Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
European Intelligence & Security Informatics Conference The Premier European Conference on Counterterrorism and Criminology http://www.eisic.org Uppsala, Sweden, August 17–19, 2016 EISIC 2016 Call for Papers Intelligence and Security Informatics (ISI) is an interdisciplinary field of research that focuses on the development, use, and evaluation of advanced information technologies, including methodologies, models and algorithms, systems, and tools, for local, national, and international security related applications. Over the past decade, the ISI research community has matured and delivered an impressive array of research results that are both technically innovative and practically relevant. The 2016 European ISI Conference is the seventh ISI conference to be organized by the European ISI community. The conference was first held in 2008, and has been organized annually since 2011. EISIC ISI conferences provide stimulating forums for gathering people from previously disparate communities including those from academia, government, and industry. We invite academic researchers from the ISI community as well as related areas to contribute to EISIC 2016 which will be held in Uppsala, Sweden, in August 2016. Research should be relevant to protection of local/national/international security and safety, including applications focusing on counterterrorism, crisis management, disaster prevention, cybercrime, etc. Topics of interest include (but are not limited to) the following: 1. Information Sharing and Data/Text Mining Web-based intelligence monitoring and analysis Intelligence-related knowledge discovery Computer or cybercrime investigations and digital forensics Crime data mining and network analysis Crime/intelligence information sharing and visualization Cybercrime detection and analysis Authorship analysis and identification HCI and user interfaces of relevance to intelligence and security Privacy, security, and civil liberties issues Intelligence-computerized community security and surveillance systems Information operations 2. Infrastructure Protection & Emergency Response Cyber-infrastructure design and protection Intrusion detection Bio-terrorism tracking, alerting, and analysis Transportation and communication infrastructure protection Border/transportation safety Emergency response and management Disaster prevention, detection, and management Assisting citizens’ responses to terrorism and catastrophic events 3. Terrorism Informatics Terrorism related analytical methodologies and software tools Terrorism knowledge portals and databases Social network analysis (radicalization, recruitment, conducting operations) Lone wolf terrorism Countering terrorism General Chairs: Tove Gustavi FOI Swedish Defence Research Agency Sweden Lisa Kaati Uppsala University Sweden Program Chairs: Joel Brynielsson KTH Royal Institute of Technology Sweden Fredrik Johansson FOI Swedish Defence Research Agency Sweden Local Arrangement Chair: Amendra Shrestha Uppsala University Sweden 4. Computational Criminology Crime pattern recognition and modeling tools Crime generators and crime attractors Forecasting crime and its impact Drug, gang and special crime analysis and modeling tools Data mining and data fusion of crime urban databases Law enforcement decision support systems 5. Information Systems Security Information security management standards Information systems security policies Fraud detection Cybercrime and social impacts Corporate sentiment surveillance Market influence analytics and media intelligence Consumer-generated media and social media analytics Image analysis http://www.eisic.org 2016 Paper Submission Due April 15 Notification of Acceptance May 30 Camera Ready Paper Due/Authors Registration Due June 15 Conference August 17–19