Conferences related to Counterterrorism

Back to Top

2020 IEEE 23rd International Conference on Information Fusion (FUSION)

The International Conference on Information Fusion is the premier forum for interchange of the latest research in data and information fusion, and its impacts on our society. The conference brings together researchers and practitioners from academia and industry to report on the latest scientific and technical advances.


2020 IEEE Nuclear Science Symposium and Medical Imaging Conference (NSS/MIC)

All areas of ionizing radiation detection - detectors, signal processing, analysis of results, PET development, PET results, medical imaging using ionizing radiation


Oceans 2020 MTS/IEEE GULF COAST

To promote awareness, understanding, advancement and application of ocean engineering and marine technology. This includes all aspects of science, engineering, and technology that address research, development, and operations pertaining to all bodies of water. This includes the creation of new capabilities and technologies from concept design through prototypes, testing, and operational systems to sense, explore, understand, develop, use, and responsibly manage natural resources.

  • OCEANS 2021 San Diego

    Covering Oceanography as a whole - instrumentation, science, research, biology, subsea and surface vehicles, autonomous vehicles, AUV, ROV, manned submersibles, global climate, oceanography, oceanology, rivers, estuaries, aquatic life and biology, water purity, water treatment, sonar, mapping, charting, navigation, navigation safety, oil and gas, military, and commercial applications of the oceans, subsea mining, hot vents, adn more.

  • OCEANS 2018 MTS/IEEE Charleston

    Ocean, coastal, and atmospheric science and technology advances and applications

  • OCEANS 2017 - Anchorage

    Papers on ocean technology, exhibits from ocean equipment and service suppliers, student posters and student poster competition, tutorials on ocean technology, workshops and town meetings on policy and governmental process.

  • OCEANS 2016

    The Marine Technology Scociety and the Oceanic Engineering Society of the IEEE cosponor a joint annual conference and exposition on ocean science, engineering, and policy. The OCEANS conference covers four days. One day for tutorials and three for approx. 500 technical papers and 150 -200 exhibits.

  • OCEANS 2015

    The Marine Technology Scociety and the Oceanic Engineering Society of the IEEE cosponor a joint annual conference and exposition on ocean science, engineering, and policy. The OCEANS conference covers four days. One day for tutorials and three for approx. 450 technical papers and 150-200 exhibits.

  • OCEANS 2014

    The OCEANS conference covers four days. One day for tutorials and three for approx. 450 technical papers and 150-200 exhibits.

  • OCEANS 2013

    Three days of 8-10 tracks of technical sessions (400-450 papers) and concurent exhibition (150-250 exhibitors)

  • OCEANS 2012

    Ocean related technology. Tutorials and three days of technical sessions and exhibits. 8-12 parallel technical tracks.

  • OCEANS 2011

    The Marine Technology Society and the Oceanic Engineering Scociety of the IEEE cosponsor a joint annual conference and exposition on ocean science engineering, and policy.

  • OCEANS 2010

    The Marine Technology Society and the Oceanic Engineering Scociety of the IEEE cosponsor a joint annual conference and exposition on ocean science engineering, and policy.

  • OCEANS 2009

  • OCEANS 2008

    The Marine Technology Society (MTS) and the Oceanic Engineering Society (OES) of the Institute of Electrical and Electronic Engineers (IEEE) cosponsor a joint conference and exposition on ocean science, engineering, education, and policy. Held annually in the fall, it has become a focal point for the ocean and marine community to meet, learn, and exhibit products and services. The conference includes technical sessions, workshops, student poster sessions, job fairs, tutorials and a large exhibit.

  • OCEANS 2007

  • OCEANS 2006

  • OCEANS 2005

  • OCEANS 2004

  • OCEANS 2003

  • OCEANS 2002

  • OCEANS 2001

  • OCEANS 2000

  • OCEANS '99

  • OCEANS '98

  • OCEANS '97

  • OCEANS '96


2019 IEEE Aerospace Conference

The international IEEE Aerospace Conference is organized to promote interdisciplinaryunderstanding of aerospace systems, their underlying science, and technology


2019 IEEE International Systems Conference (SysCon)

addresses the discipline of systems engineering,including theory, technology, methodology, andapplications of complex systems, system-of-systems,and integrated systems of national and globalsignificance.

  • 2018 Annual IEEE International Systems Conference (SysCon)

    The Conference addresses the discipline of systemsengineering, including theory, technology, methodology,and applications of complex systems, system-of-systems,and integrated systems of national and globalsignificance. It focuses on Systems Engineering for Complex Systems; and the conference caters to both practitioners andacademics, providing a forum to exchange ideas andexperiences on technology, methodology, applications,study cases, and practical experiences.

  • 2017 Annual IEEE International Systems Conference (SysCon)

    The IEEE International Systems Conference facilitates interactions among communities of interest on system-level problems andapplications. System-level thinking is essential in the worldtoday, not only for technical systems, but also for societyat large. The Conference addresses the discipline of systemsengineering, including theory, technology, methodology,and applications of complex systems, system-of-systems,and integrated systems of national and globalsignificance.

  • 2016 Annual IEEE Systems Conference (SysCon)

    The theme of the IEEE International SystemsConference is Engineering of Complex Systems, to includeSystems-of-systems, Systems Engineering, Systems Integration,and Systems Thinking

  • 2015 Annual IEEE Systems Conference (SysCon)

    The theme of the IEEE International Systems Conference is Engineering of Complex Systems, to include Systems-of-systems, Systems Engineering, Systems Integration, and Systems Thinking.

  • 2014 8th Annual IEEE Systems Conference (SysCon)

    This conference seeks to create an interactive forum forthe advancement of the practice of systems engineeringacross the multiple disciplines and specialty areasassociated with the engineering of complex systems. Theconference will provide a venue for systems engineeringpractitioners, managers, researchers, and educators toexchange innovative concepts, ideas, applications, andlessons learned addressing: Applications-oriented topics on large-scale systemsand system-of-systems in topics noted below

  • 2013 7th Annual IEEE Systems Conference (SysCon)

    Conference addresses systems, complex systems, systems-of-systems, critical systems, and the systems engineering disciplines needed to implement such large-scale or complex systems in the international arena.

  • 2012 6th Annual IEEE Systems Conference (SysCon)

    The IEEE Systems Conference is Engineering Complex Integrated Systems and Systems-of-Systems Implications for Systems Engineering, Systems Integration, and Systems Thinking.

  • 2011 IEEE International Systems Conference (SysCon)

    IEEE International Systems Conference Scope is Engineering of Complex Systems, to include Systems-of-systems, Large-scale Systems Integration, and Systems Engineering and Systems Thinking.

  • 2010 4th Annual IEEE Systems Conference

    The theme of the IEEE Systems Conference is Engineering Complex Integrated Systems and Systems-of-systems Implications for Systems Engineering, Systems Integration, and Systems Thinking.

  • 2009 3rd Annual IEEE Systems Conference

    Engineering Comles Integtared Systems and Systems-of-Systems - Implications for Systems Engineering, Systems Integration, and Systems Thinking

  • 2008 2nd Annual IEEE Systems Conference

    The theme of the IEEE Systems Conference is Engineering Complex Integrated Systems and Systems-of-systems- Implications for Systems Engineering, Systems Integration, and Systems Thinking.

  • 2007 1st Annual IEEE Systems Conference

    The theme of the IEEE Systems Conference is Engineering Complex Integrated Systems and Systems-of-systems - Implications for Systems Engineering, Systems Integration, and Systems Thinking.


More Conferences

Periodicals related to Counterterrorism

Back to Top

Engineering in Medicine and Biology Magazine, IEEE

Both general and technical articles on current technologies and methods used in biomedical and clinical engineering; societal implications of medical technologies; current news items; book reviews; patent descriptions; and correspondence. Special interest departments, students, law, clinical engineering, ethics, new products, society news, historical features and government.


Intelligent Systems, IEEE

IEEE Intelligent Systems, a bimonthly publication of the IEEE Computer Society, provides peer-reviewed, cutting-edge articles on the theory and applications of systems that perceive, reason, learn, and act intelligently. The editorial staff collaborates with authors to produce technically accurate, timely, useful, and readable articles as part of a consistent and consistently valuable editorial product. The magazine serves software engineers, systems ...


IT Professional

This IEEE Computer Society periodical covers the many rapidly emerging issues facing information technology professionals, developers, and managers of enterprise information systems. IT Professional's coverage areas include: Web services, Internet security, data management; enterprise architectures and infrastructures; organizing and utilizing data; instituting cross-functional systems; using IT for competitive breakthroughs; integrating systems and capitalizing on IT advances; emerging technologies like electronic ...


Knowledge and Data Engineering, IEEE Transactions on

Artificial intelligence techniques, including speech, voice, graphics, images, and documents; knowledge and data engineering tools and techniques; parallel and distributed processing; real-time distributed processing; system architectures, integration, and modeling; database design, modeling, and management; query design, and implementation languages; distributed database control; statistical databases; algorithms for data and knowledge management; performance evaluation of algorithms and systems; data communications aspects; system ...


Security & Privacy, IEEE

IEEE Security & Privacy seeks to stimulate and track advances in security, privacy, and dependability and present these advances for a broad cross-section of academic researchers and industry practitioners. IEEE Security & Privacy aims to provide a unique combination of research articles, case studies, tutorials, and regular departments covering diverse aspects of security and dependability of computer-based systems, including legal ...


More Periodicals

Most published Xplore authors for Counterterrorism

Back to Top

Xplore Articles related to Counterterrorism

Back to Top

The array biosensor for counterterrorism

IEEE Sensors Journal, 2005

The war against terrorism requires numerous sensor technologies for homeland security. For the detection of bioterrorist agents, 1) generic detectors that indicate something amiss, 2) biosensors for rapid screening and presumptive identification, and 3) identification systems for definitive confirmation are all required. The Array Biosensor addresses the second need. This biosensor can detect multiple agents simultaneously in less than 15 ...


Research note: Concept to develop a software-based counter-terrorism campaign decision support tool

2012 IEEE International Conference on Intelligence and Security Informatics, 2012

In the public policy community, a need exists for a software tool that comprehensively applies leading concepts of counterterrorism (CT) analysis and planning to systematically display, track, operationalize and update on an analyst's computer all the decisions and processes involved in countering an on-going terrorist insurgency facing a targeted adversary. Initially, such a prototype would be employed for analytical and ...


Using Systems Dynamics to Explore Effects of Counterterrorism Policy

2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07), 2007

This paper suggests that the effects of counterterrorism policy on violent non-state actors can be explored via systems dynamics. Specifically, we create a descriptive model of the flow of persons through the terrorism field. We then demonstrate how the model can be extended to explore "what if" analyses of counterterrorism actions, assisting analysts with identifying fallacious logic chains or important ...


Testing and evaluating counterterrorism technology

IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings., 2003

We detail the Operational Test and Evaluation Program (OTEP) at the U.S. National Guard Bureau's (NGB) Center for National Response (CNR). OTEP's mission is to evaluate the utility of equipment, technology, and apparatus to materially aid emergency responders in a weapons of mass destruction (WMD) environment. The goal is twofold. First, to allow emergency responders to operationally test equipment in ...


Detecting Word Substitutions in Text

IEEE Transactions on Knowledge and Data Engineering, 2008

Searching for words on a watchlist is one way in which large-scale surveillance of communication can be done, for example in intelligence and counterterrorism settings. One obvious defense is to replace words that might attract attention to a message with other, more innocuous, words. For example, the sentence the attack will be tomorrow" might be altered to the complex will ...


More Xplore Articles

Educational Resources on Counterterrorism

Back to Top

IEEE.tv Videos

No IEEE.tv Videos are currently tagged "Counterterrorism"

IEEE-USA E-Books

  • The array biosensor for counterterrorism

    The war against terrorism requires numerous sensor technologies for homeland security. For the detection of bioterrorist agents, 1) generic detectors that indicate something amiss, 2) biosensors for rapid screening and presumptive identification, and 3) identification systems for definitive confirmation are all required. The Array Biosensor addresses the second need. This biosensor can detect multiple agents simultaneously in less than 15 min, is automated, and can be used on site. This paper reports on the current version of the automated system and reviews data obtained in assays for bioterrorist agents.

  • Research note: Concept to develop a software-based counter-terrorism campaign decision support tool

    In the public policy community, a need exists for a software tool that comprehensively applies leading concepts of counterterrorism (CT) analysis and planning to systematically display, track, operationalize and update on an analyst's computer all the decisions and processes involved in countering an on-going terrorist insurgency facing a targeted adversary. Initially, such a prototype would be employed for analytical and training purposes, with a more advanced version used in a government's actual CT campaign. No such comprehensive software tool exists at present (based on the author's knowledge) to address any of these requirements. This research note, which is of a preliminary nature, is primarily descriptive and does not include a discussion of how such a tool would be operationalized into a software program, since that would involve releasing proprietary intellectual property that is intended for commercial purposes. Hopefully, this preliminary research note will generate interest in a collaborative effort with other researchers and software developers to create and operationalize such a software tool kit.

  • Using Systems Dynamics to Explore Effects of Counterterrorism Policy

    This paper suggests that the effects of counterterrorism policy on violent non-state actors can be explored via systems dynamics. Specifically, we create a descriptive model of the flow of persons through the terrorism field. We then demonstrate how the model can be extended to explore "what if" analyses of counterterrorism actions, assisting analysts with identifying fallacious logic chains or important knowledge gaps related to causal explanations. Our model instantiations suggest that developing and implementing counterterrorism policy requires management to avoid continuous and active undesirable long term outcomes

  • Testing and evaluating counterterrorism technology

    We detail the Operational Test and Evaluation Program (OTEP) at the U.S. National Guard Bureau's (NGB) Center for National Response (CNR). OTEP's mission is to evaluate the utility of equipment, technology, and apparatus to materially aid emergency responders in a weapons of mass destruction (WMD) environment. The goal is twofold. First, to allow emergency responders to operationally test equipment in a realistic WMD environment, prior to purchase, so that they are able to resourcefully identify equipment that meets their needs and enables them to complete their mission. Second, to provide the manufacturers with test results and feedback from the testing organization, which presents them with product strengths, as well as ways in which they can improve their product.

  • Detecting Word Substitutions in Text

    Searching for words on a watchlist is one way in which large-scale surveillance of communication can be done, for example in intelligence and counterterrorism settings. One obvious defense is to replace words that might attract attention to a message with other, more innocuous, words. For example, the sentence the attack will be tomorrow" might be altered to the complex will be tomorrow", since 'complex' is a word whose frequency is close to that of 'attack'. Such substitutions are readily detectable by humans since they do not make sense. We address the problem of detecting such substitutions automatically, by looking for discrepancies between words and their contexts, and using only syntactic information. We define a set of measures, each of which is quite weak, but which together produce per-sentence detection rates around 90% with false positive rates around 10%. Rules for combining persentence detection into per-message detection can reduce the false positive and false negative rates for messages to practical levels. We test the approach using sentences from the Enron email and Brown corpora, representing informal and formal text respectively.

  • Anticipatory Models for CounterTerrorism

    This chapter contains sections titled: * Introduction to Anticipatory Modeling * The Need for Anticipatory Models * Rethinking the Prediction Problem This chapter contains sections titled: * Summary * References ]]>

  • Privacy and Consequences: Legal and Policy Structures for Implementing New CounterTerrorism Technologies and Protecting Civil Liberty

    This chapter contains sections titled: * Introduction * A Conception of Privacy and Liberty * Building the Legal and Policy Structures * The Nature of Privacy in the Post-9/11 World This chapter contains sections titled: * Summary ]]>

  • Hidden Markov Models and Bayesian Networks for CounterTerrorism

    This chapter contains sections titled: * Introduction * Background * Modeling Terrorist Activities with HMMs and BNs * Detecting and Tracking Terrorist Network HMMs * HMM and BN Information Fusion * Simulation Results This chapter contains sections titled: * Summary * Acknowledgment * References ]]>

  • Journey from "Analysis" to Inquiry: Technology and the Transformation of CounterTerrorism Analysis

    This chapter contains sections titled: * Introduction * Counter-Terrorism at Macro- And Micro-Levels of Analysis * The Craft and Practice of Analvsis * A New Perspective on Technology and Analysis * From Analysis to Inquiry: Continuity and Change in the Use of Models * Peering into the Future: PCMT and Transformative Analysis This chapter contains sections titled: * Summary ]]>

  • Applying Semantic Web Reasoning to CounterTerrorism

    This chapter contains sections titled: * Introduction * Automated Markup Generation from Free Text * Semantic Filtering * Co-Reference Reasoning * Hybrid Evidential Reasoning This chapter contains sections titled: * Summary * Acknowledgments * References ]]>



Standards related to Counterterrorism

Back to Top

No standards are currently tagged "Counterterrorism"


Jobs related to Counterterrorism

Back to Top