European Intelligence
and Security Informatics Conference (EISIC) 2017
September 11-13, 2017
Dekelia Air Base, Attica, Greece

The Premier European Conference on Counterterrorism and Criminology

Call for Papers

2017 European Intelligence and Security Informatics Conference (EISIC 2017)
The Premier European Conference on Counterterrorism and Criminology

September 11-13, 2017, Dekelia Air Base, Greece

Intelligence and Security Informatics (ISI) is an interdisciplinary field of research that focuses on the development, use, and evaluation of advanced information technologies, including methodologies, models and algorithms, systems, and tools, for local, national, and international security related applications. Over the past decade, the ISI research community has matured and delivered an impressive array of research results that are both technically innovative and practically relevant. The 2017 European ISI Conference is the eighth ISI conference to be organized by the European ISI community. The conference was first held in 2008, and has been organized annually since 2011.

ISI conferences provide stimulating forums for gathering people from previously disparate communities including those from academia, government, and industry. We invite academic researchers from the ISI community as well as related areas to contribute to EISIC 2017 which will be held in Athens, Greece, in September 2017.

Research should be relevant to protection of local/national/international security and safety, including applications focusing on counterterrorism, crisis management, disaster prevention, cybercrime, etc.

Topics of interest include (but are not limited to) the following:

  1. Tools and Techniques for Analyzing Data
    • Web-based intelligence monitoring, mining, and analysis
    • Computer support for cybercrime investigations and digital forensics
    • Visualization techniques for intelligence analysis and investigation
    • Cybercrime detection and analysis
    • Authorship profiling and identification
    • Privacy, security, and civil liberties issues
    • Detection and analysis of information operations and disinformation
    • Data analytics for darknet marketplaces
    • Social network analysis for intelligence analysis and investigations
  2. Infrastructure Protection & Emergency Response
    • Cyber-infrastructure design and protection
    • Intrusion detection
    • Bio-terrorism tracking, alerting, and analysis
    • Transportation and communication infrastructure protection
    • Border/transportation safety
    • Emergency response and management
    • Disaster prevention, detection, and management
  3. Terrorism Informatics
    • Terrorism related analytical methodologies and software tools
    • Terrorism knowledge portals and databases
    • Social network analysis (radicalization, recruitment, conducting operations)
    • Lone wolf terrorism
    • Countering terrorism
  4. Data Science for Computational Criminology
    • Models for forecasting crime and measuring impact
    • Models for crime pattern recognition
    • Comprehensible/transparent models for crime analysis
    • Data representation and fusion
    • Methods for gang, volume, and special crime analysis
    • Handling class-imbalance and biased samples for crime analysis
    • Applications of intelligent decision support within law enforcement
  5. Decisioning and Interaction
    • Visualisation and visual analytics systems
    • Interactive and computational decision support
    • Analytical reasoning systems
    • Resilience in intelligence analysis
    • investigative and analytic decision making
    • Legal, privacy and ethical factors in intelligence analysis
  6. Internet of Things and Security
    • Resilience and security in IoT applications
    • Privacy and integrity aspects related to IoT
    • Detection, prevention, response and mitigation of cyber threats to IoT
    • Threat models and IoT
  7. Border Control
    • Authentication
    • Risk assessment of travelers
    • Modeling of border control processes
    • Surveillance and situational awareness
    • Technology impact, acceptance, and integration

Paper submission:

Both long (8 pages max., roughly 8,000 words) and short (4 pages max., roughly 4,000 words) paper submissions should be written in English and be submitted electronically via the conference web site. Submission file formats are PDF and Microsoft Word using the IEEE two-column Word/LaTeX templates that can be found at the corresponding IEEE web site. Authors wishing to present a poster and/or demo may submit a 1‐page extended abstract, which, if accepted, will appear in the conference proceedings.

Download EISIC 2017 Call for Papers

The Call for Paper is also available in Text format.