posted by system || 2587 views || tracked by 9 users: [display]

ISI 2009 : IEEE International Conference on Intelligence and Security Informatics


When Jun 8, 2009 - Jun 12, 2009
Where Richardson, TX, USA
Submission Deadline Jan 20, 2009
Categories    intelligence   security   data mining   network analysis

Call For Papers

Call For Papers

IEEE International Conference on Intelligence and Security Informatics (ISI-2009)
June 8-11, 2009, Dallas, Texas, U.S.A.

Printable Call for Papers available here

Paper Submission/Areas of Interest
Submissions may include systems, methodology, testbed, modeling, evaluation, policy, and position papers. Research should be relevant to informatics, organization, and/or public policy in applications of counter-terrorism or protection of local/ national/international/global security in the physical world and/or cyberspace. Topics include but are not limited to:

Information Sharing and Data/Text Mining
Intelligence-related knowledge discovery
Criminal data mining and network analysis
Criminal/intelligence information sharing and visualization
Web-based intelligence monitoring and event detection
Deception and intent detection
Cybercrime detection and digital forensics
Spatio-temporal data analysis/GIS for crime analysis and security informatics
Image and video analysis for intention detection
Authorship analysis and identification
Applications of digital library technologies in intelligence data processing, preservation, sharing, and analysis
Agents and collaborative systems for intelligence sharing
HCI and user interfaces of relevance to intelligence and security
Information sharing policy and governance
Privacy, security, and civil liberties issues
Intelligence-computerized community security and surveillance system
Context-aware data analysis.
Infrastructure Protection and Emergency Responses
Cyberinfrastructure design and protection
Intrusion detection
Bio-terrorism tracking, alerting, and analysis
Bioterrorism information infrastructure
Transportation and communication infrastructure protection
Border/transportation safety
Emergency response and management
Disaster prevention, detection, and management
Communication and decision support for search and rescue
Decision support systems for real-time/near real-time security-related events
Assisting citizens' responses to terrorism and catastrophic events
Computer forensics and crime lead discovery
Cryptography and anti-fraud information technology.
Terrorism Informatics
Terrorism related analytical methodologies and software tools
Terrorism knowledge portals and databases
Terrorist incident chronology databases
Terrorism root cause analysis
Social network analysis (radicalization, recruitment, conducting o perations), visualization, and simulation
Forecasting terrorism Countering terrorism
Measuring the impact of terrorism on society
Measuring the effectiveness of counter-terrorism campaigns
Crime intelligence and cyberspace crime investigation
Immigration and security.
Paper submission
Submission file formats are PDF and Microsoft Word. Required Word/LaTex templates (IEEE two-column format) will be found at the conference Web site shortly. Long (6,000 words, 6 pages max.) and short (3000 words, 3 pages max.) papers in English must be submitted electronically via the conference Web site by Friday, January 20, 2009.

Authors who wish to present a poster and/or demo may submit a 1-page extended abstract, which, if selected, will appear in Proceedings.

Meet the Author Sessions
In addition to a formal paper presentation, authors of accepted papers are strongly encouraged to discuss their findings in a "Meet the Author" poster/demo session.

Tutorials and Workshops
Proposals for tutorials and special-topic workshops in any areas of Intelligence and Security Informatics research and practice are welcome. Such events will be an integral part of the ISI-2009 conference program. Proposals in PDF or Microsoft Word not exceeding 3 pages should be emailed to the conference organizing committee at by February 20, 2009. They should contain the following information:

Title of tutorial/workshop
Preferred duration
Information about instructor(s)/organizer(s)
Objectives to be achieved
Scope of topics to be covered
Target audience and evidence of interest (for tutorials)
Target audience and the list of potential presenters/contributors (for workshops)
Conference Proceedings
Accepted papers and poster abstracts will be published in the conference proceedings to be published by IEEE.

Conference Location and Attendance
At least one author from each accepted paper must register and attend to present the paper at the conference. Conference registration rates will be posted shortly. The conference will be held at the Hyatt Regency North Dallas; reservation information can be found on the Location page.

Related Resources

DEPLING 2023   International Conference on Dependency Linguistics
MLDM 2023   18th International Conference on Machine Learning and Data Mining
IEEE ICA 2022   The 6th IEEE International Conference on Agents
PAKDD 2023   The 27th Pacific-Asia Conference on Knowledge Discovery and Data Mining
IEEE CCNC STP-CPS 2023   5th International Workshop on Security Trust Privacy for Cyber-Physical Systems (STP-CPS'23) with IEEE CCNC 2023, 8-11 January, Las Vegas, NV, USA
SDM 2023   SDM 2023 : SIAM International Conference on Data Mining
IEEE SSCI 2023   2023 IEEE Symposium Series on Computational Intelligence
ACM-Ei/Scopus-CWCBD 2023   2023 4th International Conference on Wireless Communications and Big Data (CWCBD 2023) -EI Compendex
ICACII 2023   2nd International Conference on Advances in Computational Intelligence and Informatics
MLDM 2023   19th International Conference on Machine Learning and Data Mining