EISIC 2019 Nov. 26, 2019 to Nov. 27, 2019, Oulu, Finland

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Keynote Speech: “Cyber training activities of the European Security and Defence College” Dr. Marios Thoma During this presentation, we will introduce the European Security Defence College (ESDC) and itsrole in ...
Keynote Speech: "Understanding Firmware Forensics using the Trusted Platform Module" Dr. Ian Oliver In this talk we present the Trusted Platform Module - TPM - and its role ...
AI: Trustworthy or Not on Software Security Prof. Juha Röning The National Institute of Standards and Technology plans to move to a vulnerability scoring methodthat ...
Keynote Speech: A Glimpse of 5G Security: Challenges and Opportunities Dr. Madhusanka Liyanage The evolution of mobile telecommunication networks is accompanied by new demands for theperformance, portability, elasticity ...
Keynote Speech: " Upcoming Global Initiative Report " Thi Hoang Digital technologies have changed the 'traditional' organized crime landscape in various ways,specifically with regard to ...
Identification and Detection of Human Trafficking Using Language Models Zhu Jessica , Lin Jones In this paper, we present a novel language model-based method for detecting both human trafficking ...
A comparative study of clustering methods using word embeddings Theodora Tsikrika , Stefanos Kompatsiaris , Nikolaos Bastas , George Kalpakis Grouping large amounts of data is critical for various tasks, including the identification of content ...
Mining Security discussions in Suomi24 Eetu Mikkola , Mourad Oussalah This study examines how social network-based approach can be applied in order to mine the ...
Identifying deceptive reviews: feature exploration, model transferability and classification attack Marianela Fernquist The temptation to influence and sway public opinion most certainly increases with the growth of ...
Predicting the Offender: Frequency Beats Bayes August Daniel Sutmuller , Mariëlle Den Hengst , Ana Isabel Barros , Bob Vecht , Wouter Gelder In this paper two Bayesian approaches and a frequency approach are compared on predicting offender ...
Firearm Detection and Segmentation using an Ensemble of Semantic Neural Networks Alexander Egiazarov , Vasileios Mavroeidis , Fabio Vishi In recent years we have seen an upsurge in terror attacks around the world. Such ...
Evaluation of Deep Learning Models for Ear Recognition Against Image Distortions Susan Bourlai Automated human authentication is becoming increasingly popular on a variety of daily activities, ranging fromsurveillance ...
Prototype and Analytics for Discovery and Exploitation of Threat Networks on Social Media Olga Simek , Danelle Heier Identifying and profiling threat actors are high priority tasks for a number of governmental organizations. ...
Characterization of Disinformation Networks Using Graph Embeddings and Opinion Mining Olga Simek , Alyssa Mensch , Lin Dagli The large-scale growth of worldwide social media networksis built upon their essential features of universal ...
Semi-Automatic Geometric Normalization of Profile Faces using Random Sample Consensus Feature Matching Justin Bourlai This paper proposes a correlation point matching approach, i.e. an efficient methodology for applying geometricnormalization ...
Remote KYC: Attacks and Counter-measures Marc Pic , Gaël Trabelsi Onboarding of new customers is a sensitive task for various services, like Banks who have ...
Privacy preserving sentiment analysis on multiple edge data streams with Apache NiFi Abhinay Pandya , Panos Kostakos , Hassan Mahmood , Marta Cortes , Ekaterina Gilman , Mourad Pirttikangas Sentiment analysis, also known as opinion mining, plays a big role in both private and ...
Crime Prediction Using Hotel Reviews? Panos Kostakos , Somkiadcharoen Robroo , Bofan Oussalah Can hotel reviews be used as a proxy for predicting crime hotspots? Domain knowledge indicates ...
A model of quantifying social relationships Disa Sariola This article proposes a mathematical model for quantifying relationships between agents within a network basedon ...
Extracting Account Attributes for Analyzing Influence on Twitter Lisa Kaati , Johan Fernquist , Fredrik Svenonius The last years has witnessed a surge of auto-generated content on social media. While many ...
Statistical Analysis of Identity Risk of Exposure and Cost Using the Ecosystem of Identity Attributes Chia-ju Chen , Razieh Barber Personally Identifiable Information (PII) is often called the "currency of the Internet" as identity assets ...
Attack Hypothesis Generation Aviad Elitzur , Rami Zilberman In recent years, the perpetrators of cyber-attacks have been playing a dynamic cat and mouse ...
Secure exchange of Information for all actors involved in MLAs (EIOs for Europe) and police cooperation Fabrizia Bemer The EIO is an important contribution to the topic of the conference, because security informatics ...
Timing Covert Channels Detection Cases via Machine Learning Anna Epishkina , Mikhail Finoshin , Konstantin Yazykova Currently, packet data networks are widespread. Their architectural features allow constructing covert channels thatare able ...
Moving Target Defense (MTD) as a Cyber Security Measure Mordechai Guri , Yuval Shirtz Information Communication Technologies (ICT) environments are built as static configurations. Some of the reasonsfor having ...
Mobile user authentication using keystroke dynamics Anna Epishkina , Konstantin Frolova Behavioral biometrics identifies individuals according to their unique way of interacting with computer devices.Keystroke dynamics ...
Analysis of Vancouver Crime and Census Data Using Various Machine Learning Algorithms Kyle Behiels , Andrew Park , Justin Song , Valerie Tsang In recent years mass storage of criminal data has become a common practice for many ...
The Development of Lone Wolf Terrorism in Southeast Asia Pujo Widodo , Tri Yacobus Since the development of Islam in the 13th century in Southeast Asia, the traders who ...
Continuous Authentication of Smartphone Users via Swipes and Taps Analysis Anna Epishkina , Konstantin Garbuz Nowadays, smartphones are used for getting access to sensitive and private data. As a result, ...
HOTSPOT: Crossing the Air-Gap Between Isolated PCs and Nearby Smartphones Using Temperature Mordechai Guri Air-gapped computers are hermetically isolated from the Internet to eliminate any means of information leakage.In ...
Devising and Optimizing Crowd Control Strategies Using Agent-Based Modeling and Simulation Andrew Park , Ryan Ficocelli , Lee Patterson , Valerie Spicer , Herbert Song Sporting events can attract large crowds who are capable of spurring on their teams. Emotionally ...