10th European Intelligence and Security Informatics Conference (EISIC)
November 26-27, 2019, University of Oulu, Finland

http://www.eisic.eu/

The European Intelligence and Security Informatics Conference (EISIC) is 
Europe's premier conference on Intelligence and Security Informatics. We are 
thrilled to announce that the EISIC 2019 will celebrate the 10th anniversary of 
this premier conference series.

EISIC presents the best of current Intelligence and Security Informatics 
research and practice, emphasizing on the development, use, and evaluation of 
advanced information technologies, including methodologies, models and 
algorithms, systems, and tools, for local, national and international security 
related applications. The conference promotes multi-disciplinary collaborations 
between researchers and developers from areas such as engineering, computer 
science, psychology, criminology, crime science, law, privacy and ethics, join 
with law enforcement, security and defence analysts and investigators to 
improve our capabilities for fighting crime and ensure the safety, security and 
trust of our citizens.

We invite academic researchers from the ISI community as well as related areas 
to contribute to EISIC 2019 which will be held at the University of Oulu, 
Finland, in November 2019.

Important Dates

  *   Tutorial & Workshop proposals: June 1, 2019
  *   Paper submission (short and long): July 1, 2019
  *   Notification of acceptance (short and long papers): September 15, 2019
  *   Camera ready paper due: October 1, 2019
  *   Registration: October 1, 2019
  *   Conference: November 26-27, 2019

EISIC 2019 is interested in, but not limited to, the following topics:

  1.  Smart and Safe City
     *   Internet of Things, Data Lakes and Bid Data analytics
     *   Resilience and security in IoT applications
     *   Privacy and integrity aspects related to IoT
     *   Detection, prevention, response and mitigation of cyber threats to IoT
     *   Threat models and IoT
     *   Privacy preserving analytics
  2.  Infrastructure Protection and Emergency Response
     *   Cyber-infrastructure design and protection
     *   Intrusion detection
     *   Bio-terrorism tracking, alerting and analysis
     *   Transportation and communication infrastructure protection
     *   Border/transportation safety
     *   Emergency response and management
     *   Disaster prevention, detection and management
  3.  Serious Games and Security
     *   Virtual reality, augmented reality, mixed reality and extended reality 
(XR) applications to security
     *   Biofeedback
     *   Edutainment
  4.  Collective intelligence
     *   Crowdsourcing
     *   Citizen scientists
     *   Sociobiology
     *   Open source intelligence
  5.  Decisioning and Interaction
     *   Visualisation
     *   Visual analytics systems
     *   Interactive decision support
     *   Analytical reasoning systems
     *   Multimedia information systems
  6.  Computational Criminology
     *   Crime pattern recognition and modeling tools
     *   Crime generators and crime attractors
     *   Forecasting crime and its impact
     *   Drug, gang and special crime analysis and modeling tools
     *   Data mining and data fusion of crime urban databases
  7.  Border Control
     *   Authentication
     *   Risk assessment of travellers
     *   Modelling of border control processes
     *   Surveillance and situational awareness
     *   Technology impact, acceptance, and integration
  8.  Tools and Techniques for Analysing Crime Data
     *   Web-based intelligence monitoring, mining, and analysis
     *   Intelligence-related knowledge discovery
     *   Computer or cybercrime investigations and digital forensics
     *   Crime/intelligence information sharing and visualization
     *   Cybercrime detection and analysis
     *   Authorship analysis and identification
     *   Privacy, security, and civil liberties issues
     *   Information operations
  9.  Terrorism Informatics
     *   Terrorism related analytical methodologies and software tools
     *   Terrorism knowledge portals and databases
     *   Social network analysis (radicalization, recruitment, conducting 
operations)
     *   Lone wolf terrorism
     *   Countering terrorism
  10. Organised Crime Analysis
     *   Organised Crime analytical methods and tools
     *   Serious Crime knowledge portals and databases
     *   Social network analysis
     *   Measuring organised crime
  11. Financial and Fraud Analysis
     *   Adaptive systems
     *   Big Data
     *   Insurance fraud
     *   Banking fraud
     *   Internet transactions

Paper submission:

Papers and posters may be research-oriented, design-oriented or 
practice-oriented:

  *   Full papers (6-8 pages max, roughly 8,000 words)
  *   Short papers describing work in progress (4 pages max., roughly 4,000 
words)
  *   Posters - work in progress; late-breaking work; Lab / Centre reports

Other proposals for participation are:

  *   Panels (2-4 pages) - inter- / multi-disciplinary debates on contemporary 
issues. Proposals should outline the topic of debate, and bios of speakers; 
panel format will be 90 minutes including, Q&A
  *   Tutorials (2-4 pages) are skills training sessions, and can run for half 
day (0900 - 1230 / 1330 - 1700h or full day (0900 - 1700h). Proposals should 
outline the topic of debate, and bios of instructors.
  *   Workshops (2-4 pages) are intended for small groups to come together to 
discuss and outline new ideas or new approaches to problems. Multi-disciplinary 
workshops are encouraged. These may be half day (0900 -1230 / 1330 - 1700h or 
full day (0900 - 1700h). Proposals should outline the topic of debate, and the 
bios of organisers.
  *   The workshops will take place the day before the conference on Monday 
25th November.
  *   Industry Session (1 page, 250-500 words) - companies are invited to 
present their solutions in 15-20 minute presentations on products or services.
  *   Sponsorship - we welcome sponsors to help support the conference. 
Sponsors may wish to support at one of a number of levels of sponsorship.

All submissions are to be in the IEEE conference paper format and of the 
respective lengths as indicated above. They are to be written in English and be 
submitted electronically via the conference web site. Submission file formats 
are PDF and Microsoft Word using the IEEE two-column Word/LaTeX templates that 
can be found at the IEEE web 
site<https://www.ieee.org/conferences/publishing/templates.html>  Accepted 
papers will be published in the Conference Proceedings.

=========================================================
_______________________________________________
uai mailing list
uai@ENGR.ORST.EDU
https://secure.engr.oregonstate.edu/mailman/listinfo/uai

Reply via email to