Call for Papers and Posters http://ieee-hst.org/ 2010 IEEE International Conference on Technologies for Homeland Security November 8-10, 2010 Westin Hotel, Waltham, MA The tenth annual IEEE Conference on Technologies for Homeland Security (IEEE HST '10) will focus on innovative technologies for deterring and preventing attacks, protecting critical infrastructure and individuals, and mitigating damage and expediting recovery. Submissions are desired in the broad areas of critical infrastructure and key resources protection (CIKR), border protection and monitoring, and disaster recovery and response, with application within about five years. This conference brings together innovators from leading universities, research laboratories, Homeland Security Centers of Excellence, small businesses, system integrators, and the end user community and provides a forum to discuss ideas, concepts, and experimental results. Stakeholders continue to include federal, state, local, tribal, and private sector organizations. This year we seek to broaden the conference to include input from our international partners. We seek submissions in each of the following four major areas. We plan to invite experts to highlight key technical gaps and frame the technical challenges in protecting each of the listed targets, and seek papers that help close those gaps, securing classes of targets and preventing attacks against society. We will select the best paper from each of these tracks, and we will also identify the best paper at the conference. Land and Maritime Border Security Targets include: individuals, facilities, and monuments; airports and airspace; seaports and maritime; land borders and ports of entry * Strategy, CONOPs, system risk assessment, and exercises * Radiation and nuclear threat characterization, risk assessment, sensors, and detectors * Personnel screening * Container/compartment/vehicle screening (detection, monitoring, and tracking) * Ground surveillance * Port (land, sea, and air) surveillance * Automated target recognition and identification * Testbeds, standards, and evaluations Homeland Cyber Security Targets include: federal and CIKR networks and computers, the smart grid, and control systems * Architecture, CONOPs, analytics, system risk analysis, and exercises * Host and network sensors (device, OS, application and networking layers; detection and response) * Privacy and travel document protection (hardware, algorithms, and protocols) * Attack analytic tools (honeyclients and honeynets) * Supply chain monitoring and defense * Command, control, and interoperability * Emergency readiness teams (info collection and distribution; Int'l sharing) * Testbeds, standards and evaluations Counter-WMD Techniques and CIKR Physical Security Targets include: population centers, organizations, infrastructure, facilities, and monuments * Strategy and threat characterization, CONOPs, system risk analysis, forensics, and exercises * Chemical/biological risk assessment, sensors, and detectors * Radiation/nuclear risk assessment, sensors, and detectors * Explosives risk assessment, counter-IED, sensors, and detectors * Aircraft protection * Integrative techniques and systems * Modeling, simulation, and training * Testbeds, standards, and evaluations Attack and Disaster Preparation, Recovery, and Response Targets include: small events (10-100s of victims), large events (1,000-10,000s), catastrophic events >100,000s) * Strategy, CONOPS, communications systems, and exercises * Predictive techniques for preplacing supplies, and locating and tasking first responders * Situational awareness, information management, and data visualization * Information sharing (government, commercial, public) * Decision making and support systems * Decontamination strategies, approaches, and sensors following WMD events * Modeling, simulation, and training * Testbeds, standards, and evaluations Call for Tutorials We seek tutorials in related areas. Tutorials may be 90 minutes or 3 hours long. Submissions should include the title, a brief description of the topic for the tutorial and intended audience, the intended length, and a short biography of the presenter(s). Tutorials should be proposed via the submission website: https://www.softconf.com/a/IEEE_HST_2010/ Instructions for Paper, Poster, and Tutorial Submissions For a paper, two submissions are required - the first is a one page abstract indicating interest and a one-page biography of the proposed speaker. The extended abstract should be 500 words maximum, including the author(s) title, name, address, phone, fax, email, and organizational affiliation. Attached to this should be a biography of the presenting author. A cursory review of the abstract will be done for applicability to this conference. A second submission is required for the completed paper, in IEEE format, not to exceed seven pages including all illustrations and references. (Please note: Accepted papers will require at least one author to register and pay the conference fee. The organizers of IEEE HST '10 as well as our attendees expect all accepted papers to be presented at the conference. IEEE reserves the right to exclude a paper from distribution after the conference if the paper is not presented.) This paper will be reviewed in depth, and reviewer comments will be provided to the author. For a poster or tutorial submission, please submit a one page abstract and one page biography, in the format specified. Submissions will be through the START conference manager. You can submit your paper here: https://www.softconf.com/a/IEEE_HST_2010/ . Submissions are being accepted now. Authors will be required to declare conflicts of interest upon uploading their papers. A conflict of interest occurs if the author and any listed reviewer(s) for the track currently work within the same organization, a reviewer contributed substantially to the submission, or a reviewer was co-author on a paper or poster with the author on a related topic. Important Dates Important Dates Abstract and Tutorial Proposal Deadline: 24 April 2010 Tutorial Acceptance Notification: 10 May 2010 Full Paper Submission Deadline: 25 June 2010 Paper Acceptance Notification: 6 August 2010 Poster Abstract Submission Deadline: 13 August 2010 Poster Acceptance Notification: 27 August 2010 Publication-ready Paper Deadline: 3 September 2010 Tutorial Presentation Deadline: 3 November 2010 All deadlines are by midnight eastern time. Publishing Information All papers and posters will be published on the conference CD-ROM and distributed to conference attendees. Poster presenters are welcome to submit full papers, meeting the publication-ready deadline. All full technical papers that meet the publishing requirements will be published in journals and/or in the IEEE Xplore as part of the IEEE Conference Publication Program. Call for Sponsors and Exhibitors A limited number of sponsorships and exhibit packages are available. To learn more, contact sponsorship@ieee-hst.org. For more information on the conference, email information@ieee-hst.org. Call for papers in pdf format: http://ieee-hst.org/technical_program/cfp/HST_2010_CFP_%2011_6.pdf