European Intelligence
and Security Informatics Conference (EISIC) 2017
September 11-13, 2017
Dekelia Air Base, Attica, Greece

The Premier European Conference on Counterterrorism and Criminology

Keynote Speakers


  • Christos Douligeris
    University of Piraeus, Greece

    Christos Douligeris, currently a professor at the department of Informatics, University of Piraeus, Greece held positions with the Department of Electrical and Computer Engineering at the University of Miami. He was an associate member of the Hellenic Authority for Information and Communication Assurance and Privacy and the President and CEO Hellenic Electronic Governance for Social Security SA. Dr. Douligeris has published extensively in the networking scientific literature and he has participated in many research and development projects. He is the co-editor of a book on ''Network Security'' published by IEEE Press/ John Wiley and he is on the editorial boards of several scientific journals as well as on the technical program committees of major international conferences. He has been involved extensively in curriculum development both in the USA and Greece. His latest work has focused on the use of big data and artificial intelligence techniques in several areas, mainly in Telecommunications Planning and Management and in Security Analysis of Port Information Systems. Moreover, he has been working in data analytic techniques in Learning and Education and Emergency Response Operations.

    Keynote: Modelling of Supply Chain Service Systems' Security

    A Supply Chain Service (SCS) is a complex network of interconnected business partners, including all the information, processes and assets required for the movement of goods and the performance of services. However, the smooth operation of an SCS could suffer from interruptions and delays due to a variety of reasons ranging from acknowledged business and financial factors (e.g. frequent changes in business partners' leadership and demand uncertainty) to the exploitation of physical threats (e.g. bombing of a storage room) and/or cyber threats (e.g. gaining unauthenticated access to an alarm system and changing the alarm settings). Cyber threat exploitation results from the lack of implemented security controls, making the assets vulnerable to these threats.

    This lecture introduces a process-centric approach for modelling security concepts in order to improve Supply Chain sustainability. We focus on the Vehicle Transport Service (VTS) and we present a business-process oriented model. In order to show how security issues can be visualized we apply simulation techniques on the developed process models. The three model infrastructures are component materials of the MITIGATE EU project, which has a goal the development of a platform that provides risk assessment techniques in critical maritime cyber assets aiming to manage risks that could compromise the organization's information security.

  • Vishal M. Patel
    Rutgers University, USA

    Vishal M. Patel is an A. Walter Tyson Assistant Professor in the Department of Electrical and Computer Engineering at Rutgers University. Prior to joining Rutgers University, he was a member of the research faculty at the University of Maryland Institute for Advanced Computer Studies (UMIACS). He completed his Ph.D. in Electrical Engineering from the University of Maryland, College Park, MD, in 2010. His current research interests include signal processing, computer vision, and pattern recognition with applications in biometrics and imaging. He has received a number of awards including the 2016 Office of Naval Research (ONR) Young Investigator Award, the 2016 Jimmy Lin Award for Invention, A. Walter Tyson Assistant Professorship Award, the Best Paper Award at IEEE BTAS 2015, and Best Poster Awards at BTAS 2015 and 2016. He currently serves as a member of the Information Forensics and Security Technical Committee of the IEEE Signal Processing Society and Associate Editor of the IEEE Biometrics Compendium. He is a member of Eta Kappa Nu, Pi Mu Epsilon, and Phi Beta Kappa.

    Keynote: Active user authentication on mobile devices

    Recent developments in sensing and communication technologies have led to an explosion in the use of mobile devices such as smartphones and tablets. With the increase in use of mobile devices, one has to constantly worry about the security and privacy, as the loss of a mobile device would compromise personal information of the user. To deal with this problem, active authentication (also known as continuous authentication) systems have been proposed in which users are continuously monitored after the initial access to the mobile device. This talk will provide an overview of different continuous authentication methods on mobile devices. We will discuss merits and drawbacks of available approaches and identify promising avenues of research in this rapidly evolving field.

  • Panel: Ethical Dilemmas in Intelligence Analaysis: Implications for Systems and Operations

    Chairs:
    B.L. William Wong, Middlesex University London, UK
    Ioanna Lakea, Hellenic Air Force Academy, Greece

    Panelists:

    Overview

    The field of ethics is concerned with the study of the concepts of right and wrong behaviour, and generally involves three broad subject areas: metaethics, normative ethics, and applied ethics. Metaethics investigates where our ethical principles come from, and what they mean; normative ethics refer to our study and determination of moral standards that regulate right and wrong conduct; while applied ethics involves the examination of specific controversial issues such as abortion, animal rights, environmental concerns. In this panel, we will identify and discuss ethics issues as they apply to a number of emergent challenges in the design and development of intelligence analysis systems, as well as during day-to-day operations of law enforcement and military officers. In many discussions on ethics, there is a tendency for the discussions to remain at a high level and surround the main principles of ethics, e.g. respect for autonomy, non-maleficence or do no harm, beneficence, and justice. In this panel, we present some concrete problems that emerged through our research in projects such as the FP7 VALCRI, as we seek to respect the rights of European citizens to liberty and security. These problems include the mosaic effect, protection of personal data, potential mis-use and abuse during information exploitation and analysis activities encountered during intelligence and investigative analysis. How should we design to ensure computational and analytic transparency in the decision-making processes? How we design systems and processes that are visible and open to inspection by colleagues and overseers? These are some issues that will be addressed by this Panel.