IEEE Joint Intelligence
and Security Informatics Conference (JISIC) 2014
September 24-26, 2014
the Hague, the Netherlands

The first joint International and European conference on Intelligence and Security Informatics (IEEE ISI & EISIC)

Conference Tracks

1. Forensic Intelligence

Jeroen Keppens−King's College London

  • Evidential reasoning
  • Probabilistic reasoning
  • Argumentation
  • Forensic investigation
  • Knowledge management

A broad range of disparate techniques to tackle evidential reasoning and forensic investigation have emerged from a variety of fields, including argumentation, probabilistic, narrative and knowledge management based approaches to collect and assess evidence, and to manage and coordinate investigations. This track aims to bring together academic researchers and practitioners with interests in evidential reasoning and forensic investigation from disparate fields such as statistics, artificial intelligence, decision sciences, forensic sciences and law, to present new developments in their respective areas and encourage cross-fertilisation between often disparate fields of research and practice.

2. Decisioning and Interaction

John Stasko− Georgia Institute of Technology

  • Visualization
  • Visual analytics systems
  • Interactive decision-support
  • Analytical reasoning systems
  • Multimedia information systems

The track will explore interactive technologies that assist in the decision-making processes of security-related domains. This includes visualization and visual analytics systems, interactive decision-support and analytical reasoning systems, and other forms of multimedia information systems. A key component of this track is a human-in-the-loop interaction technology where computational analyses are complemented by human exploration and investigation.

3. Cyber and Infrastructure Security

V.S. Subrahmanian− University of Maryland

  • Cyber security
  • Infrastructure security
  • Intelligence
  • Terrorism
  • Computational models

The Security track focuses on computational models of intelligence, safety and security aspects of crime and terrorism in the context of critical infrastructure and cyberspace. Papers making both theoretical and practical aspects of these topics are welcome. Interdisciplinary and applied papers, where existing computational methods are applied or adapted to the solution of real-world problems in these domains are particularly encouraged.

4. Financial and Fraud Analysis

Niall Adams −Imperial College London

  • Adaptive systems
  • Big data
  • Insurance fraud
  • Banking fraud
  • Internet transactions

Financial fraud is a serious problem, damaging both international economies and personal lives. The areas in which financial fraud can occur are diverse, including retail finance, insurance, corporate banking and internet transactions. A broad range of tactics are employed by fraudsters to obtain illegal advantage. Moreover, the area of fraud is an arms-race, with fraudsters constantly changing tactics to circumvent protection systems. Thus, methodology that is capable of automatically adapting to such changes is of special interest. Many financial fraud applications have the character of “big data”, in which a very small signal must be extracted from very large and complex data. This track will gather novel research contributions in the area of financial fraud, with the intention of gaining insight from diverse methodologies and application areas.

5. Computational Criminology

Thomas Holt −Michigan State University

  • Offender behavior and victimology
  • Social network structures
  • Organizational practices
  • Crime prevention strategies
  • Evaluations of crime prevention and intelligence led policing

This track will provide examinations of offender behavior, victimology, and law enforcement practices utilizing statistical analysis techniques and unique data sources. This includes tests of various criminological theories, assessments of social network structures, and organizational practices of terror groups, cybercriminals, and gangs. Evaluations of crime prevention strategies, intelligence led policing, and issues of public safety, privacy, and security will also be a focus of this track.

6. Border Control

Jakub Piskorski−FRONTEX

  • Authentication
  • Risk assessment of travelers
  • Modelling of border control processes
  • Surveillance and situational awareness
  • Technology impact, acceptance and integration

This track solicits papers reporting research work relevant in the context of addressing practical operational challenges encountered by the border control community. Among others, topics of interest include: (a) authentication of documents, people and vehicles, (b) risk assessment of travelers, (c) modelling and optimization of the border control processing chain, (d) border surveillance, (e) platforms, protocols and techniques for secure exchange of information and communication, (f) text/data mining, information fusion and utilization of new sources of information for intelligence gathering and situational awareness, and (g) border control technology impact, acceptance and integration.

7. General Conference Track

Intelligence and Security Informatics papers that do not fit to the above tracks can be submitted to the General Conference Track. Subjects of interest include, but are not limited to:

  • Social media analysis
  • Surveillance and monitoring
  • Alias and pseudonym resolution
  • Deep web or darknet
  • Sensor networks
  • Telecommunication traffic analysis