|
|
IEEE International Conference on Intelligence and Security Informatics
(IEEE ISI 2008)
|
Conference Website: http://isi2008.cpu.edu.tw |
Dates: June 17 ~ 20, 2008, Taipei, Taiwan |
|
|
Conference Scope:
|
The science of Intelligence and Security Informatics (ISI) focuses on the development and use of advanced information technologies, including methodologies, models and algorithms, infrastructure, systems, and tools for national/international and homeland security related applications through an integrated technological, organizational, and policy-based approach. ISI also encompasses the areas of terrorism research and intelligence analysis as well as security-related public policy.
Two previous symposia (ISI-2003 and ISI-2004) were held in Tucson, Arizona; the third (ISI-2005), with sponsorship by the IEEE, was held in Atlanta, Georgia, with 2006 and 2007 following in San Diego and New Brunswick, respectively. These meetings provided a stimulating intellectual forum for discussion among previously disparate communities: academic researchers (in information technologies, computer science, public policy, and social and behavioral studies); local, state, and federal law enforcement and intelligence experts; and information technology industry consultants and practitioners. Proceedings of these past ISI meetings were published in Springer Lecture Notes in Computer Science.
ISI-2008 will continue this conference series under the sponsorship of the IEEE Intelligent Transportation Systems Society. |
|
Topics of interest include, but are not limited to:
|
- Information Sharing and Data/Text Mining
- Intelligence-related knowledge discovery
- Computer or cyber crime investigations and digital forensics
- Criminal investigative criteria and standard of procedure on Computer crime
- Criminal data mining and network analysis
- Criminal/ intelligence information sharing and visualization
- Web-based intelligence monitoring and analysis
- Spatial-temporal data analysis/GIS for crime analysis and security informatics
- Deception and intent detection
- Cyber-crime detection and analysis
- Authorship analysis and identification
- Applications of digital library technologies in intelligence data processing, preservation, sharing, and analysis
- Agents and collaborative systems for intelligence sharing
- HCI and user interfaces of relevance to intelligence and security
- Information sharing policy and governance
- Privacy, security, and civil liberties issues
- Intelligence-computerized community security and surveillance system
- Infrastructure Protection and Emergency Responses
- Cyber-infrastructure design and protection
- Intrusion detection
- Bio-terrorism tracking, alerting, and analysis
- Bio-terrorism information infrastructure
- Transportation and communication infrastructure protection
- Border/transportation safety
- Emergency response and management
- Disaster prevention, detection, and management
- Communication and decision support for search and rescue
- Assisting citizens' responses to terrorism and catastrophic events
- Computer forensics and crime lead discovery
- Anti-fraud information technology
- Terrorism Informatics
- Terrorism related analytical methodologies and software tools
- Terrorism knowledge portals and databases
- Terrorist incident chronology databases
- Terrorism root cause analysis
- Social network analysis (radicalization, recruitment, conducting operations), visualization, and simulation
- Forecasting terrorism
- Countering terrorism
- Measuring the impact of terrorism on society
- Measuring the effectiveness of counter-terrorism campaigns
- Crime intelligence and cyberspace crime investigation
- Immigration and security
|
|
Important Dates:
|
- Conference submissions due: January 31, 2008
- Notification of acceptance: March 14, 2008
- Camera-ready copy due: March 28, 2008
- See the Submissions page for further details on submissions
- For workshop submission due dates, follow the workshop links below
|
|
Pre-conference Workshops:
|
|
|
We invite your participation in IEEE ISI 2008! |
|
|