posted by user: IEEE01 || 5435 views || tracked by 16 users: [display]

HST 2013 : IEEE Conference on Technologies for Homeland Security


When Nov 12, 2013 - Nov 14, 2013
Where Waltham, MA USA
Abstract Registration Due Apr 30, 2013
Submission Deadline Jun 19, 2013
Notification Due Jul 15, 2013
Categories    cyber security   biometrics & forensics   land and maritime border secur   attack and disaster preparatio

Call For Papers

To participate in this conference, you must submit an abstract (maximum 4000 characters, including spaces) by March 15, 2013 (Extended to April 30, 2013). Abstracts will be reviewed for relevancy to this conference. If your abstract is deemed relevant for this conference, you will be invited to prepare a draft of your final paper. All final paper drafts will be reviewed for acceptance as either a poster presentation or an oral presentation at this year's conference. Please see detailed instructions for submissions.

All abstracts must be submitted to the 2013 HST Submission Site located at:

NOTE: You may Download CFP in PDF format by selecting either the Long Version CFP or the Short Version CFP

Call for Papers, Posters & Tutorials The 13th annual IEEE Conference on Technologies for Homeland Security (HST ’13), will be held 12 - 14 November in Greater Boston, Massachusetts. This conference brings together innovators from leading academic, industry, business, Homeland Security Centers of Excellence, and government programs to provide a forum to discuss ideas, concepts, and experimental results.

Produced by IEEE with technical support from DHS S&T, IEEE Boston Section, and IEEE-USA and organizational support from MIT Lincoln Laboratory, Raytheon, Battelle, and MITRE, this year’s event will once again showcase selected technical paper and posters highlighting emerging technologies in the areas of:

Cyber Security
Biometrics & Forensics
Land and Maritime Border Security
Attack and Disaster Preparation, Recovery, and Response

We are currently seeking technical paper, poster and tutorial session submissions in each of the areas noted above. Submissions should focus on technologies with applications available for implementation within five years. All areas will cover the following common topics:

Strategy and threat characterization, CONOPs, risk analysis,
Modeling, simulation, experimentation, and training, and
Testbeds, standards and evaluations.

Contact Information

For more detailed information on the Call for Papers, Posters & Tutorials, as well as Sponsorship and Exhibit opportunities, email:
Attack and Disaster Preparation, Recovery and Response

Targets include: Small events (10s - 100s of victims), large events (1,000s - 10,000) catastrophic events ()100,000s)

Predictive techniques for pre-placing supplies, and locating and tasking first responders
Situational Awareness / Situational Understanding, Information Management and Data visualization
Information sharing, Decision Making and integrated/interoperable Decision Support Systems
Decontamination and restoration strategies, approaches, and sensors following WMD events
Preparedness, Risk, and Resilience measurement and performance tracking

Borders and Maritime Security

Targets include: Individuals, facilities and monuments, airports and airspace, seaports and maritime, transportation infrastructure, land borders and ports of entry

Radiation and nuclear threat characterization, risk assessment, sensors and detectors
Nuclear forensics
Personnel screening
Container/Compartment/Vehicle screening (Detection, monitoring and tracking)
Ground surveillance
Port (land, sea and air) surveillance
Automated target recognition and identification

Cyber Security

Targets include: Federal networks, computers and control systems

Secure, resilient systems and networks
Mission Assurance
Command, control, and interoperability
Situational awareness (enterprise-level, regional, global)
Information sharing, privacy-aware security, data anonymization
Network recovery and reconstitution
Supply chain monitoring and defense
Process control system security
IP telecommunications security, wireless security
Global-scale identity management
Cyber security economic modeling, security metrics
Attack modeling and characterization
Cyber security incident response
Software Assurance

Biometrics & Forensics

Targets include: People and assets.

Biometrics recognition based on DNA, voice, fingerprint, iris, face, handwriting, gait, and other modalities
Statistical estimation of stability and distinctiveness
Datasets, corpora, and evaluation
Multimodal biometrics
New biometrics and novel sensing technologies
Legacy biometric systems
Robust biometrics with respect to standoff, environmental conditions, and channel impairments
Analysis of biometric applications


Evaluation of the scientific basis, validity, and reliability, and uncertainty of forensic analyses under realistic case scenarios
Statistical estimation and reporting
Human observer bias and sources of human error with forensic sciences
Tools and protocols (automated and manual) for forensic examinations, methods, and practices
Nationwide and international biometric data interoperability

Call for Tutorials

We seek tutorials in related areas. Tutorials may be 90 minutes or 3 hours long. Submissions should include the title, a brief description of the topic for the tutorial and intended audience, the intended length, and a short biography of the presenter(s). Send submissions to
Call for Business Program Topics

We are looking for suggestions for topics to be discussed in the business program. Examples might be ‘Doing Business with State and Local government entities’, ‘A review of the DHS SBIR/BAA process.’ Send suggestions to
Instructions for Paper, Poster and Tutorial Submissions

You are invited to submit one or more abstracts by March 15, 2013 (Extended to April 30, 2013). These will be reviewed for relevance to the conference. The review results and Paper Submission Invitations will be issued by April 1, 2013 (Extended to April 16, 2013). Authors with Submission Invitations (Please note that receiving an invitation does NOT imply final acceptance of paper for presentation) will be invited to submit a full paper for review and a final acceptance decision by June 3, 2013. Authors will be notified of the review result (i.e., acceptance or rejection), with any applicable comments, by July 1, 2013.

Therefore, for a paper, two submissions are required - (1) The first is an abstract indicating interest and a one-page biography of the proposed speaker. The abstract should be 4,000 characters maximum, including the authors(s) title, name, address, phone, fax, email and organizational affiliation. Attached to this should be the biography of the presenting author. The abstract will be reviewed for applicability to this conference. (2) The second required submission is the completed paper, in IEEE format, not to exceed seven pages including all illustrations and references. This paper will be carefully reviewed for relevance to the conference, technical merit, and contribution to the pertinent body of knowledge by the Technical Program Committee. The paper will be accepted or rejected for the conference on this basis. Technical papers must not substantially overlap with material published at or simultaneously submitted to another venue. (Please note: for accepted papers and posters, submissions will require at least one author to register and pay the conference fee. The organizers of HST as well as our attendees expect all accepted papers and posters to be presented at the conference. IEEE reserves the right to exclude a paper from distribution after the conference if the paper is not presented.) For a poster or tutorial submission, please submit an extended abstract, as described for a paper submission. Submissions should be made at the following website:
Publishing Information

All papers and posters will be published on the conference CD-ROM and distributed to conference attendees. Extended versions of selected full technical papers that meet the publishing requirements will be published in selected journals and in the IEEE Xplore as part of the IEEE Conference Publication Program.
Call for Sponsors and Exhibitors

A limited number of sponsorships and exhibit packages are available. To learn more contact:

For more information on the conference email:

Related Resources

CCNC 2021   IEEE Consumer Communications & Networking Conference
CSW 2021   2021 International Workshop on Cyber Security (CSW 2021)
2020 IEEE GCAIoT 2020   2020 IEEE Global Conference on Artificial Intelligence and Internet of Things
IEEE--ICISPP--Ei Compendex, Scopus 2020   IEEE--2020 International Conference on Information Security and Privacy Protection (ICISPP 2020)--Ei Compendex, Scopus
ICMIMT--IEEE, Ei and Scopus 2021   2021 IEEE 12th International Conference on Mechanical and Intelligent Manufacturing Technologies (ICMIMT 2021)--EI Compendex, Scopus
CyberHunt 2020   International Workshop on Big Data Analytics for Cyber Threat Hunting
IEEE ICMIMT--EI Compendex, Scopus 2021   2021 IEEE 12th International Conference on Mechanical and Intelligent Manufacturing Technologies (ICMIMT 2021)--EI Compendex, Scopus
HCSE-CS 2020   2020 Workshop on Human Centric Software Engineering and Cyber Security
IEEE Agents In Industry 2020   [IEEE JESTIE Journal] Industrial Agents: Concepts, Technologies, and Applications
ICARA--IEEE, Ei, Scopus 2021   IEEE--2020 7th International Conference on Automation, Robotics and Applications (ICARA 2020)--Ei Compendex, Scopus