Workshop on Intelligence and Security Informatics for International Security (IIS'18)
Threats to our societies, governments and commercial infrastructures are very real due to the growth of terrorism, criminal networks and cyber-attacks. These threats are high precedence in government strategy planning. The science of Intelligence and Security Informatics (ISI) focuses on the development of advanced information technologies, systems, algorithms, and databases for international, national and homeland security related applications, through an integrated technological, organizational, and policy-based approach.
With the continuous advance of IT technologies and the increasing sophistication of national and international security, in recent years, new directions in ISI research and applications have emerged to address complicated problems with advanced technologies. The goal of International Workshop on Intelligence and Security Informatics for International Security (IIS) is to gather people from previously disparate communities to provide a stimulating forum for exchange of ideas and results.
We invite academic researchers, law enforcement and intelligence experts, as well as information technology companies, industry consultants and practitioners in the fields involved to submit original and unpublished work. Authors should submit their papers online.
All papers that conform to submission guidelines will be peer reviewed and evaluated based on originality, technical and/or research content/depth, correctness, relevance to conference, contributions, and readability. Acceptance of papers will be communicated to authors by email. All accepted papers will be published in the Conference proceedings.
The workshop provides a venue to present early work in the relevant areas. Topics of interest include, but are not limited to, the following:
- Agents and collaborative systems for intelligence sharing
- Bio-terrorism tracking, alerting, and analysis
- Computer or cybercrime investigations and digital forensics
- Consumer-generated media and social media analytics
- Corporate sentiment surveillance
- Crime pattern recognition and modeling tools
- Criminal/ intelligence information sharing and visualization
- Criminal data mining and network analysis
- Critical infrastructure protection
- Cybercrime and social impacts, Cyber-crime detection and analysis
- Deception and intent detection
- Disaster prevention, detection, and management
- Emergency response and management
- Forecasting and countering terrorism
- Immigration and security
- Information security management standards
- Intelligence-related knowledge discovery
- Link analysis and network mining
- Measuring the impact of terrorism on society
- Privacy, security, and civil liberties issues
- Quantification of threats and risks
- Social network analysis
- Authorship analysis and Attribution
- Surveillance and Reconnaissance infrastructure
- Terrorism knowledge portals and databases
- Text mining and Web mining applied to blogs and Web communities
- Web-based intelligence monitoring and analysis
- Recognition of secure patterns
- Adversarial active learning
- Secure machine learning
- Natural language processing for security
- Big data analytics for security
Submission Instructions
Authors should submit their papers online. We use EDAS system for managing submissions and review process. Unregistered authors should first create an account on EDAS to log on. Detailed usage instruction on EDAS can be found here.
Submissions must be in Portable Document Format (.pdf). The list of authors should not be included in the paper manuscript PDF, in accordance to the double blind submission policy. Changes to the paper metadata on EDAS are permitted before the paper submission deadline.
All submissions should be written in English with a maximum paper length of FIFTEEN (15 pages). However extra page charges will be applicable for papers exceeding 12 pages. Authors should pay special attention to unusual fonts, images, and figures that might create problems for reviewers.
SSCC'18 accepts regular and work-in-progress papers. Regular papers should present novel perspectives within the general scope of the conference. Short papers (Work-in-Progress) are an opportunity to present preliminary or interim results.
Manuscript Template - Word Latex
Further formatting instructions are posted at http://www.springer.com/computer/lncs?SGWID=0-164-6-793341-0
Double Blind Submissions
All submitted papers will be judged based on their originality, technical and/or research content/depth, correctness, relevance to conference, contributions, and readability through double-blind reviewing, where the identities of the authors are withheld from the reviewers. As an author, you are required to preserve the anonymity of your submission, while at the same time allowing the reader to fully grasp the context of related past work, including your own. Common sense and careful writing will go a long way towards preserving anonymity. Papers that do not conform with our double-blind submission policies will be rejected without review.
Minimally, please take the following steps when preparing your submission:
- Remove the names and affiliations of authors from the title page.
- Remove acknowledgments of identifying names and funding sources.
- Remove project titles or names that can be used to trace back to the authors via a web search engine.
- Use care in referring to related work, particularly your own. Do not omit references to provide anonymity, as this leaves the reviewer unable to grasp the context. Instead, reference your past work in the third person, just as you would any other piece of related work by another author. For example, instead of "In prior work [3], we presented a routing protocol that ...," sentences in the spirit of "In prior work, Smith and Clark [3] presented a routing protocol that ..." should be used. With this method, the full citation to Smith and Clark can still be given, such as "[3] J. Smith, A. Clark, "Analysis of...", and it is not acceptable to say "[3] Reference deleted for double-blind review."
- Papers with the same title and abstract should not be posted on a public website, such as arxiv.org, or transmitted via public mailing lists.
The organizers regard plagiarism as a serious professional misconduct. All submissions will be screened for plagiarism and when identified, the submissions by the same author will be rejected.
Submitted papers will undergo a peer review process, coordinated by the Program Committee. Each manuscript will be reviewed by a minimum of three reviewers. Acceptance of papers will be communicated to authors by email. The accepted regular and work-in-progress papers will be published in the conference proceedings. All accepted papers will be published by Springer in Communications in Computer and Information Science Series(CCIS), ISSN: 1865:0929. The proceedings will be available via the SpringerLink digital library.
To be published in the SSCC'18 Conference Proceedings, an author of an accepted paper is required to register for the conference at the full rate. Both regular and work-in-progress papers will be scheduled for oral presentation. All accepted papers MUST be presented at the conference by one of the authors, or, if none of the authors are able to attend, by a qualified surrogate.
Technical Program Committee
tba
Key Dates
Full Paper Submission Ends | July 31, 2018(Firm) |
Acceptance Notification | August 15, 2018 |
Final paper Deadline | August 25, 2018 |