[Research] Fwd: 2013 IEEE Intelligence and Security Informatics Conference
Artur Dubrawski
awd at cs.cmu.edu
Tue Oct 9 16:16:44 EDT 2012
Dear Colleagues,
We are pleased to announce the first call for papers and workshops, for
ISI2013. Please forward to your colleagues to whom you believe may be
interested in the subject conference.
Sincerely,
The 2013 IEEE ISI Conference Organizers
_________________________________________
IEEE Intelligence and Security Informatics (ISI) 2013
Call for Papers and Workshop Proposals
June 4-7, 2013, Seattle, WA, USA
*THEME: */Big Data, Emergent Threats and Decision-Making in Security
Informatics/
*HOST: *Pacific Northwest National Laboratory
*Conference website: *http://ISIconference2013.org/
Intelligence and Security Informatics (ISI) research is an
interdisciplinary research field involving academic researchers in
information technologies, computer science, public policy,
bioinformatics, and social and behavior studies as well as local, state,
and federal law enforcement and intelligence experts, and information
technology industry consultants and practitioners to support
counterterrorism and homeland security missions of anticipation,
interdiction, prevention, preparedness and response to terrorist acts.
The annual IEEE International ISI Conference series was started in 2003.
Meeting have been held in Tucson, AZ (twice); Atlanta, GA; San Diego,
CA; New Brunswick, NJ; Taipei, Taiwan; Dallas, TX; Vancouver, Canada;
and Beijing, China, and Washington D.C. Proceedings of these ISI
meetings and workshops have been published by the IEEE Press and in the
Springer Lecture Notes in Computer Science (LNCS) series.
*ISI 2013 will be organized in three main streams focusing on*
* Big Data in Security Informatics
* Emergent Threats
* Decision-Making in Security Informatics
Submissions may include systems, methodology, test-bed, modeling,
evaluation, and policy papers. Research should be relevant to
informatics, organization, or public policy in applications of
counter-terrorism or protection of local/national/international security
in the physical world or cyberspace. Topics include but are not limited to:
*Big Data in Security Informatics*
* Information Sharing and Data/Text Mining Intelligence-related
knowledge discovery
* Computer or cybercrime investigations and digital forensics
* Criminal investigative criteria and standard of procedure on
Computer crime
* Criminal data mining and network analysis
* Forecasting crime and the impact of crime
* Criminal/intelligence information sharing and visualization
* Crime pattern recognition and modeling tools
* Web-based intelligence monitoring and analysis
* Spatial-temporal data analysis/GIS for crime analysis and security
informatics
* Deception and intent detection
* Cyber-crime detection and analysis
* Authorship analysis and identification
* Applications of digital library technologies in intelligence data
processing, preservation, sharing, and analysis
* Agents and collaborative systems for intelligence sharing
* HCI and user interfaces of relevance to intelligence and security
* Information sharing policy and governance
* Privacy, security, and civil liberties issues
* Intelligence-computerized community security and surveillance system
*Emergent Threats*
* Infrastructure Protection and Emergency Responses
* Cyber-Physical-Social system security and incident management
* Cyber-infrastructure design and protection
* Intrusion detection
* Bio-terrorism tracking, alerting, and analysis
* Bio-terrorism information infrastructure
* Transportation and communication infrastructure protection
* Border/transportation safety
* Law Enforcement decision support systems
* Emergency response and management
* Disaster prevention, detection, and management
* Communication and decision support for search and rescue
* Assisting citizens' responses to terrorism and catastrophic events
* Computer forensics and crime lead discovery
* Anti-fraud information technology
* Terrorism Informatics
* Terrorism related analytical methodologies and software tools
* Terrorism knowledge portals and databases
* Terrorist incident chronology databases
* Terrorism root cause analysis
* Social network analysis (radicalization, recruitment, conducting
operations), visualization, and simulation
* Forecasting terrorism
* Countering terrorism
* Measuring the impact of terrorism on society
* Measuring the effectiveness of counter-terrorism campaigns
* Crime intelligence and cyberspace crime investigation
* Immigration and security
*Decision-Making in Security Informatics*
* Enterprise Risk Management and Information Systems Security
* Information security management standards
* Information systems security policies
* Behavior issues in information systems security
* Fraud detection
* Cybercrime and social impacts
* Corporate going concerns and risks
* Accounting and IT auditing
* Corporate governance and monitoring
* Board activism and influence
* Corporate sentiment surveillance
* Market influence analytics and media intelligence
* Consumer-generated media and social media analytics
*IMPORTANT DATES*
* Paper submission due date: February 15, 2013
* Notification of acceptance: March 18, 2013
* Due date for Workshop proposals: February 18, 2013
*PAPER SUBMISSION*
Submission file formats are PDF and Microsoft Word. Required Word/LaTeX
templates (IEEE two-column format) can be found at the conference Web
site. Long (6,000 words, 6 pages max) and short (3000 words, 3 pages
max.) Papers in English must be submitted electronically via the
conference Web site. The accepted papers from ISI 2013 and its
affiliated workshops will be published by the IEEE Press in formal
Proceedings. IEEE ISI Proceedings are EI-indexed. Authors who wish to
present a poster and/or demo may submit a 1-page extended abstract,
which, if selected, will appear in Proceedings. The selected IEEE ISI
2013 best papers will be invited for contribution to the Springer
Security Informatics journal. The deadline for paper submissions is
February 15, 2013. Paper submission instructions and template
information can be found at on the Submissions page at
https://www.easychair.org/conferences/?conf=ieeeisi2013.
**
*Best papers awards will be given in three categories:*
* Best paper
* Runner-up paper
* Best student paper
* Runner-up student paper.
*WORKSHOPS*
In conjunction with ISI 2013, several workshops will be held on June 4,
2013.Special-topic workshops in any areas of Intelligence and Security
Informatics research and practice are welcome. Such events will be an
integral part of the ISI-2013 conference program. Proposals in PDF or
Microsoft Word not exceeding 3 pages should be emailed to the conference
organizing committee at antonio at pnnl.gov <mailto:antonio at pnnl.gov> by
February 18, 2012 and contain the following information.
* Title of tutorial/workshop
* Preferred duration (half day vs. full day)
* Brief bios of proposed instructor(s)/organizer(s)
* Objectives to be achieved
* Scope of topics to be covered
* Target audience and the list of potential presenters/contributors
*Conference Organizing Committee*
*General Co-Chairs:*
* Antonio Sanfilippo, Pacific Northwest National Laboratory, USA
* Anne Kao, Boeing, USA
* Michael Gabbay, University of Washington, USA
*Steering Committee chair:*
* Hsinchun Chen, Univ. of Arizona, USA
* Daniel Zeng, Univ. of Arizona, USA
* Chris Yang, Drexel University, USA
*Program Co-Chairs:*
* Latifur Khan, UT Dallas, USA
* Jiexun (Jason) Li, Drexel University, USA
* Courtney Corley, Pacific Northwest National Laboratory, USA
*Workshop Co-Chairs:*
* Andrew Cowell, Pacific Northwest National Laboratory, USA
* Antonio E Badia, University of Louisville, USA
* Paul Thompson, Dartmouth College, USA
*Poster Co-Chairs:*
* Artur Dubrawski, Carnegie Mellon University, USA
* Uffe Kock Wiil, University of Southern Denmark, Denmark
*Local Arrangements Co-Chairs:*
* Jeffrey Kim, University of Washington, USA
*Finance and Registration Co-Chair:*
* Ahmad R. Yaghoobi, Boeing, USA
*Publication Co-Chairs:*
* Richard Colbaugh, Sandia National Lab, USA
* Kristin Glass, New Mexico Tech, USA
More information about the Autonlab-research
mailing list