Información de la conferencia
EISIC 2015: European Intelligence and Security Informatics Conference
http://www.eisic.eu/
Día de Entrega:
2015-05-31 Extended
Fecha de Notificación:
2015-06-15
Fecha de Conferencia:
2015-09-07
Ubicación:
Manchester, UK
Años:
13
Vistas: 12835   Seguidores: 1   Asistentes: 0

Solicitud de Artículos
Intelligence and Security Informatics (ISI) research is an interdisciplinary research field involving academic researchers in information technologies, computer science, public policy, bioinformatics, medical informatics, and social and behavior studies, as well as local, state, and federal law enforcement and intelligence experts, information technology industry consultants and practitioners to support counterterrorism and homeland security missions of anticipation, interdiction, prevention, preparedness and response to terrorist acts. The annual IEEE International ISI Conference series (http://www.isiconference.org) w) was started in 2003.

We invite academic researchers in the field of Intelligence and Security Informatics and related areas (such as computer science, public policy, and social and behavioral studies) as well as companies, industry consultants, analysts and practitioners in the fields involved. EISIC 2015 will be held in Manchester, UK.

Research should be relevant to applications of counter-terrorism or protection of local/national/international/global security in the physical world and/or cyberspace.

Topics of interest include (but are not limited to) the following:

    Forensic Intelligence
        Evidential reasoning
        Probabilistic reasoning
        Argumentation
        Forensic investigation
        Knowledge management

    A broad range of disparate techniques to tackle evidential reasoning and forensic investigation have emerged from a variety of fields, including argumentation, probabilistic, narrative and knowledge management based approaches to collect and assess evidence, and to manage and coordinate investigations. This track aims to bring together academic researchers and practitioners with interests in evidential reasoning and forensic investigation from disparate fields such as statistics, artificial intelligence, decision sciences, forensic sciences and law, to present new developments in their respective areas and encourage cross-fertilisation between often disparate fields of research and practice.
    Decisioning and Interaction

    William Wong – VALCRI, Margit Pohl - VALCRI
        Visualization
        Visual analytics systems
        Interactive decision-support
        Analytical reasoning systems
        Multimedia information systems

    The track will explore interactive technologies that assist in the decision-making processes of security-related domains. This includes visualization and visual analytics systems, interactive decision-support and analytical reasoning systems, and other forms of multimedia information systems. A key component of this track is a human-in-the-loop interaction technology where computational analyses are complemented by human exploration and investigation.
    Cyber and Infrastructure Security
        Cyber security
        Infrastructure security
        Intelligence
        Terrorism
        Computational models

    The Security track focuses on computational models of intelligence, safety and security aspects of crime and terrorism in the context of critical infrastructure and cyberspace. Papers making both theoretical and practical aspects of these topics are welcome. Interdisciplinary and applied papers, where existing computational methods are applied or adapted to the solution of real-world problems in these domains are particularly encouraged.
    Financial and Fraud Analysis
        Adaptive systems
        Big data
        Insurance fraud
        Banking fraud
        Internet transactions

    Financial fraud is a serious problem, damaging both international economies and personal lives. The areas in which financial fraud can occur are diverse, including retail finance, insurance, corporate banking and internet transactions. A broad range of tactics are employed by fraudsters to obtain illegal advantage. Moreover, the area of fraud is an arms-race, with fraudsters constantly changing tactics to circumvent protection systems. Thus, methodology that is capable of automatically adapting to such changes is of special interest. Many financial fraud applications have the character of “big data”, in which a very small signal must be extracted from very large and complex data. This track will gather novel research contributions in the area of financial fraud, with the intention of gaining insight from diverse methodologies and application areas.
    Computational Criminology
        Offender behavior and victimology
        Social network structures
        Organizational practices
        Crime prevention strategies
        Evaluations of crime prevention and intelligence led policing

    This track will provide examinations of offender behavior, victimology, and law enforcement practices utilizing statistical analysis techniques and unique data sources. This includes tests of various criminological theories, assessments of social network structures, and organizational practices of terror groups, cybercriminals, and gangs. Evaluations of crime prevention strategies, intelligence led policing, and issues of public safety, privacy, and security will also be a focus of this track.
    Border Control
        Authentication
        Risk assessment of travelers
        Modelling of border control processes
        Surveillance and situational awareness
        Technology impact, acceptance and integration

    This track solicits papers reporting research work relevant in the context of addressing practical operational challenges encountered by the border control community. Among others, topics of interest include: (a) authentication of documents, people and vehicles, (b) risk assessment of travelers, (c) modelling and optimization of the border control processing chain, (d) border surveillance, (e) platforms, protocols and techniques for secure exchange of information and communication, (f) text/data mining, information fusion and utilization of new sources of information for intelligence gathering and situational awareness, and (g) border control technology impact, acceptance and integration.
    General Conference Track

    Intelligence and Security Informatics papers that do not fit to the above tracks can be submitted to the General Conference Track. Subjects of interest include, but are not limited to:
        Social media analysis
        Surveillance and monitoring
        Alias and pseudonym resolution
        Deep web or darknet
        Sensor networks
        Telecommunication traffic analysis

Paper submission:

Both long (8 pages max., roughly 8,000 words) and short (4 pages max., roughly 4,000 words) paper submissions should be written in English and be submitted electronically via the conference web site. Submission file formats are PDF and Microsoft Word using the IEEE two-column Word/LaTeX templates that can be found at the corresponding IEEE web site. Authors wishing to present a poster and/or demo may submit a 1‐page extended abstract, which, if accepted, will appear in the conference proceedings.
Última Actualización Por Dou Sun en 2015-05-23
Conferencias Relacionadas
CCFCOREQUALISAbreviaciónNombre CompletoEntregaNotificaciónConferencia
ISCSICInternational Symposium on Computer Science and Intelligent Controls2024-08-102024-08-302024-09-05
b1AICTAdvanced International Conference on Telecommunications2022-03-222022-04-192022-06-26
SALENTO AVRInternational Conference on Augmented Reality, Virtual Reality and Computer Graphics2019-02-152019-03-222019-06-24
WICTWorld Congress on Information and Communication Technologies2012-08-312012-09-202012-10-27
ICICNInternational Conference on Information and Computer Networks2014-12-302015-01-252015-03-19
NCCCNational Conference on Cognitive Computing2019-01-102019-02-102019-03-22
MSMEInternational Conference on Materials Science and Manufacturing Engineering2024-09-202024-10-202025-01-22
EDUITInternational Conference on Education & Information Technology2023-08-192023-08-222023-08-26
ICoIASInternational Conference on Intelligent Autonomous Systems2021-03-152021-04-102021-05-14
AITSInternational Conference on Advanced Information Technology and Sensor Application2015-06-302015-07-152015-08-17
Revistas Relacionadas
Recomendaciones