ISI 2009 : IEEE International Conference on Intelligence and Security Informatics
Call For Papers
Call For Papers
IEEE International Conference on Intelligence and Security Informatics (ISI-2009)
June 8-11, 2009, Dallas, Texas, U.S.A.
Printable Call for Papers available here
Paper Submission/Areas of Interest
Submissions may include systems, methodology, testbed, modeling, evaluation, policy, and position papers. Research should be relevant to informatics, organization, and/or public policy in applications of counter-terrorism or protection of local/ national/international/global security in the physical world and/or cyberspace. Topics include but are not limited to:
Information Sharing and Data/Text Mining
Intelligence-related knowledge discovery
Criminal data mining and network analysis
Criminal/intelligence information sharing and visualization
Web-based intelligence monitoring and event detection
Deception and intent detection
Cybercrime detection and digital forensics
Spatio-temporal data analysis/GIS for crime analysis and security informatics
Image and video analysis for intention detection
Authorship analysis and identification
Applications of digital library technologies in intelligence data processing, preservation, sharing, and analysis
Agents and collaborative systems for intelligence sharing
HCI and user interfaces of relevance to intelligence and security
Information sharing policy and governance
Privacy, security, and civil liberties issues
Intelligence-computerized community security and surveillance system
Context-aware data analysis.
Infrastructure Protection and Emergency Responses
Cyberinfrastructure design and protection
Bio-terrorism tracking, alerting, and analysis
Bioterrorism information infrastructure
Transportation and communication infrastructure protection
Emergency response and management
Disaster prevention, detection, and management
Communication and decision support for search and rescue
Decision support systems for real-time/near real-time security-related events
Assisting citizens' responses to terrorism and catastrophic events
Computer forensics and crime lead discovery
Cryptography and anti-fraud information technology.
Terrorism related analytical methodologies and software tools
Terrorism knowledge portals and databases
Terrorist incident chronology databases
Terrorism root cause analysis
Social network analysis (radicalization, recruitment, conducting o perations), visualization, and simulation
Forecasting terrorism Countering terrorism
Measuring the impact of terrorism on society
Measuring the effectiveness of counter-terrorism campaigns
Crime intelligence and cyberspace crime investigation
Immigration and security.
Submission file formats are PDF and Microsoft Word. Required Word/LaTex templates (IEEE two-column format) will be found at the conference Web site shortly. Long (6,000 words, 6 pages max.) and short (3000 words, 3 pages max.) papers in English must be submitted electronically via the conference Web site by Friday, January 20, 2009.
Authors who wish to present a poster and/or demo may submit a 1-page extended abstract, which, if selected, will appear in Proceedings.
Meet the Author Sessions
In addition to a formal paper presentation, authors of accepted papers are strongly encouraged to discuss their findings in a "Meet the Author" poster/demo session.
Tutorials and Workshops
Proposals for tutorials and special-topic workshops in any areas of Intelligence and Security Informatics research and practice are welcome. Such events will be an integral part of the ISI-2009 conference program. Proposals in PDF or Microsoft Word not exceeding 3 pages should be emailed to the conference organizing committee at email@example.com by February 20, 2009. They should contain the following information:
Title of tutorial/workshop
Information about instructor(s)/organizer(s)
Objectives to be achieved
Scope of topics to be covered
Target audience and evidence of interest (for tutorials)
Target audience and the list of potential presenters/contributors (for workshops)
Accepted papers and poster abstracts will be published in the conference proceedings to be published by IEEE.
Conference Location and Attendance
At least one author from each accepted paper must register and attend to present the paper at the conference. Conference registration rates will be posted shortly. The conference will be held at the Hyatt Regency North Dallas; reservation information can be found on the Location page.