posted by user: xpontus || 9079 views || tracked by 18 users: [display]

EISIC 2013 : European Intelligence & Security Informatics Conference

FacebookTwitterLinkedInGoogle


Conference Series : European Intelligence and Security Informatics Conference
 
Link: http://www.eisic.org/
 
When Aug 12, 2013 - Aug 14, 2013
Where Uppsala, Sweden
Submission Deadline May 10, 2013
Notification Due May 30, 2013
Final Version Due Jun 15, 2013
Categories    security   data mining   text mining   cyber security
 

Call For Papers

*** One more week for submitting your results to EISIC 2013. ***

Due to numerous requests the submission deadline for EISIC 2013 has
been extended to May 1, 2013.

European Intelligence & Security Informatics Conference (EISIC 2013)
The Premier European Conference on Counterterrorism and Criminology
Uppsala, Sweden, August 12-14, 2013
http://www.eisic.org/

----------------------------
Call for Papers
----------------------------
Intelligence and Security Informatics (ISI) research is an
interdisciplinary research field involving academic researchers in
information technologies, computer science, public policy,
bioinformatics, medical informatics, and social and behavior studies,
as well as local, state, and federal law enforcement and intelligence
experts, information technology industry consultants and practitioners
to support counterterrorism and homeland security missions of
anticipation, interdiction, prevention, preparedness and response to
terrorist acts. The annual IEEE International ISI Conference series
was started in 2003.

We invite academic researchers in the field of Intelligence and
Security Informatics and related areas (such as computer science,
public policy, and social and behavioral studies) as well as
companies, industry consultants, analysts and practitioners in the
fields involved. EISIC 2013 will be held in Uppsala, Sweden.

Research should be relevant to applications of counter-terrorism or
protection of local/national/international/global security in the
physical world and/or cyberspace.

Topics of interest include (but are not limited to) the following:

1. Information Sharing and Data/Text Mining
- Web-based intelligence monitoring and analysis
- Intelligence-related knowledge discovery
- Computer or cyber crime investigations and digital forensics
- Crime data mining and network analysis
- Crime/intelligence information sharing and visualization
- Cyber-crime detection and analysis
- Authorship analysis and identification
- HCI and user interfaces of relevance to intelligence and
security
- Privacy, security, and civil liberties issues
- Intelligence-computerized community security and surveillance
systems
- Information operations

2. Infrastructure Protection & Emergency Response
- Cyber-infrastructure design and protection
- Intrusion detection
- Bio-terrorism tracking, alerting, and analysis
- Transportation and communication infrastructure protection
- Border/transportation safety
- Emergency response and management
- Disaster prevention, detection, and management
- Assisting citizens' responses to terrorism and catastrophic
events

3. Terrorism Informatics
- Terrorism related analytical methodologies and software tools
- Terrorism knowledge portals and databases
- Social network analysis (radicalization, recruitment, conducting
operations)
- Lone wolf terrorism
- Countering terrorism

4. Computational Criminology
- Crime pattern recognition and modeling tools
- Crime generators and crime attractors
- Forecasting crime and its impact
- Drug, gang and special crime analysis and modeling tools
- Data mining and data fusion of crime urban databases
- Law enforcement decision support systems

5. Information Systems Security
- Information security management standards
- Information systems security policies
- Fraud detection
- Cyber crime and social impacts
- Corporate sentiment surveillance
- Market influence analytics and media intelligence
- Consumer-generated media and social media analytics
- Image analysis

----------------------------
Types of Submissions
----------------------------
Full papers, short papers and posters.

----------------------------
Important Dates
----------------------------
- Paper submission due: May 1, 2013 (- DEADLINE EXTENDED
- Notification of acceptance: May 30, 2013
- Camera ready paper due: June 15, 2013
- Authors registration due: June 15, 2013
- Conference: August 12-14, 2013

----------------------------
Organizing Committee
----------------------------
Honorary General Chair
- Bo Wennström, Center for Police Research, Uppsala University, Sweden

General Chairs
- Lisa Kaati, Uppsala University, Sweden
- Pontus Svenson, FOI Swedish Defence Research Agency, Sweden

Program Chairs
- Joel Brynielsson, KTH Royal Institute of Technology, Sweden
- Fredrik Johansson, FOI Swedish Defence Research Agency, Sweden

Please refer to http://www.eisic.org/organization.aspx for the full
list of members.

----------------------------
Program Committee
----------------------------
Please refer to http://www.eisic.org/committee.aspx for the full list
of members.

Related Resources

IEEE-EI/Scopus-IECA 2025   2025 2nd International Conference on Informatics Education and Computer Technology Applications -IEEE Xplore/EI/Scopus
IEEE-Ei/Scopus-SGGEA 2024   2024 Asia Conference on Smart Grid, Green Energy and Applications (SGGEA 2024) -EI Compendex
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
ACDL 2025   8th Advanced Course on Data Science & Machine Learning
IEEE BDAI 2025   IEEE--2025 the 8th International Conference on Big Data and Artificial Intelligence (BDAI 2025)
SPIE-Ei/Scopus-DMNLP 2025   2025 2nd International Conference on Data Mining and Natural Language Processing (DMNLP 2025)-EI Compendex&Scopus
Ei/Scopus-ACAI 2024   2024 7th International Conference on Algorithms, Computing and Artificial Intelligence(ACAI 2024)
BDHI 2025   6th International Conference on Big Data & Health Informatics
BIBC 2024   5th International Conference on Big Data, IOT and Blockchain
USENIX Security 2025   The 34th USENIX Security Symposium - Cycle 2