• FOSINT-SI 2018

    ASONAM 2018Springer

  • Keynote Speaker:
    Panagiotis Papadimitratos, KTH Royal Institute of Technology, Sweden

    Committee

    • Steering Chair
    • Reda Alhajj, University of Calgary, Canada
    • General Chair
    • Joel Brynielsson, KTH Royal Institute of Technology, Sweden
    • Program Chairs
    • Uwe GlasserSimon Fraser University, Canada
    • Lisa KaatiSwedish Defence Research Agency & Uppsala University, Sweden
    • Mohammad TayebiSimon Fraser University, Canada
Welcome to FOSINT-SI 2018

International Symposium on Foundations of Open Source Intelligence and Security Informatics


Terrorism and crime threaten the international community and our society more than ever before. Criminal networks and terrorist groups that often operate globally try to hide their illegal activities by using advanced information and communications technology. They communicate easier and form global communities that are hard to track. Fortunately, resources like social media, event logs, phone call logs, web logs, and other time series data, constitute a rich source for knowledge discovery. There is a serious need for innovative techniques and tools capable of achieving the ultimate goal of early warning to help detecting, identifying and neutralizing the source of a threat. Motivated by this need with high social impact, research related to open source intelligence and security informatics is gaining momentum in academia, industry, law enforcement and intelligence agencies. Developing effective knowledge discovery methods, techniques and tools to combat crime and terrorism requires coordinated and intensified collaborations across these communities. The aim of the FOSINT-SI Symposium is to provide a unique international forum for academic researchers, government professionals and industrial practitioners to socialize, share their ideas, and exchange their data, knowledge, and expertise.

Web Intelligence and Security
  • News monitoring, analysis and visualization
  • Online social networks security and privacy
  • Web spam detection
  • Privacy and security issues in social media
  • E-mail security, phishing and fraud
  • Trust and security in e-commerce
  • Security in location based services
  • Terrorist activity detection on the Web
Cybercrime Analysis
  • Cybercrime monitoring and filtering
  • Cybercrime investigation
  • Intrusion detection and prevention
  • Protection against cyber terrorism
  • Detection and analysis of online abuse of children
  • Social effect of cyber crime
  • Digital identity management
Crime Data Mining
  • Criminal network analysis
  • Social network analysis for suspect investigation
  • Crime forecasting
  • Spatiotemporal analysis of crime data
  • Big crime data mining algorithms
  • Criminal profiling methods
  • Privacy preserving algorithms for crime data
  • Crime pattern recognition and modeling
  • Data mining for counterterrorism
Open Source Situational Awareness
  • Command and control
  • Improving situational awareness through social media
  • Social media for natural disasters monitoring and recovery
  • Crowdsourcing and wisdom of the crowds
  • Multi-agent system for security and surveillance
Previous Symposiums