FOSINT-SI 2016 - 2016 International Symposium on Foundations of Open Source Intelligence and Security Informatics
Topics/Call fo Papers
Terrorism and crime threaten the international community and our society more than ever before. Criminal networks and terrorist groups that often operate globally try to hide their illegal activities by using advanced information and communications technology. They communicate easier and form global communities that are hard to track. Fortunately, resources like social media, event logs, phone call logs, web logs, and other time series data, constitute a rich source for knowledge discovery. There is a serious need for innovative techniques and tools capable of achieving the ultimate goal of early warning to help detecting, identifying and neutralizing the source of a threat. Motivated by this need with high social impact, research related to open source intelligence and security informatics is gaining momentum in academia, industry, law enforcement and intelligence agencies. Developing effective knowledge discovery methods, techniques and tools to combat crime and terrorism requires coordinated and intensified collaborations across these communities. The aim of the FOSINT-SI Symposium is to provide a unique international forum for academic researchers, government professionals and industrial practitioners to socialize, share their ideas, and exchange their data, knowledge, and expertise.
Web Intelligence and Security
News monitoring, analysis and visualization
Online social networks security and privacy
Web spam detection
Privacy and security issues in social media
E-mail security, phishing and fraud
Trust and security in e-commerce
Security in location based services
Terrorist activity detection on the Web
Cybercrime Analysis
Cybercrime monitoring and filtering
Cybercrime investigation
Intrusion detection and prevention
Protection against cyber terrorism
Detection and analysis of online abuse of children
Social effect of cyber crime
Digital identity management
Crime Data Mining
Criminal network analysis
Social network analysis for suspect investigation
Crime forecasting
Spatiotemporal analysis of crime data
Big crime data mining algorithms
Criminal profiling methods
Privacy preserving algorithms for crime data
Crime pattern recognition and modeling
Data mining for counterterrorism
Open Source Situational Awareness
Command and control
Improving situational awareness through social media
Social media for natural disasters monitoring and recovery
Crowdsourcing and wisdom of the crowds
Multi-agent system for security and surveillance
Web Intelligence and Security
News monitoring, analysis and visualization
Online social networks security and privacy
Web spam detection
Privacy and security issues in social media
E-mail security, phishing and fraud
Trust and security in e-commerce
Security in location based services
Terrorist activity detection on the Web
Cybercrime Analysis
Cybercrime monitoring and filtering
Cybercrime investigation
Intrusion detection and prevention
Protection against cyber terrorism
Detection and analysis of online abuse of children
Social effect of cyber crime
Digital identity management
Crime Data Mining
Criminal network analysis
Social network analysis for suspect investigation
Crime forecasting
Spatiotemporal analysis of crime data
Big crime data mining algorithms
Criminal profiling methods
Privacy preserving algorithms for crime data
Crime pattern recognition and modeling
Data mining for counterterrorism
Open Source Situational Awareness
Command and control
Improving situational awareness through social media
Social media for natural disasters monitoring and recovery
Crowdsourcing and wisdom of the crowds
Multi-agent system for security and surveillance
Other CFPs
- 2016 IEEE International Conference on Internet of Things and Pervasive Systems
- Fifth International Conference on Science, Management, Engineering and Technology 2016
- 4th Agricultural Science and Food Engineering Conference (ASFE 2016)
- 2nd Big Data Day Baku 2016
- 10th IEEE International Conference on Application of Information and Communication Technologies
Last modified: 2016-03-14 21:46:31