Sign for Notice Everyday    注册| 登陆| 友情链接| English|

Our Sponsors


    IIS 2012 - International Workshop on Intelligence and Security Informatics for International Security (IIS'12)

    View: 412

    Website | Want to Edit it Edit Freely

    Category IIS 2012

    Deadline: June 20, 2012 | Date: October 11, 2012-October 12, 2012

    Venue/Country: Trivandrum, India

    Updated: 2012-06-13 07:29:40 (GMT+9)

    Call For Papers - CFP

    International Workshop on Intelligence and Security Informatics for International Security (IIS'12) , 11-12 October 2012, Trivandrum, India

    http://www.snds-conference.org/iis2012.html

    Threats to our societies, governments and commercial infrastructures are very real due to the growth of terrorism, criminal networks and cyber-attacks. These threats are high precedence in government strategy planning. The science of Intelligence and Security Informatics (ISI) focuses on the development of advanced information technologies, systems, algorithms, and databases for international, national and homeland security related applications, through an integrated technological, organizational, and policy-based approach. With the continuous advance of IT technologies and the increasing sophistication of national and international security, in recent years, new directions in ISI research and applications have emerged to address complicated problems with advanced technologies. The goal of International Workshop on Intelligence and Security Informatics for International Security (IIS'12) is to gather people from previously disparate communities to provide a stimulating forum for exchange of ideas and results.

    Call for Papers

    We invite academic researchers, law enforcement and intelligence experts, as well as information technology companies, industry consultants and practitioners in the fields involved to submit original and unpublished work. The maximum length of the paper is 10 pages (including figures and references). The paper should not contain page numbers or any special headers or footers. The manuscripts should be submitted in PDF format. Authors should submit their papers online. Unregistered authors should first create an account on EDAS to log on.

    All papers that conform to submission guidelines will be peer reviewed and evaluated based on originality, technical and/or research content/depth, correctness, relevance to conference, contributions, and readability. Acceptance of papers will be communicated to authors by email. Conference proceedings will be published by Springer in Communications in Computer and Information Science Series(CCIS), ISSN: 1865:0929. CCIS is abstracted/indexed in ISI Proceedings, Scopus, EI and DBLP. The Proceedings will also be included in the CCIS electronic book series hosted in the SpringerLink digital library. At least one full paying author of each accepted paper must register for the Conference before the indicated deadline.

    The workshop provides a venue to present early work in the relevant areas. Topics of interest include, but are not limited to, the following:

    Agents and collaborative systems for intelligence sharing

    Bio-terrorism tracking, alerting, and analysis

    Computer or cybercrime investigations and digital forensics

    Consumer-generated media and social media analytics

    Corporate sentiment surveillance

    Crime pattern recognition and modeling tools

    Criminal/ intelligence information sharing and visualization

    Criminal data mining and network analysis

    Critical infrastructure protection

    Cybercrime and social impacts, Cyber-crime detection and analysis

    Deception and intent detection

    Disaster prevention, detection, and management

    Emergency response and management

    Forecasting and countering terrorism

    Immigration and security

    Information security management standards

    Intelligence-related knowledge discovery

    Link analysis and network mining

    Measuring the impact of terrorism on society

    Privacy, security, and civil liberties issues

    Quantification of threats and risks

    Social network analysis

    Surveillance and Reconnaissance infrastructure

    Terrorism knowledge portals and databases

    Text mining and Web mining applied to blogs and Web communities

    Web-based intelligence monitoring and analysis


    Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
    Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.