ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

SDIS 2013 - International Workshop on Signature Discovery for Intelligence and Security

Date2013-06-04

Deadline2013-02-28

VenueWashington, USA - United States USA - United States

Keywords

Websitehttps://www.isiconference2013.org

Topics/Call fo Papers

The process of generating information from data in support of decisions typically starts with identifying a phenomenon of interest. Signatures are algorithmic or probabilistic constructs of multiple variables that reliably characterize, detect or predict such phenomena. This workshop will use an overview of the various methods currently used to develop and deploy signatures in security applications, highlighting the strategies and challenges faced in signature identification, development, and implementation. Papers and speakers are sought to engage a deep examination of signature challenges across multiple intelligence and security domains.
Paper Topics
We welcome workshop paper submissions on signature discovery methodologies and signature development challenges in security-related domains. Example topics are listed below:
Signature Discovery and Development Methodologies including but not limited to:
Signature discovery methodologies that work in multiple scientific disciplines
Signature construction and detection in "big data" environments
Finding the signal in the noise without over-fitting in signature construction
Using Bayes nets and/or other techniques for combining multiple lines of evidence including structured and unstructured data
Tools or frameworks to assist in signature discovery
Signature verification and validation approaches
Moving from signatures to decisions
Signature challenges for the Intelligence and Security Communities that address characterizing, detecting, or predicting phenomena of interest in:
Acoustic signatures in aquatic environments
Unusual, conspiratorial, or malicious behavior
Precursors to social upheavals in social media
Precursors to cyber attacks
Threats to nuclear security and illicit trafficking
Proteomics and biomarkers as precursors indicating bio-attacks
Threats to electric power grids, smart grid technologies, and control systems
Inexact pattern matching and evolving phenomena
Noise, obfuscation, and environmental interference
Important Dates
Workshop abstracts can be submitted beginning on: February 15 (Please limit abstracts to 300 words)
Deadline for abstracts: February 28
Notice of selection by: March 5
Workshop papers due: March 22
Notices of acceptance for papers and comments provided to authors: April 12
Camera ready paper submitted: April 29
Paper Submission:
Submission file formats are PDF and Microsoft Word. Required Word/LaTex templates (IEEE two-column format) can be found on IEEE's Publications web pages. Submissions can be long (6,000 words, 6 pages max) or short (3000 words, 3 pages max). Papers in English must be submitted by email to Adam Wynne at adam.wynne-AT-pnnl.gov. The accepted workshop papers from will be published by the IEEE Press in formal Proceedings. Authors who wish to present a poster and/or demo may submit a 1-page extended abstract, which, if selected, will appear in Proceedings.
Conference content will be submitted for inclusion into IEEE Xplore as well as other Abstracting and Indexing (A&I) databases. The selected IEEE ISI 2013 best papers will be invited for contribution to the Springer Security Informatics Journal.
Organizing Committee:
Mark Tardiff, Pacific Northwest National Laboratory
George Bonheyo, Pacific Northwest National Laboratory
Adam Wynne, Pacific Northwest National Laboratory
Program Committee:
Mark Tardiff (Chair), Pacific Northwest National Laboratory
Others, TBD
More Information:
For additional signature discovery information, please visit http://signatures.pnnl.gov

Last modified: 2013-02-23 20:25:39