首页 > 最新文献

2013 European Intelligence and Security Informatics Conference最新文献

英文 中文
The CriLiM Methodology: Crime Linkage with a Fuzzy MCDM Approach 犯罪管理方法论:模糊MCDM方法下的犯罪联系
Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.17
Fabrizio Albertetti, Paul Cotofrei, Lionel Grossrieder, O. Ribaux, K. Stoffel
Grouping events having similarities has always been interesting for analysts. Actually, when a label is put on top of a set of events to denote they share common properties, the automation and the capability to conduct reasoning with this set drastically increase. This is particularly true when considering criminal events for crime analysts, conjunction, interpretation and explanation can be key success factors to apprehend criminals. In this paper, we present the CriLiM methodology for investigating both serious and high-volume crime. Our artifact consists in implementing a tailored computerized crime linkage system, based on a fuzzy MCDM approach in order to combine spatio-temporal, behavioral, and forensic information. As a proof of concept, series in burglaries are examined from real data and compared to expert results.
分析师对具有相似性的事件进行分组一直很感兴趣。实际上,当在一组事件的顶部放置一个标签以表示它们具有共同的属性时,对这组事件进行推理的自动化和能力就会大大提高。对于犯罪分析人员来说,在考虑犯罪事件时尤其如此,结合、解释和解释可能是成功逮捕罪犯的关键因素。在本文中,我们提出了用于调查严重犯罪和大量犯罪的CriLiM方法。我们的作品包括实现一个定制的计算机化犯罪链接系统,基于模糊MCDM方法,以结合时空、行为和法医信息。作为一种概念证明,从实际数据中检验了盗窃案中的序列,并将其与专家结果进行了比较。
{"title":"The CriLiM Methodology: Crime Linkage with a Fuzzy MCDM Approach","authors":"Fabrizio Albertetti, Paul Cotofrei, Lionel Grossrieder, O. Ribaux, K. Stoffel","doi":"10.1109/EISIC.2013.17","DOIUrl":"https://doi.org/10.1109/EISIC.2013.17","url":null,"abstract":"Grouping events having similarities has always been interesting for analysts. Actually, when a label is put on top of a set of events to denote they share common properties, the automation and the capability to conduct reasoning with this set drastically increase. This is particularly true when considering criminal events for crime analysts, conjunction, interpretation and explanation can be key success factors to apprehend criminals. In this paper, we present the CriLiM methodology for investigating both serious and high-volume crime. Our artifact consists in implementing a tailored computerized crime linkage system, based on a fuzzy MCDM approach in order to combine spatio-temporal, behavioral, and forensic information. As a proof of concept, series in burglaries are examined from real data and compared to expert results.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115755527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A Pilot Study of Using Honeypots as Cyber Intelligence Sources 蜜罐作为网络情报来源的初步研究
Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.56
U. Bilstrup, M. Rosenberg
There will always be a security gap between our ability to secure our networks and the actual level of security needed. When securing our networks we need good intelligence to direct our efforts and focus on the right spots. We need to find those spots and they can be found, with the right tools. Survival time is a method that provides possibilities to make decisions concerning information security risks based on true knowledge and hard facts, in a repeatable and scientific manner. This presented work aim to investigate the possibility to use survival time of an unprotected system as an intelligence source and measure the current survival time for a given unprotected system. By the deployment of a decoy, an unprotected system, data is captured and collected through port monitoring. Mainly focus lie on building a time curve presenting the estimated time for an unprotected public system to get detected on the Internet and the elapsed time hence the system gets attacked.
在我们保护网络的能力和实际需要的安全水平之间总是存在安全差距。在保护我们的网络安全时,我们需要良好的情报来指导我们的努力,并把重点放在正确的地方。我们需要找到这些点,而且只要有合适的工具,我们就能找到它们。生存时间是一种基于真实知识和确凿事实,以可重复和科学的方式,为信息安全风险决策提供可能性的方法。本研究旨在探讨利用无保护系统的生存时间作为情报来源的可能性,并测量给定无保护系统的当前生存时间。通过部署一个诱饵,一个不受保护的系统,通过端口监控捕获和收集数据。主要重点在于建立一个时间曲线,表示一个未受保护的公共系统在互联网上被检测到的估计时间和系统受到攻击的经过时间。
{"title":"A Pilot Study of Using Honeypots as Cyber Intelligence Sources","authors":"U. Bilstrup, M. Rosenberg","doi":"10.1109/EISIC.2013.56","DOIUrl":"https://doi.org/10.1109/EISIC.2013.56","url":null,"abstract":"There will always be a security gap between our ability to secure our networks and the actual level of security needed. When securing our networks we need good intelligence to direct our efforts and focus on the right spots. We need to find those spots and they can be found, with the right tools. Survival time is a method that provides possibilities to make decisions concerning information security risks based on true knowledge and hard facts, in a repeatable and scientific manner. This presented work aim to investigate the possibility to use survival time of an unprotected system as an intelligence source and measure the current survival time for a given unprotected system. By the deployment of a decoy, an unprotected system, data is captured and collected through port monitoring. Mainly focus lie on building a time curve presenting the estimated time for an unprotected public system to get detected on the Internet and the elapsed time hence the system gets attacked.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116463870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analyzing Social Media Content for Security Informatics 分析社会媒体内容的安全信息学
Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.14
R. Colbaugh, K. Glass
Inferring public opinion regarding an issue or event by analyzing social media content is of great interest to security analysts but is also technically challenging to accomplish. This paper presents a new method for estimating sentiment and/or emotion expressed in social media which addresses the challenges associated with Web-based analysis. We formulate the problem as one of text classification, model the data as a bipartite graph of documents and words, and construct the sentiment/emotion classifier through a combination of semi-supervised learning and graph transduction. Interestingly, the proposed approach requires no labeled training documents and is able to provides accurate text classification using only a small lexicon of words of known sentiment/ emotion. The classification algorithm is shown to outperform state of the art methods on a benchmark task involving sentiment analysis of online consumer product reviews. We illustrate the utility of the approach for security informatics through two case studies, one examining the possibility that online sentiment about suicide bombing predicts bombing event frequency, and one investigating public sentiment about vaccination and its implications for population health and security.
通过分析社交媒体内容来推断公众对某一问题或事件的看法是证券分析师非常感兴趣的,但在技术上也具有挑战性。本文提出了一种评估社交媒体中表达的情绪和/或情感的新方法,该方法解决了与基于web的分析相关的挑战。我们将该问题表述为文本分类问题,将数据建模为文档和单词的二部图,并通过半监督学习和图转导相结合的方法构建情感/情感分类器。有趣的是,所提出的方法不需要标记训练文档,并且能够仅使用已知情绪/情感的少量词汇库提供准确的文本分类。在涉及在线消费者产品评论情感分析的基准任务上,该分类算法的表现优于最先进的方法。我们通过两个案例研究说明了该方法在安全信息学方面的实用性,其中一个研究了自杀式爆炸的在线情绪预测爆炸事件频率的可能性,另一个调查了公众对疫苗接种的情绪及其对人口健康和安全的影响。
{"title":"Analyzing Social Media Content for Security Informatics","authors":"R. Colbaugh, K. Glass","doi":"10.1109/EISIC.2013.14","DOIUrl":"https://doi.org/10.1109/EISIC.2013.14","url":null,"abstract":"Inferring public opinion regarding an issue or event by analyzing social media content is of great interest to security analysts but is also technically challenging to accomplish. This paper presents a new method for estimating sentiment and/or emotion expressed in social media which addresses the challenges associated with Web-based analysis. We formulate the problem as one of text classification, model the data as a bipartite graph of documents and words, and construct the sentiment/emotion classifier through a combination of semi-supervised learning and graph transduction. Interestingly, the proposed approach requires no labeled training documents and is able to provides accurate text classification using only a small lexicon of words of known sentiment/ emotion. The classification algorithm is shown to outperform state of the art methods on a benchmark task involving sentiment analysis of online consumer product reviews. We illustrate the utility of the approach for security informatics through two case studies, one examining the possibility that online sentiment about suicide bombing predicts bombing event frequency, and one investigating public sentiment about vaccination and its implications for population health and security.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128808531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Analysis of Terrorist Groups on Facebook 分析Facebook上的恐怖组织
Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.53
Ala Berzinji, Frzand Sherko Abdullah, Ali Hayder Kakei
Nowadays using the Social Networking Sites (SNS) especially Facebook by terrorist groups to spread their ideas among people has grown. In this work we try to monitor those groups by Facebook Operation techniques and then apply an algorithm to detect most active node in the group that can recruit most nodes on Facebook. The algorithm works on centralities to find out the node that is most central in the group.
如今,恐怖组织利用社交网站(SNS),特别是Facebook,在人们之间传播他们的思想的情况有所增加。在这项工作中,我们试图通过Facebook操作技术来监控这些组,然后应用一种算法来检测组中最活跃的节点,这些节点可以在Facebook上招募最多的节点。该算法通过中心性来找出组中最中心的节点。
{"title":"Analysis of Terrorist Groups on Facebook","authors":"Ala Berzinji, Frzand Sherko Abdullah, Ali Hayder Kakei","doi":"10.1109/EISIC.2013.53","DOIUrl":"https://doi.org/10.1109/EISIC.2013.53","url":null,"abstract":"Nowadays using the Social Networking Sites (SNS) especially Facebook by terrorist groups to spread their ideas among people has grown. In this work we try to monitor those groups by Facebook Operation techniques and then apply an algorithm to detect most active node in the group that can recruit most nodes on Facebook. The algorithm works on centralities to find out the node that is most central in the group.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125340567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Reconstruction and Exploration: Applications in Criminology 重构与探索:在犯罪学中的应用
Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.42
Dennis Andersson, Mirko Thorstensson
Reconstruction and Exploration (R&E) is an approach developed to support after-action reviews in military and emergency response exercises. With the development of new technology and software, data sets grow larger and more complex in many domains, increasing the need for visual exploration approaches such as R&E. This paper briefly presents the R&E approach and introduces it to the criminology community. Three areas within the field are discussed that may benefit from using structured approaches to data collection and presentation such as R&E: (1) vicarious learning, (2) police intelligence operations, and (3) evidence presentation in trials. In conclusion, the approach looks promising as a complement to existing methods in criminology, and further investigations are recommended to clarify needs, possibilities and challenges ahead.
重建和探索(R&E)是为支持军事和应急演习中的行动后审查而制定的一种方法。随着新技术和软件的发展,许多领域的数据集变得越来越大,越来越复杂,这增加了对视觉探索方法的需求,如R&E。本文简要介绍了R&E方法,并将其介绍给犯罪学界。本文讨论了该领域中可能受益于使用结构化方法进行数据收集和呈现(如R&E)的三个领域:(1)替代学习,(2)警察情报行动,(3)审判中的证据呈现。总之,作为犯罪学现有方法的补充,该方法看起来很有希望,并建议进一步调查以澄清需求、可能性和未来的挑战。
{"title":"Reconstruction and Exploration: Applications in Criminology","authors":"Dennis Andersson, Mirko Thorstensson","doi":"10.1109/EISIC.2013.42","DOIUrl":"https://doi.org/10.1109/EISIC.2013.42","url":null,"abstract":"Reconstruction and Exploration (R&E) is an approach developed to support after-action reviews in military and emergency response exercises. With the development of new technology and software, data sets grow larger and more complex in many domains, increasing the need for visual exploration approaches such as R&E. This paper briefly presents the R&E approach and introduces it to the criminology community. Three areas within the field are discussed that may benefit from using structured approaches to data collection and presentation such as R&E: (1) vicarious learning, (2) police intelligence operations, and (3) evidence presentation in trials. In conclusion, the approach looks promising as a complement to existing methods in criminology, and further investigations are recommended to clarify needs, possibilities and challenges ahead.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116649873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2013 European Intelligence and Security Informatics Conference
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1