28 research outputs found

    Intelligence and Security Informatics

    Get PDF
    The book constitutes the proceedings of the First European Conference on Intelligence and Security Informatics, EuroISI 2008 Intelligence and security informatics (ISI) is a multidisciplinary field encompassing methodologies, models, algorithms, and advanced tools for intelligence analysis, homeland security, terrorism research as well as security-related public policies. These proceedings contain 25 original papers, out of 48 submissions received, related to the topics of intelligence and security informatics. These papers cover a broad range of fields such as: social network analysis, knowledge discovery, web-based intelligence and analysis, privacy protection, access control, digital rights management, malware and intrusion detection, surveillance, crisis management, and computational intelligence, among others.JRC.G.2-Support to external securit

    An analysis of interactions within and between extreme right communities in social media

    Get PDF
    Many extreme right groups have had an online presence for some time through the use of dedicated websites. This has been accompanied by increased activity in social media websites in recent years, which may enable the dissemination of extreme right content to a wider audience. In this paper, we present exploratory analysis of the activity of a selection of such groups on Twitter, using network representations based on reciprocal follower and mentions interactions. We find that stable communities of related users are present within individual country networks, where these communities are usually associated with variants of extreme right ideology. Furthermore, we also identify the presence of international relationships between certain groups across geopolitical boundaries

    Associative search through formal concept analysis in criminal intelligence analysis

    Get PDF
    Criminal Intelligence Analysis often requires a search different from the semantic and keyword based searching to reveal the associations among semantically and operationally connected objects within a crime knowledge base. In this paper we introduce associative search as a search along the networks of association between objects like people, places, other organizations, products, events, services, and so on. We also propose an associative search model based on the 5WH associated concepts of a crime, i.e. WHAT (what has happened), WHO (who was involved in the crime), WHEN (the temporal information of the crime), WHERE (the geo-spatial information of the crime) HOW (the modus-operandi used in committing a crime). We have employed Formal Concept Analysis theory to reveal the associations, highlighting Hot Spots, offender‘s profile and its associated offenders in a criminal activit

    Control Flow Graph Based Multiclass Malware Detection Using Bi-normal Separation

    Get PDF
    Control flow graphs (CFG) and OpCodes extracted from disassembled executable files are widely used for malware detection. Most of the research in static analysis is focused on binary class malware detection which only classifies an executable as benign or malware. To overcome this issue, CFG based multiclass malware detection system that automatically classifies the malware into their respective families is proposed. The use Bi-normal separation (BNS) as a feature scoring metric. Experimental results show that proposed method using BNS outperforms compared to hitherto use technique of document Frequency for multiclass metamorphic malware detection and achieves detection accuracy of 99.5 per cent.
    corecore