The list of accepted submissions (full-short-posters) is as follows (in no particular order):
- Identifying Disruptive Events from Social Media to Enhance Situational Awareness
Nasser Alsaedi, Pete Burnap and Omer Rana - Identifying Digital Threats in a Hacker Web Forum
Mitch Macdonald, Richard Frank, Joseph Mei and Bryan Monk - Information Extraction of Regulatory Enforcement Actions: From Anti Money Laundering Compliance to Countering Terrorism Finance
Vassilis Plachouras and Jochen Leidner - Story Detection Using Generalized Concepts and Relations
Betul Ceran, Nitesh Kedia, Steven Corman and Hasan Davulcu - Detectability of Low-Rate HTTP Server DoS Attacks using Spectral Analysis
Joel Brynielsson and Rishie Sharma - Towards Real-time Classification of Malicious URLs on Twitter using Machine Activity Data
Peter Burnap, Amir Javed, Omer Rana and Malik Shahzad Awan - Cyber-Deception and Attribution in Capture-the-Flag Exercises
Eric Nunes, Nimish Kulkarni, Paulo Shakarian, Andrew Ruef and Jay Little - Open Source Intelligence applied to Twitter mining analysis through semantic networks
Federica Bisio, Claudia Meda, Rodolfo Zunino, Roberto Surlinelli, Eugenio Scillia and Augusto Vincenzo Ottaviano - Malware Task Identification: A Data Driven Approach
Eric Nunes, Casey Buto, Paulo Shakarian, Christian Lebiere, Stefano Bennati, Robert Thomson and Holger Jaenisch - Birds of a Feather Flock Together: The Accidental Communities of Spammers
Yehonatan Cohen and Danny Hendler - Bipartite Network Model for Inferring Hidden Ties in Crime Data
Haruna Isah, Daniel Neagu and Paul Trundle - An Approach to Designing a Network Security-based Application for Communications Safety
Ndibanje Bruce, Young Jin Kang, Mangal Sain and Hoon Jae Lee - Tactics, weapons, targets and rationale behind the actions of the mostly operational terrorist groups across Europe
Ioanna Lekea, Panagiotis Karampelas, Konstantinos Xylogiannopoulos and Reda Alhajj - A System for Analyzing Criminal Social Networks
Kamal Taha and Paul Yoo. - Sentiment Crawling: Extremist Content Collection through a Sentiment Analysis Guided Web-Crawler
Joseph Mei and Richard Frank - Evaluating Criminal Networks with PEVNET
Amer Rasheed and Uffe Kock Wiil - Authentication Models for IoT Clouds
Luciano Barreto, Antonio Celesti, Massimo Villari, Maria Fazio and Antonio Puliafito