International Symposium on Foundations of Open Source Intelligence and Security Informatics
NEW PAPER SUBMISSION DEADLINE EXTENDED TO May 12, 2014
Terrorism and crime threaten the international community and our society more than ever before. Criminal networks and terrorist groups that often operate globally try to hide their illegal activities by using advanced information and communications technology. They communicate easier and form global communities that are hard to track. Fortunately, resources like social media, event logs, phone call logs, web logs, and other time series data, constitute a rich source for knowledge discovery. There is a serious need for innovative techniques and tools capable of achieving the ultimate goal of early warning to help detecting, identifying and neutralizing the source of a threat. Motivated by this need with high social impact, research related to open source intelligence and security informatics is gaining momentum in academia, industry, law enforcement and intelligence agencies. Developing effective knowledge discovery methods, techniques and tools to combat crime and terrorism requires coordinated and intensified collaborations across these communities. The aim of the FOSINT-SI Symposium is to provide a unique international forum for academic researchers, government professionals and industrial practitioners to socialize, share their ideas, and exchange their data, knowledge, and expertise.
Accepted and presented papers will be included in the FOSINT-SI 2014 Conference Proceedings and forwarded for inclusion in IEEE Computer Society Digital Library (CSDL), IEEE Xplore and the ACM Digital Library. The conference proceedings will be submitted for EI indexing through INSPEC by IEEE.
High-quality research papers accepted for publication in the conference proceedings will be invited to submit an extended version for a book to be published in Springer's Lecture Notes in Social Networks (LNSN) series, subject to additional peer reviewing.
Web Intelligence and Security
- News monitoring, analysis and visualization
- Online social networks security and privacy
- Web spam detection
- Privacy and security issues in social media
- E-mail security, phishing and fraud
- Trust and security in e-commerce
- Security in location based services
- Terrorist activity detection on the Web
- Criminal network analysis
- Social network analysis for suspect investigation
- Crime forecasting
- Spatiotemporal analysis of crime data
- Big crime data mining algorithms
- Criminal profiling methods
- Privacy preserving algorithms for crime data
- Crime pattern recognition and modeling
- Data mining for counterterrorism
- Cybercrime monitoring and filtering
- Cybercrime investigation
- Intrusion detection and prevention
- Protection against cyber terrorism
- Detection and analysis of online abuse of children
- Social effect of cyber crime
- Digital identity management
- Command and control
- Improving situational awareness through social media
- Social media for natural disasters monitoring and recovery
- Crowdsourcing and wisdom of the crowds
- Multi-agent system for security and surveillance