Whose Hands Are in the Finnish Cookie Jar? (Englisch)
- Neue Suche nach: Ruohonen, Jukka
- Neue Suche nach: Leppanen, Ville
- Neue Suche nach: Ruohonen, Jukka
- Neue Suche nach: Leppanen, Ville
In:
2017 European Intelligence and Security Informatics Conference (EISIC)
;
127-130
;
2017
-
ISBN:
- Aufsatz (Konferenz) / Elektronische Ressource
-
Titel:Whose Hands Are in the Finnish Cookie Jar?
-
Beteiligte:Ruohonen, Jukka ( Autor:in ) / Leppanen, Ville ( Autor:in )
-
Erschienen in:
-
Verlag:
- Neue Suche nach: IEEE
-
Erscheinungsdatum:01.09.2017
-
Format / Umfang:239127 byte
-
ISBN:
-
DOI:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Datenquelle:
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Detecting Crime Series Based on Route Estimation and Behavioral SimilarityBorg, Anton / Boldt, Martin / Eliasson, Johan et al. | 2017
- 17
-
An Inconvenient Truth: Algorithmic Transparency & Accountability in Criminal Intelligence ProfilingZouave, Erik T. / Marquenie, Thomas et al. | 2017
- 24
-
An Integrated Framework for the Timely Detection of Petty CrimesDimitriou, Nikolaos / Kioumourtzis, George / Sideris, Anargyros / Stavropoulos, Georgios / Taka, Evdoxia / Zotos, Nikolaos / Leventakis, George / Tzovaras, Dimitrios et al. | 2017
- 32
-
Towards a Breakthrough Speaker Identification Approach for Law Enforcement Agencies: SIIPKhelif, Khaled / Mombrun, Yann / Backfried, Gerhard / Sahito, Farhan / Scarpato, Luca / Motlicek, Petr / Madikeri, Srikanth / Kelly, Damien / Hazzani, Gideon / Chatzigavriil, Emmanouil et al. | 2017
- 40
-
Cyberbullying System Detection and AnalysisFoong, Yee Jang / Oussalah, Mourad et al. | 2017
- 47
-
How Analysts Think: How Do Criminal Intelligence Analysts Recognise and Manage Significant Information?Groenewald, Celeste / Wong, B. L. William / Attfield, Simon / Passmore, Peter / Kodagoda, Neesha et al. | 2017
- 54
-
Gender Classification with Data Independent Features in Multiple LanguagesIsbister, Tim / Kaati, Lisa / Cohen, Katie et al. | 2017
- 61
-
IoT Data Profiles: The Routines of Your Life Reveals Who You AreFernquist, Johan / Fangstrom, Torbjorn / Kaati, Lisa et al. | 2017
- 68
-
Interpretable Probabilistic Divisive Clustering of Large Node-Attributed NetworksKaati, Lisa / Ruul, Adam et al. | 2017
- 76
-
Text Mining in Unclean, Noisy or Scrambled Datasets for Digital Forensics AnalyticsXylogiannopoulos, Konstantinos / Karampelas, Panagiotis / Alhajj, Reda et al. | 2017
- 84
-
Detecting Periodic Subsequences in Cyber Security DataPrice-Williams, Matthew / Heard, Nick / Turcotte, Melissa et al. | 2017
- 91
-
Cyber Threat Intelligence Model: An Evaluation of Taxonomies, Sharing Standards, and Ontologies within Cyber Threat IntelligenceMavroeidis, Vasileios / Bromander, Siri et al. | 2017
- 99
-
Adversarial Machine Learning in Malware Detection: Arms Race between Evasion Attack and DefenseChen, Lingwei / Ye, Yanfang / Bourlai, Thirimachos et al. | 2017
- 107
-
Customs Risk Analysis through the ConTraffic Visual Analytics ToolPoulymenopoulou, Mikaela / Tsois, Aris et al. | 2017
- 115
-
Comparative Analysis of Crime Scripts: One CCTV Footage—Twenty-One ScriptsBorrion, Herve / Dehghanniri, Hashem / Li, Yuanxi et al. | 2017
- 123
-
A Statistical Method for Detecting Significant Temporal Hotspots Using LISA StatisticsBoldt, Martin / Borg, Anton et al. | 2017
- 127
-
Whose Hands Are in the Finnish Cookie Jar?Ruohonen, Jukka / Leppanen, Ville et al. | 2017
- 131
-
A Survey of Intelligence Analysts' Perceptions of Analytic ToolsDhami, Mandeep K. et al. | 2017
- 135
-
Large Scale Data Collection of Tattoo-Based Biometric Data from Social-Media WebsitesMartin, Michael / Dawson, Jeremy / Bourlai, Thirimachos et al. | 2017
- 139
-
Catchem: A Browser Plugin for the Panama Papers Using Approximate String MatchingKostakos, Panos / Moilanen, Miika / Niemela, Arttu / Oussalah, Mourad et al. | 2017
- 143
-
Behavioural & Tempo-Spatial Knowledge Graph for Crime Matching through Graph TheoryQazi, Nadeem / Wong, B. L. William et al. | 2017
- 147
-
Behavioural Markers: Bridging the Gap between Art of Analysis and Science of Analytics in Criminal IntelligenceIslam, Junayed / Wong, B. L. William et al. | 2017
- 151
-
A Framework for Measuring Imagination in Visual Analytics SystemsBedek, Michael A. / Nussbaumer, Alexander / Hillemann, Eva-C. / Albert, Dietrich et al. | 2017
- 155
-
Author Profiling in the WildKaati, Lisa / Lundeqvist, Elias / Shrestha, Amendra / Svensson, Maria et al. | 2017
- 159
-
Are We Really That Close Together? Tracing and Discussing Similarities and Differences between Greek Terrorist Groups Using Cluster AnalysisLekea, Ioanna / Karampelas, Panagiotis et al. | 2017
- 163
-
Photometrix (TM): A Digital Seal for Offline Identity Picture AuthenticationPic, Marc M. / Ouddan, Amine et al. | 2017
- 164
-
How the Use of Ethically Sensitive Information Helps to Identify Co-Offenders via a Purposed Privacy Scale: A Pilot StudyPaudyal, Pragya / Rooney, Chris / Kodagoda, Neesha / Wong, B. L. William / Duquenoy, Penny / Qazi, Nadeem et al. | 2017
- 165
-
Can an Automatic Tool Assess Risk of Radicalization Online? A Case Study on FacebookTorregrosa, Javier / Gilperez-Lopez, Irene / Lara-Cabrera, Raul / Garriga, David / Camacho, David et al. | 2017
- 166
-
A Monitoring Tool for Terrorism-Related Key-Players and Key-Communities in Social Media NetworksAndreadis, Stelios / Gialampoukidis, Ilias / Kalpakis, George / Tsikrika, Theodora / Papadopoulos, Symeon / Vrochidis, Stefanos / Kompatsiaris, Ioannis et al. | 2017
- 169
-
Author index| 2017
- 172
-
[Publisher's information]| 2017
- c1
-
[Front cover]| 2017
- i
-
[Title page i]| 2017
- iii
-
[Title page iii]| 2017
- iv
-
[Copyright notice]| 2017
- v
-
Table of contents| 2017
- viii
-
Message from the General Chair| 2017
- x
-
Message from the Program Chair| 2017
- xi
-
Organizing Committee| 2017
- xii
-
Program Committee| 2017
- xiv
-
[EISIC 2017 panel discussion] Ethical dilemmas in intelligence analysis: Implications for systems and operations| 2017