posted by system || 2571 views || tracked by 9 users: [display]

ISI 2009 : IEEE International Conference on Intelligence and Security Informatics


When Jun 8, 2009 - Jun 12, 2009
Where Richardson, TX, USA
Submission Deadline Jan 20, 2009
Categories    intelligence   security   data mining   network analysis

Call For Papers

Call For Papers

IEEE International Conference on Intelligence and Security Informatics (ISI-2009)
June 8-11, 2009, Dallas, Texas, U.S.A.

Printable Call for Papers available here

Paper Submission/Areas of Interest
Submissions may include systems, methodology, testbed, modeling, evaluation, policy, and position papers. Research should be relevant to informatics, organization, and/or public policy in applications of counter-terrorism or protection of local/ national/international/global security in the physical world and/or cyberspace. Topics include but are not limited to:

Information Sharing and Data/Text Mining
Intelligence-related knowledge discovery
Criminal data mining and network analysis
Criminal/intelligence information sharing and visualization
Web-based intelligence monitoring and event detection
Deception and intent detection
Cybercrime detection and digital forensics
Spatio-temporal data analysis/GIS for crime analysis and security informatics
Image and video analysis for intention detection
Authorship analysis and identification
Applications of digital library technologies in intelligence data processing, preservation, sharing, and analysis
Agents and collaborative systems for intelligence sharing
HCI and user interfaces of relevance to intelligence and security
Information sharing policy and governance
Privacy, security, and civil liberties issues
Intelligence-computerized community security and surveillance system
Context-aware data analysis.
Infrastructure Protection and Emergency Responses
Cyberinfrastructure design and protection
Intrusion detection
Bio-terrorism tracking, alerting, and analysis
Bioterrorism information infrastructure
Transportation and communication infrastructure protection
Border/transportation safety
Emergency response and management
Disaster prevention, detection, and management
Communication and decision support for search and rescue
Decision support systems for real-time/near real-time security-related events
Assisting citizens' responses to terrorism and catastrophic events
Computer forensics and crime lead discovery
Cryptography and anti-fraud information technology.
Terrorism Informatics
Terrorism related analytical methodologies and software tools
Terrorism knowledge portals and databases
Terrorist incident chronology databases
Terrorism root cause analysis
Social network analysis (radicalization, recruitment, conducting o perations), visualization, and simulation
Forecasting terrorism Countering terrorism
Measuring the impact of terrorism on society
Measuring the effectiveness of counter-terrorism campaigns
Crime intelligence and cyberspace crime investigation
Immigration and security.
Paper submission
Submission file formats are PDF and Microsoft Word. Required Word/LaTex templates (IEEE two-column format) will be found at the conference Web site shortly. Long (6,000 words, 6 pages max.) and short (3000 words, 3 pages max.) papers in English must be submitted electronically via the conference Web site by Friday, January 20, 2009.

Authors who wish to present a poster and/or demo may submit a 1-page extended abstract, which, if selected, will appear in Proceedings.

Meet the Author Sessions
In addition to a formal paper presentation, authors of accepted papers are strongly encouraged to discuss their findings in a "Meet the Author" poster/demo session.

Tutorials and Workshops
Proposals for tutorials and special-topic workshops in any areas of Intelligence and Security Informatics research and practice are welcome. Such events will be an integral part of the ISI-2009 conference program. Proposals in PDF or Microsoft Word not exceeding 3 pages should be emailed to the conference organizing committee at by February 20, 2009. They should contain the following information:

Title of tutorial/workshop
Preferred duration
Information about instructor(s)/organizer(s)
Objectives to be achieved
Scope of topics to be covered
Target audience and evidence of interest (for tutorials)
Target audience and the list of potential presenters/contributors (for workshops)
Conference Proceedings
Accepted papers and poster abstracts will be published in the conference proceedings to be published by IEEE.

Conference Location and Attendance
At least one author from each accepted paper must register and attend to present the paper at the conference. Conference registration rates will be posted shortly. The conference will be held at the Hyatt Regency North Dallas; reservation information can be found on the Location page.

Related Resources

IEEE ICA 2022   The 6th IEEE International Conference on Agents
IEEE SSCI 2023   2023 IEEE Symposium Series on Computational Intelligence
IEEE CCNC STP-CPS 2023   5th International Workshop on Security Trust Privacy for Cyber-Physical Systems (STP-CPS'23) with IEEE CCNC 2023, 8-11 January, Las Vegas, NV, USA
SSCI 2023   2023 IEEE Symposium Series on Computational Intelligence
EvoCompAISecurity&Privacy 2022   Evolutionary Computing for AI-Driven Security and Privacy: Advancing the state-of-the-art applications
INDIN 2023   IEEE International Conference on Industrial Informatics
IEEE ICVR 2023   2023 the 9th International Conference on Virtual Reality (ICVR 2023)--IEEE, SCI
IEEE Journal of Selected Topics in Appli 2023   Security and Privacy-preserving Solutions on Remote Sensing Data of Smart Cities
ICCSN 2023   IEEE--2023 15th International Conference on Communication Software and Networks (ICCSN 2023)
IEEE CCAI 2023   IEEE--2023 3rd International Conference on Computer Communication and Artificial Intelligence (CCAI 2023)