You do not have permission to edit this page, for the following reason:
The action you have requested is limited to users in the group: Users.
Add another
The '''17th IEEE International Conference on Intelligence and Security Informatics''' ('''ISI''') ==Topics== '''Security Analytics and Threat Intelligence:''' *Threat pattern models and modeling tools<br> *Real-time situational awareness<br> *Intrusion and cybersecurity threat detection and analysis<br> *Cyber-physical-social system security and incident management<br> *Computing and networking infrastructure protection<br> *Crime analysis and prevention<br> *Forecasting threats and measuring the impact of threats<br> *Surveillance and intelligence through unconventional means<br> *Information security management standards<br> *Information systems security policies<br> *Mobile and cloud computing security<br> *Big data analytics for cybersecurity<br> *Resilient cyber infrastructure design and protection<br> '''Data Science and Analytics in Security Informatics:''' *Data representation and fusion for security informatics<br> *Criminal/intelligence information extraction<br> *Data sharing and information visualization for security informatics<br> *Web-based intelligence monitoring and analysis<br> *Spatial-temporal data analysis for crime analysis and security informatics<br> *Criminal/intelligence machine learning and data mining<br> *Bio-terrorism tracking, alerting, and analysis<br> *Digital forensics and computational criminology<br> *Financial and accounting fraud analysis<br> *Consumer-generated content and security-related social media analytics<br> *Security-related social network analysis (radicalization, recruitment, conducting operations)<br> *Authorship analysis and identification<br> *Terrorism related analytical methodologies and software tools<br> '''Human Behavior and Factors in Security Applications:''' *Behavior issues in information systems security<br> *HCI and user interfaces of relevance to intelligence and security<br> *Social impacts of crime and terrorism<br> *Board activism and influence<br> *Measuring the effectiveness of counter-terrorism campaigns<br> *Citizen education and training<br> *Understanding user behavior in that has potential security risks<br> *Security risks about user behavior in information systems<br> *Human behavior modeling, representation and prediction for security applications<br> '''Organizational, National, and International Issues in Counter-terrorism and other Security Applications:''' *Best practices in counter-terrorism or security protection<br> *Information sharing policy and governance<br> *Privacy, security, and civil liberties issues<br> *Emergency response and management<br> *Disaster prevention, detection, and management<br> *Protection of transportation and communications infrastructure<br> *Communication and decision support for research and rescue<br> *Assisting citizens' responses to terrorism and catastrophic events<br> *Border security<br> *Accounting and IT auditing<br> *Corporate governance and monitoring<br> *Election fraud and political use and abuse<br> ==Important Dates== *Most submissions due: April 10,2019<br> *Acceptance: April 30, 2019<br> *Camera ready copy: May 14, 2019<br> *Author registration: May 14, 2019<br> *Conference: July 1-3, 2019 ==Committees== '''Honorary Chair:''' *Hsinchun Chen, University of Arizona & Tsinghua University '''Conference Co-Chairs:''' *Daniel Zeng, Chinese Academy of Sciences & Shenzhen Artificial Intelligence and Data Science Institute *Chris Yang, Drexel University '''Program Co-Chairs:''' *Xiaolong Zheng, Chinese Academy of Sciences & Shenzhen Artificial Intelligence and Data Science Institute *Ahmed Abbasi, University of Virginia *Michael Chau, University of Hong Kong '''Publication Chairs:''' *Alan Wang, Virginia Tech *Lina Zhou, UMBC '''Local Arrangements Co-Chairs:''' *Xiaoyan Huang, Chinese Academy of Sciences & Shenzhen Artificial Intelligence and Data Science Institute *Liang Chen, Chinese Academy of Sciences & Shenzhen Artificial Intelligence and Data Science Institute<br>
Save page Show preview Cancel