C4I Center


   STIDS 2013 Home

   Topic list
   Program Cmte
   Venue & Local info

   Keynote Speakers  
   Agenda & Papers  
   Important dates  
   Download CFP   

  C4I Home

OIC Logo


                STIDS 2013



The conference is an opportunity for collaboration and cross-fertilization between researchers and practitioners of semantic-based technologies with particular experience in the problems facing the Intelligence, Defense, and Security communities. It will feature invited talks from prominent semantic technology researchers and recognized leaders from the target application domains.

To facilitate interchange among communities with a clear commonality of interest but little history of interaction, STIDS will host two separate tracks. The Research Track will showcase original, significant research on semantic technologies applicable to problems in intelligence, defense or security. Submissions to the research track are expected to clearly present their contribution, demonstrate its significance, and show the applicability to problems in the target applications domain. The Applications Track provides a forum for presenting implemented semantic-based applications to intelligence, defense, or security, as well as to discuss and evaluate the use of semantic techniques in these areas. Of particular interest are comparisons between different technologies or approaches and lessons learned from applications. By capitalizing on this opportunity, STIDS could spark dramatic progress toward transitioning semantic technologies from research to the field.


Both tracks welcome the submission of papers on semantic technologies applied to the fields of Intelligence, Defense, and Security. We are especially interested in papers on the following topics:

  • Creating an interoperable suite of public-domain semantic technology/ontologies relevant to intelligence, defense, and security covering areas such as:
    • Biology and health
    • Command and Control and Situation Awareness
    • Conditions that foster or inhibit outbreak of violence
    • Controlled substance interception
    • Course-of-action planning
    • Cyberspace: Computer network operations (defense, exploitation, counter-attack)
    • Emergency response
    • Ethnicity, religion, culture and politics
    • Financial Analysis
    • Human factors
    • Infrastructure protection
    • Information sharing
    • Intelligence collection, analysis, and dissemination
    • International law
    • ISR (Intelligence, Surveillance, Reconnaissance)
    • Money Laundering
    • Predictive analysis
    • Resiliency
    • Risk analytics
    • Science and Technology (S&T)
    • Social networks
    • Spatial and temporal phenomena
    • Vulnerability assessment
  • Ontologies and reasoning under conditions of uncertainty
  • Semantic technology and ontological issues related to:
    • Source credibility and evidential pedigree
    • Use of sensing devices including security e.g. global infrastructure grid (GIG),
      images and intelligence collection in general
  • Usability issues relating to semantic technology
  • Best practices in ontological engineering
DATES (updated due to CDDM-PDS special session)

System ready for submissions:    June 15, 2013
Paper submissions due:    August 14       September 4
Notification of acceptance:    September 18      October 2
Early bird rates end:    October 16         October 23         October 28
Camera-ready papers due:    October 16         October 30
Presentations due:    November 6, 2013

Tutorials     November 12, 2013
Main Conference     November 13-14, 2013
Classified Session     November 15, 2013


Both tracks will accept submissions of technical papers. Each submission will be evaluated for acceptability by at least three members of the Program Committee. Decisions about acceptance will be based on relevance to the above topic list, originality, potential significance, topicality and clarity. Because all accepted papers are to be presented at the conference, we require that at least one of the submitting authors must be a registered participant committed to attend STIDS 2013.

Submissions are accepted only in electronic format and should be sent via the conference's submission site.
Details on submissions for the classified session will be posted on Intelink.
Papers must closely follow the US Letter version of the IEEE format for conference proceedings. For complete details and to download MS Word and LaTeX templates (choose the US Letter size), see IEEE's Manuscript Template webpage at: IEEE's Manuscript Template webpage. .

Technical papers must have between 6 and 8 pages, including figures. Submissions outside this limit will not be reviewed. In addition, papers that, at the time of submission, are under review for or have already been published in or accepted for publication in a journal or another conference will not be accepted to the STIDS conference. All papers in the general session must be unclassified and suitable for release in a public forum.


All papers accepted to either track in STIDS 2013 will be presented during the conference and published in the conference proceedings, which will be available as a separate publication after the Conference.

Download Call for Papers

Last updated: 12/03/2013