IIS 2014 - Second International Workshop on Intelligence and Security Informatics for International Security (IIS'14)
Topics/Call fo Papers
Threats to our societies, governments and commercial infrastructures are very real due to the growth of terrorism, criminal networks and cyber-attacks. These threats are high precedence in government strategy planning. The science of Intelligence and Security Informatics (ISI) focuses on the development of advanced information technologies, systems, algorithms, and databases for international, national and homeland security related applications, through an integrated technological, organizational, and policy-based approach. With the continuous advance of IT technologies and the increasing sophistication of national and international security, in recent years, new directions in ISI research and applications have emerged to address complicated problems with advanced technologies. The goal of International Workshop on Intelligence and Security Informatics for International Security (IIS'14) is to gather people from previously disparate communities to provide a stimulating forum for exchange of ideas and results.
Call for Papers
We invite academic researchers, law enforcement and intelligence experts, as well as information technology companies, industry consultants and practitioners in the fields involved to submit original and unpublished work. The maximum length of the paper is 10 pages (including figures and references). The paper should not contain page numbers or any special headers or footers. The manuscripts should be submitted in PDF format. Authors should submit their papers online. Unregistered authors should first create an account on EDAS to log on.
All papers that conform to submission guidelines will be peer reviewed and evaluated based on originality, technical and/or research content/depth, correctness, relevance to conference, contributions, and readability. Acceptance of papers will be communicated to authors by email. All accepted papers will be published in the Conference proceedings. At least one full paying author of each accepted paper must register for the Conference before the indicated deadline.
Call for Papers
We invite academic researchers, law enforcement and intelligence experts, as well as information technology companies, industry consultants and practitioners in the fields involved to submit original and unpublished work. The maximum length of the paper is 10 pages (including figures and references). The paper should not contain page numbers or any special headers or footers. The manuscripts should be submitted in PDF format. Authors should submit their papers online. Unregistered authors should first create an account on EDAS to log on.
All papers that conform to submission guidelines will be peer reviewed and evaluated based on originality, technical and/or research content/depth, correctness, relevance to conference, contributions, and readability. Acceptance of papers will be communicated to authors by email. All accepted papers will be published in the Conference proceedings. At least one full paying author of each accepted paper must register for the Conference before the indicated deadline.
Other CFPs
- Second International Workshop on Trust and Privacy in Cyberspace (CyberTrust'14)
- Workshop on Multidisciplinary Perspectives in Cryptology and Information Security (CIS-2014)
- Second International Workshop on Security in Self-Organizing Networks (SelfNet'14)
- ACM International Conference on Interactive Experiences for TV and Online Video
- 7th International Workshop on Information Filtering and Retrieval
Last modified: 2013-09-08 22:02:20