Workshop on Signature Discovery for Intelligence and Security

Workshop Description
The process of generating information from data in support of decisions typically starts with identifying a phenomenon of interest. Signatures are algorithmic or probabilistic constructs of multiple variables that reliably characterize, detect or predict such phenomena. This workshop will use an overview of the various methods currently used to develop and deploy signatures in security applications, highlighting the strategies and challenges faced in signature identification, development, and implementation. Papers and speakers are sought to engage a deep examination of signature challenges across multiple intelligence and security domains.

Registration Information:
As part of IEEE ISI 2013's pre-conference workshop program, the registration for this workshop is managed centrally by IEEE ISI 2013.

Paper Topics
We welcome workshop paper submissions on signature discovery methodologies and signature development challenges in security-related domains. Example topics are listed below:

  • Signature Discovery and Development Methodologies including but not limited to:
    • Signature discovery methodologies that work in multiple scientific disciplines
    • Signature construction and detection in "big data" environments
    • Finding the signal in the noise without over-fitting in signature construction
    • Using Bayes nets and/or other techniques for combining multiple lines of evidence including structured and unstructured data
    • Tools or frameworks to assist in signature discovery
    • Signature verification and validation approaches
    • Moving from signatures to decisions
  • Signature challenges for the Intelligence and Security Communities that address characterizing, detecting, or predicting phenomena of interest in:
    • Acoustic signatures in aquatic environments
    • Unusual, conspiratorial, or malicious behavior
    • Precursors to social upheavals in social media
    • Precursors to cyber attacks
    • Threats to nuclear security and illicit trafficking
    • Proteomics and biomarkers as precursors indicating bio-attacks
    • Threats to electric power grids, smart grid technologies, and control systems
    • Inexact pattern matching and evolving phenomena
    • Noise, obfuscation, and environmental interference

Important Dates
  • Workshop abstracts can be submitted beginning on: February 15 (Please limit abstracts to 300 words)
  • Deadline for abstracts: February 28
  • Notice of selection by: March 5
  • Workshop papers due: March 22
  • Notices of acceptance for papers and comments provided to authors: April 12
  • Camera ready paper submitted: April 29
  • Workshop Date: June 4, 2013

Abstract Submission:
Abstracts should be up to 300 words and provide information on the topic area, what was done, and the major findings or conclusions. Abstracts should be submitted to Adam Wynne at .

Paper Submission:
Submission file formats are PDF and Microsoft Word. Required Word/LaTex templates (IEEE two-column format) can be found on IEEE's Publications web pages. Submissions can be long (6,000 words, 6 pages max) or short (3000 words, 3 pages max). Papers in English must be submitted by email to Adam Wynne at . The accepted workshop papers will be published by the IEEE Press in formal Proceedings. Authors who wish to present a poster and/or demo may submit a 1-page extended abstract, which, if selected, will appear in Proceedings.

Conference content will be submitted for inclusion into IEEE Xplore as well as other Abstracting and Indexing (A&I) databases. The selected IEEE ISI 2013 best papers will be invited for contribution to the Springer Security Informatics Journal.

Organizing Committee:
  • Mark Tardiff, Pacific Northwest National Laboratory
  • George Bonheyo, Pacific Northwest National Laboratory
  • Adam Wynne, Pacific Northwest National Laboratory

Program Committee:
  • Mark Tardiff (Chair), Pacific Northwest National Laboratory
  • Others, TBD

More Information:
For additional signature discovery information, please visit

June 4, 2013
7:00am - 5:30pmConference Registration
8:45am - 9:00am Welcome - Room: Leonesa III
9:00am - 9:45am Presenter: Nathan Baker
Topic: Signature discovery methodology
9:45am - 10:15am Presenter: Alexander Venzin
Topic: An Investigation into Label Fusion on Sparse Data
10:15am - 10:45am Presenter: Emilie Hogan
Topic: Graph Analytics for Signature Discovery
10:45am - 11:15am Presenter: Shan Suthaharan
Topic: Lame Curve-based signature discovery learning technique for network traffic classification
11:15am - 11:45am Presenter: Arun Sathanur
Topic: Capturing Signatures of Anomalous Behavior in Online Social Networks
11:45am - 1:00pmLunch
1:00pm - 1:30pm Presenter: Elena Peterson
Topic: A Generalized Bio-inspired Method for Discovering Sequence-based Signatures
1:30pm - 2:00pm Presenter: Kay Yee Yeung
Topic: Signature Discovery for Personalized Medicine
2:00pm - 2:30pm Presenter: Zoe Gastelum
Topic: The Lifecycle of Bayesian Network Models Developed for Multi-Source Signature Assessment of Nuclear Programs
2:30pm - 3:00pm Presenter: Landon Sego
Topic: Assessing the Quality of Bioforensic Signatures
3:00pm - 3:30pm Presenter: Yarden Livnat
Topic: The CommonGround Visual Paradigm for Biosurveillance
3:30pm - 4:00pm Discussion