Call for Papers and Posters
2010 IEEE International Conference on Technologies for Homeland Security
November 8-10, 2010
Westin Hotel, Waltham, MA

The tenth annual IEEE Conference on Technologies for Homeland Security
(IEEE HST '10) will focus on innovative technologies for deterring and
preventing attacks, protecting critical infrastructure and
individuals, and mitigating damage and expediting
recovery. Submissions are desired in the broad areas of critical
infrastructure and key resources protection (CIKR), border protection
and monitoring, and disaster recovery and response, with application
within about five years.

This conference brings together innovators from leading universities,
research laboratories, Homeland Security Centers of Excellence, small
businesses, system integrators, and the end user community and
provides a forum to discuss ideas, concepts, and experimental
results. Stakeholders continue to include federal, state, local,
tribal, and private sector organizations. This year we seek to broaden
the conference to include input from our international partners.

We seek submissions in each of the following four major areas. We plan
to invite experts to highlight key technical gaps and frame the
technical challenges in protecting each of the listed targets, and
seek papers that help close those gaps, securing classes of targets
and preventing attacks against society. We will select the best paper
from each of these tracks, and we will also identify the best paper at
the conference.

Land and Maritime Border Security

Targets include: individuals, facilities, and monuments; airports and
airspace; seaports and maritime; land borders and ports of entry

    * Strategy, CONOPs, system risk assessment, and exercises
    * Radiation and nuclear threat characterization, risk assessment,
      sensors, and detectors
    * Personnel screening
    * Container/compartment/vehicle screening (detection, monitoring,
      and tracking)
    * Ground surveillance
    * Port (land, sea, and air) surveillance
    * Automated target recognition and identification
    * Testbeds, standards, and evaluations

Homeland Cyber Security

Targets include: federal and CIKR networks and computers, the smart
grid, and control systems

    * Architecture, CONOPs, analytics, system risk analysis, and exercises
    * Host and network sensors (device, OS, application and networking
      layers; detection and response)
    * Privacy and travel document protection (hardware, algorithms,
      and protocols)
    * Attack analytic tools (honeyclients and honeynets)
    * Supply chain monitoring and defense
    * Command, control, and interoperability
    * Emergency readiness teams (info collection and distribution;
      Int'l sharing)
    * Testbeds, standards and evaluations

Counter-WMD Techniques and CIKR Physical Security

Targets include: population centers, organizations, infrastructure,
facilities, and monuments

    * Strategy and threat characterization, CONOPs, system risk
      analysis, forensics, and exercises
    * Chemical/biological risk assessment, sensors, and detectors
    * Radiation/nuclear risk assessment, sensors, and detectors
    * Explosives risk assessment, counter-IED, sensors, and detectors
    * Aircraft protection
    * Integrative techniques and systems
    * Modeling, simulation, and training
    * Testbeds, standards, and evaluations

Attack and Disaster Preparation, Recovery, and Response

Targets include: small events (10-100s of victims), large events
(1,000-10,000s), catastrophic events >100,000s)

    * Strategy, CONOPS, communications systems, and exercises
    * Predictive techniques for preplacing supplies, and locating and
      tasking first responders
    * Situational awareness, information management, and data visualization
    * Information sharing (government, commercial, public)
    * Decision making and support systems
    * Decontamination strategies, approaches, and sensors following WMD events
    * Modeling, simulation, and training
    * Testbeds, standards, and evaluations

Call for Tutorials

We seek tutorials in related areas. Tutorials may be 90 minutes or 3
hours long. Submissions should include the title, a brief description
of the topic for the tutorial and intended audience, the intended
length, and a short biography of the presenter(s).

Tutorials should be proposed via the submission website: 

Instructions for Paper, Poster, and Tutorial Submissions

For a paper, two submissions are required - the first is a one page
abstract indicating interest and a one-page biography of the proposed
speaker. The extended abstract should be 500 words maximum, including
the author(s) title, name, address, phone, fax, email, and
organizational affiliation. Attached to this should be a biography of
the presenting author.

A cursory review of the abstract will be done for applicability to
this conference. A second submission is required for the completed
paper, in IEEE format, not to exceed seven pages including all
illustrations and references. (Please note: Accepted papers will
require at least one author to register and pay the conference
fee. The organizers of IEEE HST '10 as well as our attendees expect
all accepted papers to be presented at the conference. IEEE reserves
the right to exclude a paper from distribution after the conference if
the paper is not presented.) This paper will be reviewed in depth, and
reviewer comments will be provided to the author.

For a poster or tutorial submission, please submit a one page abstract
and one page biography, in the format specified.

Submissions will be through the START conference manager. You can
submit your paper here: . Submissions are being
accepted now. Authors will be required to declare conflicts of
interest upon uploading their papers. A conflict of interest occurs if
the author and any listed reviewer(s) for the track currently work
within the same organization, a reviewer contributed substantially to
the submission, or a reviewer was co-author on a paper or poster with
the author on a related topic.

Important Dates

Important Dates

Abstract and Tutorial Proposal Deadline:

24 April 2010

Tutorial Acceptance Notification:

10 May 2010

Full Paper Submission Deadline:

25 June 2010

Paper Acceptance Notification:

6 August 2010

Poster Abstract Submission Deadline:

13 August 2010

Poster Acceptance Notification:

27 August 2010

Publication-ready Paper Deadline:

3 September 2010

Tutorial Presentation Deadline:

3 November 2010

All deadlines are by midnight eastern time.

Publishing Information

All papers and posters will be published on the conference CD-ROM and
distributed to conference attendees. Poster presenters are welcome to
submit full papers, meeting the publication-ready deadline. All full
technical papers that meet the publishing requirements will be
published in journals and/or in the IEEE Xplore as part of the IEEE
Conference Publication Program.

Call for Sponsors and Exhibitors

A limited number of sponsorships and exhibit packages are
available. To learn more, contact

For more information on the conference, email

Call for papers in pdf format: