EISIC: European Intelligence and Security Informatics Conference



Past:   Proceedings on DBLP

Future:  Post a CFP for 2016 or later   |   Invite the Organizers Email


All CFPs on WikiCFP

Event When Where Deadline
EISIC 2015 2015 European Intelligence and Security Informatics Conference ( Technically sponsored by IEEE)
Sep 7, 2015 - Sep 9, 2015 Manchester May 31, 2015
EISIC 2013 European Intelligence & Security Informatics Conference
Aug 12, 2013 - Aug 14, 2013 Uppsala, Sweden May 10, 2013
EISIC 2012 European Intelligence and Security Informatics Conference
Aug 22, 2012 - Aug 24, 2012 Odense, Denmark Apr 15, 2012
EISIC 2011 European Intelligence and Security Informatics
Sep 12, 2011 - Sep 14, 2011 Athens, Greece Apr 11, 2011

Present CFP : 2015

*** Final submission deadline: May 31, 2015 ***

European Intelligence & Security Informatics Conference (EISIC 2015)
The Premier European Conference on Counterterrorism and Criminology
Manchester, UK, September 7-9, 2015

Call for Papers
Intelligence and Security Informatics (ISI) research is an
interdisciplinary research field involving academic researchers in
information technologies, computer science, public policy,
bioinformatics, medical informatics, and social and behavior studies,
as well as local, state, and federal law enforcement and intelligence
experts, information technology industry consultants and practitioners
to support counterterrorism and homeland security missions of
anticipation, interdiction, prevention, preparedness and response to
terrorist acts. The annual IEEE International ISI Conference series
was started in 2003.

We invite academic researchers in the field of Intelligence and
Security Informatics and related areas (such as computer science,
public policy, and social and behavioral studies) as well as
companies, industry consultants, analysts and practitioners in the
fields involved. EISIC 2015 will be held in Manchester, UK.

Research should be relevant to applications of counter-terrorism or
protection of local/national/international/global security in the
physical world and/or cyberspace.

Topics of interest include (but are not limited to) the following:

1. Forensic Intelligence
- Evidential reasoning
- Probabilistic reasoning
- Argumentation
- Forensic investigation
- Knowledge management

A broad range of disparate techniques to tackle evidential reasoning
and forensic investigation have emerged from a variety of fields,
including argumentation, probabilistic, narrative and knowledge
management based approaches to collect and assess evidence, and to
manage and coordinate investigations. This track aims to bring
together academic researchers and practitioners with interests in
evidential reasoning and forensic investigation from disparate fields
such as statistics, artificial intelligence, decision sciences,
forensic sciences and law, to present new developments in their
respective areas and encourage cross-fertilisation between often
disparate fields of research and practice.

2. Decisioning and Interaction
- Visualization
- Visual analytics systems
- Interactive decision support
- Analytical reasoning systems
- Multimedia information systems

The track will explore interactive technologies that assist in the
decision-making processes of security-related domains. This includes
visualization and visual analytics systems, interactive
decision support and analytical reasoning systems, and other forms of
multimedia information systems. A key component of this track is a
human-in-the-loop interaction technology where computational analyses
are complemented by human exploration and investigation.

3. Cyber and Infrastructure Security
- Cyber security
- Infrastructure security
- Intelligence
- Terrorism
- Computational models

The security track focuses on computational models of intelligence,
safety and security aspects of crime and terrorism in the context of
critical infrastructure and cyberspace. Papers making both theoretical
and practical aspects of these topics are welcome. Interdisciplinary
and applied papers, where existing computational methods are applied
or adapted to the solution of real-world problems in these domains are
particularly encouraged.

4. Financial and Fraud Analysis
- Adaptive systems
- Big data
- Insurance fraud
- Banking fraud
- Internet transactions

Financial fraud is a serious problem, damaging both international
economies and personal lives. The areas in which financial fraud can
occur are diverse, including retail finance, insurance, corporate
banking and internet transactions. A broad range of tactics are
employed by fraudsters to obtain illegal advantage. Moreover, the area
of fraud is an arms-race, with fraudsters constantly changing tactics
to circumvent protection systems. Thus, methodology that is capable of
automatically adapting to such changes is of special interest. Many
financial fraud applications have the character of "big data," in
which a very small signal must be extracted from very large and
complex data. This track will gather novel research contributions in
the area of financial fraud, with the intention of gaining insight
from diverse methodologies and application areas.

5. Computational Criminology
- Offender behavior and victimology
- Social network structures
- Organizational practices
- Crime prevention strategies
- Evaluations of crime prevention and intelligence led policing

This track will provide examinations of offender behavior,
victimology, and law enforcement practices utilizing statistical
analysis techniques and unique data sources. This includes tests of
various criminological theories, assessments of social network
structures, and organizational practices of terror groups,
cybercriminals, and gangs. Evaluations of crime prevention strategies,
intelligence led policing, and issues of public safety, privacy, and
security will also be a focus of this track.

6. Border Control
- Authentication
- Risk assessment of travelers
- Modelling of border control processes
- Surveillance and situational awareness
- Technology impact, acceptance and integration

This track solicits papers reporting research work relevant in the
context of addressing practical operational challenges encountered by
the border control community. Among others, topics of interest
include: (a) authentication of documents, people and vehicles, (b)
risk assessment of travelers, (c) modelling and optimization of the
border control processing chain, (d) border surveillance, (e)
platforms, protocols and techniques for secure exchange of information
and communication, (f) text/data mining, information fusion and
utilization of new sources of information for intelligence gathering
and situational awareness, and (g) border control technology impact,
acceptance and integration.

7. General Conference Track
Intelligence and Security Informatics papers that do not fit to the
above tracks can be submitted to the general conference
track. Subjects of interest include, but are not limited to:
- Social media analysis
- Surveillance and monitoring
- Alias and pseudonym resolution
- Deep web or darknet
- Sensor networks
- Telecommunication traffic analysis

Types of Submissions
Full papers, short papers and posters. Please refer to the website for
paper format.

Important Dates
- Paper submission due: May 31, 2015 (- DEADLINE EXTENDED
- Notification of acceptance: June 15, 2015
- Camera ready paper due: July 3, 2015
- Authors registration due: July 3, 2015
- Conference: September 7-9, 2015

Organizing Committee
Honorary General Chair
- Ross Anderson, University of Cambridge Computer Laboratory, UK

General Chairs
- Mohammad Hammoudeh, Manchester Metropolitan University, UK
- Liangxiu Han, Manchester Metropolitan University, UK

Program Chairs
- Joel Brynielsson, KTH Royal Institute of Technology, Sweden
- Moi Hoon Yap, Manchester Metropolitan University, UK

Please refer to http://www.eisic.org/organization.aspx for the full
list of members.

Program Committee
Please refer to http://www.eisic.org/committee.aspx for the full list
of members.


Related Resources

DISC 2018   Special Issue on Data Intelligence in Sustainable Computing, Journal of Sustainable Computing: Informatics and Systems
ACII 2018   Advanced Computational Intelligence: An International Journal
FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
AmI 2018   2018 European Conference on Ambient Intelligence
CIIISI 2018   IV Congreso Internacional de Ingeniería Informática y Sistemas de Información (CIIISI´18)
PST 2018   The Sixteen International Conference on Privacy, Security and Trust (PST)
ISIA 2018   Third International Symposium on Informatics and its Applications
ECTIJ 2018   Economics, Commerce and Trade Management: An International Journal
ICNS--Ei Compendex and Scopus 2018   2018 The 3rd International Conference on Network Security (ICNS 2018)--Ei Compendex and Scopus
IJRAP 2018   International Journal of Recent advances in Physics