ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
2012 European Intelligence and Security Informatics Conference
Latest Publications
TOTAL DOCUMENTS
73
(FIVE YEARS 0)
H-INDEX
9
(FIVE YEARS 0)
Published By IEEE
9781467323581, 9780769547824
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Semantic Network Analysis of Islamist Sources Using Time Slices as Nodes and Semantic Similarity as Link Strengths: Some Implications for Propaganda Analysis about Jihad
2012 European Intelligence and Security Informatics Conference
◽
10.1109/eisic.2012.53
◽
2012
◽
Cited By ~ 3
Author(s):
James A. Danowski
Keyword(s):
Network Analysis
◽
Semantic Similarity
◽
Semantic Network
◽
Semantic Network Analysis
Download Full-text
Framing the Attacker in Organized Cybercrime
2012 European Intelligence and Security Informatics Conference
◽
10.1109/eisic.2012.48
◽
2012
◽
Cited By ~ 3
Author(s):
Muhammad Adnan Tariq
◽
Joel Brynielsson
◽
Henrik Artman
Download Full-text
Structured Documents: Signatures and Deception
2012 European Intelligence and Security Informatics Conference
◽
10.1109/eisic.2012.17
◽
2012
◽
Author(s):
Aaron Hunter
Keyword(s):
Structured Documents
Download Full-text
To Incorporate Sequential Dynamic Features in Malware Detection Engines
2012 European Intelligence and Security Informatics Conference
◽
10.1109/eisic.2012.57
◽
2012
◽
Cited By ~ 6
Author(s):
Mojtaba Eskandari
◽
Zeinab Khorshidpur
◽
Sattar Hashemi
Keyword(s):
Malware Detection
◽
Dynamic Features
Download Full-text
The HiTS/ISAC Social Network Analysis Tool
2012 European Intelligence and Security Informatics Conference
◽
10.1109/eisic.2012.37
◽
2012
◽
Cited By ~ 1
Author(s):
Hirad Asadi
◽
Christian Martenson
◽
Pontus Svenson
◽
Magnus Skold
Keyword(s):
Social Network
◽
Social Network Analysis
◽
Network Analysis
◽
Analysis Tool
Download Full-text
Laundering Sexual Deviance: Targeting Online Pornography through Anti-money Laundering
2012 European Intelligence and Security Informatics Conference
◽
10.1109/eisic.2012.29
◽
2012
◽
Cited By ~ 2
Author(s):
Alex Antoniou
◽
Gauri Sinha
Keyword(s):
Money Laundering
◽
Sexual Deviance
◽
Online Pornography
Download Full-text
EISIC 2012 Organization
2012 European Intelligence and Security Informatics Conference
◽
10.1109/eisic.2012.6
◽
2012
◽
Download Full-text
Network Intelligence: An Emerging Discipline
2012 European Intelligence and Security Informatics Conference
◽
10.1109/eisic.2012.52
◽
2012
◽
Cited By ~ 1
Author(s):
David E.A. Johnson
◽
Newton Howard
Keyword(s):
Network Intelligence
Download Full-text
Pattern Theory in Intelligence Analysis
2012 European Intelligence and Security Informatics Conference
◽
10.1109/eisic.2012.28
◽
2012
◽
Author(s):
Tove Gustavi
◽
Pontus Svenson
Keyword(s):
Intelligence Analysis
◽
Pattern Theory
Download Full-text
A Machine Learning Approach to Android Malware Detection
2012 European Intelligence and Security Informatics Conference
◽
10.1109/eisic.2012.34
◽
2012
◽
Cited By ~ 130
Author(s):
Justin Sahs
◽
Latifur Khan
Keyword(s):
Machine Learning
◽
Malware Detection
◽
Learning Approach
◽
Android Malware
◽
Android Malware Detection
◽
Machine Learning Approach
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close