Last Update: 03-JAN-2008

Speakers & Panels
Program & Schedule
Poster Sessions

Call For Papers
Paper Submission
Important Dates
Conference Location

Hosts and Sponsors
Program Committee
Contact Information
Call for Papers
   Annals of Information
   Special Volume in
   Security Informatics
Event Sponsorship

  Call For Papers

IEEE International Conference on Intelligence and Security Informatics
(IEEE ISI 2008)
Conference Website:

Dates: June 17 ~ 20, 2008, Taipei, Taiwan

Conference Scope:
The science of Intelligence and Security Informatics (ISI) focuses on the development and use of advanced information technologies, including methodologies, models and algorithms, infrastructure, systems, and tools for national/international and homeland security related applications through an integrated technological, organizational, and policy-based approach. ISI also encompasses the areas of terrorism research and intelligence analysis as well as security-related public policy.
Two previous symposia (ISI-2003 and ISI-2004) were held in Tucson, Arizona; the third (ISI-2005), with sponsorship by the IEEE, was held in Atlanta, Georgia, with 2006 and 2007 following in San Diego and New Brunswick, respectively. These meetings provided a stimulating intellectual forum for discussion among previously disparate communities: academic researchers (in information technologies, computer science, public policy, and social and behavioral studies); local, state, and federal law enforcement and intelligence experts; and information technology industry consultants and practitioners. Proceedings of these past ISI meetings were published in Springer Lecture Notes in Computer Science. ISI-2008 will continue this conference series under the sponsorship of the IEEE Intelligent Transportation Systems Society.
Topics of interest include, but are not limited to:
  1. Information Sharing and Data/Text Mining
    1. Intelligence-related knowledge discovery
    2. Computer or cyber crime investigations and digital forensics
    3. Criminal investigative criteria and standard of procedure on Computer crime
    4. Criminal data mining and network analysis
    5. Criminal/ intelligence information sharing and visualization
    6. Web-based intelligence monitoring and analysis
    7. Spatial-temporal data analysis/GIS for crime analysis and security informatics
    8. Deception and intent detection
    9. Cyber-crime detection and analysis
    10. Authorship analysis and identification
    11. Applications of digital library technologies in intelligence data processing, preservation, sharing, and analysis
    12. Agents and collaborative systems for intelligence sharing
    13. HCI and user interfaces of relevance to intelligence and security
    14. Information sharing policy and governance
    15. Privacy, security, and civil liberties issues
    16. Intelligence-computerized community security and surveillance system
  2. Infrastructure Protection and Emergency Responses
    1. Cyber-infrastructure design and protection
    2. Intrusion detection
    3. Bio-terrorism tracking, alerting, and analysis
    4. Bio-terrorism information infrastructure
    5. Transportation and communication infrastructure protection
    6. Border/transportation safety
    7. Emergency response and management
    8. Disaster prevention, detection, and management
    9. Communication and decision support for search and rescue
    10. Assisting citizens' responses to terrorism and catastrophic events
    11. Computer forensics and crime lead discovery
    12. Anti-fraud information technology
  3. Terrorism Informatics
    1. Terrorism related analytical methodologies and software tools
    2. Terrorism knowledge portals and databases
    3. Terrorist incident chronology databases
    4. Terrorism root cause analysis
    5. Social network analysis (radicalization, recruitment, conducting operations), visualization, and simulation
    6. Forecasting terrorism
    7. Countering terrorism
    8. Measuring the impact of terrorism on society
    9. Measuring the effectiveness of counter-terrorism campaigns
    10. Crime intelligence and cyberspace crime investigation
    11. Immigration and security
Important Dates:
  • Conference submissions due: January 31, 2008
  • Notification of acceptance: March 14, 2008
  • Camera-ready copy due: March 28, 2008
  • See the Submissions page for further details on submissions
  • For workshop submission due dates, follow the workshop links below
Pre-conference Workshops:


We invite your participation in IEEE ISI 2008!



Taipei, Taiwan | June 17-20, 2008 Central Police University