| |||||||||||
FOSINT-SI 2016 : International Symposium on Foundations of Open Source Intelligence and Security Informatics | |||||||||||
Link: http://fosint-si.cpsc.ucalgary.ca/2016/ | |||||||||||
| |||||||||||
Call For Papers | |||||||||||
Terrorism and crime threaten the international community and our society more than ever before. Criminal networks and terrorist groups that often operate globally try to hide their illegal activities by using advanced information and communications technology. They communicate easier and form global communities that are hard to track. Fortunately, resources like social media, event logs, phone call logs, web logs, and other time series data, constitute a rich source for knowledge discovery. There is a serious need for innovative techniques and tools capable of achieving the ultimate goal of early warning to help detecting, identifying and neutralizing the source of a threat. Motivated by this need with high social impact, research related to open source intelligence and security informatics is gaining momentum in academia, industry, law enforcement and intelligence agencies. Developing effective knowledge discovery methods, techniques and tools to combat crime and terrorism requires coordinated and intensified collaborations across these communities. The aim of the FOSINT-SI Symposium is to provide a unique international forum for academic researchers, government professionals and industrial practitioners to socialize, share their ideas, and exchange their data, knowledge, and expertise.
Web Intelligence and Security: News monitoring, analysis and visualization Online social networks security and privacy Web spam detection Privacy and security issues in social media E-mail security, phishing and fraud Trust and security in e-commerce Security in location based services Terrorist activity detection on the Web Cybercrime Analysis: Cybercrime monitoring and filtering Cybercrime investigation Intrusion detection and prevention Protection against cyber terrorism Detection and analysis of online abuse of children Social effect of cyber crime Digital identity management Crime Data Mining: Criminal network analysis Social network analysis for suspect investigation Crime forecasting Spatiotemporal analysis of crime data Big crime data mining algorithms Criminal profiling methods Privacy preserving algorithms for crime data Crime pattern recognition and modeling Data mining for counterterrorism Open Source Situational Awareness: Command and control Improving situational awareness through social media Social media for natural disasters monitoring and recovery Crowdsourcing and wisdom of the crowds Multi-agent system for security and surveillance ----------- Full paper submission deadlineMay 1, 2016 11:59 PM American Samoa Zone Notification of acceptanceJune 19, 2016 Camera-ready papers dueJune 3, 2016 11:59 PM American Samoa Zone Conference eventsAugust 19-20, 2016 |
|