posted by system || 2408 views || tracked by 9 users: [display]

ISI 2009 : IEEE International Conference on Intelligence and Security Informatics

FacebookTwitterLinkedInGoogle

 
When Jun 8, 2009 - Jun 12, 2009
Where Richardson, TX, USA
Submission Deadline Jan 20, 2009
Categories    intelligence   security   data mining   network analysis
 

Call For Papers

Call For Papers

IEEE International Conference on Intelligence and Security Informatics (ISI-2009)
June 8-11, 2009, Dallas, Texas, U.S.A.

Printable Call for Papers available here

Paper Submission/Areas of Interest
Submissions may include systems, methodology, testbed, modeling, evaluation, policy, and position papers. Research should be relevant to informatics, organization, and/or public policy in applications of counter-terrorism or protection of local/ national/international/global security in the physical world and/or cyberspace. Topics include but are not limited to:

Information Sharing and Data/Text Mining
Intelligence-related knowledge discovery
Criminal data mining and network analysis
Criminal/intelligence information sharing and visualization
Web-based intelligence monitoring and event detection
Deception and intent detection
Cybercrime detection and digital forensics
Spatio-temporal data analysis/GIS for crime analysis and security informatics
Image and video analysis for intention detection
Authorship analysis and identification
Applications of digital library technologies in intelligence data processing, preservation, sharing, and analysis
Agents and collaborative systems for intelligence sharing
HCI and user interfaces of relevance to intelligence and security
Information sharing policy and governance
Privacy, security, and civil liberties issues
Intelligence-computerized community security and surveillance system
Context-aware data analysis.
Infrastructure Protection and Emergency Responses
Cyberinfrastructure design and protection
Intrusion detection
Bio-terrorism tracking, alerting, and analysis
Bioterrorism information infrastructure
Transportation and communication infrastructure protection
Border/transportation safety
Emergency response and management
Disaster prevention, detection, and management
Communication and decision support for search and rescue
Decision support systems for real-time/near real-time security-related events
Assisting citizens' responses to terrorism and catastrophic events
Computer forensics and crime lead discovery
Cryptography and anti-fraud information technology.
Terrorism Informatics
Terrorism related analytical methodologies and software tools
Terrorism knowledge portals and databases
Terrorist incident chronology databases
Terrorism root cause analysis
Social network analysis (radicalization, recruitment, conducting o perations), visualization, and simulation
Forecasting terrorism Countering terrorism
Measuring the impact of terrorism on society
Measuring the effectiveness of counter-terrorism campaigns
Crime intelligence and cyberspace crime investigation
Immigration and security.
Paper submission
Submission file formats are PDF and Microsoft Word. Required Word/LaTex templates (IEEE two-column format) will be found at the conference Web site shortly. Long (6,000 words, 6 pages max.) and short (3000 words, 3 pages max.) papers in English must be submitted electronically via the conference Web site by Friday, January 20, 2009.

Authors who wish to present a poster and/or demo may submit a 1-page extended abstract, which, if selected, will appear in Proceedings.

Meet the Author Sessions
In addition to a formal paper presentation, authors of accepted papers are strongly encouraged to discuss their findings in a "Meet the Author" poster/demo session.

Tutorials and Workshops
Proposals for tutorials and special-topic workshops in any areas of Intelligence and Security Informatics research and practice are welcome. Such events will be an integral part of the ISI-2009 conference program. Proposals in PDF or Microsoft Word not exceeding 3 pages should be emailed to the conference organizing committee at zeng@email.arizona.edu by February 20, 2009. They should contain the following information:

Title of tutorial/workshop
Preferred duration
Information about instructor(s)/organizer(s)
Objectives to be achieved
Scope of topics to be covered
Target audience and evidence of interest (for tutorials)
Target audience and the list of potential presenters/contributors (for workshops)
Conference Proceedings
Accepted papers and poster abstracts will be published in the conference proceedings to be published by IEEE.

Conference Location and Attendance
At least one author from each accepted paper must register and attend to present the paper at the conference. Conference registration rates will be posted shortly. The conference will be held at the Hyatt Regency North Dallas; reservation information can be found on the Location page.

Related Resources

AIKE 2021   IEEE Artificial Intelligence & Knowledge Engineering 2021
ICDM 2021   21th Industrial Conference on Data Mining
IEEE SSCI 2021   2021 IEEE Symposium Series on Computational Intelligence
KDD 2021   27th ACM SIGKDD Conference on Knowledge Discovery and Data Mining
CCNC 2021   IEEE Consumer Communications & Networking Conference
MLDM 2021   17th International Conference on Machine Learning and Data Mining
UVS-Oman 2022   The 2nd International Conference on Unmanned Vehicle Systems (UVS-Oman 2022) - IEEE
Spec.Issue on Social Informatics: Scopus 2021   Journal of Social and Business Informatics - Acta Informatica Pragensia
BigMM 2021   IEEE International Conference on Multimedia Big Data 2021
IDEAS 2021   25th International Database Engineering & Applications Symposium