EISIC 2017 - European Intelligence & Security Informatics Conference (EISIC 2017)
Date2017-09-11 - 2017-09-13
Deadline2017-06-10
VenueDekelia Air Base, Attica, Greece
Keywords
Websitehttps://www.eisic.org
Topics/Call fo Papers
Intelligence and Security Informatics (ISI) is an interdisciplinary
field of research that focuses on the development, use, and evaluation
of advanced information technologies, including methodologies, models
and algorithms, systems, and tools, for local, national, and
international security related applications. Over the past decade, the
ISI research community has matured and delivered an impressive array
of research results that are both technically innovative and
practically relevant. The 2017 European ISI Conference is the eighth
ISI conference to be organized by the European ISI community. The
conference was first held in 2008, and has been organized annually
since 2011.
ISI conferences provide stimulating forums for gathering people from
previously disparate communities including those from academia,
government, and industry. We invite academic researchers from the ISI
community as well as related areas to contribute to EISIC 2017 which
will be held in Athens, Greece, in September 2017.
Research should be relevant to protection of
local/national/international security and safety, including
applications focusing on counterterrorism, crisis management, disaster
prevention, cybercrime, etc.
Topics of interest include (but are not limited to) the following:
1. Tools and Techniques for Analyzing Data
- Web-based intelligence monitoring, mining, and analysis
- Computer support for cybercrime investigations and digital
forensics
- Visualization techniques for intelligence analysis and
investigation
- Cybercrime detection and analysis
- Authorship profiling and identification
- Privacy, security, and civil liberties issues
- Detection and analysis of information operations and
disinformation
- Data analytics for darknet marketplaces
- Social network analysis for intelligence analysis and
investigations
2. Infrastructure Protection and Emergency Response
- Cyber-infrastructure design and protection
- Intrusion detection
- Bio-terrorism tracking, alerting, and analysis
- Transportation and communication infrastructure protection
- Border/transportation safety
- Emergency response and management
- Disaster prevention, detection, and management
3. Terrorism Informatics
- Terrorism related analytical methodologies and software tools
- Terrorism knowledge portals and databases
- Social network analysis (radicalization, recruitment, conducting
operations)
- Lone wolf terrorism
- Countering terrorism
4. Data Science for Computational Criminology
- Models for forecasting crime and measuring impact
- Models for crime pattern recognition
- Comprehensible/transparent models for crime analysis
- Data representation and fusion
- Methods for gang, volume, and special crime analysis
- Handling class-imbalance and biased samples for crime analysis
- Applications of intelligent decision support within law
enforcement
5. Decisioning and Interaction
- Visualization and visual analytics systems
- Interactive and computational decision support
- Analytical reasoning systems
- Resilience in intelligence analysis
- Investigative and analytic decision-making
- Legal, privacy, and ethical factors in intelligence analysis
6. Internet of Things and Security
- Resilience and security in IoT applications
- Privacy and integrity aspects related to IoT
- Detection, prevention, response and mitigation of cyber threats
to IoT
- Threat models and IoT
7. Border Control
- Authentication
- Risk assessment of travelers
- Modeling of border control processes
- Surveillance and situational awareness
- Technology impact, acceptance, and integration
---
Types of Submissions
---
Regular papers, short papers, and posters.
---
Important Dates
---
- Paper submission due: June 10, 2017
field of research that focuses on the development, use, and evaluation
of advanced information technologies, including methodologies, models
and algorithms, systems, and tools, for local, national, and
international security related applications. Over the past decade, the
ISI research community has matured and delivered an impressive array
of research results that are both technically innovative and
practically relevant. The 2017 European ISI Conference is the eighth
ISI conference to be organized by the European ISI community. The
conference was first held in 2008, and has been organized annually
since 2011.
ISI conferences provide stimulating forums for gathering people from
previously disparate communities including those from academia,
government, and industry. We invite academic researchers from the ISI
community as well as related areas to contribute to EISIC 2017 which
will be held in Athens, Greece, in September 2017.
Research should be relevant to protection of
local/national/international security and safety, including
applications focusing on counterterrorism, crisis management, disaster
prevention, cybercrime, etc.
Topics of interest include (but are not limited to) the following:
1. Tools and Techniques for Analyzing Data
- Web-based intelligence monitoring, mining, and analysis
- Computer support for cybercrime investigations and digital
forensics
- Visualization techniques for intelligence analysis and
investigation
- Cybercrime detection and analysis
- Authorship profiling and identification
- Privacy, security, and civil liberties issues
- Detection and analysis of information operations and
disinformation
- Data analytics for darknet marketplaces
- Social network analysis for intelligence analysis and
investigations
2. Infrastructure Protection and Emergency Response
- Cyber-infrastructure design and protection
- Intrusion detection
- Bio-terrorism tracking, alerting, and analysis
- Transportation and communication infrastructure protection
- Border/transportation safety
- Emergency response and management
- Disaster prevention, detection, and management
3. Terrorism Informatics
- Terrorism related analytical methodologies and software tools
- Terrorism knowledge portals and databases
- Social network analysis (radicalization, recruitment, conducting
operations)
- Lone wolf terrorism
- Countering terrorism
4. Data Science for Computational Criminology
- Models for forecasting crime and measuring impact
- Models for crime pattern recognition
- Comprehensible/transparent models for crime analysis
- Data representation and fusion
- Methods for gang, volume, and special crime analysis
- Handling class-imbalance and biased samples for crime analysis
- Applications of intelligent decision support within law
enforcement
5. Decisioning and Interaction
- Visualization and visual analytics systems
- Interactive and computational decision support
- Analytical reasoning systems
- Resilience in intelligence analysis
- Investigative and analytic decision-making
- Legal, privacy, and ethical factors in intelligence analysis
6. Internet of Things and Security
- Resilience and security in IoT applications
- Privacy and integrity aspects related to IoT
- Detection, prevention, response and mitigation of cyber threats
to IoT
- Threat models and IoT
7. Border Control
- Authentication
- Risk assessment of travelers
- Modeling of border control processes
- Surveillance and situational awareness
- Technology impact, acceptance, and integration
---
Types of Submissions
---
Regular papers, short papers, and posters.
---
Important Dates
---
- Paper submission due: June 10, 2017
Other CFPs
- Ninth International Conference on Wireless Communications and Signal Processing
- International Conference on Recent Advances in Space Technologies (RAST)
- 2017 2nd International Conference on Intelligent Information Processing
- 11th International Conference on Autonomous Infrastructure, Management, and Security (AIMS 2017)
- 5th International Congress on Neurotechnology, Electronics and Informatics
Last modified: 2017-05-31 06:44:30