-------- Original-Nachricht -------- Betreff: [isworld] Second CFP: IEEE ISI-2009 Datum: Sun, 28 Dec 2008 16:56:48 -0500 (EST) Von: Lina Zhou zhoul@umbc.edu Antwort an: Lina Zhou zhoul@umbc.edu An: AISWORLD Information Systems World Network isworld@lyris.isworld.org
Apologies for receiving multiple copies/cross-posting.
====================================================================== CALL FOR PAPERS ====================================================================== IEEE International Conference on Intelligence and Security Informatics (ISI-2009) ----------------------------------------------------------------- Conference Web site: http://www.isiconference.org/2009 June 8--11, 2009, Dallas, Texas, U.S.A.
*************** Important Dates *************** - Paper submission due January 20, 2009 - Notification of acceptance February 20, 2009 - Camera-ready copy due March 6, 2009 - Tutorial/workshop proposals February 20, 2009 - Conference dates: June 8--11, 2009
************************ Hosts and Major Sponsors ************************ Hosts: - The University of Texas at Dallas - The University of Arizona
Major Sponsors: - IEEE Intelligent Transportation Systems Society - The University of Texas at Dallas - Air Force Office of Scientific Research - Intelligence Advanced Research Projects Agency - Raytheon Corporation - National Science Foundation
**************** Conference Scope ****************
Intelligence and Security Informatics (ISI) has been established as an interdisciplinary subject that focuses on the development and use of advanced information technologies, including methodologies, models and algorithms, infrastructure, systems, and tools, for local, national/international, and global security related applications through an integrated technological, organizational, behavioral, and policy based approach.
The annual IEEE International Conference series (http://www.isiconference.org) on ISI was started in 2003 and the first five meetings were held in Tucson (twice), Atlanta, San Diego, New Brunswick, respectively, in the United States. The sixth (2008) meeting was held in Taipei with significant international participation. Several regional ISI conferences/workshops have also been held in Pacific Asia and Europe in recent years. These ISI conferences and workshops have brought together academic researchers, law enforcement and intelligence experts, information technology consultants and practitioners to discuss their research and practice related to various ISI topics. The themes of 2009 IEEE ISI conference cover context-aware data analysis, effective counterterrorism, and public education on cybercrime detection. The conference will provide a stimulating forum for ISI researchers all over the world to exchange ideas and report research results.
********************************** Paper Submission/Areas of Interest **********************************
Submissions may include systems, methodology, testbed, modeling, evaluation, policy, and position papers. Research should be relevant to informatics, organization, and/or public policy in applications of counter-terrorism or protection of local/national/international/global security in the physical world and/or cyberspace. Topics include but are not limited to:
I. Information Sharing and Data/Text Mining - Intelligence-related knowledge discovery - Criminal data mining and network analysis - Criminal/intelligence information sharing and visualization - Web-based intelligence monitoring and event detection - Deception and intent detection - Cybercrime detection and digital forensics - Spatio-temporal data analysis/GIS for crime analysis and security informatics - Image and video analysis for intention detection - Authorship analysis and identification - Applications of digital library technologies in intelligence data processing, preservation, sharing, and analysis - Agents and collaborative systems for intelligence sharing - HCI and user interfaces of relevance to ISI - Information sharing policy and governance - Privacy, security, and civil liberties issues - Intelligence-computerized community security and surveillance system - Context-aware data analysis
II. Infrastructure Protection and Emergency Responses - Cyberinfrastructure design and protection - Intrusion detection - Bio-terrorism tracking, alerting, and analysis - Bioterrorism information infrastructure - Transportation and communication infrastructure protection - Border/transportation safety - Emergency response and management - Disaster prevention, detection, and management - Communication and decision support for search and rescue - Decision support systems for real-time/near real-time security-related events - Assisting citizens' responses to terrorism and catastrophic events - Computer forensics and crime lead discovery - Cryptography and anti-fraud information technology
III. Terrorism Informatics - Terrorism related analytical methodologies and software tools - Terrorism knowledge portals and databases - Terrorist incident chronology databases - Terrorism root cause analysis - Social network analysis (radicalization, recruitment, conducting operations), visualization, and simulation - Forecasting terrorism - Countering terrorism - Measuring the impact of terrorism on society - Measuring the effectiveness of counter-terrorism campaigns - Crime intelligence and cyberspace crime investigation - Immigration and security
Paper submission: Submission file formats are PDF and Microsoft Word. Required Word/LaTex templates (IEEE two-column format) can be found at the conference Web site. Long (6,000 words, 6 pages max.) and short (3000 words, 3 pages max.) papers in English must be submitted electronically via the conference Web site by January 20, 2009.
Authors who wish to present a poster and/or demo may submit a 1-page extended abstract, which, if selected, will appear in Proceedings.
Meet the Author Sessions: In addition to a formal paper presentation, authors of accepted papers are strongly encouraged to discuss their findings in a "Meet the Author" poster/demo session.
*********************** Tutorials and Workshops ***********************
Proposals for tutorials and special-topic workshops in any areas of Intelligence and Security Informatics research and practice are welcome. Such events will be an integral part of the ISI-2009 conference program.
Proposals in PDF or Microsoft Word not exceeding 3 pages should be emailed to the conference organizing committee at zeng@email.arizona.edu by February 20, 2009. They should contain the following information.
- Title of tutorial/workshop - Preferred duration - Information about instructor(s)/organizer(s) - Objectives to be achieved - Scope of topics to be covered - Target audience and evidence of interest (for tutorials) - Target audience and the list of potential presenters/contributors (for workshops)
******************** Organizing Committee ********************
- Bhavani Thuraisingham, Univ. of Texas, Dallas (Conference co-Chair) - Hsinchun Chen, Univ. of Arizona (Conference co-Chair) - Latifur R Khan, Univ. of Texas at Dallas (Program Committee co-Chair) - Daniel Zeng, Univ. of Arizona & Chinese Academy of Sciences (Program Committee co-Chair) - Lina Zhou, Univ. of Maryland Baltimore County (Program Committee co-Chair) - Chris Yang, Drexel Univ. (Publication co-Chair) - Min-Yuh Day, National Taiwan Univ. (Publication co-Chair) - Cathy Larson, Univ. of Arizona (Local Arrangements co-Chair)
The AISWorld LISTSERV is a service of the Association for Information Systems (http://www.aisnet.org). To unsubscribe, redirect, or change subscription options please go to http://lyris.isworld.org/. You are subscribed to AISworld as: neumann@wu-wien.ac.at. Each Sender assumes responsibility that his or her message conforms to the AISWorld LISTSERV policy and conditions of use available at http://lyris.isworld.org/isworldlist.htm.