Skip to content
Contact Us | Tel. +49 511 762 – 17715 | @: niederee[at]L3S.de
h2020mirror
  • Home
  • About
    • Collaborations and Synergies​
  • Work Plan
  • News
  • Consortium
  • Downloads
  • Publications
  • Contact
  • Toolkit
Menu Close
Toggle the button to expand or collapse the Menu
  • Home
  • About
    • Collaborations and Synergies​
  • Work Plan
  • News
  • Consortium
  • Downloads
  • Publications
  • Contact
  • Toolkit

Yearly Archives: 2022

  1. Home>
  2. 2022>
  3. Page 2

Methodology for associating text with images

  • Post published:June 13, 2022
  • Post category:Automation/Toolkit

Migration related semantic concepts (MRSCs) are a set of concepts related to…

Continue ReadingMethodology for associating text with images
Methodology for associating text with images

Threat analysis from open source information in the context of the MIRROR system

  • Post published:June 13, 2022
  • Post category:Threat Analysis/Toolkit

The MIRROR system is designed from the beginning as a tool to…

Continue ReadingThreat analysis from open source information in the context of the MIRROR system
Threat analysis from open source information in the context of the MIRROR system

OSINT and human trafficking

  • Post published:June 10, 2022
  • Post category:OSINT/Toolkit

Labour exploitation victims are often recruited through online job advertisements;These advertisements are…

Continue ReadingOSINT and human trafficking
OSINT and human trafficking

Download the Latest MIRROR Newsletter

  • Post published:May 31, 2022
  • Post category:News/Publication

The latest MIRROR project newsletter is now available for download from our…

Continue ReadingDownload the Latest MIRROR Newsletter
Download the Latest MIRROR Newsletter

“Summarizing videos using concentrated attention and considering the uniqueness and diversity of the video frames” accepted by the ICMR’22 conference.

  • Post published:May 11, 2022
  • Post category:News/Publication

We are pleased to share that the MIRROR project paper "Summarizing Videos…

Continue Reading“Summarizing videos using concentrated attention and considering the uniqueness and diversity of the video frames” accepted by the ICMR’22 conference.
“Summarizing videos using concentrated attention and considering the uniqueness and diversity of the video frames” accepted by the ICMR’22 conference.

Security Challenges and Opportunities in the Use of Open-Source Information and Emerging Technologies in the Field of Migration

  • Post published:May 4, 2022
  • Post category:Events

In collaboration with CRiTERIA (Comprehensive data-driven Risk and Threat Assessment Methods for…

Continue ReadingSecurity Challenges and Opportunities in the Use of Open-Source Information and Emerging Technologies in the Field of Migration
Security Challenges and Opportunities in the Use of Open-Source Information and Emerging Technologies in the Field of Migration

Migration and mobile devices

  • Post published:April 26, 2022
  • Post category:Media Usage/Toolkit

Social media, accessible through mobile devices, have fundamentally reshaped migration networks and…

Continue ReadingMigration and mobile devices
Migration and mobile devices

Information and migration

  • Post published:April 26, 2022
  • Post category:Media Usage/Toolkit

Migration is a continuous and complex process, in which migrants and refugees…

Continue ReadingInformation and migration
Information and migration

Inclusive research

  • Post published:April 26, 2022
  • Post category:Media Usage/Toolkit

Inclusive or participatory research is all about involving the respective target group…

Continue ReadingInclusive research
Inclusive research

Migrants’ EU perceptions and misperceptions

  • Post published:April 26, 2022
  • Post category:Media Usage/Toolkit

Migrants and refugees (aspire to) migrate due to a combination of factors…

Continue ReadingMigrants’ EU perceptions and misperceptions
Migrants’ EU perceptions and misperceptions
  • Go to the previous page
  • 1
  • 2
  • 3
  • 4
  • Go to the next page

Recent Posts

  • Human Security Filter – Open-Source Information
  • Human Security Filter – Correlations
  • Human Security Filter – Composite Indicator
  • OSINT applications for law enforcement agencies
  • Introduction to OSINT for humanitarian practitioners

Recent Comments

    Archives

    • September 2024
    • June 2022
    • May 2022
    • April 2022
    • February 2022
    • January 2022
    • December 2021
    • November 2021
    • October 2021
    • August 2021
    • July 2021
    • June 2021
    • May 2021
    • April 2021
    • January 2021
    • November 2020
    • August 2020
    • April 2020
    • March 2020
    • November 2019
    • August 2019

    Categories

    • Automation
    • Events
    • Human Rights
    • Media Usage
    • News
    • OSINT
    • Perception Model
    • Publication
    • Risk Assessment
    • Threat Analysis
    • Toolkit
    • Training
    • Video

    Meta

    • Log in
    • Entries feed
    • Comments feed
    • WordPress.org

    Migration-Related Risks Caused by Misconceptions of Opportunities and Requirement

    MIRROR has received funding from the European Union’s Horizon 2020 research and innovation action program under grant agreement No 832921.
    Follow us:
    Linkedin Twitter

    © All rights reserved

    Imprint | Privacy Policy

    Manage Cookie Consent
    We use cookies to optimize our website and our service.
    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
    View preferences
    {title} {title} {title}