posted by user: mamadt || 1287 views || tracked by 5 users: [display]

FOSINT-SI 2015 : International Symposium on Foundations of Open Source Intelligence and Security Informatics


When Aug 26, 2015 - Aug 27, 2015
Where Paris, France
Submission Deadline May 17, 2015
Notification Due Jun 23, 2015
Final Version Due Jul 3, 2015
Categories    open source intelligence   cybercrime   information security   crime data mining

Call For Papers

Terrorism and crime threaten the international community and our society more than ever before. Criminal networks and terrorist groups that often operate globally try to hide their illegal activities by using advanced information and communications technology. They communicate easier and form global communities that are hard to track. Fortunately, resources like social media, event logs, phone call logs, web logs, and other time series data, constitute a rich source for knowledge discovery. There is a serious need for innovative techniques and tools capable of achieving the ultimate goal of early warning to help detecting, identifying and neutralizing the source of a threat. Motivated by this need with high social impact, research related to open source intelligence and security informatics is gaining momentum in academia, industry, law enforcement and intelligence agencies. Developing effective knowledge discovery methods, techniques and tools to combat crime and terrorism requires coordinated and intensified collaborations across these communities. The aim of the FOSINT-SI Symposium is to provide a unique international forum for academic researchers, government professionals and industrial practitioners to socialize, share their ideas, and exchange their data, knowledge, and expertise.

Accepted and presented papers will be included in the FOSINT-SI 2015 Conference Proceedings and forwarded for inclusion in IEEE Computer Society Digital Library (CSDL), IEEE Xplore and the ACM Digital Library. The conference proceedings will be submitted for EI indexing through INSPEC by IEEE.

High-quality research papers accepted for publication in the conference proceedings will be invited to submit an extended version for a book to be published in Springer's Lecture Notes in Social Networks (LNSN) series, subject to additional peer reviewing.

-Web Intelligence and Security
News monitoring, analysis and visualization
Online social networks security and privacy
Web spam detection
Privacy and security issues in social media
E-mail security, phishing and fraud
Trust and security in e-commerce
Security in location based services
Terrorist activity detection on the Web

-Crime Data Mining
Criminal network analysis
Social network analysis for suspect investigation
Crime forecasting
Spatiotemporal analysis of crime data
Big crime data mining algorithms
Criminal profiling methods
Privacy preserving algorithms for crime data
Crime pattern recognition and modeling
Data mining for counterterrorism

-Cybercrime Analysis
Cybercrime monitoring and filtering
Cybercrime investigation
Intrusion detection and prevention
Protection against cyber terrorism
Detection and analysis of online abuse of children
Social effect of cyber crime
Digital identity management

-Open Source Situational Awareness
Command and control
Improving situational awareness through social media
Social media for natural disasters monitoring and recovery
Crowdsourcing and wisdom of the crowds
Multi-agent system for security and surveillance

Related Resources

IJCAI 2017   International Joint Conference on Artificial Intelligence
ICISSP 2017   3rd International Conference on Information Systems Security and Privacy
IROS 2017   IEEE/RSJ International Conference on Intelligent Robots and Systems
SI: Digital Forensics 2017   Call for Papers for Special Issue on Digital Forensics for IEEE S&P magazine
FC 2017   Financial Cryptography and Data Security 2017
AIP Special Issue 2016   Journal Acta Informatica Pragensia - Special Issue on Systems
CTI 2017   Cyber Threat Intelligence - Springer Book Chapter
IJISS 2016   International Journal of Information Security Science (IJISS)
IJMSA 2016   International Journal of Modelling, Simulation and Applications
InterOSS-IoT 2016   2nd International Workshop on Interoperability and Open Source Solutions for the Internet of Things