10th European Intelligence and Security Informatics Conference co-hosted by UBICOMP

The Centre for Ubiquitous Computing (UBICOMP) and the Center for Machine Vision and Signal Analysis (CMVS) will host the 10thEuropean Intelligence and Security Informatics Conference.

November 26-27, 2019, University of Oulu, Oulu, Finland

The European Intelligence and Security Informatics Conference (EISIC) is Europe’s premier conference on Intelligence and Security Informatics. We are thrilled to announce that the EISIC 2019 will celebrate the 10th anniversary of this premier conference series.

EISIC presents the best of current Intelligence and Security Informatics research and practice, emphasizing on the development, use, and evaluation of advanced information technologies, including methodologies, models and algorithms, systems, and tools, for local, national and international security related applications. The conference promotes multi-disciplinary collaborations between researchers and developers from areas such as engineering, computer science, psychology, criminology, crime science, law, privacy and ethics, join with law enforcement, security and defence analysts and investigators to improve our capabilities for fighting crime and ensure the safety, security and trust of our citizens.

We invite academic researchers from the ISI community as well as related areas to contribute to EISIC 2019 which will be held at the University of Oulu, Finland, in November 2019.

EISIC 2019 is interested in, but not limited to, the following topics:

  1. Tools and Techniques for Analysing Crime Data
    • Web-based intelligence monitoring, mining, and analysis
    • Intelligence-related knowledge discovery
    • Computer or cybercrime investigations and digital forensics
    • Crime/intelligence information sharing and visualization
    • Cybercrime detection and analysis
    • Authorship analysis and identification
    • Privacy, security, and civil liberties issues
    • Information operations
  2. Terrorism Informatics
    • Terrorism related analytical methodologies and software tools
    • Terrorism knowledge portals and databases
    • Social network analysis (radicalization, recruitment, conducting operations)
    • Lone wolf terrorism
    • Countering terrorism
  3. Organised Crime Analysis
    • Organised Crime analytical methods and tools
    • Serious Crime knowledge portals and databases
    • Social network analysis
    • Measuring organised crime
  4. Financial and Fraud Analysis
    • Adaptive systems
    • Big Data
    • Insurance fraud
    • Banking fraud
    • Internet transactions
  5. Serious Games and Security
    • Virtual reality, augmented reality, mixed reality and extended reality (XR) applications to security
    • Biofeedback
    • Edutainment
  6. Collective intelligence
    • Crowdsourcing
    • Citizen scientists
    • Sociobiology
    • Open source intelligence
  7. Decisioning and Interaction
    • Visualisation
    • Visual analytics systems
    • Interactive decision support
    • Analytical reasoning systems
    • Multimedia information systems
  8. Smart and Safe City
    • Internet of Things, Data Lakes and Bid Data analytics
    • Resilience and security in IoT applications
    • Privacy and integrity aspects related to IoT
    • Detection, prevention, response and mitigation of cyber threats to IoT
    • Threat models and IoT
    • Privacy preserving analytics
  9. Infrastructure Protection and Emergency Response
    • Cyber-infrastructure design and protection
    • Intrusion detection
    • Bio-terrorism tracking, alerting and analysis
    • Transportation and communication infrastructure protection
    • Border/transportation safety
    • Emergency response and management
    • Disaster prevention, detection and management
  10. Computational Criminology
    • Crime pattern recognition and modeling tools
    • Crime generators and crime attractors
    • Forecasting crime and its impact
    • Drug, gang and special crime analysis and modeling tools
    • Data mining and data fusion of crime urban databases
  11. Border Control
    • Authentication
    • Risk assessment of travellers
    • Modelling of border control processes
    • Surveillance and situational awareness
    • Technology impact, acceptance, and integration

Paper submission:

Papers and posters may be research-oriented, design-oriented or practice-oriented:

  • Full papers (6-8 pages max, roughly 8,000 words)
  • Short papers describing work in progress (4 pages max., roughly 4,000 words)
  • Posters – work in progress; late-breaking work; Lab / Centre reports

Other proposals for participation are:

  • Panels (2-4 pages) – inter- / multi-disciplinary debates on contemporary issues. Proposals should outline the topic of debate, and bios of speakers; panel format will be 90 minutes including, Q&A
  • Tutorials (2-4 pages) are skills training sessions, and can run for half day (0900 – 1230 / 1330 – 1700h or full day (0900 – 1700h). Proposals should outline the topic of debate, and bios of instructors.
  • Workshops (2-4 pages) are intended for small groups to come together to discuss and outline new ideas or new approaches to problems. Multi-disciplinary workshops are encouraged. These may be half day (0900 -1230 / 1330 – 1700h or full day (0900 – 1700h). Proposals should outline the topic of debate, and the bios of organisers.
    The workshops will take place the day before the conference on Monday 25th November.
  • Industry Session (1 page, 250-500 words) – companies are invited to present their solutions in 15-20 minute presentations on products or services.
  • Sponsorship – we welcome sponsors to help support the conference. Sponsors may wish to support at one of a number of levels of sponsorship.

All submissions are to be in the IEEE conference paper format and of the respective lengths as indicated above. They are to be written in English and be submitted electronically via the conference web site. Submission file formats are PDF and Microsoft Word using the IEEE two-column Word/LaTeX templates that can be found at the IEEE web site. Accepted papers will be published in the Conference Proceedings.

Important Dates

  • Tutorial & Workshop proposals: June 1, 2019
  • Notification (for Tutorial & Workshop): June 25, 2019
  • Paper submission (short and long): July 1, 2019
  • Notification of acceptance (short and long papers): September 15, 2019
  • Camera ready paper due: October 1, 2019
  • Registration: October 1, 2019
  • Conference: November 26-27, 2019

General Chairs

Program Chair

Local Arrangements Chair

Bookmark the permalink.

Comments are closed.