posted by system || 2561 views || tracked by 9 users: [display]

ISI 2009 : IEEE International Conference on Intelligence and Security Informatics

FacebookTwitterLinkedInGoogle

 
When Jun 8, 2009 - Jun 12, 2009
Where Richardson, TX, USA
Submission Deadline Jan 20, 2009
Categories    intelligence   security   data mining   network analysis
 

Call For Papers

Call For Papers

IEEE International Conference on Intelligence and Security Informatics (ISI-2009)
June 8-11, 2009, Dallas, Texas, U.S.A.

Printable Call for Papers available here

Paper Submission/Areas of Interest
Submissions may include systems, methodology, testbed, modeling, evaluation, policy, and position papers. Research should be relevant to informatics, organization, and/or public policy in applications of counter-terrorism or protection of local/ national/international/global security in the physical world and/or cyberspace. Topics include but are not limited to:

Information Sharing and Data/Text Mining
Intelligence-related knowledge discovery
Criminal data mining and network analysis
Criminal/intelligence information sharing and visualization
Web-based intelligence monitoring and event detection
Deception and intent detection
Cybercrime detection and digital forensics
Spatio-temporal data analysis/GIS for crime analysis and security informatics
Image and video analysis for intention detection
Authorship analysis and identification
Applications of digital library technologies in intelligence data processing, preservation, sharing, and analysis
Agents and collaborative systems for intelligence sharing
HCI and user interfaces of relevance to intelligence and security
Information sharing policy and governance
Privacy, security, and civil liberties issues
Intelligence-computerized community security and surveillance system
Context-aware data analysis.
Infrastructure Protection and Emergency Responses
Cyberinfrastructure design and protection
Intrusion detection
Bio-terrorism tracking, alerting, and analysis
Bioterrorism information infrastructure
Transportation and communication infrastructure protection
Border/transportation safety
Emergency response and management
Disaster prevention, detection, and management
Communication and decision support for search and rescue
Decision support systems for real-time/near real-time security-related events
Assisting citizens' responses to terrorism and catastrophic events
Computer forensics and crime lead discovery
Cryptography and anti-fraud information technology.
Terrorism Informatics
Terrorism related analytical methodologies and software tools
Terrorism knowledge portals and databases
Terrorist incident chronology databases
Terrorism root cause analysis
Social network analysis (radicalization, recruitment, conducting o perations), visualization, and simulation
Forecasting terrorism Countering terrorism
Measuring the impact of terrorism on society
Measuring the effectiveness of counter-terrorism campaigns
Crime intelligence and cyberspace crime investigation
Immigration and security.
Paper submission
Submission file formats are PDF and Microsoft Word. Required Word/LaTex templates (IEEE two-column format) will be found at the conference Web site shortly. Long (6,000 words, 6 pages max.) and short (3000 words, 3 pages max.) papers in English must be submitted electronically via the conference Web site by Friday, January 20, 2009.

Authors who wish to present a poster and/or demo may submit a 1-page extended abstract, which, if selected, will appear in Proceedings.

Meet the Author Sessions
In addition to a formal paper presentation, authors of accepted papers are strongly encouraged to discuss their findings in a "Meet the Author" poster/demo session.

Tutorials and Workshops
Proposals for tutorials and special-topic workshops in any areas of Intelligence and Security Informatics research and practice are welcome. Such events will be an integral part of the ISI-2009 conference program. Proposals in PDF or Microsoft Word not exceeding 3 pages should be emailed to the conference organizing committee at zeng@email.arizona.edu by February 20, 2009. They should contain the following information:

Title of tutorial/workshop
Preferred duration
Information about instructor(s)/organizer(s)
Objectives to be achieved
Scope of topics to be covered
Target audience and evidence of interest (for tutorials)
Target audience and the list of potential presenters/contributors (for workshops)
Conference Proceedings
Accepted papers and poster abstracts will be published in the conference proceedings to be published by IEEE.

Conference Location and Attendance
At least one author from each accepted paper must register and attend to present the paper at the conference. Conference registration rates will be posted shortly. The conference will be held at the Hyatt Regency North Dallas; reservation information can be found on the Location page.

Related Resources

IEEE SSCI 2023   2023 IEEE Symposium Series on Computational Intelligence
ICMLA 2022   IEEE International conference on Machine Learning and Applications
EvoCompAISecurity&Privacy 2022   Evolutionary Computing for AI-Driven Security and Privacy: Advancing the state-of-the-art applications
MLDM 2023   18th International Conference on Machine Learning and Data Mining
IEEE TNSE Special Issue 2022   IEEE TNSE Special Issue on Next-generation Traffic Measurement with Network-wide Perspective and Artificial Intelligence
BIOS 2022   8th International Conference on Bioinformatics & Biosciences
IEEE ICCCR 2023   IEEE--2023 3rd International Conference on Computer, Control and Robotics (ICCCR 2023)
WSDM 2023   Web Search and Data Mining
CyberHunt 2022   IEEE BigData Workshop on Cyber Threat Intelligence and Hunting
ACM-Ei/Scopus-ITNLP 2022   2022 2nd International Conference on Information Technology and Natural Language Processing (ITNLP 2022) -EI Compendex