Download 2016 European Intelligence and Security Informatics

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts
no text concepts found
Transcript
European Intelligence & Security Informatics Conference
The Premier European Conference on Counterterrorism and Criminology
http://www.eisic.org
Uppsala, Sweden, August 17–19, 2016
EISIC 2016
Call for Papers
Intelligence and Security Informatics (ISI) is an interdisciplinary field of research that
focuses on the development, use, and evaluation of advanced information technologies,
including methodologies, models and algorithms, systems, and tools, for local, national,
and international security related applications. Over the past decade, the ISI research
community has matured and delivered an impressive array of research results that are
both technically innovative and practically relevant. The 2016 European ISI Conference is
the seventh ISI conference to be organized by the European ISI community. The
conference was first held in 2008, and has been organized annually since 2011.
EISIC
ISI conferences provide stimulating forums for gathering people from previously
disparate communities including those from academia, government, and industry. We
invite academic researchers from the ISI community as well as related areas to contribute
to EISIC 2016 which will be held in Uppsala, Sweden, in August 2016.
Research should be relevant to protection of local/national/international security and
safety, including applications focusing on counterterrorism, crisis management, disaster
prevention, cybercrime, etc.
Topics of interest include (but are not limited to) the following:
1. Information Sharing and Data/Text Mining
 Web-based intelligence monitoring and analysis
 Intelligence-related knowledge discovery
 Computer or cybercrime investigations and
digital forensics
 Crime data mining and network analysis
 Crime/intelligence information sharing and
visualization
 Cybercrime detection and analysis
 Authorship analysis and identification
 HCI and user interfaces of relevance to
intelligence and security
 Privacy, security, and civil liberties issues
 Intelligence-computerized community security
and surveillance systems
 Information operations
2. Infrastructure Protection & Emergency Response
 Cyber-infrastructure design and protection
 Intrusion detection
 Bio-terrorism tracking, alerting, and analysis
 Transportation and communication
infrastructure protection
 Border/transportation safety
 Emergency response and management
 Disaster prevention, detection, and management
 Assisting citizens’ responses to terrorism and
catastrophic events
3. Terrorism Informatics
 Terrorism related analytical methodologies and
software tools
 Terrorism knowledge portals and databases
 Social network analysis (radicalization,
recruitment, conducting operations)
 Lone wolf terrorism
 Countering terrorism
General Chairs:
Tove Gustavi
FOI Swedish Defence Research Agency
Sweden
Lisa Kaati
Uppsala University
Sweden
Program Chairs:
Joel Brynielsson
KTH Royal Institute of Technology
Sweden
Fredrik Johansson
FOI Swedish Defence Research Agency
Sweden
Local Arrangement Chair:
Amendra Shrestha
Uppsala University
Sweden
4. Computational Criminology
 Crime pattern recognition and modeling tools
 Crime generators and crime attractors
 Forecasting crime and its impact
 Drug, gang and special crime analysis and
modeling tools
 Data mining and data fusion of crime urban
databases
 Law enforcement decision support systems
5. Information Systems Security
 Information security management standards
 Information systems security policies
 Fraud detection
 Cybercrime and social impacts
 Corporate sentiment surveillance
 Market influence analytics and media intelligence
 Consumer-generated media and social media
analytics
 Image analysis
http://www.eisic.org
2016
Paper Submission Due
April 15
Notification of Acceptance
May 30
Camera Ready Paper Due/Authors Registration Due
June 15
Conference
August 17–19