HST 2015 - 2015 IEEE Symposium on Technologies for Homeland Security (HST ’15)
Date2015-04-14 - 2015-04-16
Deadline2014-07-15
VenueWaltham, USA - United States
Keywords
Websitehttps://ieee-hst.org
Topics/Call fo Papers
The 14th annual IEEE Symposium on Technologies for Homeland Security (HST ’15), will be held 14-16 April, 2015, in the Greater Boston, Massachusetts area. This symposium brings together innovators from leading academic, industry, business, Homeland Security Centers of Excellence, and government programs to provide a forum to discuss ideas, concepts, and experimental results.
Produced by IEEE with technical support from DHS S&T, IEEE Boston Section, and IEEE-USA and organizational support from MIT Lincoln Laboratory, Raytheon, Battelle, and MITRE, this year’s event will once again showcase selected technical paper and posters highlighting emerging technologies in the areas of:
Cyber Security
Biometrics & Forensics
Land and Maritime Border Security
Attack and Disaster Preparation, Recovery, and Response
We are currently seeking technical paper, poster and tutorial session submissions in each of the areas noted above. Submissions should focus on technologies with applications available for implementation within about five years. All areas will cover the following common topics:
Strategy and threat characterization, CONOPs, risk analysis,
Modeling, simulation, experimentation, and excercises & training, and
Testbeds, standards performance and evaluations.
Contact Information
For more detailed information on the Call for Papers, Posters & Tutorials, as well as Sponsorship and Exhibit opportunities, email: information-AT-ieee-hst.org. Submissions should be made at the following website, https://cmt.research.microsoft.com/HST2015/
Attack and Disaster Preparation, Recovery and Response
Targets include: Small events (10s - 100s of victims), large events (1,000s - 10,000) catastrophic events (>100,000s)
Cloud Computing and “Big Data” analytics to support prediction, and integrated/interoperable decision support
Planning and Preparation techniques for pre-positioning supplies, and locating, tracking, and tasking first responders
Situational Awareness / Situational Understanding, Information Sharing and Data Visualization
Decontamination and restoration strategies, approaches, and sensors following WMD events
Preparedness, Risk, and Resilience measurement and performance tracking
Land and Maritime Border Security
Targets include: Individuals, facilities and monuments, airports and airspace, seaports and maritime, transportation infrastructure, land borders and ports of entry
Radiation and nuclear threat characterization, risk assessment, sensors and detectors
Nuclear forensics
Personnel screening
Container/Compartment/Vehicle screening (Detection, monitoring and tracking)
Ground surveillance
Port (land, sea and air) surveillance
Automated target recognition and identification
Cyber Security
Targets include: Federal National networks, computers and control systems
Secure, resilient systems and networks; cloud security
Mission Assurance
Command, control, and interoperability
Situational awareness (enterprise-level, regional, global)
Information sharing; privacy-aware security; data anonymization
System and nNetwork recovery and reconstitution; forensics
Supply chain monitoring and defense
Process control systemCyber-physical control and critical infrastructure system security
IP Ttelecommunications security; wireless security; mobile security
Global-scale identity management
Cyber security economic modeling, ; security metrics
Attack modeling and characterization
Cyber security incident response
Software assurance
Human factors and usability
Public policy; ethical, legal, and social issues
Biometrics & Forensics
Targets include: People and assets.
BIOMETRICS
Biometrics recognition based on DNA, voice, fingerprint, iris, face, handwriting, gait, and other modalities
Statistical estimation of stability and distinctiveness
Datasets, corpora, and evaluation
Multimodal biometrics
New biometrics and novel sensing technologies
Legacy biometric systems
Robust biometrics with respect to standoff, environmental conditions, and channel impairments
Analysis of biometric applications
Identity Management
FORENSICS
Evaluation of the scientific basis, validity, and reliability, and uncertainty of forensic analyses under realistic case scenarios
Statistical estimation and reporting
Human observer bias and sources of human error with forensic sciences
Tools and protocols (automated and manual) for forensic examinations, methods, and practices
Standards and Guidelines
Nationwide and international biometric data interoperability
Call for Tutorials
We seek tutorials in related areas. Tutorials may be either 90 minutes or 3 hours long. Submissions should include the title, a brief description of the topic for the tutorial and intended audience, the intended length, and a short biography of the presenter(s). Send submissions to tutorials-AT-ieee-hst.org.
Call for Business Program Topics
We are looking for suggestions for topics to be discussed in the business program. Examples might be ‘Doing Business with State and Local government entities’, ‘A review of the DHS SBIR/BAA process.’ Send suggestions to businessprogram-AT-ieee-hst.org.
Instructions for Paper, Poster and Tutorial Submissions
Paper Submissions
Prospective paper authors are invited to submit one or more abstracts by July 15, 2014. The abstracts will be reviewed for relevance to the symposium. The review results and Paper Submission Invitations will be issued by August 1, 2014. Authors who receive Submission Invitations will be invited to submit a full paper for review and a final acceptance decision by November 1, 2014. Please note that receiving a Submission Invitation does NOT imply final acceptance of paper for presentation. Authors will be notified of the review result (i.e., acceptance or rejection), with any applicable comments, by December 15, 2014. Depending on program needs, some prospective paper authors may be asked to present a poster in lieu of an oral paper presentation.
Therefore, for a successful paper presentation, two submissions are required:
(1) An abstract indicating interest and a one-page biography of the proposed speaker. The abstract should be 500 words maximum, including the authors(s) title, name, address, phone, fax, email and organizational affiliation. Attached to this should be the biography of the presenting author. The abstract will be reviewed for applicability to this symposium.
(2) A completed paper, is required only from authors receiving a Submission Invitation. This paper should be prepared in standard IEEE format and not exceed seven pages, including all illustrations and references. This paper will be carefully reviewed for relevance to the symposium, technical merit, and contribution to the pertinent body of knowledge by the Technical Program Committee. The paper will be accepted or rejected for the symposium on this basis. Technical papers must not substantially overlap with material published at or simultaneously submitted to another venue.
Poster Submissions
Some authors may prefer to present their work as a poster presentation. In this case, an abstract should be prepared and submitted in accordance with Item 1 of the paper submission process and indicate the preference for a poster presentation. Authors will be notified of the review result (i.e., acceptance or rejection) and any applicable comments, by December 15, 2014.
Please note: Accepted papers and posters, submissions will require at least one author to register and pay the symposium fee. The organizers of HST, as well as our attendees, expect all accepted papers and posters to be presented at the symposium. IEEE reserves the right to exclude a paper from distribution after the symposium if the paper is not presented.
All submissions should be made at the following website: https://cmt.research.microsoft.com/HST2015/
Publishing Information
All papers and posters will be published on the symposium proceedings and distributed to symposium attendees. Extended versions of selected full technical papers that meet the publishing requirements may be published in selected journals and in the IEEE Xplore as part of the IEEE Symposium Publication Program.
Call for Sponsors and Exhibitors
A limited number of sponsorships and exhibit packages are available. To learn more, visit the symposium website or contact or sponsorship-AT-ieee-hst.org.
For more information on the symposium, see the website, www.ieee-hst.org or email, information-AT-ieee-hst.org.
Produced by IEEE with technical support from DHS S&T, IEEE Boston Section, and IEEE-USA and organizational support from MIT Lincoln Laboratory, Raytheon, Battelle, and MITRE, this year’s event will once again showcase selected technical paper and posters highlighting emerging technologies in the areas of:
Cyber Security
Biometrics & Forensics
Land and Maritime Border Security
Attack and Disaster Preparation, Recovery, and Response
We are currently seeking technical paper, poster and tutorial session submissions in each of the areas noted above. Submissions should focus on technologies with applications available for implementation within about five years. All areas will cover the following common topics:
Strategy and threat characterization, CONOPs, risk analysis,
Modeling, simulation, experimentation, and excercises & training, and
Testbeds, standards performance and evaluations.
Contact Information
For more detailed information on the Call for Papers, Posters & Tutorials, as well as Sponsorship and Exhibit opportunities, email: information-AT-ieee-hst.org. Submissions should be made at the following website, https://cmt.research.microsoft.com/HST2015/
Attack and Disaster Preparation, Recovery and Response
Targets include: Small events (10s - 100s of victims), large events (1,000s - 10,000) catastrophic events (>100,000s)
Cloud Computing and “Big Data” analytics to support prediction, and integrated/interoperable decision support
Planning and Preparation techniques for pre-positioning supplies, and locating, tracking, and tasking first responders
Situational Awareness / Situational Understanding, Information Sharing and Data Visualization
Decontamination and restoration strategies, approaches, and sensors following WMD events
Preparedness, Risk, and Resilience measurement and performance tracking
Land and Maritime Border Security
Targets include: Individuals, facilities and monuments, airports and airspace, seaports and maritime, transportation infrastructure, land borders and ports of entry
Radiation and nuclear threat characterization, risk assessment, sensors and detectors
Nuclear forensics
Personnel screening
Container/Compartment/Vehicle screening (Detection, monitoring and tracking)
Ground surveillance
Port (land, sea and air) surveillance
Automated target recognition and identification
Cyber Security
Targets include: Federal National networks, computers and control systems
Secure, resilient systems and networks; cloud security
Mission Assurance
Command, control, and interoperability
Situational awareness (enterprise-level, regional, global)
Information sharing; privacy-aware security; data anonymization
System and nNetwork recovery and reconstitution; forensics
Supply chain monitoring and defense
Process control systemCyber-physical control and critical infrastructure system security
IP Ttelecommunications security; wireless security; mobile security
Global-scale identity management
Cyber security economic modeling, ; security metrics
Attack modeling and characterization
Cyber security incident response
Software assurance
Human factors and usability
Public policy; ethical, legal, and social issues
Biometrics & Forensics
Targets include: People and assets.
BIOMETRICS
Biometrics recognition based on DNA, voice, fingerprint, iris, face, handwriting, gait, and other modalities
Statistical estimation of stability and distinctiveness
Datasets, corpora, and evaluation
Multimodal biometrics
New biometrics and novel sensing technologies
Legacy biometric systems
Robust biometrics with respect to standoff, environmental conditions, and channel impairments
Analysis of biometric applications
Identity Management
FORENSICS
Evaluation of the scientific basis, validity, and reliability, and uncertainty of forensic analyses under realistic case scenarios
Statistical estimation and reporting
Human observer bias and sources of human error with forensic sciences
Tools and protocols (automated and manual) for forensic examinations, methods, and practices
Standards and Guidelines
Nationwide and international biometric data interoperability
Call for Tutorials
We seek tutorials in related areas. Tutorials may be either 90 minutes or 3 hours long. Submissions should include the title, a brief description of the topic for the tutorial and intended audience, the intended length, and a short biography of the presenter(s). Send submissions to tutorials-AT-ieee-hst.org.
Call for Business Program Topics
We are looking for suggestions for topics to be discussed in the business program. Examples might be ‘Doing Business with State and Local government entities’, ‘A review of the DHS SBIR/BAA process.’ Send suggestions to businessprogram-AT-ieee-hst.org.
Instructions for Paper, Poster and Tutorial Submissions
Paper Submissions
Prospective paper authors are invited to submit one or more abstracts by July 15, 2014. The abstracts will be reviewed for relevance to the symposium. The review results and Paper Submission Invitations will be issued by August 1, 2014. Authors who receive Submission Invitations will be invited to submit a full paper for review and a final acceptance decision by November 1, 2014. Please note that receiving a Submission Invitation does NOT imply final acceptance of paper for presentation. Authors will be notified of the review result (i.e., acceptance or rejection), with any applicable comments, by December 15, 2014. Depending on program needs, some prospective paper authors may be asked to present a poster in lieu of an oral paper presentation.
Therefore, for a successful paper presentation, two submissions are required:
(1) An abstract indicating interest and a one-page biography of the proposed speaker. The abstract should be 500 words maximum, including the authors(s) title, name, address, phone, fax, email and organizational affiliation. Attached to this should be the biography of the presenting author. The abstract will be reviewed for applicability to this symposium.
(2) A completed paper, is required only from authors receiving a Submission Invitation. This paper should be prepared in standard IEEE format and not exceed seven pages, including all illustrations and references. This paper will be carefully reviewed for relevance to the symposium, technical merit, and contribution to the pertinent body of knowledge by the Technical Program Committee. The paper will be accepted or rejected for the symposium on this basis. Technical papers must not substantially overlap with material published at or simultaneously submitted to another venue.
Poster Submissions
Some authors may prefer to present their work as a poster presentation. In this case, an abstract should be prepared and submitted in accordance with Item 1 of the paper submission process and indicate the preference for a poster presentation. Authors will be notified of the review result (i.e., acceptance or rejection) and any applicable comments, by December 15, 2014.
Please note: Accepted papers and posters, submissions will require at least one author to register and pay the symposium fee. The organizers of HST, as well as our attendees, expect all accepted papers and posters to be presented at the symposium. IEEE reserves the right to exclude a paper from distribution after the symposium if the paper is not presented.
All submissions should be made at the following website: https://cmt.research.microsoft.com/HST2015/
Publishing Information
All papers and posters will be published on the symposium proceedings and distributed to symposium attendees. Extended versions of selected full technical papers that meet the publishing requirements may be published in selected journals and in the IEEE Xplore as part of the IEEE Symposium Publication Program.
Call for Sponsors and Exhibitors
A limited number of sponsorships and exhibit packages are available. To learn more, visit the symposium website or contact or sponsorship-AT-ieee-hst.org.
For more information on the symposium, see the website, www.ieee-hst.org or email, information-AT-ieee-hst.org.
Other CFPs
- 2nd International Renewable and Sustainable Energy Conference
- Workshop on Human Gait and Action Analysis in the Wild: Challenges and Applications
- 3RD IFAC WORKSHOP ON MULTIVEHICLE SYSTEMS
- MTS IEEE OCEANS conference and exhibit
- First UCL-Duke University Workshop on Sensing and Analysis of High-Dimensional Data
Last modified: 2014-05-31 10:48:16