Last Update: 2006/1/25
  P A P E R   S U B M I S S I O N :

The submission deadline has passed and the submission system is now closed. The review process was finished. Review results were emailed to authors.

Original submission guidelines:

Submissions may include systems, methodology, testbed, modeling, evaluation, and policy papers. Research should be relevant to both informatics and national/international security. Topics include but are not limited to:

I. Information Sharing and Data/Text Mining 

  • Intelligence-related knowledge discovery 
  • Criminal data mining and network analysis
  • Criminal/ intelligence information sharing and visualization
  • Web-based intelligence monitoring and analysis
  • Spatio-temporal data analysis/GIS for crime analysis and security informatics
  • Deception and intent detection 
  • Cybercrime detection and analysis
  • Authorship analysis and identification
  • Applications of digital library technologies in intelligence data processing, preservation, sharing, and analysis
  • Agents and collaborative systems for intelligence sharing
  • HCI and user interfaces of relevance to intelligence and security
  • Information sharing policy and governance
  • Privacy, security, and civil liberties issues

II. Infrastructure Protection and Emergency Responses

  • Cyberinfrastructure design and protection
  • Intrusion detection 
  • Bio-terrorism tracking, alerting, and analysis 
  • Bioterrorism information infrastructure
  • Transportation and communication infrastructure protection
  • Border/transportation safety
  • Emergency response and management
  • Disaster prevention, detection, and management
  • Communication and decision support for search and rescue
  • Assisting citizens' responses to terrorism and catastrophic events

III. Terrorism Informatics 

  • Terrorism related analytical methodologies and software tools
  • Terrorism knowledge portals and databases
  • Terrorist incident chronology databases
  • Terrorism root cause analysis
  • Social network analysis (radicalization, recruitment, conducting operations), visualization, and simulation
  • Forecasting terrorism
  • Countering terrorism
  • Measuring the impact of terrorism on society
  • Measuring the effectiveness of counter-terrorism campaigns

Long (6,000 words) and short (3,000 words) papers (in English) may be submitted electronically via the workshop Website after November 1, 2005. Submission file formats are PDF and Microsoft Word/LaTeX. Accepted WISI'06 papers will be published along with accepted papers from other workshops in PAKDD'06 in the Springer Lecture Notes in Computer Science (LNCS) series. Required LNCS Microsoft Word/LaTeX templates can be found on the Springer Website. Authors who wish to only present a poster may submit a 500-word abstract, which will be reviewed and will appear in the Proceedings if accepted.

 


Singapore | April 9, 2006
© 2004-2006 Chinese University of Hong Kong, University of Arizona