You do not have permission to edit this page, for the following reason:
The action you have requested is limited to users in the group: Users.
Add another
'''IEEE International Conference on Intelligence and Security Informatics 2018''' ('''ISI''') ==Topics== '''Security Analytics and Threat Intelligence:''' *Threat pattern models and modelling tools *Real-time situational awareness *Intrusion and cybersecurity threat detection and analysis *Cyber-physical-social system security and incident management *Computing and networking infrastructure protection *Crime analysis and prevention *Forecasting threats and measuring the impact of threats *Surveillance and intelligence through unconventional means *Information security management standards *Information systems security policies *Mobile and cloud computing security *Big data analytics for cybersecurity *Machine learning for cybersecurity *Artificial Intelligence for cybersecurity *Resilient cyber infrastructure design and protection '''Data Science and Analytics in Security Informatics:''' *Data representation and fusion for security informatics<br> *Criminal/intelligence information extraction<br> *Data sharing and information visualization for security informatics<br> *Web-based intelligence monitoring and analysis<br> *Spatial-temporal data analysis for crime analysis and security informatics<br> *Criminal/intelligence machine learning and data mining<br> *Bio-terrorism tracking, alerting, and analysis<br> *Digital forensics and computational criminology<br> *Financial and accounting fraud analysis<br> *Consumer-generated content and security-related social media analytics<br> *Security-related social network analysis (radicalization, fund-raising, recruitment, conducting operations)<br> *Authorship analysis and identification<br> *Terrorism related analytical methodologies and software tools<br> '''Human Behaviour and Factors in Security Applications:''' *Behaviour issues in information systems security<br> *HCI and user interfaces of relevance to intelligence and security<br> *Social impacts of crime and terrorism<br> *Board activism and influence<br> *Measuring the effectiveness of counter-terrorism campaigns<br> *Citizen education and training<br> *Understanding user behaviour in that has potential security risks<br> *Security risks about user behaviour in information systems<br> *Human behaviour modelling, representation and prediction for security applications<br> '''Organizational, National, and International Issues in Counter-terrorism and other Security Applications:''' *Best practices in counter-terrorism or security protection<br> *Information sharing policy and governance<br> *Privacy, security, and civil liberties issues<br> *Emergency response and management<br> *Disaster prevention, detection, and management<br> *Protection of transportation and communications infrastructure<br> *Communication and decision support for research and rescue<br> *Assisting citizens' responses to terrorism and catastrophic events<br> *Border security<br> *Accounting and IT auditing<br> *Corporate governance and monitoring<br> *Election fraud and political use and abuse<br> ==Important Dates== Conference Dates: November 8-10, 2018<br> Paper Submission: July 20, 2018 August 17, 2018 (Extended Deadline)<br> Workshop Proposal: June 22, 2018<br> Tutorial Proposal: July 31, 2018<br> Tutorial Proposal Acceptance Notification: August 15, 2018<br> Paper Acceptance Notification: September 7, 2018 September 14, 2018 (Extended Deadline)<br> Camera-Ready Papers Due: September 28, 2018<br> ==Committees== '''General Chair:''' *Dongwon Lee, Pennsylvania State University, USA '''Local Chair:''' *A. Selcuk Uluagac, Florida International University, USA '''Program Co-Chairs:''' *Nitesh Saxena, University of Alabama at Birmingham, USA *Ponnurangam Kumaraguru, Indraprastha Institute of Information Technology, New Delhi, India '''Publication Chair:''' *Ghita Mezzour, International University of Rabat, Morocco '''Finance Chair:''' *Fengjun Li, The University of Kansas, USA '''Publicity Chair:''' *Anna Squicciarini, Pennsylvania State University, USA '''Web Chair:''' *Leonardo Babun, Florida International University, USA '''Workshop Co-Chairs:''' *Kemal Akkaya, Florida International University, USA *Christopher C. Yang, Drexel University, USA '''Tutorial Co-Chairs:''' *Jonathan Voris, New York Institute of Technology, USA *Siddharth Kaza, Towson University, USA '''Registration Co-Chairs:''' *Wingyan Chung, University of Central Florida, USA *K.P. Chow, The University of Hong Kong, Hong Kong '''Registration Specialist:''' *Jinwei Liu, University of Central Florida, USA '''PROGRAM COMMITTEE''' '''Chairs:''' *Ponnurangam Kumaraguru, Indraprastha Institute of Information Technology, Delhi, India *Nitesh Saxena, University of Alabama at Birmingham, USA '''Committee:''' *Swati Agarwal, Indraprastha Institute of Information Technology, Delhi, India *Anupama Aggarwal, Indraprastha Institute of Information Technology, Delhi, India *Massimiliano Albanese, George Mason University, USA *S. Abhishek Anand, University of Alabama at Birmingham, USA *Sandhya Aneja, Institute of Informatics and Communication, University of Delhi, India *Jie Bai, Chinese Academy of Sciences, China *Jeremy Blackburn, University of Alabama at Birmingham, USA *Joel Brynielsson, KTH Royal Institute of Technology, Sweden *Jose Luis Calvo-Rolle, University of A. Coruña, Spain *Weiping Chang, Central Police University, Taiwan *K. P. Chow, The University of Hong Kong, Hong Kong *Wingyan Chung, University of Central Florida, USA *Amitava Das, Indian Institute of Information Technology, Sri City, India *Leon Deligiannidis, Wentworth Institute of Technology, USA *Norah Dunbar, University of California Santa Barbara, USA *Guanggang Geng, Chinese Academy of Sciences, China *Roberto Giacobazzi, University of Verona, Italy *Anuradha Gupta, Jaypee Institute of Information Technology, India *Tzipora Halevi, Brooklyn College, USA *Sue Kase, Army Research Laboratory, USA *Sergii Kavun, Kharkiv Educational and Scientific Institute of the University of Banking, Ukraine *Jeroen Keppens, King's College London, UK *Latifur Khan, University of Texas at Dallas, USA *Jörn Kohlhammer, Fraunhofer Institute for Computer Graphics Research IGD, Deutschland *Steve Kramer, Paragon Science, Inc. *Qiudan Li, Chinese Academy of Sciences, Beijing, China *Luca Mazzola, Deutsche Forschungszentrum für Künstliche Intelligenz GmbH (DFKI), Germany *Michael Mcguire, Towson University, USA *Manar Mohamed, Miami University, USA *Ajaya Neupane, University of California Riverside, USA *Greg Newby, Compute Canada *Cyril Onwubiko, Cyber Security and Intelligence at Research Series Limited *Andrew Park, Thompson Rivers University, Canada *Jakub Piskorski, Joint Research Centre of the European Commission, Poland *Andrea Pugliese, University of Calabria, Italy *Guangzhi Qu, Oakland University, USA *Björn Schuller, University of Augsburg / Imperial College London, UK *Abdul Serwadda, Louisiana Tech University, USA *Maliheh Shirvanian, University of Alabama at Birmingham, USA *Babins Shrestha, VISA Inc., Austin, USA *Gerardo Simari, Universidad Nacional del Sur and CONICET, Argentina *Yannis Stamatiou, University of Patras, Greece *Robyn Torok, Edith Cowan University, Australia *Hien Thi Thu Truong, NEC Labs Europe *Khan Ferdous Wahid, Airbus Group *Jenq-Haur Wang, National Taipei University of Technology, Taiwan *Uffe Wiil, University of Southern Denmark, Denmark *Christian Wolff, Regensburg University, Germany *Guobin Xu, Frostburg State University, USA *Shouhuai Xu, University of Texas at San Antonio, USA *Qingpeng Zhang, City University of Hong Kong, Hong Kong *Xiaolong Zheng, Chinese Academy of Sciences, Beijing, China *Bin Zhou, University of Maryland, USA
Save page Show preview Cancel