Difference between revisions of "Event:ISI 2017"

From ConfIDent
(mobo import Concept___Events-migrated)
 
(2 intermediate revisions by 2 users not shown)
Line 2: Line 2:
 
|Acronym=ISI 2017
 
|Acronym=ISI 2017
 
|Title=2017 IEEE International Conference on Intelligence and Security Informatics
 
|Title=2017 IEEE International Conference on Intelligence and Security Informatics
|Type=Conference
+
|In Event Series=Event Series:ISI
|Homepage=http://www.isi-conf.org/
+
|Single Day Event=no
 +
|Start Date=2017/07/22
 +
|End Date=2017/07/24
 +
|Event Status=as scheduled
 +
|Event Mode=on site
 
|City=Beijing
 
|City=Beijing
 +
|Region=Beijing Shi
 
|Country=Country:CN
 
|Country=Country:CN
 +
|Academic Field=Computer Reliability; Computer Security
 +
|Official Website=http://www.isi-conf.org/
 +
|DOI=10.25798/p6gm-wt24
 +
|Type=Conference
 
|has program chair=Xiaolong Zheng, Hui Zhang, Chunxiao Xing
 
|has program chair=Xiaolong Zheng, Hui Zhang, Chunxiao Xing
 
|has Proceedings Link=https://ieeexplore.ieee.org/xpl/conhome/7999198/proceeding
 
|has Proceedings Link=https://ieeexplore.ieee.org/xpl/conhome/7999198/proceeding
Line 11: Line 20:
 
|pageEditor=User:Curator 75
 
|pageEditor=User:Curator 75
 
|contributionType=1
 
|contributionType=1
|In Event Series=Event Series:ISI
 
|Single Day Event=no
 
|Start Date=2017/07/22
 
|End Date=2017/07/24
 
|Academic Field=Computer Security;Computer Reliability
 
|Event Status=as scheduled
 
|Event Mode=on site
 
 
}}
 
}}
 
{{Event Deadline
 
{{Event Deadline
Line 23: Line 25:
 
|Submission Deadline=2017/04/10
 
|Submission Deadline=2017/04/10
 
}}
 
}}
 +
{{Organizer
 +
|Contributor Type=organization
 +
|Organization=IEEE Intelligent Transportation Systems Society, Institute of Electrical and Electronics Engineers
 +
}}
 +
{{Event Metric}}
 
{{S Event}}
 
{{S Event}}
 
'''IEEE International Conference on Intelligence and Security Informatics''' ('''ISI'''), July 22-24, 2017, Beijing, China  
 
'''IEEE International Conference on Intelligence and Security Informatics''' ('''ISI'''), July 22-24, 2017, Beijing, China  

Latest revision as of 12:04, 29 January 2024

Deadlines
2017-05-30
2017-04-10
10
Apr
2017
Submission
30
May
2017
Notification
organization
Metrics
Venue

Beijing, Beijing Shi, China

Loading map...

IEEE International Conference on Intelligence and Security Informatics (ISI), July 22-24, 2017, Beijing, China

Topics

Security Analytics and Threat Intelligence:

• Threat pattern models and modeling tools
• Real-time situational awareness
• Intrusion and cybersecurity threat detection and analysis
• Cyber-physical-social system security and incident management
• Computing and networking infrastructure protection
• Crime analysis and prevention
• Forecasting threats and measuring the impact of threats
• Surveillance and intelligence through unconventional means
• Information security management standards
• Information systems security policies
• Mobile and cloud computing security
• Big data analytics for cybersecurity
• Resilient cyber infrastructure design and protection


Data Science and Analytics in Security Informatics:

• Data representation and fusion for security informatics
• Criminal/intelligence information extraction
• Data sharing and information visualization for security informatics
• Web-based intelligence monitoring and analysis
• Spatial-temporal data analysis for crime analysis and security informatics
• Criminal/intelligence machine learning and data mining
• Bio-terrorism tracking, alerting, and analysis
• Digital forensics and computational criminology
• Financial and accounting fraud analysis
• Consumer-generated content and security-related social media analytics
• Security-related social network analysis (radicalization, recruitment, conducting operations)
• Authorship analysis and identification
• Terrorism related analytical methodologies and software tools


Human Behavior and Factors in Security Applications:

• Behavior issues in information systems security
• HCI and user interfaces of relevance to intelligence and security
• Social impacts of crime and terrorism
• Board activism and influence
• Measuring the effectiveness of counter-terrorism campaigns
• Citizen education and training
• Understanding user behavior in that has potential security risks
• Security risks about user behavior in information systems
• Human behavior modeling, representation and prediction for security applications


Organizational, National, and International Issues in Counter-terrorism and other Security Applications:

• Best practices in counter-terrorism or security protection
• Information sharing policy and governance
• Privacy, security, and civil liberties issues
• Emergency response and management
• Disaster prevention, detection, and management
• Protection of transportation and communications infrastructure
• Communication and decision support for research and rescue
• Assisting citizens' responses to terrorism and catastrophic events
• Border security
• Accounting and IT auditing
• Corporate governance and monitoring
• Election fraud and political use and abuse

Cookies help us deliver our services. By using our services, you agree to our use of cookies.