posted by user: grupocole || 11090 views || tracked by 21 users: [display]

EISIC 2011 : European Intelligence and Security Informatics

FacebookTwitterLinkedInGoogle


Conference Series : European Intelligence and Security Informatics Conference
 
Link: http://www.eisic.eu
 
When Sep 12, 2011 - Sep 14, 2011
Where Athens, Greece
Submission Deadline Apr 11, 2011
Notification Due May 20, 2011
Final Version Due Jun 20, 2011
Categories    NLP   data mining   computational criminology
 

Call For Papers

European Intelligence & Security Informatics Conference (EISIC 2011)
Athens, Greece, September 12-14, 2011
http://www.eisic.org, http://www.eisic.eu

---------------------
Call for Papers
---------------------
Intelligence and Security Informatics (ISI) research is an interdisciplinary research field involving academic researchers in information technologies, computer science, public policy, bioinformatics, medical informatics, and social and behavior studies as well as local, state, and federal law enforcement and intelligence experts, and information technology industry consultants and practitioners to support counterterrorism and homeland security missions of anticipation, interdiction, prevention, preparedness and response to terrorist acts. The annual IEEE International ISI Conference series (http://www.isiconference.org) was started in 2003.

The goal of EISIC 2011 is to gather people from previously disparate communities to provide a stimulating forum for exchange of ideas and results. We invite academic researchers (in information technologies, computer science, public policy, and social and behavioral studies), law enforcement and intelligence experts, as well as information technology companies, industry consultants and practitioners in the fields involved. EISIC 2011 will be held in Athens, Greece.

Submissions may include systems, methodology, testbed, modeling, evaluation, policy, and position papers. Research should be relevant to informatics, organization, and/or public policy in applications of counter-terrorism or protection of local/ national/ international/ global security in the physical world and/or cyberspace. The accepted papers will be published by the IEEE Computer Society Press (approval pending) in formal Proceedings.
EISIC 2011 will be organized in four main streams focusing on:

- Terrorism Informatics
- Information Sharing and Data/Text Mining
- Computational Criminology
- Infrastructure Protection and Emergency Responses

Topics include but are not limited to:
1. Information Sharing and Data/Text Mining
- Intelligence-related knowledge discovery
- Computer or cyber crime investigations and digital forensics
- Criminal investigative criteria and standard of procedure on Computer crime
- Criminal data mining and network analysis
- Criminal/ intelligence information sharing and visualization
- Web-based intelligence monitoring and analysis
- Spatial-temporal data analysis/GIS for crime analysis and security informatics
- Deception and intent detection
- Cyber-crime detection and analysis
- Authorship analysis and identification
- Applications of digital library technologies in intelligence data processing, preservation, sharing, and analysis
- Agents and collaborative systems for intelligence sharing
- HCI and user interfaces of relevance to intelligence and security
- Information sharing policy and governance
- Privacy, security, and civil liberties issues
- Intelligence-computerized community security and surveillance system
2. Infrastructure Protection and Emergency Responses
- Cyber-infrastructure design and protection
- Intrusion detection
- Bio-terrorism tracking, alerting, and analysis
- Bio-terrorism information infrastructure
- Transportation and communication infrastructure protection
- Border/transportation safety
- Emergency response and management
- Disaster prevention, detection, and management
- Communication and decision support for search and rescue
- Assisting citizens' responses to terrorism and catastrophic events
- Computer forensics and crime lead discovery
- Anti-fraud information technology
3. Terrorism Informatics
- Terrorism related analytical methodologies and software tools
- Terrorism knowledge portals and databases
- Terrorist incident chronology databases
- Terrorism root cause analysis
- Social network analysis (radicalization, recruitment, conducting operations),
- visualization, and simulation
- Forecasting terrorism
- Countering terrorism
- Measuring the impact of terrorism on society
- Measuring the effectiveness of counter-terrorism campaigns
- Crime intelligence and cyberspace crime investigation
- Immigration and security
4. Computational Criminology
- Crime pattern recognition and modeling tools
- Offender social network analysis (infrequent to frequent offenders)
- Crime generators and crime attractors
- Forecasting crime and its impact
- Drug, gang and special crime analysis and modeling tools
- Data mining and data fusion of crime - urban databases
- Dynamic information systems analysis for crime and place
- Privacy and security in crime and justice system data
- Spatial and temporal analysis and software tools
- Law Enforcement decision support systems
- Cybercrime

--------------------------
Types of submissions
--------------------------
Full, Short Papers and Posters.

--------------------
Important Dates
--------------------
- April 11th, 2011 Paper Submission Due
- May 20th, 2011 Notification of Acceptance
- June 20th, 2011 Camera Ready Papers
- June 24th, 2011 Authors Registration Due
- September 12-14th, 2011 Conference

----------------------------
Organizing Committee
----------------------------
Honorary General Chairs
- Hsinchun Chen, University of Arizona
- George J. Hagerty, Hellenic American University

General Chairs
- Uffe Kock Wiil, University of Southern Denmark
- Panagiotis Karampelas, Hellenic American University
- Gerhard Wagner, Joint Research Center, European Commission

Program Chairs
- Nasrullah Memon, University of Southern Denmark
- Daniel Zeng, Chinese Academy of Sciences and University of Arizona

Please refer to http://www.eisic2011.org/organization.aspx for the full list of members

----------------------------
Program Committee
----------------------------
Please refer to http://www.eisic2011.org/committee.aspx for the full list of members.

Related Resources

IEEE-EI/Scopus-IECA 2025   2025 2nd International Conference on Informatics Education and Computer Technology Applications -IEEE Xplore/EI/Scopus
IEEE-Ei/Scopus-SGGEA 2024   2024 Asia Conference on Smart Grid, Green Energy and Applications (SGGEA 2024) -EI Compendex
IEEE BDAI 2025   IEEE--2025 the 8th International Conference on Big Data and Artificial Intelligence (BDAI 2025)
IEEE Big Data - MMAI 2024   IEEE Big Data 2024 Workshop on Multimodal AI
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
SPIE-Ei/Scopus-DMNLP 2025   2025 2nd International Conference on Data Mining and Natural Language Processing (DMNLP 2025)-EI Compendex&Scopus
Ei/Scopus-ACAI 2024   2024 7th International Conference on Algorithms, Computing and Artificial Intelligence(ACAI 2024)
USENIX Security 2025   The 34th USENIX Security Symposium - Cycle 2
ICSTTE 2025   2025 3rd International Conference on SmartRail, Traffic and Transportation Engineering (ICSTTE 2025)
CVAI 2026   2026 International Symposium on Computer Vision and Artificial Intelligence (CVAI 2026)