EISIC: European Intelligence and Security Informatics Conference



Past:   Proceedings on DBLP

Future:  Post a CFP for 2019 or later   |   Invite the Organizers Email


All CFPs on WikiCFP

Event When Where Deadline
EISIC 2018 European Intelligence and Security Informatics Conference (EISIC) 2018
Oct 23, 2018 - Oct 25, 2018 Sweden TBD
EISIC 2015 2015 European Intelligence and Security Informatics Conference ( Technically sponsored by IEEE)
Sep 7, 2015 - Sep 9, 2015 Manchester May 31, 2015
EISIC 2013 European Intelligence & Security Informatics Conference
Aug 12, 2013 - Aug 14, 2013 Uppsala, Sweden May 10, 2013
EISIC 2012 European Intelligence and Security Informatics Conference
Aug 22, 2012 - Aug 24, 2012 Odense, Denmark Apr 15, 2012
EISIC 2011 European Intelligence and Security Informatics
Sep 12, 2011 - Sep 14, 2011 Athens, Greece Apr 11, 2011

Present CFP : 2018

2018 European Intelligence and Security Informatics Conference (EISIC 2018)
The Premier European Conference on Counterterrorism and Criminology
October 23-25, 2018, Blekinge Institute of Technology, Karlskrona, Sweden
The European Intelligence and Security Informatics Conference – EISIC – is Europe’s premier conference on intelligence and security informatics. EISIC 2018 will celebrate the 8th anniversary of this premier conference series.

EISIC is a multi-disciplinary conference where science and technology researchers and developers from areas such as engineering, computer science, psychology, human factors, criminology, crime science, law, privacy and ethics, join with law enforcement, security and defence analysts and investigators to advance our capabilities for fighting crime and ensuring the safety and security of our citizens.

EISIC 2018 will showcase the latest technologies to tackle such crimes as human trafficking, terrorism, online radicalisation, child sexual exploitation, money laundering, and the use of forged documents. Further, we will discuss why such crimes are becoming more difficult to address, and how criminal elements are using such technologies such the dark net and blockchain to perpetrate their crimes and cover their tracks. Such technologies present a significant challenges to law enforcement as crimes and their consequences span both the virtual and physical worlds. EISIC 2018 will report on and share potential solutions to these problems.

EISIC 2018 is interested in, but not limited to, the following topics:

The Crime Phenomenon and Problems such as:
Human trafficking
Child sex exploitation and abuse
Online child sexual coercion and extortion
Online radicalisation
Trade in fake documents and illegal substances
Money laundering
Illicit firearms trafficking
Mobile organised crime and gangs
Tools and Techniques for Analysing Crime Data
Web-based intelligence monitoring, mining, and analysis
Computer support for cybercrime investigations and digital forensics
Visualization techniques for intelligence analysis and investigation
Cybercrime detection and analysis
Identity verification of suspects (using faces, fingerprints, tattoos etc.)
Authorship profiling and identification
Privacy, security, and civil liberties issues
Detection and analysis of information operations and disinformation
Data analytics for darknet marketplaces
Social network analysis for intelligence analysis and investigations
Infrastructure Protection and Emergency Response
Cyber-infrastructure design and protection
Intrusion detection
Bio-terrorism tracking, alerting and analysis
Transportation and communication infrastructure protection
Border/transportation safety
Emergency response and management
Disaster prevention, detection and management
Terrorism Informatics
Terrorism related analytical methodologies and software tools
Terrorism knowledge portals and databases
Social network analysis (radicalization, recruitment, conducting operations)
Lone wolf terrorism
Countering terrorism
Data Science for Computational Criminology
Models for forecasting crime and measuring impact
Models for crime pattern recognition
Comprehensible/transparent models for crime analysis
Data representation and fusion
Methods for gang, volume, and special crime analysis
Handling class-imbalance and biased samples for crime analysis
Applications of intelligent decision support within law enforcement
Decision Making and Interaction
Visualisation and visual analytics systems
Interactive and computational decision support
Analytical reasoning systems
Resilience in intelligence analysis
investigative and analytic decision making
Legal, privacy and ethical factors in intelligence analysis
Privacy, security, and civil liberties issues
Decision making
Expertise and intuition
Situational awareness
Internet of Things and Security
Resilience and security in IoT applications
Privacy and integrity aspects related to IoT
Detection, prevention, response and mitigation of cyber threats to IoT
Threat models and IoT
Border Control
Human authentication
Risk assessment of travellers
Modelling of border control processes
Surveillance and situational awareness
Technology impact, acceptance, and integration
Training the Next Generation Intelligence and Security Professional
New methods and techniques for intelligence and security training
Challenges and complexities in future crime fighting and impact on intelligence and security analysis
Paper submission:
Papers and posters may be research-oriented, design-oriented or practice-oriented:

Full papers (6-8 pages)
Short papers describing work in progress (4 pages)
Posters – work in progress; late-breaking work; Lab / Centre reports
Other proposals for participation are:

Panels (2-4 pages) – inter- / multi-disciplinary debates on contemporary issues. Proposals should outline the topic of debate, and bios of speakers; panel format will be 90 minutes including, Q&A
Tutorials (2-4 pages) are skills training sessions, and can run for half day (0900 -1230 / 1330 – 1700h or full day (0900 – 1700h). Proposals should outline the topic of debate, and bios of instructors.
Workshops (2-4 pages) are intended for small groups to come together to discuss and outline new ideas or new approaches to problems. Multi-disciplinary workshops are encouraged. These may be half day (0900 -1230 / 1330 – 1700h or full day (0900 – 1700h). Proposals should outline the topic of debate, and the bios of organisers.
Doctoral Consortium (6 pages max.) – these are intended for doctoral students who are studying and investigating various aspects of intelligence analysis, investigation, crime science, criminology, etc. They should generally be in the early stages of their study, so that their work may still benefit from feedback and comments from the DC.
Industry Session (1 page, 250–500 words) – companies are invited to present their solutions in 15-20 minute presentations on products or services.
Exhibition - Industry and research organisations are invited to exhibit their products and services. A fee is charged for the rental of the exhibition booth. Contact sponsorship chair.
Sponsorship - we welcome sponsors to help support the conference. Sponsors may wish to support at one of a number of levels of sponsorship.
Student Volunteers are needed to support various conference tasks, e.g. bag stuffing, welcoming and reception desk, time-keeping during sessions, general support. Student volunteers will be managed by the SV Chair.

All submissions are to be in the IEEE conference paper format and of the respective lengths as indicated above. They are to be written in English and be submitted electronically via the conference web site. Submission file formats are PDF and Microsoft Word using the IEEE two-column Word/LaTeX templates that can be found at the IEEE web site. Accepted papers will be published in the Conference Proceedings.

Important Dates
Paper submission due: TBA
Notification of acceptance: TBA
Camera ready paper due: TBA
Registration: TBA
Conference: October 23-25, 2018
Download EISIC 2018 Call for Papers
The Call for Paper will be also available in Text format.

Related Resources

ETRIJ Cyber Security & AI 2019   ETRI Journal Special issue on Cyber Security and AI
Special Issue MDPI Applied Sciences 2019   Special Issue on Intelligent Health Services Based on Biomedical Smart Sensors
ACISP 2019   The 24th Australasian Conference on Information Security and Privacy
SISY 2019   IEEE 17th International Symposium on Intelligent Systems and Informatics
SSCI 2019   The 2019 IEEE Symposium Series on Computational Intelligence
ACNS 2019   International Conference on Applied Cryptography and Network Security
IJCSA 2018   International Journal on Computational Science & Applications
CCSEIT 2019   9th International Conference on Computer Science, Engineering and Information Technology
EJEMS - 1 2019   The European Journal of Economics and Management Sciences
DBSEC 2019   33rd Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy