LATEST NEWS:  FOSINT-SI Keynote Speakers     Dr. Maura Conway   Dr. Cor Veenman
  • FOSINT-SI 2015

    ASONAM 2015


    FOSINT_SI PROGRAM

    Springer

  • Committee

    • Steering Chair
    • Reda Alhajj, University of Calgary, Canada
    • Honorary Chair
    • Daniel ZengUniversity of Arizona, USA
    • General Chair
    • Arno H. P. ReuserDirector, Reuser's Information Services & Head, Bureau Open Source Intelligence, Defence Intelligence & Security Service (ret.)
    • Program Chairs
    • Uwe GlässerSimon Fraser University, Canada
    • Lisa KaatiSwedish Defence Research Agency & Uppsala University, Sweden
    • Program Coordinators
    • Mohammad TayebiSimon Fraser University, Canada
    • Alper AksacUniversity of Calgary, Canada
    • Publicity Chairs
    • Omar AddamUniversity of Calgary, Canada
    • Abdullah SarhanUniversity of Calgary, Canada
    • Web Chair
    • Ibrahim KarakiraUniversity of Calgary, Canada
ASONAM 2015
Accepted Papers

The list of accepted submissions (full-short-posters) is as follows (in no particular order):

  • Identifying Disruptive Events from Social Media to Enhance Situational Awareness
    Nasser Alsaedi, Pete Burnap and Omer Rana
  • Identifying Digital Threats in a Hacker Web Forum
    Mitch Macdonald, Richard Frank, Joseph Mei and Bryan Monk
  • Information Extraction of Regulatory Enforcement Actions: From Anti Money Laundering Compliance to Countering Terrorism Finance
    Vassilis Plachouras and Jochen Leidner
  • Story Detection Using Generalized Concepts and Relations
    Betul Ceran, Nitesh Kedia, Steven Corman and Hasan Davulcu
  • Detectability of Low-Rate HTTP Server DoS Attacks using Spectral Analysis
    Joel Brynielsson and Rishie Sharma
  • Towards Real-time Classification of Malicious URLs on Twitter using Machine Activity Data
    Peter Burnap, Amir Javed, Omer Rana and Malik Shahzad Awan
  • Cyber-Deception and Attribution in Capture-the-Flag Exercises
    Eric Nunes, Nimish Kulkarni, Paulo Shakarian, Andrew Ruef and Jay Little
  • Open Source Intelligence applied to Twitter mining analysis through semantic networks
    Federica Bisio, Claudia Meda, Rodolfo Zunino, Roberto Surlinelli, Eugenio Scillia and Augusto Vincenzo Ottaviano
  • Malware Task Identification: A Data Driven Approach
    Eric Nunes, Casey Buto, Paulo Shakarian, Christian Lebiere, Stefano Bennati, Robert Thomson and Holger Jaenisch
  • Birds of a Feather Flock Together: The Accidental Communities of Spammers
    Yehonatan Cohen and Danny Hendler
  • Bipartite Network Model for Inferring Hidden Ties in Crime Data
    Haruna Isah, Daniel Neagu and Paul Trundle
  • An Approach to Designing a Network Security-based Application for Communications Safety
    Ndibanje Bruce, Young Jin Kang, Mangal Sain and Hoon Jae Lee
  • Tactics, weapons, targets and rationale behind the actions of the mostly operational terrorist groups across Europe
    Ioanna Lekea, Panagiotis Karampelas, Konstantinos Xylogiannopoulos and Reda Alhajj
  • A System for Analyzing Criminal Social Networks
    Kamal Taha and Paul Yoo.
  • Sentiment Crawling: Extremist Content Collection through a Sentiment Analysis Guided Web-Crawler
    Joseph Mei and Richard Frank
  • Evaluating Criminal Networks with PEVNET
    Amer Rasheed and Uffe Kock Wiil
  • Authentication Models for IoT Clouds
    Luciano Barreto, Antonio Celesti, Massimo Villari, Maria Fazio and Antonio Puliafito