist weapons of choice in conflict areas is the ... |
|
Modeling Flash Mobs in Cybernetic Space: Evaluating Threats of Emerging Socio-Technical Behaviors to Human Security |
Samer Al-khateeb
,
Nitin Agarwal
|
Since the occurrence of the first 'Flash Mob' organized by Bill Wasik in Manhattan in ... |
|
Robust Navigation and Communication in the Maritime Domain: the TRITON Project |
Marco Pini
,
Luca Pilosu
,
Lene Vesterlund
,
David Blanco
,
Fredrik Lindström
,
Emiliano Spaltro
|
Intentional jamming and spoofing are growing concerns for communication and positioning systems based on Global ... |
|
Detection of Olfactory Traces by Orthogonal Gas Identification Technologies - DOGGIES |
I. Daniilidis
,
J.-j. Filippi
,
W. Vautz
,
E. Dalcanale
,
S. Zampolli
,
G. Leventakis
,
I. Kauppinen
,
S.sinisalo
,
V. Tsoulkas
,
V. Kassouras
,
M. Carras
,
B. Gerard
,
R. Pinalli
,
A. Ragnoni
,
L. Dujourdy
,
D. Zavali
,
M. Brun
,
V. Grizis
,
A. Argyris
,
D. Syvridis
|
Border security is one of the key challenges to be taken up by Europe in ... |
|
When Counting is Not Enough: Limitations of NSA's effectiveness assessment of surveillance technology |
Michelle Cayford
,
Coen Van Gulijk
,
P.h.a.j.m. Van Gelder
|
The NSA has justified their surveillance programs by presenting the number of terrorist activities these ... |
|
DOCSCOPE: ID Printing Techniques Signatures |
Marc Pic
,
Clarisse Mandridake
,
Mathieu Hoarau
,
Kevin Win-lime
|
DOCSCOPE is an ANR project dedicated to the exploration of new approaches to authenticate ID ... |
|
Lawfully-Authorized Electronic Surveillance in Wireless Communications Systems: Standard and Requirements Overview |
Kafi Hassan
|
Abstract—Voice and data wireless communication devices have become important and convenient way of communication for ... |
|