掌桥科研
一站式科研服务平台
科技查新
收录引用
专题文献检索
外文数据库(机构版)
更多产品
首页
成为会员
我要充值
退出
我的积分:
中文会员
开通
中文文献批量获取
外文会员
开通
外文文献批量获取
我的订单
会员中心
我的包量
我的余额
登录/注册
文献导航
中文期刊
>
中文会议
>
中文学位
>
中国专利
>
外文期刊
>
外文会议
>
外文学位
>
外国专利
>
外文OA文献
>
外文科技报告
>
中文图书
>
外文图书
>
工业技术
基础科学
医药卫生
农业科学
教科文艺
经济财政
社会科学
哲学政法
其他
工业技术
基础科学
医药卫生
农业科学
教科文艺
经济财政
社会科学
哲学政法
其他
自然科学总论
数学、物理、化学、力学
天文学、地球科学
生物科技
医学、药学、卫生
航空航天、军事
农林牧渔
机械、仪表工业
化工、能源
冶金矿业
电子学、通信
计算机、自动化
土木、建筑、水利
交通运输
轻工业技术
材料科学
电工技术
一般工业技术
环境科学、安全科学
图书馆学、情报学
社会科学
其他
马克思主义、列宁主义、毛泽东思想、邓小平理论
哲学、宗教
社会科学总论
政治、法律
军事
经济
文化、科学、教育、体育
语言、文字
文学
艺术
历史、地理
自然科学总论
数理科学和化学
天文学、地球科学
生物科学
医药、卫生
农业科学
工业技术
交通运输
航空、航天
环境科学、安全科学
综合性图书
自然科学总论
数学、物理、化学、力学
天文学、地球科学
生物科技
医学、药学、卫生
航空航天、军事
农林牧渔
机械、仪表工业
化工、能源
冶金矿业
电子学、通信
计算机、自动化
土木、建筑、水利
交通运输
轻工业技术
材料科学
电工技术
一般工业技术
环境科学、安全科学
图书馆学、情报学
社会科学
其他
自然科学总论
数学、物理、化学、力学
天文学、地球科学
生物科技
医学、药学、卫生
航空航天、军事
农林牧渔
机械、仪表工业
化工、能源
冶金矿业
电子学、通信
计算机、自动化
土木、建筑、水利
交通运输
轻工业技术
电工技术
一般工业技术
环境科学、安全科学
图书馆学、情报学
社会科学
其他
自然科学总论
数学、物理、化学、力学
天文学、地球科学
生物科技
医学、药学、卫生
航空航天、军事
农林牧渔
机械、仪表工业
化工、能源
冶金矿业
电子学、通信
计算机、自动化
土木、建筑、水利
交通运输
轻工业技术
材料科学
电工技术
一般工业技术
环境科学、安全科学
图书馆学、情报学
社会科学
其他
美国国防部AD报告
美国能源部DE报告
美国航空航天局NASA报告
美国商务部PB报告
外军国防科技报告
美国国防部
美国参联会主席指示
美国海军
美国空军
美国陆军
美国海军陆战队
美国国防技术信息中心(DTIC)
美军标
美国航空航天局(NASA)
战略与国际研究中心
美国国土安全数字图书馆
美国科学研究出版社
兰德公司
美国政府问责局
香港科技大学图书馆
美国海军研究生院图书馆
OALIB数据库
在线学术档案数据库
数字空间系统
剑桥大学机构知识库
欧洲核子研究中心机构库
美国密西根大学论文库
美国政府出版局(GPO)
加利福尼亚大学数字图书馆
美国国家学术出版社
美国国防大学出版社
美国能源部文献库
美国国防高级研究计划局
美国陆军协会
美国陆军研究实验室
英国空军
美国国家科学基金会
美国战略与国际研究中心-导弹威胁网
美国科学与国际安全研究所
法国国际关系战略研究院
法国国际关系研究所
国际宇航联合会
美国防务日报
国会研究处
美国海运司令部
北约
盟军快速反应部队
北约浅水行动卓越中心
北约盟军地面部队司令部
北约通信信息局
北约稳定政策卓越中心
美国国会研究服务处
美国国防预算办公室
美国陆军技术手册
一般OA
科技期刊论文
科技会议论文
图书
科技报告
科技专著
标准
其它
美国卫生研究院文献
分子生物学
神经科学
药学
外科
临床神经病学
肿瘤学
细胞生物学
遗传学
公共卫生&环境&职业病
应用微生物学
全科医学
免疫学
动物学
精神病学
兽医学
心血管
放射&核医学&医学影像学
儿科
医学进展
微生物学
护理学
生物学
牙科&口腔外科
毒理学
生理学
医院管理
妇产科学
病理学
生化技术
胃肠&肝脏病学
运动科学
心理学
营养学
血液学
泌尿科学&肾病学
生物医学工程
感染病
生物物理学
矫形
外周血管病
药物化学
皮肤病学
康复学
眼科学
行为科学
呼吸学
进化生物学
老年医学
耳鼻喉科学
发育生物学
寄生虫学
病毒学
医学实验室检查技术
生殖生物学
风湿病学
麻醉学
危重病护理
生物材料
移植
医学情报
其他学科
人类生活必需品
作业;运输
化学;冶金
纺织;造纸
固定建筑物
机械工程;照明;加热;武器;爆破
物理
电学
人类生活必需品
作业;运输
化学;冶金
纺织;造纸
固定建筑物
机械工程;照明;加热;武器;爆破
物理
电学
马克思主义、列宁主义、毛泽东思想、邓小平理论
哲学、宗教
社会科学总论
政治、法律
军事
经济
文化、科学、教育、体育
语言、文字
文学
艺术
历史、地理
自然科学总论
数理科学和化学
天文学、地球科学
生物科学
医药、卫生
农业科学
工业技术
交通运输
航空、航天
环境科学、安全科学
综合性图书
主题
主题
题名
作者
关键词
摘要
高级搜索 >
外文期刊
外文会议
外文学位
外国专利
外文图书
外文OA文献
中文期刊
中文会议
中文学位
中国专利
中文图书
外文科技报告
清除
历史搜索
清空历史
首页
>
外文会议
>
其他
>
IEEE Joint Intelligence and Security Informatics Conference
IEEE Joint Intelligence and Security Informatics Conference
召开年:
召开地:
出版时间:
-
会议文集:
-
会议论文
热门论文
全部论文
全选(
0
)
清除
导出
1.
CAPER: Collaborative Information, Acquisition, Processing, Exploitation and Reporting for the Prevention of Organised Crime
机译:
CAPER:用于预防有组织犯罪的协作信息,收购,加工,开发和报告
作者:
Molcho G.
;
Maier S.
;
Melero F.
;
Aliprandi C.
会议名称:
《IEEE Joint Intelligence and Security Informatics Conference》
|
2014年
关键词:
data analysis;
data visualisation;
natural language processing;
police data processing;
social networking (online);
CAPER platform;
European law enforcement agency;
Internet;
NLP;
VA technology;
collaborative information acquisition processing exploitation and reporting;
information and communication technologies;
information quantity;
information richness;
natural language processing;
open source intelligence platform;
organised crime prevention;
social media;
visual analytics;
Europe;
Interoperability;
Media;
Multimedia communication;
Natural language processing;
Semantics;
Visual analytics;
Focused Crawling;
Natural Language Processing (NLP);
Open Source Intelligence (OSINT);
Semantics;
Social Web;
Visual Analytics (VA).;
2.
Computational Approach for Detection of Illegal Activity over the Internet
机译:
互联网非法活动检测的计算方法
作者:
Alguliyev R.
;
Rustamov D.
;
Rzayev M.
会议名称:
《IEEE Joint Intelligence and Security Informatics Conference》
|
2014年
关键词:
Internet;
computer crime;
Internet;
heuristic algorithm;
illegal activity detection;
permanent monitoring;
Informatics;
Internet;
Law;
Monitoring;
National security;
ISP;
illegal activity;
national security system;
radical-religious propaganda;
riot;
state secret;
terror;
3.
Towards a Methodology for Cybersecurity Risk Management Using Agents Paradigm
机译:
使用代理范例对网络安全风险管理的方法
作者:
Toshiro Yano E.
;
Bhatt P.
;
Gustavsson P.M.
;
Ahlfeldt R.-M.
会议名称:
《IEEE Joint Intelligence and Security Informatics Conference》
|
2014年
关键词:
business continuity;
risk management;
security of data;
SA;
agents paradigm;
business continuity;
cybersecurity risk management;
proactive behavior;
security management systems;
sensors;
situational awareness;
Analytical models;
Computer security;
Educational institutions;
Informatics;
Risk management;
Agent Based Paradigm;
Cybersecurity Risk Management;
Situational Awareness;
4.
Modeling Flash Mobs in Cybernetic Space: Evaluating Threats of Emerging Socio-Technical Behaviors to Human Security
机译:
用网络感染空间建模闪怪物:评估新兴社会技术行为对人类安全的威胁
作者:
Al-khateeb S.
;
Agarwal N.
会议名称:
《IEEE Joint Intelligence and Security Informatics Conference》
|
2014年
关键词:
behavioural sciences;
security;
social networking (online);
ICT;
SMS;
campaigns;
civil stability;
computational science;
cybernetic space;
economic stability;
flash mob phenomenon;
flash mobs;
human security;
journalistic accounts;
mass movement;
modern information and communication technology;
parkour;
political stability;
public engagement;
social movement;
social network platforms;
social science;
social stability;
socio-technical behaviors;
viral emails;
Ash;
Cybernetics;
Educational institutions;
Electronic mail;
Rocks;
Security;
Social network services;
collective action;
collective identity;
control;
cyber crime;
cyber security;
flash mob;
human security;
interest;
parkour;
predictive model;
social media;
social network;
5.
POLAR-An Interactive Patterns of Life Visualisation Tool for Intelligence Analysis
机译:
偏光 - 智能分析的生命形态化工具的互动模式
作者:
Kodagoda Neesha
;
Attfield Simon
;
Nguyen Phong H.
;
Zhang Leishi
;
Xu Kai
;
Wong B L William
;
Wagstaff Adrian
;
Phillips Graham
;
Bulloch James
;
Marshall John
;
Bertram Stewart
会议名称:
《IEEE Joint Intelligence and Security Informatics Conference》
|
2014年
关键词:
Conferences;
Data mining;
Data visualization;
Educational institutions;
Geospatial analysis;
Image color analysis;
Visualization;
behaviour patterns;
intelligence analysis;
interactive visualisation;
multiple coordinated views;
patterns of life;
spatial temporal;
6.
Learning to Classify Hate and Extremism Promoting Tweets
机译:
学习分类仇恨和极端主义促进推文
作者:
Sureka A.
;
Agarwal S.
会议名称:
《IEEE Joint Intelligence and Security Informatics Conference》
|
2014年
关键词:
learning (artificial intelligence);
pattern classification;
social networking (online);
Twitter;
Web site community guidelines;
linguistic features;
one-class classification;
tweet classification;
tweet identification;
tweet promotion;
Accuracy;
Informatics;
Internet;
Security;
Testing;
Training;
Twitter;
Mining user generated content;
One-class classifier;
Online radicalization;
Short-text classification;
Twitter;
7.
Recommending Documents for Complex Question Exploration by Analyzing Browsing Behavior
机译:
通过分析浏览行为推荐复杂问题探索的文档
作者:
Abbott A.
;
Simek O.
会议名称:
《IEEE Joint Intelligence and Security Informatics Conference》
|
2014年
关键词:
behavioural sciences computing;
document handling;
recommender systems;
browsing behavior;
complex question exploration;
documents;
original data set;
Algorithm design and analysis;
Joints;
Laboratories;
Prediction algorithms;
Recommender systems;
Security;
Semantics;
browsing history;
dimensionality reduction;
document prioritization;
question answering;
recommender systems;
8.
Metal Oxide Gas Sensors Technologies for Hidden People Detection
机译:
金属氧化物气体传感器用于隐藏人员检测的技术
作者:
Ponzoni A.
;
Zappa D.
;
Cerqui C.
;
Comini E.
;
Sberveglieri G.
会议名称:
《IEEE Joint Intelligence and Security Informatics Conference》
|
2014年
关键词:
electronic noses;
object detection;
sensor arrays;
surface ionisation;
chemiresistor;
electronic nose sensing system;
hidden people detection;
metal oxide gas sensor;
pattern recognition software;
sensor array;
surface ionization devices;
Arrays;
Compounds;
Electronic noses;
Ionization;
Metals;
Security;
Sensors;
chemiresistor;
electronic nose;
hidden people;
metal oxides;
surface ionization;
9.
Detecting Threats of Violence in Online Discussions Using Bigrams of Important Words
机译:
使用重要词语检测在线讨论中的暴力威胁
作者:
Hammer Hugo Lewi
会议名称:
《IEEE Joint Intelligence and Security Informatics Conference》
|
2014年
关键词:
Educational institutions;
Europe;
Feature extraction;
Internet;
Materials;
Text mining;
YouTube;
classification;
lasso logistic regression;
machine learning;
social media;
text mining;
violent threats;
10.
Detection of Olfactory Traces by Orthogonal Gas Identification Technologies - DOGGIES
机译:
通过正交气体识别技术检测嗅觉痕迹 - 小狗
作者:
Daniilidis I.
;
Filippi J.-J.
;
Vautz W.
;
Dalcanale E.
;
Zampolli S.
;
Leventakis G.
;
Kauppinen I.
;
Sinisalo S.
;
Tsoulkas V.
;
Kassouras V.
;
Carras M.
;
Gerard B.
;
Pinalli R.
;
Ragnoni A.
;
Dujourdy L.
;
Zavali D.
;
Brun M.
;
Grizis V.
;
Argyris A.
;
Syvridis D.
会议名称:
《IEEE Joint Intelligence and Security Informatics Conference》
|
2014年
关键词:
least squares approximations;
military computing;
organic compounds;
pattern classification;
photoacoustic spectroscopy;
security;
support vector machines;
terrorism;
DOGGIES;
Europe;
IMS;
KNN;
MIR-PAS;
PLS-DA;
SVM;
VFA;
VOC;
border security;
hidden persons detection;
human trafficking;
illegal substances detection;
ion mobility spectrometry;
k-nearest neighbour;
mid-infrared photo-acoustic spectroscopy;
miniature photo-acoustic cell;
non radio-active ionization source;
olfactory traces detection;
orthogonal gas identification technologies;
partial least squares-discrimant analysis;
smuggling;
spectral signature;
support vector machines;
terrorism;
volatile fatty acids;
volatile organic compounds;
Algorithm design and analysis;
Drugs;
Europe;
Explosives;
Instruments;
Olfactory;
Security;
Border security;
Explosives;
Human Detection;
IMS;
Illicit Drugs;
MIRPAS;
Mobile Instrument;
Olfactory;
Orthogonal Technologies;
11.
Sensemaking and Cognitive Bias Mitigation in Visual Analytics
机译:
视觉分析中的传感与认知偏置缓解
作者:
Pohl M.
;
Winter L.-C.
;
Pallaris C.
;
Attfield S.
;
Wong B.L.W.
会议名称:
《IEEE Joint Intelligence and Security Informatics Conference》
|
2014年
关键词:
cognition;
data analysis;
data visualisation;
inference mechanisms;
VALCRI project;
cognitive bias mitigation;
information exploitation;
information visualisation;
intelligence analysis systems;
intelligence analysts;
law enforcement agencies;
reasoning process;
sensemaking process;
visual analytics;
Artificial intelligence;
Cognition;
Context;
Data visualization;
Educational institutions;
Law enforcement;
Prototypes;
human cognitive processes;
intelligence analysis;
sensemaking;
12.
DOCSCOPE: ID Printing Techniques Signatures
机译:
DocScope:ID打印技术签名
作者:
Pic M.M.
;
Mandridake C.
;
Hoarau M.
;
Win-Lime K.
会议名称:
《IEEE Joint Intelligence and Security Informatics Conference》
|
2014年
关键词:
authorisation;
document handling;
printing;
ANR project;
DOCSCOPE;
ID document authentication;
ID printing technique signatures;
counterfeiting detection;
falsification detection;
Databases;
Educational institutions;
Forgery;
Industries;
Printers;
Printing;
Security;
ID Documents;
printing signature;
printing techniques;
13.
Passwords are Dead: Alternative Authentication Methods
机译:
密码已死:替代身份验证方法
作者:
Bachmann M.
会议名称:
《IEEE Joint Intelligence and Security Informatics Conference》
|
2014年
关键词:
biometrics (access control);
data protection;
security of data;
authentication methods;
biometrics;
electronic tattoos;
information protection;
ingestible pills;
login authentication;
private data access;
sound-based passwords;
Authentication;
Biometrics (access control);
Educational institutions;
Fingerprint recognition;
Joints;
Visualization;
2-step authentication;
one-time password;
password;
user authentication;
web security;
14.
When Counting is Not Enough: Limitations of NSA's Effectiveness Assessment of Surveillance Technology
机译:
计数时不够:NSA对监视技术的有效性评估的限制
作者:
Cayford M.
;
Van Gulijk C.
;
Gelder P.H.A.J.M.
会议名称:
《IEEE Joint Intelligence and Security Informatics Conference》
|
2014年
关键词:
national security;
surveillance;
terrorism;
NSA effective assessment;
surveillance programs;
surveillance technology;
technology effectiveness;
terrorist activities;
Auditory system;
Government;
Presses;
Privacy;
Surveillance;
Terrorism;
NSA;
effectiveness;
surveillance technology;
15.
Robust Navigation and Communication in the Maritime Domain: The TRITON Project
机译:
海事域名中的强大导航和通信:Thiton项目
作者:
Pini M.
;
Pilosu L.
;
Vesterlund L.
;
Blanco D.
;
Lindstrom F.
;
Spaltro E.
会议名称:
《IEEE Joint Intelligence and Security Informatics Conference》
|
2014年
关键词:
calibration;
failure analysis;
interference suppression;
marine communication;
marine navigation;
radio receivers;
radiofrequency interference;
satellite navigation;
security;
ships;
transponders;
AIS transponder;
GNSS receivers;
Global Navigation Satellite System;
Internet;
TRITON project;
VHF band;
automatic information system;
digital selective calling system;
fraud services;
intentional interfering signals;
intentional jamming;
intentional spoofing;
interference mitigation;
maritime domain;
maritime sector;
personal privacy devices;
positioning systems;
robust navigation;
security mechanisms;
ship gyro calibration system;
vessels;
Global Positioning System;
Interference;
Jamming;
Marine vehicles;
Receivers;
Robustness;
Security;
Ship Reporting Systems;
interference mitigation;
robust navigation;
16.
Automatic Timeline Construction and Analysis for Computer Forensics Purposes
机译:
计算机取证目的自动时间线构造与分析
作者:
Chabot Y.
;
Bertaux A.
;
Nicolle C.
;
Kechadi T.
会议名称:
《IEEE Joint Intelligence and Security Informatics Conference》
|
2014年
关键词:
digital forensics;
automatic timeline analysis;
automatic timeline construction;
cognitive overload;
computer forensics;
crime scene;
digital system;
event reconstruction;
multilayered architecture;
Browsers;
Computer architecture;
Data mining;
Digital forensics;
Ontologies;
Semantics;
Software;
Digital Forensics;
Event Reconstruction;
Ontology;
Timeline Analysis;
17.
Multiagent Models for Police Resource Allocation and Dispatch
机译:
警察资源分配和派遣的多元模型
作者:
Guedes R.
;
Furtado V.
;
Pequeno T.
会议名称:
《IEEE Joint Intelligence and Security Informatics Conference》
|
2014年
关键词:
law administration;
multi-agent systems;
police data processing;
random processes;
Zipfian distribution;
crime type;
law enforcement;
multiagent model;
police resource allocation;
police resource dispatch;
public safety;
random distribution;
Conferences;
Informatics;
Joints;
Security;
agent-based-simulation;
allocation and dispatch of policie resources;
scheduling policies;
18.
Application of a Linear Time Method for Change Point Detection to the Classification of Software
机译:
在改变点检测到软件分类的情况下应用线性时间方法
作者:
Bolton A.
;
Heard N.
会议名称:
《IEEE Joint Intelligence and Security Informatics Conference》
|
2014年
关键词:
Markov processes;
invasive software;
matrix algebra;
probability;
change point detection method;
computer program dynamic instruction trace analysis;
exact linear time method;
instruction sequence;
instruction trace modelling;
malicious functions;
malware detection;
piecewise homogeneous Markov chains;
simulated dynamic instruction trace;
software classification;
transition probability matrix;
Computational modeling;
Computers;
Educational institutions;
Heuristic algorithms;
Malware;
Markov processes;
Software;
PELT algorithm;
change point analysis;
malware;
piecewise homogeneous Markov chain;
19.
Optical Security Document Simulator for Black-Box Testing of ABC Systems
机译:
用于ABC系统的黑匣子测试的光学安全文件模拟器
作者:
Gschwandtner M.
;
Tolc S.
;
Daubner F.
会议名称:
《IEEE Joint Intelligence and Security Informatics Conference》
|
2014年
关键词:
document handling;
reliability;
security of data;
ABC systems;
authentication process;
automated border control systems;
automated document readers;
black-box testing;
eGates;
human border guard;
optical security document simulator;
passenger numbers;
reliability;
Authentication;
Hardware;
Optical imaging;
Patents;
Software;
Testing;
ABC system testing;
MRTD;
automated border control;
document simulation;
passport;
security document authentication;
20.
Statistical Frameworks for Detecting Tunnelling in Cyber Defence Using Big Data
机译:
使用大数据检测网络防御隧道隧道的统计框架
作者:
Lawson D.J.
;
Rubin-Delanchy P.
;
Heard N.
;
Adams N.M.
会议名称:
《IEEE Joint Intelligence and Security Informatics Conference》
|
2014年
关键词:
Big Data;
computer network security;
graph theory;
learning (artificial intelligence);
statistical analysis;
artificial attack;
big data;
computational cost;
computer networks;
cyber defence;
graph-level descriptions;
higher-level sessions;
machine learning;
malicious software;
netflow timings;
session telescoping;
statistical frameworks;
statistical modelling;
tunnelling;
Big data;
Computational modeling;
Correlation;
Data models;
Educational institutions;
Image edge detection;
Tunneling;
21.
Challenges to a Smooth-Running Data Security Audits. Case: A Finnish National Security Auditing Criteria KATAKRI
机译:
挑战流畅运行的数据安全审核。案例:芬兰国家安全审计标准卡塔克里
作者:
Rajamaki J.
会议名称:
《IEEE Joint Intelligence and Security Informatics Conference》
|
2014年
关键词:
information management;
security of data;
CSR;
Finnish national security auditing criteria;
ISMS;
KATAKRI;
case study research;
information security management system;
smooth-running data security audits;
Companies;
ISO standards;
Information security;
National security;
Standards organizations;
KATAKRI;
information security management system;
national security auditing criteria;
security auditing;
22.
Three Statistical Approaches to Sessionizing Network Flow Data
机译:
三种统计方法调整网络流数据
作者:
Rubin-Delanchy P.
;
Lawson D.J.
;
Turcotte M.J.
;
Heard N.
;
Adams N.M.
会议名称:
《IEEE Joint Intelligence and Security Informatics Conference》
|
2014年
关键词:
computer network management;
computer network reliability;
computer network security;
computers;
cyber security;
intruder tunnelling;
network flow data;
network monitoring;
network traffic;
statistical approaches;
Bayes methods;
Computational modeling;
Computers;
Data models;
Educational institutions;
Mathematical model;
Stochastic processes;
clustering;
network flow;
point process;
sessionization;
23.
An Approximate Framework for Flexible Network Flow Screening
机译:
灵活网络流筛选的近似框架
作者:
Adams N.M.
;
Lawson D.
会议名称:
《IEEE Joint Intelligence and Security Informatics Conference》
|
2014年
关键词:
computer network security;
search problems;
telecommunication traffic;
approximate sequential search procedure;
flexible network flow screening;
network security;
network traffic;
Computers;
Context;
Educational institutions;
IP networks;
Mathematics;
Monitoring;
Security;
24.
AccountabilityFS: A File System Monitor for Forensic Readiness
机译:
Consultabilityfs:文件系统监视器,用于取证准备
作者:
Nordvik R.
;
Yi-Ching Liao
;
Langweg H.
会议名称:
《IEEE Joint Intelligence and Security Informatics Conference》
|
2014年
关键词:
digital forensics;
invasive software;
AccountabilityFS file system monitor;
file system operation;
forensic analysis;
forensic readiness;
malware attacks;
performance overhead;
storage overhead;
Educational institutions;
Forensics;
Kernel;
Malware;
Monitoring;
Reliability;
25.
Adaptive Change Detection for Relay-Like Behaviour
机译:
用于继电器的行为的自适应变化检测
作者:
Bodenham D.A.
;
Adams N.M.
会议名称:
《IEEE Joint Intelligence and Security Informatics Conference》
|
2014年
关键词:
security of data;
NETFLOW data;
adaptive change detection;
anomalous behaviour detection;
in-coming flow;
network device;
network flow data;
out-going flow;
relay-like behaviour;
Adaptive estimation;
Context;
Detectors;
Educational institutions;
Monitoring;
Relays;
Servers;
26.
A Service-Indepenent Model for Linking Online User Profile Information
机译:
用于链接在线用户配置文件信息的无关模型
作者:
Edwards M.J.
;
Rashid A.
;
Rayson P.
会议名称:
《IEEE Joint Intelligence and Security Informatics Conference》
|
2014年
关键词:
data privacy;
social networking (online);
Websites;
cross-link profiles;
digital crime artefact tracing;
online user profile information linking;
privacy investigators;
privacy researchers;
public user profile information;
service-independent model;
Electronic mail;
Electronic publishing;
Encyclopedias;
Internet;
Joining processes;
Videos;
27.
The Nature of Communications and Emerging Communities on Twitter Following the 2013 Syria Sarin Gas Attacks
机译:
2013年叙利亚萨林煤气发作后Twitter通信和新兴社区的性质
作者:
Tyshchuk Y.
;
Wallace W.A.
;
Hao Li
;
Heng Ji
;
Kase S.E.
会议名称:
《IEEE Joint Intelligence and Security Informatics Conference》
|
2014年
关键词:
information retrieval;
natural language processing;
network theory (graphs);
social networking (online);
terrorism;
2013 Syria Sarin gas attack;
EE;
NER;
NLP techniques;
Stanford parser;
Twitter communication;
Twitter communities;
event extraction;
named entity recognition;
natural language processing;
network analysis;
social media;
trace human response;
Communities;
Feature extraction;
Image edge detection;
Media;
Natural language processing;
Organizations;
Twitter;
communities;
social media;
social network analysis;
28.
Trusted Detection of Sensitive Activities on Mobile Phones Using Power Consumption Measurements
机译:
使用功耗测量值得信赖地检测手机上的敏感活动
作者:
Guri M.
;
Kedma G.
;
Zadov B.
;
Elovici Y.
会议名称:
《IEEE Joint Intelligence and Security Informatics Conference》
|
2014年
关键词:
learning (artificial intelligence);
smart phones;
telecommunication security;
trusted computing;
machine learning multilabel classification algorithms;
malicious program;
mobile phones;
power consumption measurements;
sensitive activities;
software monitors;
trusted detection;
Battery charge measurement;
Global Positioning System;
IEEE 802.11 Standards;
Mobile handsets;
Monitoring;
Power demand;
Power measurement;
Machine learning;
Mobile phone security;
Multi-label classification;
Trusted measurement;
29.
Time Critical Disinformation Influence Minimization in Online Social Networks
机译:
在线社交网络中的最小化影响力
作者:
Chuan Luo
;
Kainan Cui
;
Xiaolong Zheng
;
Zeng D.
会议名称:
《IEEE Joint Intelligence and Security Informatics Conference》
|
2014年
关键词:
approximation theory;
computational complexity;
minimisation;
social networking (online);
NP-hard optimization problem;
Twitter;
adversarial campaign;
approximation algorithm;
minimization;
objective function;
online social network;
terrorist organization;
time critical disinformation;
time window;
transmission temporal dynamics knowledge;
Greedy algorithms;
Information processing;
Linear programming;
Minimization;
Optimization;
Radiation detectors;
Social network services;
competing campaigns;
disinformation;
information cascades;
social networks;
submodular functions;
30.
Resilience of Anti-malware Programs to Na?ve Modifications of Malicious Binaries
机译:
对恶意杂志的反恶意软件程序的恢复能力进行恶意二进制文件
作者:
Guri M.
;
Kedma G.
;
Kachlon A.
;
Elovici Y.
会议名称:
《IEEE Joint Intelligence and Security Informatics Conference》
|
2014年
关键词:
invasive software;
Internet;
anti-malware program resilience;
antivirus products;
average detection rate;
malicious binary file;
nave variants;
Conferences;
Informatics;
Joints;
Security;
crafty malware;
false positive;
malware analysis;
malware detection;
malware variants;
31.
On the Usability of Augmented Reality for Information Exchange in Teams from the Security Domain
机译:
论安全域团队中信息交换的增强现实的可用性
作者:
Datcu D.
;
Cidota M.
;
Lukosch H.
;
Lukosch S.
会议名称:
《IEEE Joint Intelligence and Security Informatics Conference》
|
2014年
关键词:
augmented reality;
security of data;
team working;
user centred design;
AR environment;
AR techniques;
augmented reality techniques;
augmented reality usability;
context-related information exchange;
end-user centred design approach;
security domain;
team information exchange;
Collaboration;
Games;
Information exchange;
Security;
Three-dimensional displays;
Training;
Usability;
Augmented Reality;
Information Exchange;
Usability;
32.
ALPD: Active Learning Framework for Enhancing the Detection of Malicious PDF Files
机译:
ALPD:主动学习框架,用于增强恶意PDF文件的检测
作者:
Nissim N.
;
Cohen A.
;
Moskovitch R.
;
Shabtai A.
;
Edry M.
;
Bar-Ad O.
;
Elovici Y.
会议名称:
《IEEE Joint Intelligence and Security Informatics Conference》
|
2014年
关键词:
computer viruses;
digital signatures;
learning (artificial intelligence);
ALPD;
PDF malware;
active learning framework;
antivirus signature repository;
attack vector;
email communication;
emails;
informative benign PDF documents;
machine learning algorithms;
malicious PDF file detection;
malicious attachments;
organizational networks;
Electronic mail;
Feature extraction;
Malware;
Organizations;
Portable document format;
Support vector machines;
Training;
Active Learning;
Machine Learning;
Malware;
PDF;
33.
Predicting Popularity of Forum Threads for Public Events Security
机译:
预测论坛线程的普及:公共事件安全性
作者:
Qingchao Kong
;
Wenji Mao
;
Zeng D.
;
Lei Wang
会议名称:
《IEEE Joint Intelligence and Security Informatics Conference》
|
2014年
关键词:
Internet;
human factors;
social networking (online);
Tianya forum dataset;
Web user online interactive behavior;
dynamic factors;
forum thread popularity prediction;
online content popularity modeling;
online content popularity prediction;
public event security;
user generated contents;
Classification algorithms;
Heuristic algorithms;
Hidden Markov models;
Instruction sets;
Message systems;
Prediction algorithms;
Predictive models;
modeling and prediction of popularity evolution;
popularity of online content;
social media analytics;
34.
Aegis: A Lightweight Tool for Prevent Frauds in Web Browsers
机译:
AEGIS:用于防止Web浏览器中欺诈的轻量级工具
作者:
Revoredo Da Silva C.M.
;
Costa da Silva J.L.
;
Elia Assad R.
;
Guerra Barretto Garcia R.J.
会议名称:
《IEEE Joint Intelligence and Security Informatics Conference》
|
2014年
关键词:
online front-ends;
security of data;
Aegis;
Web browsers;
Web environment;
fraud prevention;
malicious cyber crimes;
social engineering technique;
Algorithms;
Browsers;
Information filters;
Malware;
Uniform resource locators;
Frauds;
Social Engineering;
Web Vulnerabilities;
35.
Time-to-Event Modeling for Predicting Hacker IRC Community Participant Trajectory
机译:
预测黑客IRC社区参与者轨迹的延时建模
作者:
Benjamin Victor
;
Chen Hsinchun
会议名称:
《IEEE Joint Intelligence and Security Informatics Conference》
|
2014年
关键词:
Communities;
Computer crime;
Computer hacking;
Data models;
Feature extraction;
Predictive models;
Cybersecurity;
Hacker IRC;
Hacker community;
Survival Analysis;
Time-to-event;
36.
A Selective Defense for Application Layer DDoS Attacks
机译:
应用层DDOS攻击的选择性防御
作者:
Dantas Y.G.
;
Nigam V.
;
Fonseca I.E.
会议名称:
《IEEE Joint Intelligence and Security Informatics Conference》
|
2014年
关键词:
Internet;
computer network security;
formal verification;
reliability;
system monitoring;
ADDoS prevention;
ASV defense;
Internet;
Maude;
PVeStA;
adaptive selective verification;
application layer DDoS attacks;
availability;
computational system;
distributed denial of service;
network layer DDoS attacks;
statistical model checker;
traffic monitoring;
Availability;
Computer crime;
Internet;
Probability distribution;
Protocols;
Servers;
Simulation;
ASV;
Application Layer;
DDoS;
Defense;
37.
Time Profiles for Identifying Users in Online Environments
机译:
用于在线环境中识别用户的时间配置文件
作者:
Johansson F.
;
Kaati L.
;
Shrestha A.
会议名称:
《IEEE Joint Intelligence and Security Informatics Conference》
|
2014年
关键词:
Internet;
learning (artificial intelligence);
social networking (online);
author identity;
online environments;
supervised machine learning;
time features;
time profiles;
unsupervised alias matching;
user identity;
Accuracy;
Blogs;
Media;
Niobium;
Support vector machines;
Training;
Time print;
author recognition;
multiple aliases;
supervised learning;
unsupervised learning;
38.
Twitter Sentiment Analysis for Security-Related Information Gathering
机译:
安全相关信息收集的Twitter情绪分析
作者:
Jurek A.
;
Yaxin Bi
;
Mulvenna M.
会议名称:
《IEEE Joint Intelligence and Security Informatics Conference》
|
2014年
关键词:
data mining;
pattern classification;
security of data;
social networking (online);
EDL related events;
English defence league;
Facebook;
Twitter content sentiment analysis;
classification process;
enforcement sector;
evidence-based combining function;
lexicon-based approach;
positive-negative label;
public sector organisations;
public sentiment analysis;
public topics;
security-related information gathering;
social media;
Algorithm design and analysis;
Classification algorithms;
Equations;
Mathematical model;
Media;
Sentiment analysis;
Twitter;
security informatics;
sentiment analysis;
social media;
39.
DNSSEC Misconfigurations: How Incorrectly Configured Security Leads to Unreachability
机译:
DNSSEC MIRCONFIGURATIONS:配置错误的安全性导致无法达成
作者:
Van Adrichem N.L.M.
;
Lua A.R.
;
Xin Wang
;
Wasif M.
;
Fatturrahman F.
;
Kuipers F.A.
会议名称:
《IEEE Joint Intelligence and Security Informatics Conference》
|
2014年
关键词:
Internet;
computer network security;
formal verification;
public key cryptography;
DNS data spoofing;
DNSSEC misconfiguration;
DNSSEC verification;
Internet;
domain name system;
public key cryptography;
Cryptography;
Google;
IP networks;
Internet;
Phase measurement;
Servers;
DNS;
DNSSEC;
authentication;
domain name system;
error;
integrity;
misconfiguration;
security extensions;
signatures;
unreachability;
validation;
40.
Descriptive Analytics: Examining Expert Hackers in Web Forums
机译:
描述性分析:在网络论坛中检查专家黑客
作者:
Abbasi A.
;
Weifeng Li
;
Benjamin V.
;
Shiyu Hu
;
Hsinchun Chen
会议名称:
《IEEE Joint Intelligence and Security Informatics Conference》
|
2014年
关键词:
Internet;
computer crime;
pattern clustering;
social networking (online);
text analysis;
ICA framework;
Web forums;
automated expert hacker characterization;
automated expert hacker identification;
content-based clustering;
cybercrime;
cybersecurity research;
descriptive analytics;
expert identification amp;
analysis;
hacker analysis;
hacker social dynamics;
hacker-centric perspective;
interaction coherence analysis framework;
lexicon matching;
online communities;
online hacker social dynamics;
social media analytics;
structural features;
text analytics module;
topological feature;
Coherence;
Communities;
Computer hacking;
Feature extraction;
Social network services;
Topology;
cybersecurity;
expert hacker;
hacker forum;
social media analytics;
user generated content;
41.
Predicting Links in Multi-relational Networks
机译:
预测多关系网络中的链接
作者:
Memon B.R.
;
Wiil U.K.
会议名称:
《IEEE Joint Intelligence and Security Informatics Conference》
|
2014年
关键词:
network theory (graphs);
social networking (online);
Sageman data set;
Salafi Jihad network;
compound relationship;
heterogeneous network;
homogeneous networks;
link structure;
multimodal networks;
multirelational network link prediction;
social settings;
social ties;
Algebra;
Compounds;
Knowledge engineering;
Network topology;
Semantics;
Social network services;
Topology;
covert networks;
heterogeneous networks;
link prediction;
multi-relational networks;
42.
Military Geospatial Profiling Analysis
机译:
军事地理空间分析分析
作者:
Oey H.-D.G.T.
会议名称:
《IEEE Joint Intelligence and Security Informatics Conference》
|
2014年
关键词:
decision making;
explosives;
geography;
military computing;
psychology;
terrorism;
weapons;
Criminology;
Geography;
Psychology;
enemy behaviour model;
improvised explosive device countering;
intelligence led decision making;
military geospatial profiling analysis;
multidisciplinary research approach;
terrorist weapons;
Explosives;
Geology;
Joints;
Psychology;
Radiation detectors;
Systems engineering and theory;
Terrorism;
Behavioral Crime Analysis;
Counter IED;
Geographic Profiling;
Geospatial Intelligence Analysis;
Intelligence Led Policing;
Netcentric Warfare;
System of Systems Analysis;
43.
Land Border Permeability and Irregular Migration Using Geospatial Intelligence from Satellite Data
机译:
使用从卫星数据的地理空间智能的土地边界渗透性和不规则迁移
作者:
Van Den Broek A.C.
;
Schoemaker R.M.
;
Dekker R.J.
会议名称:
《IEEE Joint Intelligence and Security Informatics Conference》
|
2014年
关键词:
geographic information systems;
remote sensing;
security of data;
effective border control;
geographical terrain features;
geospatial intelligence;
high resolution satellite data;
irregular border-crossing geo-oriented statistics;
irregular migration;
land border permeability;
migrant mobility estimation;
permeability indicators;
pre-border terrain;
pre-operational services;
security measures;
Europe;
Permeability;
Rivers;
Satellites;
Security;
Surveillance;
Border control;
border permeability;
geospatial intelligence;
irregular migration;
satellite monitoring;
44.
Studies of Integration Readiness Levels: Case Shared Maritime Situational Awareness System
机译:
综合准备水平研究:案例共享海事态势意识系统
作者:
Pirinen R.
会议名称:
《IEEE Joint Intelligence and Security Informatics Conference》
|
2014年
关键词:
national security;
risk analysis;
surveillance;
European border control domains;
Finnish national border control domains;
IRL metrics;
border control information interactions;
border control information systems;
information system integration;
integration readiness level metrics;
operational validation;
risk assessment;
shared maritime situational awareness system;
sharing mechanisms;
Buildings;
Context;
Control systems;
Information systems;
Interviews;
Measurement;
Systems engineering and theory;
integration;
integration readiness levels;
maturity;
pre-operational validation;
situational awareness;
45.
Exfiltration of Information from Air-Gapped Machines Using Monitor's LED Indicator
机译:
使用Monitor的LED指示灯从空调机器中删除信息
作者:
Sepetnitsky V.
;
Guri M.
;
Elovici Y.
会议名称:
《IEEE Joint Intelligence and Security Informatics Conference》
|
2014年
关键词:
data handling;
light emitting diodes;
security of data;
APT;
LED indicator;
advanced persistent threat;
air-gapped machine;
data exfiltration;
information exfiltration;
light emitting diode;
smart phone camera;
Cameras;
Light emitting diodes;
Monitoring;
Optical sensors;
Protocols;
Software;
Standards;
bridging the air gap;
exfiltrate information;
monitor's LED indicator;
46.
Causal Inference in Social Media Using Convergent Cross Mapping
机译:
使用收敛交叉映射的社交媒体的因果推断
作者:
Chuan Luo
;
Xiaolong Zheng
;
Zeng D.
会议名称:
《IEEE Joint Intelligence and Security Informatics Conference》
|
2014年
关键词:
causality;
inference mechanisms;
social networking (online);
state-space methods;
causal inference methods;
causality detection;
convergent cross mapping;
nonlinear state space reconstruction;
social media;
user behavior prediction;
Manifolds;
Media;
Nonlinear dynamical systems;
Security;
Time series analysis;
Twitter;
causal inference;
nonlinear dynamic system;
social media;
user influence;
47.
Filtering Automated Polling Traffic in Computer Network Flow Data
机译:
过滤计算机网络流数据中的自动轮询流量
作者:
Heard N.
;
Rubin-Delanchy P.
;
Lawson D.
会议名称:
《IEEE Joint Intelligence and Security Informatics Conference》
|
2014年
关键词:
Fourier analysis;
computer network security;
system monitoring;
Fourier analysis technique;
Imperial College London;
automated polling traffic filtering;
computer network flow data;
regular automated update requests;
signature-free anomaly detection;
Computational modeling;
Educational institutions;
IP networks;
Malware;
Monitoring;
Servers;
48.
Identifying Top Sellers In Underground Economy Using Deep Learning-Based Sentiment Analysis
机译:
利用深入学习的情感分析识别地下经济中的顶级卖家
作者:
Weifeng Li
;
Hsinchun Chen
会议名称:
《IEEE Joint Intelligence and Security Informatics Conference》
|
2014年
关键词:
credit transactions;
data mining;
economics;
financial data processing;
invasive software;
learning (artificial intelligence);
pattern classification;
Russian carding forum;
black market sellers;
credit-debit card information;
customer feedback;
cyber carding crime ecosystems;
cyber criminals;
deep learning-based sentiment analysis;
key cybercrime facilitators;
malicious product-service quality;
malware-carding sellers;
seller product-service quality;
snowball sampling;
thread classification;
top seller identification;
underground economy;
Computer hacking;
Entropy;
Malware;
Neural networks;
Sentiment analysis;
Support vector machines;
Vectors;
carding crime;
cybersecurity;
deep learning;
sentiment analysis;
top sellers;
underground economy;
49.
Forecasting Country Stability in North Africa
机译:
预测北非的国家稳定
作者:
Banaszak S.
;
Bowman E.
;
Dickerson J.P.
;
Subrahmanian V.S.
会议名称:
《IEEE Joint Intelligence and Security Informatics Conference》
|
2014年
关键词:
pattern classification;
politics;
social networking (online);
North Africa;
Sentibility prototype system;
Web blog;
country stability forecasting;
data classification;
political violence;
sentiment monitoring;
social media data;
Accuracy;
Correlation;
Databases;
Educational institutions;
Government;
Power system stability;
Stability analysis;
Sentiment analysis;
forecasting stability events;
50.
A Case Study in Opportunity Reduction: Mitigating the Dirt Jumper Drive-Smart Attack
机译:
减少机会的案例研究:减轻污垢跳线驱动智能攻击
作者:
Lathrop J.
;
OKane J.B.
会议名称:
《IEEE Joint Intelligence and Security Informatics Conference》
|
2014年
关键词:
Internet;
computer network security;
invasive software;
DDoS malware;
Dirt Jumper bot;
Internet security;
application Webserver;
botnet;
crime science framework;
dirt jumper drive-smart attack;
distributed denial-of-service;
opportunity-reduction technique;
situational crime prevention;
smart attack;
Browsers;
Complexity theory;
Computer crime;
Logic gates;
Malware;
Servers;
defensive exploitation;
distributed denial-of-service (DDoS);
opportunity-reduction;
51.
Security Components in a One-Stop-Shop Border Control System
机译:
一站式边境控制系统中的安全组件
作者:
Weissenfeld A.
;
Kriechbaum-Zabini A.
;
Szklarski L.
会议名称:
《IEEE Joint Intelligence and Security Informatics Conference》
|
2014年
关键词:
police data processing;
security of data;
OSS border control system;
one-stop-shop border control system;
security components;
security measurement;
stakeholder requirements;
Barium;
Cameras;
Europe;
Security;
Stereo vision;
Surveillance;
Vehicles;
ABC;
border control;
facilitation;
security components;
52.
Modelling New Edge Formation in a Computer Network through Bayesian Variable Selection
机译:
通过贝叶斯变量选择在计算机网络中建模新的边缘形成
作者:
Metelli S.
;
Heard N.
会议名称:
《IEEE Joint Intelligence and Security Informatics Conference》
|
2014年
关键词:
Bayes methods;
belief networks;
computer network security;
invasive software;
regression analysis;
Bayesian variable selection;
DoS attack;
Internet protocol;
anomalous formation detection;
computer network flow data;
computer network graph;
denial of service attack;
logistic regression model;
malicious software;
malware;
network traffic data;
new edge formation modelling;
server IP address;
Bayes methods;
Computational modeling;
IP networks;
Input variables;
Logistics;
Protocols;
53.
Ranking Online Memes in Emergency Events Based on Transfer Entropy
机译:
基于转移熵的紧急事件中排名在线模型
作者:
Saike He
;
Xiaolong Zheng
;
Xiuguo Bao
;
Hongyuan Ma
;
Zeng D.
;
Bo Xu
;
Guanhua Tian
;
Hongwei Hao
会议名称:
《IEEE Joint Intelligence and Security Informatics Conference》
|
2014年
关键词:
cultural aspects;
emergency management;
entropy;
information dissemination;
social networking (online);
OSN;
crime analysis;
emergency events;
emergency management;
intelligence acquisition;
meme dynamics;
online meme dissemination;
online meme evolution;
online meme ranking;
online social networks;
peer influence;
transfer entropy;
Benchmark testing;
Entropy;
Media;
Robustness;
Security;
Social network services;
meme ranking;
peer influence;
transfer entropy;
54.
Exploring Opinion Dynamics in Security-Related Microblog Data
机译:
探索与安全相关的微博数据中的观点动态
作者:
Yuhao Zhang
;
Wenji Mao
;
Zeng D.
;
Ning Zhao
;
Xiuguo Bao
会议名称:
《IEEE Joint Intelligence and Security Informatics Conference》
|
2014年
关键词:
security of data;
social networking (online);
social sciences computing;
China;
Web social media;
dynamic factors;
opinion change;
opinion dynamics;
public attitudes;
public opinion;
security-related microblog data;
sentiment;
social influence;
Data models;
Learning systems;
Logistics;
Media;
Predictive models;
Support vector machines;
Time measurement;
modeling and detection of sentiment evolvement;
opinion dynamics;
social media analytics;
55.
Foraging Online Social Networks
机译:
觅食在线社交网络
作者:
Koot G.
;
Huis in Veld M.A.A.
;
Hendricksen J.
;
Kaptein R.
;
De Vries A.
;
Van Den Broek E.L.
会议名称:
《IEEE Joint Intelligence and Security Informatics Conference》
|
2014年
关键词:
data privacy;
law administration;
social networking (online);
OSN;
ethical issue;
law enforcement;
manual foraging;
online social network;
privacy;
Conferences;
Crawlers;
Data mining;
Data models;
Informatics;
Security;
Social network services;
Open Source INTelligence;
data mining;
foraging;
online social networks (OSN);
profiling;
56.
How Analysts Think (?): Early Observations
机译:
分析师如何看待(?):早期观察
作者:
Wong B.L.W.
会议名称:
《IEEE Joint Intelligence and Security Informatics Conference》
|
2014年
关键词:
data visualisation;
inference mechanisms;
intelligence analysis system;
interactive visual interfaces;
reasoning process;
thinking process;
Analytical models;
Artificial intelligence;
Cognition;
Context;
Educational institutions;
Presses;
Visual analytics;
abductive inference;
analytic reasoning;
intelligence analysis;
thinking and reasoning;
57.
Mining the Web for Sympathy: The Pussy Riot Case
机译:
挖掘网上同情:猫骚乱案
作者:
Westling A.
;
Brynielsson J.
;
Gustavi T.
会议名称:
《IEEE Joint Intelligence and Security Informatics Conference》
|
2014年
关键词:
Internet;
data mining;
learning (artificial intelligence);
pattern classification;
politics;
social networking (online);
Pussy Riot case;
Russian punk rock collective;
Russian tweets;
Web mining;
machine learning classifier training;
majority class baseline classifier;
sentiment labels;
social media services;
tweets labelling;
Accuracy;
Media;
Sentiment analysis;
Support vector machines;
Training;
Training data;
Twitter;
Pussy Riot;
Twitter;
crisis management;
sentiment analysis;
text mining;
58.
Understanding the Factors Affecting UX and Technology Acceptance in the Context of Automated Border Controls
机译:
了解影响自动边境管制背景下影响UX和技术验收的因素
作者:
Ylikauppila M.
;
Toivonen S.
;
Kulju M.
;
Jokela M.
会议名称:
《IEEE Joint Intelligence and Security Informatics Conference》
|
2014年
关键词:
government data processing;
human computer interaction;
national security;
public administration;
ABC systems;
UX;
automated border controls;
border checks;
border security;
technology acceptance;
technology integration;
usability;
user acceptance;
user experience;
Biometrics (access control);
Context;
Interviews;
Monitoring;
Process control;
Security;
Usability;
automated border control;
self-service;
technology acceptance;
usability;
user experience;
59.
Addressing the Increasing Volume and Variety of Digital Evidence Using an Ontology
机译:
使用本体论解决越来越大的数字证据的数量和各种数字证据
作者:
Brady O.
;
Overill R.
;
Keppens J.
会议名称:
《IEEE Joint Intelligence and Security Informatics Conference》
|
2014年
关键词:
digital forensics;
ontologies (artificial intelligence);
public administration;
DESO;
data generation;
digital evidence semantic ontology;
forensic tools;
laboratory environment;
Availability;
Forensics;
Object recognition;
Ontologies;
Operating systems;
Telephone sets;
Universal Serial Bus;
artefact;
digital evidence;
forensic;
investigation;
ontology;
variety;
volume;
60.
Practical Interception of DECT Encrypted Voice Communication in Unified Communications Environments
机译:
实际拦截DECT加密语音通信在统一通信环境中
作者:
Coisel I.
;
Sanchez I.
会议名称:
《IEEE Joint Intelligence and Security Informatics Conference》
|
2014年
关键词:
computer network security;
cordless telephone systems;
cryptography;
open systems;
telephony;
voice communication;
DECT cryptographic pairing process;
DECT encrypted voice communication;
digital enhanced cordless telephony;
enterprise environments;
interoperability;
residential environments;
security;
unified communications environments;
Authentication;
Encryption;
Protocols;
Radio access networks;
Standards;
61.
On the Adequacy of Performance Models in an Adaptive Border Inspection Management System
机译:
关于自适应边境检验管理系统性能模型的充分性
作者:
Musgrove J.
;
Cukic B.
;
Cortellessa V.
会议名称:
《IEEE Joint Intelligence and Security Informatics Conference》
|
2014年
关键词:
adaptive systems;
inspection;
military computing;
security;
software engineering;
BIMS;
MAPE loop;
adaptive systems;
border inspection management system;
security requirements;
software engineering;
system performance models;
Adaptation models;
Adaptive systems;
Feedback loop;
Inspection;
Schedules;
Security;
Throughput;
62.
Inferring itineraries of containerized cargo through the application of Conditional Random Fields
机译:
通过应用条件随机字段推断集装箱货物的行程
作者:
Chahuara Pedro
;
Mazzola Luca
;
Makridis Michail
;
Schifanella Claudio
;
Tsois Aris
;
Pedone Mauro
会议名称:
《IEEE Joint Intelligence and Security Informatics Conference》
|
2014年
关键词:
Containers;
Data mining;
Databases;
Hidden Markov models;
History;
Joints;
Security;
63.
Maritime Situation Analysis: A Multi-vessel Interaction and Anomaly Detection Framework
机译:
海事情况分析:多血管相互作用和异常检测框架
作者:
Shahir H.Y.
;
Glasser U.
;
Nalbandyan N.
;
Wehn H.
会议名称:
《IEEE Joint Intelligence and Security Informatics Conference》
|
2014年
关键词:
hidden Markov models;
military computing;
security of data;
sensor fusion;
anomaly detection framework;
contextual information;
data fusion;
geospatial aspects;
harbors;
hidden Markov model;
intelligent systems;
interaction patterns;
kinematic features;
maritime security;
maritime situation analysis;
multivessel interaction;
ports;
sea lanes;
Cognition;
Feature extraction;
Hidden Markov models;
Kinematics;
Marine vehicles;
Security;
Trajectory;
Anomaly Detection;
Decision Support;
Intelligent Systems;
Interactive Situation Analysis;
Maritime Safety amp;
amp;
Security;
64.
Overcoming Limited Collaboration Channels in Distributed Intelligence Analysis: Visualization Tools and Design Seeds
机译:
克服了分布式智能分析中的有限协作渠道:可视化工具和设计种子
作者:
Prue B.
;
Jenkins M.
;
Stern L.D.
;
Pfautz J.
会议名称:
《IEEE Joint Intelligence and Security Informatics Conference》
|
2014年
关键词:
data analysis;
data visualisation;
military computing;
design seeds;
direct communication and coordination;
distributed collaboration;
distributed intelligence analysis;
limited collaboration channels;
military intelligence analysis support tools;
operational community;
organizational cultures;
organizational structures;
real-world constraints;
visualization tools;
Analytical models;
Cognition;
Collaboration;
Communities;
Context;
Training;
Visualization;
Collaboration;
Distributed Analysis;
Intelligence Analysis;
Network Visualization;
Visual Analytics;
65.
Authorship Analysis of Inspire Magazine through Stylometric and Psychological Features
机译:
通过仪表和心理特征对激励杂志的作者分析
作者:
Sikos J.
;
David P.
;
Habash N.
;
Faraj R.
会议名称:
《IEEE Joint Intelligence and Security Informatics Conference》
|
2014年
关键词:
authoring systems;
computational linguistics;
natural language processing;
psychology;
Al-Qaeda;
Arabian Peninsula;
English-language magazine;
Inspire magazine;
Jihadi writing;
LIWC resource;
authorship analysis;
linguistic inquiry and word count resource;
psychological features;
stylometric features;
Dictionaries;
Educational institutions;
Pragmatics;
Psychology;
Syntactics;
Training;
Authorship Analysis;
Linguistic Inquiry and Word Count;
Natural Language Processing;
Stylometry;
66.
Modelling and Analysis of Identity Threat Behaviors through Text Mining of Identity Theft Stories
机译:
通过身份盗窃故事的文本挖掘形式威胁行为的建模与分析
作者:
Yongpeng Yang
;
Manoharan M.
;
Barber K.S.
会议名称:
《IEEE Joint Intelligence and Security Informatics Conference》
|
2014年
关键词:
data analysis;
data mining;
police data processing;
text analysis;
criminal behavior;
gateway crime;
identity theft stories;
identity threat behavior;
semistructured information extraction;
text mining;
theft data analysis;
Analytical models;
Government;
Internet;
Security;
Text mining;
PII attribute;
identity theft;
news stories;
text mining;
67.
Resource-Based Event Reconstruction of Digital Crime Scenes
机译:
数字犯罪场景基于资源的事件重构
作者:
Yi-Ching Liao
;
Langweg H.
会议名称:
《IEEE Joint Intelligence and Security Informatics Conference》
|
2014年
关键词:
digital forensics;
image reconstruction;
public domain software;
digital crime scenes;
digital events;
digital evidence;
digital forensics framework;
evidence source;
open-source applications;
resource-based event reconstruction;
system calls;
system resources;
Digital forensics;
Instruments;
Kernel;
Privacy;
Prototypes;
Security;
68.
Uninvited Connections: A Study of Vulnerable Devices on the Internet of Things (IoT)
机译:
不可邀请的联系:对物联网上的弱势设备(IOT)的研究
作者:
Patton M.
;
Gross E.
;
Chinn R.
;
Forbis S.
;
Walker L.
;
Hsinchun Chen
会议名称:
《IEEE Joint Intelligence and Security Informatics Conference》
|
2014年
关键词:
Internet;
Internet of Things;
security of data;
Internet;
Internet of Things;
IoT;
insecure devices;
uninvited connections;
vulnerable devices;
Cameras;
Databases;
IP networks;
Internet of Things;
Object recognition;
Security;
Internet of Things;
IoT;
SCADA;
Shodan;
69.
Threat Detection in Tweets with Trigger Patterns and Contextual Cues
机译:
具有触发模式和上下文提示的推文中的威胁检测
作者:
Spitters M.
;
Eendebak P.T.
;
Worm D.T.H.
;
Bouma H.
会议名称:
《IEEE Joint Intelligence and Security Informatics Conference》
|
2014年
关键词:
social networking (online);
Dutch tweets;
Internet information;
automatic message ranking;
blogs;
contextual cues;
forums;
message analysis;
message checking;
public sources;
security operators;
security services;
social media;
source monitoring;
threat detection;
threatening content recognition;
threatening message detection;
trigger keywords;
trigger patterns;
Bills of materials;
Context;
Correlation;
Media;
Pattern matching;
Security;
Training;
OSINT;
Twitter;
social media;
text mining;
threat detection;
70.
Towards a Comprehensive Insight into the Thematic Organization of the Tor Hidden Services
机译:
旨在全面了解Tor隐藏服务的主题组织
作者:
Spitters M.
;
Verbruggen S.
;
Van Staalduinen M.
会议名称:
《IEEE Joint Intelligence and Security Informatics Conference》
|
2014年
关键词:
Web services;
data mining;
pattern classification;
security of data;
text analysis;
Tor hidden services;
anonymity;
classification;
content-based analysis;
darknet;
linguistic diversity;
thematic organization;
topic model-based text mining techniques;
Computer crime;
Drugs;
Internet;
Pragmatics;
Taxonomy;
Weapons;
Tor;
content analysis;
darknets;
text mining;
意见反馈
回到顶部
回到首页