ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
2013 European Intelligence and Security Informatics Conference
Latest Publications
TOTAL DOCUMENTS
78
(FIVE YEARS 0)
H-INDEX
6
(FIVE YEARS 0)
Published By IEEE
9780769550626
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Visualization of Container Movements through a Web-Based Geographical Information System
2013 European Intelligence and Security Informatics Conference
◽
10.1109/eisic.2013.40
◽
2013
◽
Cited By ~ 1
Author(s):
Tatyana Velikova Dimitrova
◽
Aris Tsois
◽
Elena Camossi
Keyword(s):
Information System
◽
Geographical Information System
◽
Geographical Information
◽
Web Based
Download Full-text
Law Enforcement Authorities' Legal Digital Evidence Gathering: Legal, Integrity and Chain-of-Custody Requirement
2013 European Intelligence and Security Informatics Conference
◽
10.1109/eisic.2013.44
◽
2013
◽
Cited By ~ 1
Author(s):
Jyri Rajamaki
◽
Juha Knuuttila
Keyword(s):
Law Enforcement
◽
Digital Evidence
◽
Chain Of Custody
◽
Evidence Gathering
Download Full-text
Contextualisation of Geographical Scraped Data to Support Human Judgment and Classification
2013 European Intelligence and Security Informatics Conference
◽
10.1109/eisic.2013.33
◽
2013
◽
Cited By ~ 2
Author(s):
Luca Mazzola
◽
Aris Tsois
◽
Tatyana Dimitrova
◽
Elena Camossi
Keyword(s):
Human Judgment
Download Full-text
Towards Offensive Cyber Counterintelligence: Adopting a Target-Centric View on Advanced Persistent Threats
2013 European Intelligence and Security Informatics Conference
◽
10.1109/eisic.2013.37
◽
2013
◽
Cited By ~ 7
Author(s):
Johan Sigholm
◽
Martin Bang
Keyword(s):
Advanced Persistent Threats
Download Full-text
Crime and Its Social Context: Analysis Using the Self-Organizing Map
2013 European Intelligence and Security Informatics Conference
◽
10.1109/eisic.2013.26
◽
2013
◽
Cited By ~ 3
Author(s):
Xingan Li
◽
Martti Juhola
Keyword(s):
Social Context
◽
The Self
◽
Self Organizing Map
◽
Context Analysis
◽
Self Organizing
Download Full-text
Managing the Border, Smartly
2013 European Intelligence and Security Informatics Conference
◽
10.1109/eisic.2013.72
◽
2013
◽
Cited By ~ 2
Author(s):
Sandrine Trochu
◽
Olivier Touret
Download Full-text
A Tool for Visualizing and Analyzing Users on Discussion Boards
2013 European Intelligence and Security Informatics Conference
◽
10.1109/eisic.2013.60
◽
2013
◽
Author(s):
Amendra Shrestha
Keyword(s):
Discussion Boards
Download Full-text
Probability Analysis of Cyber Attack Paths against Business and Commercial Enterprise Systems
2013 European Intelligence and Security Informatics Conference
◽
10.1109/eisic.2013.13
◽
2013
◽
Cited By ~ 9
Author(s):
Dmitry Dudorov
◽
David Stupples
◽
Martin Newby
Keyword(s):
Enterprise Systems
◽
Probability Analysis
◽
Cyber Attack
◽
Commercial Enterprise
Download Full-text
Semi-automatic Ontology Maintenance in the Virtuoso News Monitoring System
2013 European Intelligence and Security Informatics Conference
◽
10.1109/eisic.2013.29
◽
2013
◽
Cited By ~ 2
Author(s):
Florence Amardeilh
◽
Wessel Kraaij
◽
Martijn Spitters
◽
Corne Versloot
◽
Sinan Yurtsever
Keyword(s):
Monitoring System
Download Full-text
Visual Analysis of Heterogeneous Networks
2013 European Intelligence and Security Informatics Conference
◽
10.1109/eisic.2013.28
◽
2013
◽
Cited By ~ 1
Author(s):
Bisharat Rasool Memon
◽
Uffe Kock Wiil
Keyword(s):
Heterogeneous Networks
◽
Visual Analysis
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close