HST 2013 : IEEE Conference on Technologies for Homeland Security
Call For Papers
To participate in this conference, you must submit an abstract (maximum 4000 characters, including spaces) by March 15, 2013 (Extended to April 30, 2013). Abstracts will be reviewed for relevancy to this conference. If your abstract is deemed relevant for this conference, you will be invited to prepare a draft of your final paper. All final paper drafts will be reviewed for acceptance as either a poster presentation or an oral presentation at this year's conference. Please see detailed instructions for submissions.
All abstracts must be submitted to the 2013 HST Submission Site located at: https://cmt.research.microsoft.com/HST2013/
NOTE: You may Download CFP in PDF format by selecting either the Long Version CFP or the Short Version CFP
Call for Papers, Posters & Tutorials The 13th annual IEEE Conference on Technologies for Homeland Security (HST ’13), will be held 12 - 14 November in Greater Boston, Massachusetts. This conference brings together innovators from leading academic, industry, business, Homeland Security Centers of Excellence, and government programs to provide a forum to discuss ideas, concepts, and experimental results.
Produced by IEEE with technical support from DHS S&T, IEEE Boston Section, and IEEE-USA and organizational support from MIT Lincoln Laboratory, Raytheon, Battelle, and MITRE, this year’s event will once again showcase selected technical paper and posters highlighting emerging technologies in the areas of:
Biometrics & Forensics
Land and Maritime Border Security
Attack and Disaster Preparation, Recovery, and Response
We are currently seeking technical paper, poster and tutorial session submissions in each of the areas noted above. Submissions should focus on technologies with applications available for implementation within five years. All areas will cover the following common topics:
Strategy and threat characterization, CONOPs, risk analysis,
Modeling, simulation, experimentation, and training, and
Testbeds, standards and evaluations.
For more detailed information on the Call for Papers, Posters & Tutorials, as well as Sponsorship and Exhibit opportunities, email: firstname.lastname@example.org.
Attack and Disaster Preparation, Recovery and Response
Targets include: Small events (10s - 100s of victims), large events (1,000s - 10,000) catastrophic events ()100,000s)
Predictive techniques for pre-placing supplies, and locating and tasking first responders
Situational Awareness / Situational Understanding, Information Management and Data visualization
Information sharing, Decision Making and integrated/interoperable Decision Support Systems
Decontamination and restoration strategies, approaches, and sensors following WMD events
Preparedness, Risk, and Resilience measurement and performance tracking
Borders and Maritime Security
Targets include: Individuals, facilities and monuments, airports and airspace, seaports and maritime, transportation infrastructure, land borders and ports of entry
Radiation and nuclear threat characterization, risk assessment, sensors and detectors
Container/Compartment/Vehicle screening (Detection, monitoring and tracking)
Port (land, sea and air) surveillance
Automated target recognition and identification
Targets include: Federal networks, computers and control systems
Secure, resilient systems and networks
Command, control, and interoperability
Situational awareness (enterprise-level, regional, global)
Information sharing, privacy-aware security, data anonymization
Network recovery and reconstitution
Supply chain monitoring and defense
Process control system security
IP telecommunications security, wireless security
Global-scale identity management
Cyber security economic modeling, security metrics
Attack modeling and characterization
Cyber security incident response
Biometrics & Forensics
Targets include: People and assets.
Biometrics recognition based on DNA, voice, fingerprint, iris, face, handwriting, gait, and other modalities
Statistical estimation of stability and distinctiveness
Datasets, corpora, and evaluation
New biometrics and novel sensing technologies
Legacy biometric systems
Robust biometrics with respect to standoff, environmental conditions, and channel impairments
Analysis of biometric applications
Evaluation of the scientific basis, validity, and reliability, and uncertainty of forensic analyses under realistic case scenarios
Statistical estimation and reporting
Human observer bias and sources of human error with forensic sciences
Tools and protocols (automated and manual) for forensic examinations, methods, and practices
Nationwide and international biometric data interoperability
Call for Tutorials
We seek tutorials in related areas. Tutorials may be 90 minutes or 3 hours long. Submissions should include the title, a brief description of the topic for the tutorial and intended audience, the intended length, and a short biography of the presenter(s). Send submissions to email@example.com.
Call for Business Program Topics
We are looking for suggestions for topics to be discussed in the business program. Examples might be ‘Doing Business with State and Local government entities’, ‘A review of the DHS SBIR/BAA process.’ Send suggestions to firstname.lastname@example.org.
Instructions for Paper, Poster and Tutorial Submissions
You are invited to submit one or more abstracts by March 15, 2013 (Extended to April 30, 2013). These will be reviewed for relevance to the conference. The review results and Paper Submission Invitations will be issued by April 1, 2013 (Extended to April 16, 2013). Authors with Submission Invitations (Please note that receiving an invitation does NOT imply final acceptance of paper for presentation) will be invited to submit a full paper for review and a final acceptance decision by June 3, 2013. Authors will be notified of the review result (i.e., acceptance or rejection), with any applicable comments, by July 1, 2013.
Therefore, for a paper, two submissions are required - (1) The first is an abstract indicating interest and a one-page biography of the proposed speaker. The abstract should be 4,000 characters maximum, including the authors(s) title, name, address, phone, fax, email and organizational affiliation. Attached to this should be the biography of the presenting author. The abstract will be reviewed for applicability to this conference. (2) The second required submission is the completed paper, in IEEE format, not to exceed seven pages including all illustrations and references. This paper will be carefully reviewed for relevance to the conference, technical merit, and contribution to the pertinent body of knowledge by the Technical Program Committee. The paper will be accepted or rejected for the conference on this basis. Technical papers must not substantially overlap with material published at or simultaneously submitted to another venue. (Please note: for accepted papers and posters, submissions will require at least one author to register and pay the conference fee. The organizers of HST as well as our attendees expect all accepted papers and posters to be presented at the conference. IEEE reserves the right to exclude a paper from distribution after the conference if the paper is not presented.) For a poster or tutorial submission, please submit an extended abstract, as described for a paper submission. Submissions should be made at the following website: https://cmt.research.microsoft.com/HST2013/
All papers and posters will be published on the conference CD-ROM and distributed to conference attendees. Extended versions of selected full technical papers that meet the publishing requirements will be published in selected journals and in the IEEE Xplore as part of the IEEE Conference Publication Program.
Call for Sponsors and Exhibitors
A limited number of sponsorships and exhibit packages are available. To learn more contact: email@example.com.
For more information on the conference email: firstname.lastname@example.org