Intelligence and Cyber Security

2019

15. Skillicorn, DB. and Leuprecht, C. Clustering Semi-Structured Heterogeneous Social Science Datasets for National Security Applications. In Security by Design: Innovative Perspectives on Complex Problems. Ed. Anthony Masys. New York: VS Springer, pp. 181-192.

14. Leuprecht, C, Szeman, J and Skilliborn, DB1. The Damoclean sword of offensive cyber: Policy uncertainty and collective insecurity. Contemporary Security Policy. SJR = Q2

13. Skillicorn, DB, Leuprecht, C1 and Green, A. Leveraging Police Incident Data for Intelligence-Led Policing. Global Crime. Special Issue on Illicit Network. SJR = Q1

12. Skillicorn, DB1. and Leuprecht, C. Clustering Heterogeneous Semi-Structured Dataset in Applications to Criminology: A Records Management System Case Study. In Criminology at the Edge: Big Data in Criminology. Eds. Benoit Leclerc and Jesse Cale. Abingdon: Routledge.

2018

11. Skillicorn, DB1 and Leuprecht, C. Copresence Networks. IEEE Intelligence and Security Informatics. SJR = Q1

10. Skillicorn, DB1. and Leuprecht, C. Clustering Semi-Structured Heterogeneous Social Science Datasets for National Security Applications. In Security by Design: Innovative Perspectives on Complex Problems. Ed. Anthony Masys. New York: VS Springer, pp. 181-192.

9. Leuprecht, C and Mcnorton, H. C-22: Bringing Security and Intelligence into Focus: How to Clarify the Roles of Newly Created Accountability Bodies. Ottawa: Macdonald Laurier Institute.

2017 8. Bill C-22, An Act to establish the National Security and Intelligence Committee of Parliamentarians. Senate of Canada Standing Committee on National Security and Defence. 12 June.
2016 7. Skillicorn, DB1, Leuprecht, C, and Tait, V. 2016. Beyond the Castle Model of Cybersecurity. Government Information Quarterly. 33(2): 250-257. SJR = Q1 (Top 7% in Sociology and Political Science)

See my talk at Flinders University on this topic.

Abridged and revised portions of this article subsequently appeared as Computing in Compromised Environments: Beyond the Castle Model of Cyber-Security. In Exploring the Security Landscape: Non-Traditional Security Challenges. Ed. Anthony Masys. New York: VS Springer: 249-265. Initial draft version published by the Austrian Institute for European and Security Policy as Working Paper No. 4, July 2015.
2015

6. Skillicorn, DB1 and Leuprecht, C. 2015. Clustering Heterogeneous Semi-Structured Social Science Datasets. Procedia Computer Science (International Conference on Computational Science), 51: 2888-2892. SJR = Q2

5. Bill C-44: An Act to Amend the Canadian Security Intelligence Service Act and other Acts. Senate of Canada Standing Committee on National Security and Defence. 23 March.

4. Bill C-51, An Act to enact the Security of Canada Information Sharing Act and the Secure Air Travel Act, to amend the Criminal Code, the Canadian Security Intelligence Service Act and the Immigration and Refugee Protection Act and to make related and consequential amendments to other Acts. Senate of Canada Standing Committee on National Security and Defence. 2 April.

3. Bill C-51, An Act to enact the Security of Canada Information Sharing Act and the Secure Air Travel Act, to amend the Criminal Code, the Canadian Security Intelligence Service Act and the Immigration and Refugee Protection Act and to make related and consequential amendments to other Acts. House of Commons Standing Committee on Public Safety and National Security. 23 March.

2014 2. Bill C-44: An Act to Amend the Canadian Security Intelligence Service Act and other Acts. House of Commons Standing Committee on Public Safety and National Security. 26 November.
2013

1. Skillicorn, DB1 and Leuprecht, C. 2013. Improving the Language of Influence. Proceedings of Foundations of Open Source Intelligence Workshop (FOSINT-SI), at Advances in Social Network Analysis and Modelling (ASONAM), ACM & IEEE: 1028-1033. SJR = Q1