Call for Papers

Photo of Thessaloniki

The recent efforts by major technology companies  (including Web search engines  and social media platforms) on addressing objectionable extremist material (such as violent extremist content) that may appear on their services acutely demonstrate both the important challenges faced by practitioners in the Web Intelligence community, as well as the pressing need for developing effective and efficient solutions. Moreover, cyber security attacks are on the rise and their detection, prevention, and management increasingly rely on big data analytics, Web intelligence, and deep learning/machine learning methods.

In this context, this workshop aims to investigate the deliberate misuse of technical infrastructure for subversive purposes, including (but not limited to): the spreading of extremist propaganda, antagonistic or hateful commentary; the distribution of malware; denial of service attacks; etc. Better understanding of such phenomena on the Web (including social media) allows for their early detection and underpins the development of effective models for predicting cyber security threats.

The topics of this workshop include, but are not limited to, the following areas:

  • Artificial Intelligence, machine learning, and Web data mining for intelligence purposes
  • Security-related online content discovery: crawling the Web, social media, and darknets
  • Security-related information extraction and sentiment analysis
  • Semantic multimedia analysis for criminal/intelligence content understanding
  • Summarisation of criminal/intelligence content
  • Visual security analytics 
  • User-generated content and security-related social media analytics
  • Security-related social network analysis (incl. radicalization and recruitment)
  • Authorship analysis and identification
  • Multimedia forensics Intrusion and cybersecurity threat detection and analysis
  • Cyber-physical-social system security and incident management
  • Forecasting threats and measuring the impact of threats
  • Big data analytics for cybersecurity
  • Terrorism-related analytics and software tools
  • Ethical and legal issues in monitoring security-related online content