Security

English

Investigating motivation in policing systems by computer simulation

Understanding motivation in large public organisations is essential to managing them successfully. Phil Davies is a senior officer in Greater Manchester Police and is investigating motivation in Police Constable Support Officers (PCSOs). PCSOs undertake many tasks that enable warranted police officers to focus on tasks that require their higher levels of training and capabilities. The tasks for PCSOs include patrolling urban streets and shopping centres, visiting victims of crime, and dealing with antisocial behaviour.

A Study of the Network of Military Treaties

Since the conclusion of World War II in 1945, international military conflicts have largely been between nations of great power and “underdog” nations. This paper studies the network of military treaties between states in the international system. Examining this network leads to important conclusions about how state actors are prone to respond if an international or regional conflict were to arise. One influential such scenario was the launch of World War I, when great power nations got dragged into conflict due to their binding military treaties with lesser power states.

AICS2: Artificial Intelligence for Cyberspace Security

Threats to the cyberspace are increasingly complex, and new approaches for attacks prevention, detection and investigation are required. We propose AICS2: Artificial Intelligence for Cyberspace Security, to address the two core challenges: 1) define a new model for anomaly detection, GAD, the Graph-based model for Anomaly Detection; 2) build the new Artificial Intelligence primitives to identify and characterize cmoplex attacks in system logs and network traffic. The target environment of AICSS2 is able to generate complex, heterogeneous log information matching individual actions.

Analysing the footprint of a terrorist group to detect its fragmentation and mobility patterns

Boko Haram is one of the deadliest jihadist organisations on the planet. At its current rate, Boko Haram takes part in roughly one event every 10 hours, taking the lives of nearly 11 people daily. Yet, little is known concerning Boko Haram's internal structure or frequently travelled paths. Here, we apply a novel technique based on mobility patterns to analyse consecutive Boko Haram events to detect the mobility of the group [1].

Partners

Twitter

Facebook

Contact

For information please contact :
ccs2020conf@gmail.com