European Intelligence
and Security Informatics Conference (EISIC) 2018
June 26-29, 2018
Middlesex University, London, UK

The Premier European Conference on Counterterrorism and Criminology

Call for Papers


2018 European Intelligence and Security Informatics Conference (EISIC 2018)
The Premier European Conference on Counterterrorism and Criminology

June 26-29, 2018, Middlesex University, London, UK

The European Intelligence and Security Informatics Conference – EISIC – is Europe’s premier conference on intelligence and security informatics. EISIC 2018 will celebrate the 8th anniversary of this premier conference series.

EISIC is a multi-disciplinary conference where science and technology researchers and developers from areas such as engineering, computer science, psychology, human factors, criminology, crime science, law, privacy and ethics, join with law enforcement, security and defence analysts and investigators to advance our capabilities for fighting crime and ensuring the safety and security of our citizens.

EISIC 2018 will showcase the latest technologies to tackle such crimes as human trafficking, terrorism, online radicalisation, child sexual exploitation, money laundering, and the use of forged documents. Further, we will discuss why such crimes are becoming more difficult to address, and how criminal elements are using such technologies such the dark net and blockchain to perpetrate their crimes and cover their tracks. Such technologies present a significant challenges to law enforcement as crimes and their consequences span both the virtual and physical worlds. EISIC 2018 will report on and share potential solutions to these problems.

EISIC 2018 is interested in, but not limited to, the following topics:

  1. The Crime Phenomenon and Problems such as:
    • Cybercrime
    • Human trafficking
    • Child sex exploitation and abuse
    • Online child sexual coercion and extortion
    • Online radicalisation
    • Trade in fake documents and illegal substances
    • Money laundering
    • Illicit firearms trafficking
    • Mobile organised crime and gangs
  2. Tools and Techniques for Analysing Crime Data
    • Web-based intelligence monitoring, mining, and analysis
    • Computer support for cybercrime investigations and digital forensics
    • Visualization techniques for intelligence analysis and investigation
    • Cybercrime detection and analysis
    • Identity verification of suspects (using faces, fingerprints, tattoos etc.)
    • Authorship profiling and identification
    • Privacy, security, and civil liberties issues
    • Detection and analysis of information operations and disinformation
    • Data analytics for darknet marketplaces
    • Social network analysis for intelligence analysis and investigations
  3. Infrastructure Protection and Emergency Response
    • Cyber-infrastructure design and protection
    • Intrusion detection
    • Bio-terrorism tracking, alerting and analysis
    • Transportation and communication infrastructure protection
    • Border/transportation safety
    • Emergency response and management
    • Disaster prevention, detection and management
  4. Terrorism Informatics
    • Terrorism related analytical methodologies and software tools
    • Terrorism knowledge portals and databases
    • Social network analysis (radicalization, recruitment, conducting operations)
    • Lone wolf terrorism
    • Countering terrorism
  5. Data Science for Computational Criminology
    • Models for forecasting crime and measuring impact
    • Models for crime pattern recognition
    • Comprehensible/transparent models for crime analysis
    • Data representation and fusion
    • Methods for gang, volume, and special crime analysis
    • Handling class-imbalance and biased samples for crime analysis
    • Applications of intelligent decision support within law enforcement
  6. Decision Making and Interaction
    • Visualisation and visual analytics systems
    • Interactive and computational decision support
    • Analytical reasoning systems
    • Resilience in intelligence analysis
    • investigative and analytic decision making
    • Legal, privacy and ethical factors in intelligence analysis
    • Privacy, security, and civil liberties issues
    • Decision making
    • Expertise and intuition
    • Situational awareness
  7. Internet of Things and Security
    • Resilience and security in IoT applications
    • Privacy and integrity aspects related to IoT
    • Detection, prevention, response and mitigation of cyber threats to IoT
    • Threat models and IoT
  8. Border Control
    • Human authentication
    • Risk assessment of travellers
    • Modelling of border control processes
    • Surveillance and situational awareness
    • Technology impact, acceptance, and integration
  9. Training the Next Generation Intelligence and Security Professional
    • New methods and techniques for intelligence and security training
    • Challenges and complexities in future crime fighting and impact on intelligence and security analysis

Paper submission:

Papers and posters may be research-oriented, design-oriented or practice-oriented:

  • Full papers (6-8 pages)
  • Short papers describing work in progress (4 pages)
  • Posters – work in progress; late-breaking work; Lab / Centre reports

Other proposals for participation are:

  • Panels (2-4 pages) – inter- / multi-disciplinary debates on contemporary issues. Proposals should outline the topic of debate, and bios of speakers; panel format will be 90 minutes including, Q&A
  • Tutorials (2-4 pages) are skills training sessions, and can run for half day (0900 -1230 / 1330 – 1700h or full day (0900 – 1700h). Proposals should outline the topic of debate, and bios of instructors.
  • Workshops (2-4 pages) are intended for small groups to come together to discuss and outline new ideas or new approaches to problems. Multi-disciplinary workshops are encouraged. These may be half day (0900 -1230 / 1330 – 1700h or full day (0900 – 1700h). Proposals should outline the topic of debate, and the bios of organisers.
  • Doctoral Consortium (6 pages max.) – these are intended for doctoral students who are studying and investigating various aspects of intelligence analysis, investigation, crime science, criminology, etc. They should generally be in the early stages of their study, so that their work may still benefit from feedback and comments from the DC.
  • Industry Session (1 page, 250–500 words) – companies are invited to present their solutions in 15-20 minute presentations on products or services.
  • Exhibition - Industry and research organisations are invited to exhibit their products and services. A fee is charged for the rental of the exhibition booth. Contact sponsorship chair.
  • Sponsorship - we welcome sponsors to help support the conference. Sponsors may wish to support at one of a number of levels of sponsorship.

Student Volunteers are needed to support various conference tasks, e.g. bag stuffing, welcoming and reception desk, time-keeping during sessions, general support. Student volunteers will be managed by the SV Chair.

All submissions are to be in the IEEE conference paper format and of the respective lengths as indicated above. They are to be written in English and be submitted electronically via the conference web site. Submission file formats are PDF and Microsoft Word using the IEEE two-column Word/LaTeX templates that can be found at the IEEE web site. Accepted papers will be published in the Conference Proceedings.

Important Dates

  • Paper submission due: 1 March, 2018
  • Notification of acceptance: 15 April, 2018
  • Camera ready paper due: 1 May, 2018
  • Early-bird registration: before 1 May, 2018 *(discounted rate)*
    (at least one author should be registered for the conference by 1 May 2018)
  • Late registration: after 1 May, 2018
  • On-Site registration: 26-29 June, 2018
  • Conference: June 26-29, 2018

Download EISIC 2018 Call for Papers

The Call for Paper will be also available in Text format.