-------- Original-Nachricht -------- Betreff: [isworld] CFP: European Conference on Intelligence and Security Informatics 2008 Datum: Fri, 02 May 2008 01:03:03 -0700 Von: Daniel Zeng zeng@eller.arizona.edu Antwort an: Daniel Zeng zeng@eller.arizona.edu Organisation: University of Arizona An: AISWORLD Information Systems World Network isworld@lyris.isworld.org
************************************************************* CALL FOR PAPERS ************************************************************* EuroISI 2008 European Conference on Intelligence and Security Informatics Copenhagen, Denmark, December 3-5th, 2008 ************************************************************* Organized by Aalborg University Esbjerg
in collaboration with Joint Research Centre, European Commission University of Arizona IEEE Systems Man and Cybernetics Society ************************************************************** www.euroisi.org **************************************************************
Intelligence and Security Informatics (ISI) is a multidisciplinary science encompassing methodologies, models, algorithms, and advanced tools for intelligence analysis, homeland security, terrorism research as well as security-related public policies. EuroISI 2008 is the first European edition of the series of ISI symposiums being held annually in the US since 2003 and more recently in Asia. These meetings gather together people from previously disparate communities to provide a stimulating forum for exchange of ideas and results. We invite to this meeting academic researchers (in information technologies, computer science, public policy, and social and behavioral studies), law enforcement and intelligence experts, as well as information technology companies, industry consultants and practitioners in the fields involved. EuroISI 2008 will be held in Copenhagen, Denmark, one of the most cosmopolitan cities in the world. The EuroISI 2008 proceedings will be published by Springer in its Lecture Notes in Computer Science series.
*************************************************************** Important Dates: Conference submissions due: June 15th, 2008.
For submission details visit the conference web site at: www.euroisi.org
Notification of acceptance: August 1st, 2008 Camera-ready copy due: August 15th, 2008 ****************************************************************
Topics of interest include, but are not limited to: I. Data/Text Mining, Computational Intelligence and Security Informatics Intelligence-related knowledge discovery Computer or cybercrime investigations and digital forensics Criminal data mining and network analysis Criminal/intelligence information sharing and visualization Web-based intelligence monitoring and analysis Applications of digital library technologies in intelligence data processing, preservation, sharing, and analysis Information extraction for Intelligence Soft/Granular computing and computational intelligence techniques in intelligence and security informatics Cryptographic techniques in security informatics Agents and collaborative systems for intelligence sharing HCI and user interfaces of relevance to intelligence and security Cybercrime detection and analysis Authorship analysis and identification Spatio-temporal data analysis and GIS for crime analysis and security informatics Deception and intent detection Information sharing policy and governance Privacy and civil liberties issues Intelligence-computerized community security and surveillance systems
II. Infrastructure Protection and Emergency Responses Cyberinfrastructure design and protection Intrusion detection Bio-terrorism tracking, alerting, and analysis Bio-terrorism information infrastructure Transportation and communication infrastructure protection Border/transportation safety Emergency response and management Disaster prevention, detection, and management Communication and decision support for search and rescue Decision support systems for real-time/near real-time security-related events Assisting citizens' responses to terrorism and catastrophic events Computer forensics and crime lead discovery Anti-fraud information technology
III. Terrorism Informatics Terrorism related analytical methodologies and tools Terrorism knowledge portals and databases Terrorist incident chronology databases Terrorism root cause analysis Social network analysis (radicalization, recruitment, conducting operations), visualization, and simulation Forecasting terrorism, countering terrorism Measuring the impact of terrorism on society Measuring the effectiveness of counter-terrorism campaigns
******************************************************************
The official language of the conference is English. Only original, high quality papers that have not been submitted previously to any other conference will be accepted for publication. Submission file formats are PDF with the document source in Microsoft Word or LaTeX. The templates for Microsoft Word and LaTeX templates can be found at the Springer LNCS website (http://www.springer.com/east/home/computer/lncs). Papers (in English) may be submitted electronically via the conference Web site.
******************************************************************* Organizing Committee
Daniel Ortiz-Arroyo, Aalborg University Esbjerg (General Chair) David Hicks, Aalborg University Esbjerg (Conference co-Chair) Clive Best, JRC (Conference co-Chair) Hsinchun Chen, Univ. of Arizona (Conference co-Chair) Henrik Legind Larsen, Aalborg University Esbjerg (Program Committee co-Chair) Daniel Zeng, Univ. of Arizona (Program Committee co-Chair) Andrea Valente, Aalborg University Esbjerg (Local arrangements co-Chair) Akbar Hussain, Aalborg University Esbjerg (Local arrangements co-Chair)
Program Committee Tayfur Altiok Rutgers University, USA Dragos Arotaritei University of Medicine and Pharmacy "Gr. T. Popa" Iasi, Romania Antonio Badia University of Louisville, USA Patrick Bosc Enssat, University of Rennes, France Jesus Cardenosa Technical University of Madrid, Spain Richard Chbeif Bourgogne University, France Xueqi Cheng Chinese Academy of Sciences, China Agnieszka Dardzinska Bialystok Technical University Guy DE TRE Ghent University, Belgium Kevin C. Desouza University of Washington, USA Marek Druzdzel Bialystok Technical University Dennis Egan George Washington Univ., USA Vladimir Estivill-Castro Griffith University, Australia Uwe Glasser Simmon Fraser University, Canada Nazli Goharian Illinois Institute of Technology, USA Mark Goldberg Rensselaer Polytechnic Institute, USA Paul Hofmann SAP Akbar Hussain Aalborg University Esbjerg, Denmark Janusz Kacprzyk Polish Academy of Sciences, Poland Paul Kantor Rutgers University, USA Juha Knuuttila Laurea University of Applied Sciences, Finland Don Kraft Louisiana State University; USA Volker Krüger Aalborg University Copenhagen, Denmark Seok-Won Lee University of North Carolina at Charlotte, USA Gondy Leroy Claremont Graduate University, USA Ee-peng Lim Nanyang Technological University, Singapore Maria Jose Martín-Bautista University of Granada, Spain Nasrullah Memon Aalborg University Esbjerg, Denmark Sushmita Mitra Indian Statistical Institute, India Robert Moskovitch Ben Gurion University; Israel Fredrick Mtenzi Dublin Institute of Technology, Ireland Ajith Mtenzi Norwegian University of Science and Technology, Norway Clifford Neuman University of Southern California, USA Joon Park Syracuse University, USA Gabriella Pasi Università degli Studi di Milano Bicocca, Italy Warren Powell Princeton University, USA Yael Radlauer International Policy Institute for Counter-Terrorism, Isreal Victor Ralevich Sheridan Institute of Technology and Advanced Learning, Canada Tiit T. Romet Government of Canada, Canada Elie Sanchez Universite Aix-Marseille II Antonio Sanfilippo Pacific Northwest National Lab, USA Charles Shoniregun University of East London, UK Joshua Sinai The Analysis Corp., USA David B. Skillicorn Queen's University, Canada Randy Smith University of Alabama, USA Nicolas Spyratos Université de Paris-Sud, France Clark Thomborson University of Auckland, New Zealand Paul Thompson Dartmouth College, USA Scott Tousley Logos Technologies, USA Cedric Ulmer SAP Nalini Venkatasubramanian University of California at Irvine, USA Alan Wang Virginia Tech, USA Fei-Yue Wang Chinese Academy of Sciences, China Uffe Kock Wiil University of Southern Denmark; Denmark Jennifer Xu Bentley College, USA Chris Yang The Chinese University of Hong Kong, Hong Kong Wei Yue University of Texas, Dallas, USA Slawomir Zadrozny Polish Academy of Sciences, Poland Nan Zhang Univ. of Texas at Arlington, USA Lina Zhou University of Maryland Baltimore County, USA Willam Zhu Univ. of Electronic Science and Tech. of China, China
The AISWorld LISTSERV is a service of the Association for Information Systems (http://www.aisnet.org). To unsubscribe, redirect, or change subscription options please go to http://lyris.isworld.org/. You are subscribed to AISworld as: neumann@wu-wien.ac.at. Each Sender assumes responsibility that his or her message conforms to the AISWorld LISTSERV policy and conditions of use available at http://lyris.isworld.org/isworldlist.htm.