Submissions encompass practice, system, methodology, evaluation, technology, testbed, policy, and position papers. Research papers must be relevant to informatics and counterterrorism or homeland security. Practice papers must reflect real experience or real needs. Topics include but are not limited to:
I. Port Security and infrastructure Protection
- Containerized cargo inspection technology
- Contraband detection and identification technologies
- Transportation and communication infrastructure protection
- Cyberinfrastructure design and protection
- Intrusion detection protection
- Analysis and modeling of container and inspection operations
- Deception and intent detection in people flowsII. Preparedness / Response to High-Consequence Event
- Web-based intelligence monitoring and analysis
- Spatio-temporal data analysis/GIS for security informatics
- Bio-terrorism tracking, alerting, and analysis
- Bio-terrorism information infrastructure
- Communication and decision support for search and rescue
- Economic impacts of security events and alerts on global supply chains
- Emergency response and management
- Assisting citizens' responses to terrorism and catastrophic events
- Disaster prevention, detection, and management
III. Terrorism-Related Intelligence and Informatics
- Intelligence-related data mining and knowledge discovery
- Counterterrorism-related analytical methodologies, software tools,
visualization ,knowledge portals and databases
- Agents and collaborative systems for intelligence sharing
- Applications of digital library technologies to intelligence
- processing, sharing, and analysis
- Terrorism forecasting and root-cause analysis
- Social network analysis (radicalization, recruitment, operations),
visualization, and simulation
- Forecasting terrorism
- Measuring counter-terrorism campaign effectiveness
- Measuring terrorism's impact on society
- Privacy, security, and civil liberties issues
- Information sharing policy and governance
Paper Submission
Long (6,000 words) and short (3,000) papers (in English) may be submitted by Monday, January 8, 2007 at: http://www.softconf.com/start/ISI2007/
Required Microsoft Word/LaTeX templates are at: http://www.ieee.org/portal/pages/pubs/transactions/stylesheets.html .
and sample files may be found at: http://www.ieee.org/portal/cms_docs/pubs/confpubcenter/pdfs/samplems.pdf .
Submission file formats are PDF and Microsoft Word. Authors wishing to present a poster and/or demo may submit a 500 word abstract, which will appear in the Proceedings.
Meet the Author Sessions. Authors of accepted papers are strongly encouraged to also discuss their findings in a "meet the author" poster/demo session. Authors of selected papers may be asked to submit extended versions of their work to a special issue on Intelligence & Security Informatics: IEEE Transactions on Systems, Man, and Cybernetics; IEEE Intelligent Systems; and IEEE Transactions on Intelligent Transportation Systems.