Connectionists: Deadline extended: 2017 European Intelligence & Security Informatics Conference (EISIC 2017)

Joel Brynielsson joel at kth.se
Mon Jun 12 16:06:14 EDT 2017


[Apologies for multiple postings.]

*** Submission deadline extended to June 25, 2017. ***

European Intelligence & Security Informatics Conference (EISIC 2017)
The Premier European Conference on Counterterrorism and Criminology
Dekelia Air Base, Attica, Greece, September 11-13, 2017
http://www.eisic.org/

----------------------------
  Call for Papers
----------------------------
Intelligence and Security Informatics (ISI) is an interdisciplinary
field of research that focuses on the development, use, and evaluation
of advanced information technologies, including methodologies, models
and algorithms, systems, and tools, for local, national, and
international security related applications. Over the past decade, the
ISI research community has matured and delivered an impressive array
of research results that are both technically innovative and
practically relevant. The 2017 European ISI Conference is the eighth
ISI conference to be organized by the European ISI community. The
conference was first held in 2008, and has been organized annually
since 2011.

ISI conferences provide stimulating forums for gathering people from
previously disparate communities including those from academia,
government, and industry. We invite academic researchers from the ISI
community as well as related areas to contribute to EISIC 2017 which
will be held in Athens, Greece, in September 2017.

Research should be relevant to protection of
local/national/international security and safety, including
applications focusing on counterterrorism, crisis management, disaster
prevention, cybercrime, etc.

Topics of interest include (but are not limited to) the following:

1. Tools and Techniques for Analyzing Data
     - Web-based intelligence monitoring, mining, and analysis
     - Computer support for cybercrime investigations and digital
       forensics
     - Visualization techniques for intelligence analysis and
       investigation
     - Cybercrime detection and analysis
     - Authorship profiling and identification
     - Privacy, security, and civil liberties issues
     - Detection and analysis of information operations and
       disinformation
     - Data analytics for darknet marketplaces
     - Social network analysis for intelligence analysis and
       investigations

2. Infrastructure Protection and Emergency Response
     - Cyber-infrastructure design and protection
     - Intrusion detection
     - Bio-terrorism tracking, alerting, and analysis
     - Transportation and communication infrastructure protection
     - Border/transportation safety
     - Emergency response and management
     - Disaster prevention, detection, and management

3. Terrorism Informatics
     - Terrorism related analytical methodologies and software tools
     - Terrorism knowledge portals and databases
     - Social network analysis (radicalization, recruitment, conducting
       operations)
     - Lone wolf terrorism
     - Countering terrorism

4. Data Science for Computational Criminology
     - Models for forecasting crime and measuring impact
     - Models for crime pattern recognition
     - Comprehensible/transparent models for crime analysis
     - Data representation and fusion
     - Methods for gang, volume, and special crime analysis
     - Handling class-imbalance and biased samples for crime analysis
     - Applications of intelligent decision support within law
       enforcement

5. Decisioning and Interaction
     - Visualization and visual analytics systems
     - Interactive and computational decision support
     - Analytical reasoning systems
     - Resilience in intelligence analysis
     - Investigative and analytic decision-making
     - Legal, privacy, and ethical factors in intelligence analysis

6. Internet of Things and Security
     - Resilience and security in IoT applications
     - Privacy and integrity aspects related to IoT
     - Detection, prevention, response and mitigation of cyber threats
       to IoT
     - Threat models and IoT

7. Border Control
     - Authentication
     - Risk assessment of travelers
     - Modeling of border control processes
     - Surveillance and situational awareness
     - Technology impact, acceptance, and integration

----------------------------
  Types of Submissions
----------------------------
Regular papers, short papers, and posters.

----------------------------
  Important Dates
----------------------------
- Paper submission due: June 25, 2017 <- DEADLINE EXTENDED
- Notification of acceptance: July 15, 2017
- Camera ready paper due: July 31, 2017
- Authors' registration due: July 31, 2017
- Conference: September 11-13, 2017

----------------------------
  Organization
----------------------------
Honorary General Chair
- Petros Kotsiopoulos, Hellenic Air Force Academy, Greece

General Chair
- Panagiotis Karampelas, Hellenic Air Force Academy, Greece

Program Chair
- Joel Brynielsson, KTH Royal Institute of Technology, Sweden

Track Chairs
- Martin Boldt, Blekinge Institute of Technology, Sweden
- Anton Borg, Blekinge Institute of Technology, Sweden
- Lisa Kaati, Uppsala University, Sweden
- Neesha Kodagoda, Middlesex University, UK
- Margit Pohl, TU Wien, Austria
- B. L. William Wong, Middlesex University, UK

Publicity Chair
- Thirimachos Bourlai, West Virginia University, USA

Publication Chair
- Christos Pavlatos, Hellenic Air Force Academy, Greece

Local Arrangement Chair
- Ioanna Lekea, Hellenic Air Force Academy, Greece

----------------------------
  Program Committee
----------------------------
Please refer to http://www.eisic.org/committee.aspx for the full list
of members.


More information about the Connectionists mailing list