IEEE Joint Intelligence and Security Informatics Conference
(JISIC) 2014
[Intelligence and Security Informatics and European
Intelligence and Security Informatics Conference]
September 24-26, The Hague, The Netherlands
CALL FOR PAPERS
Since 2003 the IEEE International Conference on
Intelligence and Security Informatics (ISI) is the leading
international scientific conference on interdisciplinary
research on information technology for intelligence, safety
and security. In 2011, the European counterpart of the ISI
started as European Intelligence and Security Informatics
Conference (EISIC). For the first time both events meet in the
IEEE Joint Intelligence and Security Informatics Conference
(JISIC), enabling international researchers on the challenging
field of intelligence and security informatics to share ideas
on problems, solutions and new directions.
IEEE JISIC features six tracks that are chaired by leading
researchers on the respective theme:
1. Forensic Intelligence (Jeroen Keppens - King's College
London)
2. Decisioning and Interaction (John Stasko - Georgia
Institute of Technology)
3. Cyber and infrastructure security (V.S. Subrahmanian -
University of Maryland)
4. Financial and fraud analysis (Niall Adams - Imperial
College London)
5. Computational criminology (Thomas Holt - Michigan State
University)
6. Border Control (Jakub Piskorski - FRONTEX)
PAPER SUBMISSION
We invite academic researchers in the field of Intelligence
and Security Informatics and related areas as well as
companies, industry consultants, analysts and practitioners in
the fields involved to submit papers and proposals for
tutorials. We are soliciting both research and practice and
experience papers on the topics of the proposed tracks and
related topics.
Research papers should either: (a) present results of
substantial research/scientific work (long papers, 8 pages
max), (b) report on an ongoing research activity/effort, ideas
and new challenges (short papers, 4 pages max).
Experience papers (short papers) should describe
experiences encountered in applying novel research results and
methods in the context of the conference and/or report on
innovative solutions with strong application potential that
are not yet on the market, or are on the market, but require
guidance regarding further steps in order to convert them into
real-world solutions. Submissions should be written in
technical style rather than sales styles.
TUTORIAL PROPOSALS
We seek to extend IEEE JISIC 2014 experience by tutorials
on selected topics given by renowned scientists and
practitioners in their fields. We solicit proposals for
half-day tutorials. Tutorials may be lectures, interactive
workshops, hands-on training, or any combination of the above.
Exploring diverse ways of interacting with the audience is
welcome as are cross-disciplinary topics.
IMPORTANT DATES
* Paper submission due: June 1, 2014
* Notification of acceptance: July 1, 2014
* Camera ready paper due: July 18, 2014
* Authors registration due: July 18, 2014
* Conference: September 24-26, 2014
TRACK DESCRIPTIONS
1. Forensic Intelligence
A broad range of disparate techniques to tackle evidential
reasoning and forensic investigation have emerged from a
variety of fields, including argumentation, probabilistic,
narrative and knowledge management based approaches to collect
and assess evidence, and to manage and coordinate
investigations. This track aims to bring together academic
researchers and practitioners with interests in evidential
reasoning and forensic investigation from disparate fields
such as statistics, artificial intelligence, decision
sciences, forensic sciences and law, to present new
developments in their respective areas and encourage
cross-fertilisation between often disparate fields of
research and practice.
2. Decisioning and Interaction
The track will explore interactive technologies that assist
in the decision-making processes of security-related domains.
This includes visualization and visual analytics systems,
interactive decision-support and analytical reasoning systems,
and other forms of multimedia information systems. A key
component of this track is a human-in-the-loop interaction
technology where computational analyses are complemented by
human exploration and investigation.
3. Cyber and Infrastructure Security
The Security track focuses on computational models of
intelligence, safety and security aspects of crime and
terrorism in the context of critical infrastructure and
cyberspace. Papers making both theoretical and practical
aspects of these topics are welcome. Interdisciplinary and
applied papers, where existing computational methods are
applied or adapted to the solution of real-world problems in
these domains are particularly encouraged.
4. Financial and Fraud Analysis
Financial fraud is a serious problem, damaging both
international economies and personal lives. The areas in which
financial fraud can occur are diverse, including retail
finance, insurance, corporate banking and internet
transactions. A broad range of tactics are employed by
fraudsters to obtain illegal advantage. Moreover, the area of
fraud is an arms-race, with fraudsters constantly changing
tactics to circumvent protection systems. Thus, methodology
that is capable of automatically adapting to such changes is
of special interest. Many financial fraud applications have
the character of “big data”, in which a very small signal must
be extracted from very large and complex data. This track will
gather novel research contributions in the area of financial
fraud, with the intention of gaining insight from diverse
methodologies and application areas.
5. Computational criminology
This track will provide examinations of offender behavior,
victimology, and law enforcement practices utilizing
statistical analysis techniques and unique data sources. This
includes tests of various criminological theories, assessments
of social network structures, and organizational practices of
terror groups, cybercriminals, and gangs. Evaluations of
crime prevention strategies, intelligence led policing, and
issues of public safety, privacy, and security will also be a
focus of this track.
6. Border Control
This track solicits papers reporting research work relevant
in the context of addressing practical operational challenges
encountered by the border control community. Among others,
topics of interest include: (a) authentication of documents,
people and vehicles, (b) risk assessment of travelers, (c)
modelling and optimization of the border control processing
chain, (d) border surveillance, (e) platforms, protocols and
techniques for secure exchange of information and
communication, (f) text/data mining, information fusion and
utilization of new sources of information for intelligence
gathering and situational awareness, and (g) border control
technology impact, acceptance and integration.
We are looking forward to see you in The Hague - City of
Peace and Justice
The IEEE JISIC Organizing Team