posted by system || 9784 views || tracked by 4 users: [display]

ISI 2012 : IEEE International Conference on Intelligence and Security Informatics

FacebookTwitterLinkedInGoogle


Conference Series : Intelligence and Security Informatics
 
Link: http://isi.borders.arizona.edu
 
When Jun 11, 2012 - Jun 14, 2012
Where Washington, DC, USA
Submission Deadline Feb 15, 2012
Categories    security
 

Call For Papers

Call For Papers

IEEE International Conference on Intelligence and Security Informatics
(ISI 2012)

June 11-14, 2012 Washington, DC, USA
http://isi.borders.arizona.edu/

THEME: Cyberspace, Border, and Immigration Securities

Intelligence and Security Informatics (ISI) research is an
interdisciplinary research field involving academic researchers in
information technologies, computer science, public policy,
bioinformatics, and social and behavior studies as well as local,
state, and federal law enforcement and intelligence experts, and
information technology industry consultants and practitioners, to
support counterterrorism and homeland security missions of
anticipation, interdiction, prevention, preparedness and response to
terrorist acts. The annual IEEE International ISI Conference series
(http://www.isiconference.org/) was started in 2003, and the first
nine meetings were held in Tucson, AZ (twice); Atlanta, GA; San Diego,
CA; New Brunswick, NJ; Taipei, Taiwan; Dallas, TX; Vancouver, Canada;
and Beijing, China. Proceedings of these ISI meetings and workshops
have been published by the IEEE Press and in the Springer Lecture
Notes in Computer Science (LNCS) series.

ISI 2012 will be organized in four main streams focusing on
- Information Sharing and Data/Text Mining,
- Infrastructure Protection and Emergency Responses,
- Terrorism Informatics, and
- Enterprise Risk Management and Information Systems Security

Submissions may include systems, methodology, testbed, modeling,
evaluation, and policy papers. Research should be relevant to
informatics, organization, or public policy in applications of
counter-terrorism or protection of local/national/international/enterprise
security in the physical world or cyberspace. Topics include but are
not limited to:

1. Information Sharing and Data/Text Mining
- Intelligence-related knowledge discovery
- Computer or cyber crime investigations and digital forensics
- Criminal investigative criteria and standard of procedure on Computer crime
- Criminal data mining and network analysis
- Forecasting crime and the impact of crime
- Criminal/ intelligence information sharing and visualization
- Crime pattern recognition and modeling tools
- Web-based intelligence monitoring and analysis
- Spatial-temporal data analysis/GIS for crime analysis and security informatics
- Deception and intent detection
- Cyber-crime detection and analysis
- Authorship analysis and identification
- Applications of digital library technologies in intelligence data processing, preservation, sharing, and analysis
- Agents and collaborative systems for intelligence sharing
- HCI and user interfaces of relevance to intelligence and security
- Information sharing policy and governance
- Privacy, security, and civil liberties issues
- Intelligence-computerized community security and surveillance system

2. Infrastructure Protection and Emergency Responses
- Cyber-Physical-Social system security and incident management
- Cyber-infrastructure design and protection
- Intrusion detection
- Bio-terrorism tracking, alerting, and analysis
- Bio-terrorism information infrastructure
- Transportation and communication infrastructure protection
- Border/transportation safety
- Law Enforcement decision support systems
- Emergency response and management
- Disaster prevention, detection, and management
- Communication and decision support for search and rescue
- Assisting citizens' responses to terrorism and catastrophic events
- Computer forensics and crime lead discovery
- Anti-fraud information technology

3. Terrorism Informatics
- Terrorism related analytical methodologies and software tools
- Terrorism knowledge portals and databases
- Terrorist incident chronology databases
- Terrorism root cause analysis
- Social network analysis (radicalization, recruitment, conducting operations),
- visualization, and simulation
- Forecasting terrorism
- Countering terrorism
- Measuring the impact of terrorism on society
- Measuring the effectiveness of counter-terrorism campaigns
- Crime intelligence and cyberspace crime investigation
- Immigration and security

4. Enterprise Risk Management and Information Systems Security
- Information security management standards
- Information systems security policies
- Behavior issues in information systems security
- Fraud detection
- Cyber crime and social impacts
- Corporate going concerns and risks
- Accounting and IT auditing
- Corporate governance and monitoring
- Board activism and influence
- Corporate sentiment surveillance
- Market influence analytics and media intelligence
- Consumer-generated media and social media analytics

Paper submission instructions and template information can soon be
found on the Submissions page at
http://isi.borders.arizona.edu/

WORKSHOPS

In conjunction with ISI 2012, several workshops will be held on June
11, 2012. The currently committed ones include (1) the Border Security
Workshop, (2) the Immigration Studies Workshop, and (3) the
International Workshop on Social Computing (SoCo). Workshop proposals
are welcome.

IMPORTANT DATES

- paper submission due date for ISI 2012: February 15, 2012
- Notification of acceptance: March 15, 2012
- The due date for Tutorial/ Workshop proposals: February 27, 2012

PAPER SUBMISSION

Submission file formats are PDF and Microsoft Word. Required
Word/LaTeX templates (IEEE two-column format) can be found at the
conference Web site. Long (6,000 words, 6 pages max.) and short (3000
words, 3 pages max.) papers in English must be submitted
electronically via the conference Web site. The accepted papers from
ISI 2012 and its affiliated workshops will be published by the IEEE
Press in a formal Proceedings. IEEE ISI Proceedings are
EI-indexed. Authors who wish to present a poster and/or demo may
submit a 1-page extended abstract, which, if selected, will appear in
Proceedings. The selected IEEE ISI 2012 best papers will be invited
for contribution to the new Springer Security Informatics journal.

Proposals for tutorials and special-topic workshops in any areas of
Intelligence and Security Informatics research and practice are
welcome. Such events will be an integral part of the ISI-2012
conference program. Proposals in PDF or Microsoft Word not exceeding 3
pages should be emailed to the conference organizing committee at
zeng@email.arizona.edu by February 27, 2012 and contain the following
information.

- Title of tutorial/workshop
- Preferred duration (half day vs. full day)
- Brief bios of proposed instructor(s)/organizer(s)
- Objectives to be achieved
- Scope of topics to be covered
- Target audience and evidence of interest (for tutorials)
- Target audience and the list of potential presenters/contributors (for workshops)

Related Resources

IEEE BDAI 2025   IEEE--2025 the 8th International Conference on Big Data and Artificial Intelligence (BDAI 2025)
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
IEEE-Ei/Scopus-ITCC 2025   2025 5th International Conference on Information Technology and Cloud Computing (ITCC 2025)-EI Compendex
MSEJ 2024   Advances in Materials Science and Engineering: An International Journal
IEEE-Ei/Scopus-CNIOT 2025   2025 IEEE 6th International Conference on Computing, Networks and Internet of Things (CNIOT 2025) -EI Compendex
ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2
SEAS 2025   14th International Conference on Software Engineering and Applications
IJCSITY 2024   International Journal of Computational Science and Information Technology
IEEE AMCAI 2025   IEEE Afro-Mediterranean Conference on Artificial Intelligence
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2