Call for Papers
2017 European Intelligence and Security Informatics Conference (EISIC 2017)
The Premier European Conference on Counterterrorism and Criminology
September 11-13, 2017, Dekelia Air Base, Greece
Intelligence and Security Informatics (ISI) is an interdisciplinary
field of research that focuses on the development, use, and evaluation
of advanced information technologies, including methodologies, models
and algorithms, systems, and tools, for local, national, and
international security related applications. Over the past decade, the
ISI research community has matured and delivered an impressive array
of research results that are both technically innovative and
practically relevant. The 2017 European ISI Conference is the eighth
ISI conference to be organized by the European ISI community. The
conference was first held in 2008, and has been organized annually
since 2011.
ISI conferences provide stimulating forums for gathering people from
previously disparate communities including those from academia,
government, and industry. We invite academic researchers from the ISI
community as well as related areas to contribute to EISIC 2017 which
will be held in Athens, Greece, in September 2017.
Research should be relevant to protection of
local/national/international security and safety, including
applications focusing on counterterrorism, crisis management, disaster
prevention, cybercrime, etc.
Topics of interest include (but are not limited to) the following:
- Tools and Techniques for Analyzing Data
- Web-based intelligence monitoring, mining, and analysis
- Computer support for cybercrime investigations and digital forensics
- Visualization techniques for intelligence analysis and
investigation
- Cybercrime detection and analysis
- Authorship profiling and identification
- Privacy, security, and civil liberties issues
- Detection and analysis of information operations and
disinformation
- Data analytics for darknet marketplaces
- Social network analysis for intelligence analysis and
investigations
- Infrastructure Protection & Emergency Response
- Cyber-infrastructure design and protection
- Intrusion detection
- Bio-terrorism tracking, alerting, and analysis
- Transportation and communication infrastructure protection
- Border/transportation safety
- Emergency response and management
- Disaster prevention, detection, and management
- Terrorism Informatics
- Terrorism related analytical methodologies and software tools
- Terrorism knowledge portals and databases
- Social network analysis (radicalization, recruitment, conducting operations)
- Lone wolf terrorism
- Countering terrorism
- Data Science for Computational Criminology
- Models for forecasting crime and measuring impact
- Models for crime pattern recognition
- Comprehensible/transparent models for crime analysis
- Data representation and fusion
- Methods for gang, volume, and special crime analysis
- Handling class-imbalance and biased samples for crime analysis
- Applications of intelligent decision support within law
enforcement
- Decisioning and Interaction
- Visualisation and visual analytics systems
- Interactive and computational decision support
- Analytical reasoning systems
- Resilience in intelligence analysis
- investigative and analytic decision making
- Legal, privacy and ethical factors in intelligence analysis
- Internet of Things and Security
- Resilience and security in IoT applications
- Privacy and integrity aspects related to IoT
- Detection, prevention, response and mitigation of cyber threats to IoT
- Threat models and IoT
- Border Control
- Authentication
- Risk assessment of travelers
- Modeling of border control processes
- Surveillance and situational awareness
- Technology impact, acceptance, and integration
Paper submission:
Both long (8 pages max., roughly 8,000 words) and short (4 pages max., roughly 4,000 words) paper submissions should be written in English and be submitted electronically via the conference web site. Submission file formats are PDF and Microsoft Word using the IEEE two-column Word/LaTeX templates that can be found at the corresponding IEEE web site. Authors wishing to present a poster and/or demo may submit a 1‐page extended abstract, which, if accepted, will appear in the conference proceedings.
Download EISIC 2017 Call for Papers
The Call for Paper is also available in Text format.