posted by user: ptl || 10266 views || tracked by 16 users: [display]

ISI 2013 : Intelligence and Security Informatics

FacebookTwitterLinkedInGoogle


Conference Series : Intelligence and Security Informatics
 
Link: http://isiconference2013.org/pgs/call.php
 
When Jun 4, 2013 - Jun 7, 2013
Where Seattle, WA, USA
Submission Deadline Feb 15, 2013
Notification Due Mar 18, 2013
Categories    big data   emergent threats   decision making
 

Call For Papers

Intelligence and Security Informatics (ISI) research is an interdisciplinary research field involving academic researchers in information technologies, computer science, public policy, bioinformatics, and social and behavior studies as well as local, state, and federal law enforcement and intelligence experts, and information technology industry consultants and practitioners to support counterterrorism and homeland security missions of anticipation, interdiction, prevention, preparedness and response to terrorist acts. The annual IEEE International ISI Conference series was started in 2003. Meeting have been held in Tucson, AZ (twice); Atlanta, GA; San Diego, CA; New Brunswick, NJ; Taipei, Taiwan; Dallas, TX; Vancouver, Canada; and Beijing, China, and Washington D.C. Proceedings of these ISI meetings and workshops have been published by the IEEE Press and in the Springer Lecture Notes in Computer Science (LNCS) series.

ISI 2013 will be organized in three main streams focusing on

Big Data in Security Informatics
Emergent Threats
Decision-Making in Security Informatics

Submissions may include systems, methodology, test-bed, modeling, evaluation, and policy papers. Research should be relevant to informatics, organization, or public policy in applications of counter-terrorism or protection of local/national/international security in the physical world or cyberspace. Topics include but are not limited to:

Big Data in Security Informatics

Information Sharing and Data/Text Mining Intelligence-related knowledge discovery
Computer or cybercrime investigations and digital forensics
Criminal investigative criteria and standard of procedure on Computer crime
Criminal data mining and network analysis
Forecasting crime and the impact of crime
Criminal/intelligence information sharing and visualization
Crime pattern recognition and modeling tools
Web-based intelligence monitoring and analysis
Spatial-temporal data analysis/GIS for crime analysis and security informatics
Deception and intent detection
Cyber-crime detection and analysis
Authorship analysis and identification
Applications of digital library technologies in intelligence data processing, preservation, sharing, and analysis
Agents and collaborative systems for intelligence sharing
HCI and user interfaces of relevance to intelligence and security
Information sharing policy and governance
Privacy, security, and civil liberties issues
Intelligence-computerized community security and surveillance system


Emergent Threats

Infrastructure Protection and Emergency Responses
Cyber-Physical-Social system security and incident management
Cyber-infrastructure design and protection
Intrusion detection
Bio-terrorism tracking, alerting, and analysis
Bio-terrorism information infrastructure
Transportation and communication infrastructure protection
Border/transportation safety
Law Enforcement decision support systems
Emergency response and management
Disaster prevention, detection, and management
Communication and decision support for search and rescue
Assisting citizens' responses to terrorism and catastrophic events
Computer forensics and crime lead discovery
Anti-fraud information technology
Terrorism Informatics
Terrorism related analytical methodologies and software tools
Terrorism knowledge portals and databases
Terrorist incident chronology databases
Terrorism root cause analysis
Social network analysis (radicalization, recruitment, conducting operations), visualization, and simulation
Forecasting terrorism
Countering terrorism
Measuring the impact of terrorism on society
Measuring the effectiveness of counter-terrorism campaigns
Crime intelligence and cyberspace crime investigation
Immigration and security


Decision-Making in Security Informatics

Enterprise Risk Management and Information Systems Security
Information security management standards
Information systems security policies
Behavior issues in information systems security
Fraud detection
Cybercrime and social impacts
Corporate going concerns and risks
Accounting and IT auditing
Corporate governance and monitoring
Board activism and influence
Corporate sentiment surveillance
Market influence analytics and media intelligence
Consumer-generated media and social media analytics


IMPORTANT DATES

Paper submission due date: February 15, 2013
Notification of acceptance: March 18, 2013
Due date for Workshop proposals: February 18, 2013


PAPER SUBMISSION
Submission file formats are PDF and Microsoft Word. Required Word/LaTeX templates (IEEE two-column format) can be found at the conference Web site. Long (6,000 words, 6 pages max) and short (3000 words, 3 pages max.) Papers in English must be submitted electronically via the conference Web site. The accepted papers from ISI 2013 and its affiliated workshops will be published by the IEEE Press in formal Proceedings. IEEE ISI Proceedings are EI-indexed. Authors who wish to present a poster and/or demo may submit a 1-page extended abstract, which, if selected, will appear in Proceedings. The selected IEEE ISI 2013 best papers will be invited for contribution to the Springer Security Informatics journal. The deadline for paper submissions is February 15, 2013. Paper submission instructions and template information can be found at on the Submissions page at https://www.easychair.org/conferences/?conf=ieeeisi2013.

Best papers awards will be given in three categories:

Best paper
Runner-up paper
Best student paper
Runner-up student paper.


WORKSHOPS
In conjunction with ISI 2013, several workshops will be held on June 4, 2013.Special-topic workshops in any areas of Intelligence and Security Informatics research and practice are welcome. Such events will be an integral part of the ISI-2013 conference program. Proposals in PDF or Microsoft Word not exceeding 3 pages should be emailed to the conference organizing committee at antonio@pnnl.gov by February 18, 2012 and contain the following information.

Title of tutorial/workshop
Preferred duration (half day vs. full day)
Brief bios of proposed instructor(s)/organizer(s)
Objectives to be achieved
Scope of topics to be covered
Target audience and the list of potential presenters/contributors

Related Resources

SEAS 2025   14th International Conference on Software Engineering and Applications
IEEE-Ei/Scopus-ITCC 2025   2025 5th International Conference on Information Technology and Cloud Computing (ITCC 2025)-EI Compendex
IEEE BDAI 2025   IEEE--2025 the 8th International Conference on Big Data and Artificial Intelligence (BDAI 2025)
ICoSR 2025   2025 4th International Conference on Service Robotics
ISKE 2025   The 20th International Conference on Intelligent Systems and Knowledge Engineering (ISKE 2025)
PAKDD 2025   29th Pacific-Asia Conference on Knowledge Discovery and Data Mining
EMERGING 2025   The Seventeenth International Conference on Emerging Networks and Systems Intelligence
COIT 2025   5th International Conference on Computing and Information Technology
Intelligent Computing-Based Time Series 2025   Intelligent Computing: Special Issue: Intelligent Computing-Based Time Series Analysis for Cybersecurity
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust