ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

HST 2012 - 2012 IEEE International Conference on Technologies for Homeland Security (HST)

Date2012-11-13

Deadline2012-04-22

VenueWaltham, USA - United States USA - United States

Keywords

Websitehttps://www.ieee-hst.org

Topics/Call fo Papers

This conference brings together innovators from leading universities, research laboratories, Homeland Security Centers of Excellence, small businesses, system integrators, and the end user community and provides a forum to discuss ideas, concepts, and experimental results. Stakeholders continue to include federal, state, local, tribal, and private sector organizations. This year we seek to broaden the conference to include input from our international partners.

We seek submissions in each of the following four major areas. We plan to invite experts to highlight key technical gaps and frame the technical challenges in protecting each of the listed targets, and seek papers that help close those gaps, securing classes of targets and preventing attacks against society. We will select the best paper from each of these tracks, and we will also identify the best paper at the conference.

LAND AND MARITIME BORDER SECURITY
Targets include: individuals, facilities, and monuments; airports and airspace; seaports and maritime; land borders and ports of entry

Strategy, CONOPs, system risk assessment, and exercises
Radiation and nuclear threat characterization, risk assessment, sensors, and detectors
Personnel screening
Container/compartment/vehicle screening (detection, monitoring, and tracking)
Ground surveillance
Port (land, sea, and air) surveillance
Automated target recognition and identification
Testbeds, standards, and evaluations
HOMELAND CYBER SECURITY
Targets include: federal and CIKR networks and computers, the smart grid, and control systems

Architecture, CONOPs, analytics, system risk analysis, and exercises
Host and network sensors (device, OS, application and networking layers; detection and response)
Privacy and travel document protection (hardware, algorithms, and protocols)
Attack analytic tools (honeyclients and honeynets)
Supply chain monitoring and defense
Command, control, and interoperability
Emergency readiness teams (info collection and distribution; Int’l sharing)
Testbeds, standards and evaluations
COUNTER-WMD TECHNIQUES AND CIKR PHYSICAL SECURITY
Targets include: population centers, organizations, infrastructure, facilities, and monuments

Strategy and threat characterization, CONOPs, system risk analysis, forensics, and exercises
Chemical/biological risk assessment, sensors, and detectors
Radiation/nuclear risk assessment, sensors, and detectors
Explosives risk assessment, counter-IED, sensors, and detectors
Aircraft protection
Integrative techniques and systems
Modeling, simulation, and training
Testbeds, standards, and evaluations
ATTACK AND DISASTER PREPARATION, RECOVERY, AND RESPONSE
Targets include: small events (10-100s of victims), large events (1,000-10,000s), catastrophic events >100,000s)

Strategy, CONOPS, communications systems, and exercises
Predictive techniques for preplacing supplies, and locating and tasking first responders
Situational awareness, information management, and data visualization
Information sharing (government, commercial, public)
Decision making and support systems
Decontamination strategies, approaches, and sensors following WMD events
Modeling, simulation, and training
Testbeds, standards, and evaluations

CONTACTS AND QUESTIONS
Tom Longstaff Chair-Cyber-AT-ieee-hst.org Homeland Cyber Security
Dan Cousins Chair-Border-AT-ieee-hst.org Land and Maritime Border Security
Mike French Chair-Disaster-AT-ieee-hst.org Attack and Disaster Preparation, Recovery, and Response
Rich Moro Chair-WMD-AT-ieee-hst.org Counter-WMD Techniques and CIKR Physical Security

Last modified: 2011-11-23 11:55:27