posted by user: sdritsas || 8648 views || tracked by 11 users: [display]

EISIC 2012 : European Intelligence and Security Informatics Conference

FacebookTwitterLinkedInGoogle


Conference Series : European Intelligence and Security Informatics Conference
 
Link: http://www.eisic.eu/default.aspx
 
When Aug 22, 2012 - Aug 24, 2012
Where Odense, Denmark
Submission Deadline Apr 15, 2012
Notification Due May 30, 2012
Categories    intelligence   security
 

Call For Papers

The goal of EISIC 2012 is to gather people from previously disparate communities to provide a stimulating forum for exchange of ideas and results. We invite academic researchers (in information technologies, computer science, public policy, and social and behavioral studies), law enforcement and intelligence experts, as well as information technology companies, industry consultants and practitioners in the fields involved. EISIC 2012 will be held in Odense, Denmark.

Submissions may include systems, methodology, testbed, modeling, evaluation, policy, and position papers. Research should be relevant to informatics, organization, and/or public policy in applications of counter-terrorism or protection of local/ national/ international/ global security in the physical world and/or cyberspace. The accepted papers will be published by the IEEE Computer Society Press (approval pending) in formal Proceedings.

EISIC 2012 will be organized in five main streams focusing on:

Information Sharing and Data/Text Mining
Infrastructure Protection and Emergency Responses
Terrorism Informatics
Computational Criminology
Enterprise Risk Management and Information Systems Security

Topics include but are not limited to:

Information Sharing and Data/Text Mining
Intelligence-related knowledge discovery
Computer or cyber crime investigations and digital forensics
Criminal investigative criteria and standard of procedure on Computer crime
Criminal data mining and network analysis
Criminal/ intelligence information sharing and visualization
Web-based intelligence monitoring and analysis
Spatial-temporal data analysis/GIS for crime analysis and security informatics
Deception and intent detection
Cyber-crime detection and analysis
Authorship analysis and identification
Applications of digital library technologies in intelligence data processing, preservation, sharing, and analysis
Agents and collaborative systems for intelligence sharing
HCI and user interfaces of relevance to intelligence and security
Information sharing policy and governance
Privacy, security, and civil liberties issues
Intelligence-computerized community security and surveillance system

Infrastructure Protection and Emergency Responses
Cyber-infrastructure design and protection
Intrusion detection
Bio-terrorism tracking, alerting, and analysis
Bio-terrorism information infrastructure
Transportation and communication infrastructure protection
Border/transportation safety
Emergency response and management
Disaster prevention, detection, and management
Communication and decision support for search and rescue
Assisting citizens' responses to terrorism and catastrophic events
Computer forensics and crime lead discovery
Anti-fraud information technology

Terrorism Informatics
Terrorism related analytical methodologies and software tools
Terrorism knowledge portals and databases
Terrorist incident chronology databases
Terrorism root cause analysis
Social network analysis (radicalization, recruitment, conducting operations), visualization, and simulation
Forecasting terrorism
Countering terrorism
Measuring the impact of terrorism on society
Measuring the effectiveness of counter-terrorism campaigns
Crime intelligence and cyberspace crime investigation
Immigration and security

Computational Criminology
Crime pattern recognition and modeling tools
Offender social network analysis (infrequent to frequent offenders)
Crime generators and crime attractors
Forecasting crime and the impact of crime
Drug, gang and special crime analysis and modeling tools
Data mining and data fusion of crime - urban databases
Dynamic information systems analysis for crime and place
Privacy and security in crime and justice system data
Spatial and temporal analysis and software tools
Law Enforcement decision support systems
Cybercrime

Enterprise Risk Management and Information Systems Security
Information security management standards
Information systems security policies
Behavior issues in information systems security
Fraud detection
Cyber crime and social impacts
Corporate going concerns and risks
Accounting and IT auditing
Corporate governance and monitoring
Board activism and influence
Corporate sentiment surveillance
Market influence analytics and media intelligence
Consumer-generated media and social media analytics

Related Resources

IEEE BDAI 2025   IEEE--2025 the 8th International Conference on Big Data and Artificial Intelligence (BDAI 2025)
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
EMERGING 2025   The Seventeenth International Conference on Emerging Networks and Systems Intelligence
ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2
IEEE-Ei/Scopus-ITCC 2025   2025 5th International Conference on Information Technology and Cloud Computing (ITCC 2025)-EI Compendex
IJCSITY 2024   International Journal of Computational Science and Information Technology
IEEE-Ei/Scopus-CNIOT 2025   2025 IEEE 6th International Conference on Computing, Networks and Internet of Things (CNIOT 2025) -EI Compendex
CVAI 2026   2026 International Symposium on Computer Vision and Artificial Intelligence (CVAI 2026)
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2