• Skip to primary navigation
  • Skip to main content

CINA.

  • About
    • Mission
    • People
  • Research
    • Research
    • Projects
    • RFPs
  • Education
    • Resources
    • Internships
  • Publications
    • Newsletter Archive
    • Director’s Blog
  • News & Events
    • News
    • CINA Director’s Blog
    • Digital Archive
    • Events
    • Work with Us
  • Contact
  • Search Toggle
  • Skip to content

CINA Annual Meeting 2022 – Event Materials

Oct 26, 2022

CINA Annual Meeting Booklet

CINA Research Portfolio Overview

 

Project Showcase Fact Sheets

Criminal Investigative Processes

  • An Architectural Model for Web-Based Technologies to Enhance Text-Image Capabilities in Detecting Sex Trafficking Cases
  • Detecting Criminal Disruption of Supply Chains Study
  • Detection of Illicit Massage Businesses through Spatial and Socio-Demographic Data Enrichment
  • Is There Money Laundering in Cryptocurrency Markets?
  • Overcoming Reluctance and Increasing Intelligence Gathering from Victims of Trafficking
  • The Next Battlefield: Illicit Markets Hosted on Encrypted Communication Platforms
  • Time Series Analysis of Anonymized Communication Channels
  • Training on Intelligence and Evidence Gathering in Darknet Environments
  • Visualizing the membership of organized criminal syndicates: A field evaluation of the Reporting Information about Networks and Groups (RING) task

Dynamic Patterns of Criminal Activity

  • Effects of Natural Disasters on Spatio-Temporal Patterns of Crime Types in the United States
  • Innovative Spatiotemporal Pattern Detection: Examining Changes in Crime Hot Spots Across Six U.S. Cities
  • The Emergence and Diffusion of Illicit Virtual Goods across the International Cybercrime Ecosystem
  • Understanding the Economy and Social Organization of the Underground Market for Cybercrime as a Service

Criminal Network Analysis

  • Cross-platforms Cybercrime Detection on Inter-connected Heterogeneous Networks
  • Exploring Graph Neural Networks for Attributed Multilayer Criminal Network Analysis
  • Graph Analytics and Visualization for Criminal Network Identification
  • Illicit Gold from Peru and Colombia: Understanding the Trade, Routes, and U.S. Linkages
  • Location Data Analytics and Visualization for Criminal Network Identification

Digital Forensics

  • A Machine Learning-based Approach to Analyzing and Triaging Encrypted Data Containers in Law Enforcement Applications
  • Agent-based Learning to Utilize Local Data for Activity Recognition
  • Data Science-Integrated Experiential Digital Forensics Training Based on Real-World Case Studies of Cybercrime Artifacts
  • Digital Forensic Investigations Involving Cryptocurrency Wallets Installed on Mobile Devices
  • Digital Forensic Tools and Techniques for Investigating Control Logic Attacks in Industrial Control Systems
  • Evaluate Current NCFI Course Offerings and Develop Recommendations for Prerequisites and Post Curriculum Evaluation

Traditional Forensics

  • Digital Holographic Acquisition, Storage, Retrieval and Analysis of Three-Dimensional Fingermarks Developed with the Nanoscale Columnar-Thin-Film Technique
  • Identity Sciences Interdisciplinary Research: Morph Attack Detection, Latent Fingerprint Recognition, Presentation Attack Detection

*The programs and services offered by George Mason University are open to all who seek them. George Mason does not discriminate on the basis of race, color, religion, ethnic national origin (including shared ancestry and/or ethnic characteristics), sex, disability, military status (including veteran status), sexual orientation, gender identity, gender expression, age, marital status, pregnancy status, genetic information, or any other characteristic protected by law. After an initial review of its policies and practices, the university affirms its commitment to meet all federal mandates as articulated in federal law, as well as recent executive orders and federal agency directives.

CINA Now

Events

All Events

Publications

The Key to Deobfuscation is Pattern of Life, not Overcoming Encryption

Published: Oct 4, 2025

The Organized Activities of Ransomware Groups: A Social network Approach

Published: Mar 14, 2025
All Publications

News

CINA Distinguished Speaker Series with Colton Seale: Interviewer Mindset

CINA  |   April 3, 2025  |   Posted In:
  • Digital Archive
  • Uncategorized

CINA  |   March 6, 2025  |   Posted In:
  • Uncategorized
All News

Science and Technology Directorate’s Office of University Programs
CINA at George Mason University Logo
Copyright © 2025 All Rights Reserved | CINA Is A Department of Homeland Security Center of Excellence led by George Mason University
  • Facebook
  • Twitter
  • Instagram
  • Linkedin
  • YouTube