posted by user: ngr9000 || 5793 views || tracked by 6 users: [display]

EISIC 2021 : 2021 European Intelligence and Security Informatics Conference

FacebookTwitterLinkedInGoogle


Conference Series : European Intelligence and Security Informatics Conference
 
Link: http://www.eisic.eu
 
When Jun 10, 2021 - Jun 11, 2021
Where Oslo, Norway
Submission Deadline Apr 25, 2021
Notification Due May 15, 2021
Final Version Due May 25, 2021
Categories    security   cyber security   cyber crime
 

Call For Papers

2021 European Intelligence and Security Informatics Conference (EISIC 2021)
The Premier European Conference on Counterterrorism and Criminology

June 10-11, 2021, University of Oslo, Norway

UPDATE: The conference will be organized as a digital conference.

The European Intelligence and Security Informatics Conference (EISIC) is Europe's premier conference on Intelligence and Security Informatics. We are thrilled to announce that EISIC 2021 will celebrate the 10th anniversary of this premier conference series.

EISIC presents the best of current Intelligence and Security Informatics research and practice, emphasizing the development, use, and evaluation of advanced information technologies, including methodologies, models and algorithms, systems, and tools, for local, national and international security-related applications. The conference promotes multi-disciplinary collaborations between researchers and developers from areas such as engineering, computer science, psychology, criminology, crime science, law, privacy and ethics, jointly with law enforcement, security and defence analysts and investigators to improve our capabilities for fighting crime and ensure the safety, security and trust of our citizens.

EISIC 2021 is interested in, but not limited to, the following topics:
1. Tools and Techniques for Analysing Crime Data
- Web-based intelligence monitoring, mining, and analysis
- Intelligence-related knowledge discovery
- Computer or cybercrime investigations and digital forensics
- Crime/intelligence information sharing and visualization
- Cybercrime detection and analysis
- Authorship analysis and identification
- Privacy, security, and civil liberties issues
- Information operations
2. Terrorism Informatics
- Terrorism related analytical methodologies and software tools
- Terrorism knowledge portals and databases
- Social network analysis (radicalization, recruitment, conducting operations)
- Lone wolf terrorism
- Countering terrorism
3. Organised Crime Analysis
- Organised crime analytical methods and tools
- Serious crime knowledge portals and databases
- Social network analysis
- Measuring organised crime
4. Financial and Fraud Analysis
- Adaptive systems
- Big data
- Insurance fraud
- Banking fraud
- Internet transactions
5. Serious Games and Security
- Virtual reality, augmented reality, mixed reality and extended reality (XR) applications to security
- Biofeedback
- Edutainment
6. Collective intelligence
- Crowdsourcing
- Citizen scientists
- Sociobiology
- Open source intelligence
7. Decisioning and Interaction
- Visualisation
- Visual analytics systems
- Interactive decision support
- Analytical reasoning systems
- Multimedia information systems
8. Smart and Safe City
- Internet of things, data lakes and big data analytics
- Resilience and security in IoT applications
- Privacy and integrity aspects related to IoT
- Detection, prevention, response and mitigation of cyber threats to IoT
- Threat models and IoT
- Privacy-preserving analytics
9. Infrastructure Protection and Emergency Response
- Cyber-infrastructure design and protection
- Intrusion detection
- Bio-terrorism tracking, alerting and analysis
- Transportation and communication infrastructure protection
- Border/transportation safety
- Emergency response and management
- Disaster prevention, detection and management
10. Computational Criminology
- Crime pattern recognition and modeling tools
- Crime generators and crime attractors
- Forecasting crime and its impact
- Drug, gang and special crime analysis and modeling tools
- Data mining and data fusion of crime urban databases
11. Border Control
- Authentication
- Risk assessment of travelers
- Modelling of border control processes
- Surveillance and situational awareness
- Technology impact, acceptance, and integration

Types of Submissions
- Regular papers (6–8 pages, roughly 8,000 words)
- Short papers describing work in progress (4 pages max., roughly 4,000 words)
- Posters (early ideas, late-breaking work, lab/centre reports, a 1-page extended abstract is submitted and included in the proceedings)

All submissions are to be written using the standard IEEE conference paper format adhering to the respective lengths as indicated above. They are to be written in American English and be submitted electronically via the conference web site. Submission file format is PDF using the IEEE two-column Word/LaTeX templates that can be found at the IEEE web site. Accepted papers will be published in the conference proceedings.

== Conference Organization ==
= Steering Chair =
- Joel Brynielsson,
KTH Royal Institute of Technology, Sweden
= General Chairs =
- Vasileios Mavroeidis,
University of Oslo, Norway
- Audun Jøsang,
University of Oslo, Norway
= Program Chairs =
- Nils Gruschka,
University of Oslo, Norway
- Joel Brynielsson,
KTH Royal Institute of Technology, Sweden
- Panos Kostakos,
University of Oulu, Finland
= Publication Chair =
- Panagiotis Karampelas,
Hellenic Air Force Academy, Greece
= Web Chair =
- Panagiotis Karampelas,
Hellenic Air Force Academy, Greece

Related Resources

IEEE COINS 2022   IEEE COINS 2022: Hybrid (3 days on-site | 2 days virtual)
IEEE COINS 2022   Internet of Things IoT | Artificial Intelligence | Machine Learning | Big Data | Blockchain | Edge & Cloud Computing | Security | Embedded Systems |
S&P 2022   IEEE Symposium on Security and Privacy (Third deadline)
EvoCompAISecurity&Privacy 2022   Evolutionary Computing for AI-Driven Security and Privacy: Advancing the state-of-the-art applications
ECCWS 2022   21st European Conference on Cyber Warfare and Security
CSW 2022   2022 International Workshop on Cyber Security (CSW 2022)
CEVVE 2022   2022 International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2022)
Sensors Special Issue 2022   Artificial Intelligence in Medical Sensors II
DLIS 2022   Deep Learning for IoT Security - Frontiers in Big Data Journal
Sensors 2022   Sustainable Computing based on Internet of Things Empowered with Artificial Intelligence and Blockchain