![]() |
| |||||||||||
ISI 2009 : IEEE International Conference on Intelligence and Security Informatics | |||||||||||
| |||||||||||
Call For Papers | |||||||||||
Call For Papers
IEEE International Conference on Intelligence and Security Informatics (ISI-2009) June 8-11, 2009, Dallas, Texas, U.S.A. Printable Call for Papers available here Paper Submission/Areas of Interest Submissions may include systems, methodology, testbed, modeling, evaluation, policy, and position papers. Research should be relevant to informatics, organization, and/or public policy in applications of counter-terrorism or protection of local/ national/international/global security in the physical world and/or cyberspace. Topics include but are not limited to: Information Sharing and Data/Text Mining Intelligence-related knowledge discovery Criminal data mining and network analysis Criminal/intelligence information sharing and visualization Web-based intelligence monitoring and event detection Deception and intent detection Cybercrime detection and digital forensics Spatio-temporal data analysis/GIS for crime analysis and security informatics Image and video analysis for intention detection Authorship analysis and identification Applications of digital library technologies in intelligence data processing, preservation, sharing, and analysis Agents and collaborative systems for intelligence sharing HCI and user interfaces of relevance to intelligence and security Information sharing policy and governance Privacy, security, and civil liberties issues Intelligence-computerized community security and surveillance system Context-aware data analysis. Infrastructure Protection and Emergency Responses Cyberinfrastructure design and protection Intrusion detection Bio-terrorism tracking, alerting, and analysis Bioterrorism information infrastructure Transportation and communication infrastructure protection Border/transportation safety Emergency response and management Disaster prevention, detection, and management Communication and decision support for search and rescue Decision support systems for real-time/near real-time security-related events Assisting citizens' responses to terrorism and catastrophic events Computer forensics and crime lead discovery Cryptography and anti-fraud information technology. Terrorism Informatics Terrorism related analytical methodologies and software tools Terrorism knowledge portals and databases Terrorist incident chronology databases Terrorism root cause analysis Social network analysis (radicalization, recruitment, conducting o perations), visualization, and simulation Forecasting terrorism Countering terrorism Measuring the impact of terrorism on society Measuring the effectiveness of counter-terrorism campaigns Crime intelligence and cyberspace crime investigation Immigration and security. Paper submission Submission file formats are PDF and Microsoft Word. Required Word/LaTex templates (IEEE two-column format) will be found at the conference Web site shortly. Long (6,000 words, 6 pages max.) and short (3000 words, 3 pages max.) papers in English must be submitted electronically via the conference Web site by Friday, January 20, 2009. Authors who wish to present a poster and/or demo may submit a 1-page extended abstract, which, if selected, will appear in Proceedings. Meet the Author Sessions In addition to a formal paper presentation, authors of accepted papers are strongly encouraged to discuss their findings in a "Meet the Author" poster/demo session. Tutorials and Workshops Proposals for tutorials and special-topic workshops in any areas of Intelligence and Security Informatics research and practice are welcome. Such events will be an integral part of the ISI-2009 conference program. Proposals in PDF or Microsoft Word not exceeding 3 pages should be emailed to the conference organizing committee at zeng@email.arizona.edu by February 20, 2009. They should contain the following information: Title of tutorial/workshop Preferred duration Information about instructor(s)/organizer(s) Objectives to be achieved Scope of topics to be covered Target audience and evidence of interest (for tutorials) Target audience and the list of potential presenters/contributors (for workshops) Conference Proceedings Accepted papers and poster abstracts will be published in the conference proceedings to be published by IEEE. Conference Location and Attendance At least one author from each accepted paper must register and attend to present the paper at the conference. Conference registration rates will be posted shortly. The conference will be held at the Hyatt Regency North Dallas; reservation information can be found on the Location page. |
|