m (Text replacement - "\*User:Curator 83" to "*Ch") |
m (Text replacement - "[ \s]User:Curator 83" to " Ch") |
||
Line 9: | Line 9: | ||
|Camera ready=2019/05/14 | |Camera ready=2019/05/14 | ||
|Submitting link=https://easychair.org/account/signin?l=17A3HDxxWUdFXtfZ65Twpd | |Submitting link=https://easychair.org/account/signin?l=17A3HDxxWUdFXtfZ65Twpd | ||
− | |has Keynote speaker=Hsinchun | + | |has Keynote speaker=Hsinchun Chen, Hui Zhang, Winson Peng |
|Attendance fee currency=$ | |Attendance fee currency=$ | ||
|On site regular=540 | |On site regular=540 | ||
Line 102: | Line 102: | ||
==Committees== | ==Committees== | ||
− | '''Honorary | + | '''Honorary Chair:''' |
− | *Hsinchun | + | *Hsinchun Chen, University of Arizona & Tsinghua University |
'''Conference Co-Chairs:''' | '''Conference Co-Chairs:''' | ||
− | *Daniel Zeng, | + | *Daniel Zeng, Chinese Academy of Sciences & Shenzhen Artificial Intelligence and Data Science Institute |
*Chris Yang, Drexel University | *Chris Yang, Drexel University | ||
'''Program Co-Chairs:''' | '''Program Co-Chairs:''' | ||
− | *Xiaolong Zheng, | + | *Xiaolong Zheng, Chinese Academy of Sciences & Shenzhen Artificial Intelligence and Data Science Institute |
*Ahmed Abbasi, University of Virginia | *Ahmed Abbasi, University of Virginia | ||
− | *Michael | + | *Michael Chau, University of Hong Kong |
− | '''Publication | + | '''Publication Chairs:''' |
*Alan Wang, Virginia Tech | *Alan Wang, Virginia Tech | ||
*Lina Zhou, UMBC | *Lina Zhou, UMBC | ||
Line 123: | Line 123: | ||
'''Local Arrangements Co-Chairs:''' | '''Local Arrangements Co-Chairs:''' | ||
− | *Xiaoyan Huang, | + | *Xiaoyan Huang, Chinese Academy of Sciences & Shenzhen Artificial Intelligence and Data Science Institute |
− | *Liang | + | *Liang Chen, Chinese Academy of Sciences & Shenzhen Artificial Intelligence and Data Science Institute<br> |
Revision as of 12:40, 7 July 2022
The 17th IEEE International Conference on Intelligence and Security Informatics (ISI)
Topics
Security Analytics and Threat Intelligence:
- Threat pattern models and modeling tools
- Real-time situational awareness
- Intrusion and cybersecurity threat detection and analysis
- Cyber-physical-social system security and incident management
- Computing and networking infrastructure protection
- Crime analysis and prevention
- Forecasting threats and measuring the impact of threats
- Surveillance and intelligence through unconventional means
- Information security management standards
- Information systems security policies
- Mobile and cloud computing security
- Big data analytics for cybersecurity
- Resilient cyber infrastructure design and protection
Data Science and Analytics in Security Informatics:
- Data representation and fusion for security informatics
- Criminal/intelligence information extraction
- Data sharing and information visualization for security informatics
- Web-based intelligence monitoring and analysis
- Spatial-temporal data analysis for crime analysis and security informatics
- Criminal/intelligence machine learning and data mining
- Bio-terrorism tracking, alerting, and analysis
- Digital forensics and computational criminology
- Financial and accounting fraud analysis
- Consumer-generated content and security-related social media analytics
- Security-related social network analysis (radicalization, recruitment, conducting operations)
- Authorship analysis and identification
- Terrorism related analytical methodologies and software tools
Human Behavior and Factors in Security Applications:
- Behavior issues in information systems security
- HCI and user interfaces of relevance to intelligence and security
- Social impacts of crime and terrorism
- Board activism and influence
- Measuring the effectiveness of counter-terrorism campaigns
- Citizen education and training
- Understanding user behavior in that has potential security risks
- Security risks about user behavior in information systems
- Human behavior modeling, representation and prediction for security applications
Organizational, National, and International Issues in Counter-terrorism and other Security Applications:
- Best practices in counter-terrorism or security protection
- Information sharing policy and governance
- Privacy, security, and civil liberties issues
- Emergency response and management
- Disaster prevention, detection, and management
- Protection of transportation and communications infrastructure
- Communication and decision support for research and rescue
- Assisting citizens' responses to terrorism and catastrophic events
- Border security
- Accounting and IT auditing
- Corporate governance and monitoring
- Election fraud and political use and abuse
Important Dates
- Most submissions due: April 10,2019
- Acceptance: April 30, 2019
- Camera ready copy: May 14, 2019
*Author registration: May 14, 2019
*Conference: July 1-3, 2019
Committees
Honorary Chair:
- Hsinchun Chen, University of Arizona & Tsinghua University
Conference Co-Chairs:
- Daniel Zeng, Chinese Academy of Sciences & Shenzhen Artificial Intelligence and Data Science Institute
- Chris Yang, Drexel University
Program Co-Chairs:
- Xiaolong Zheng, Chinese Academy of Sciences & Shenzhen Artificial Intelligence and Data Science Institute
- Ahmed Abbasi, University of Virginia
- Michael Chau, University of Hong Kong
Publication Chairs:
- Alan Wang, Virginia Tech
- Lina Zhou, UMBC
Local Arrangements Co-Chairs:
- Xiaoyan Huang, Chinese Academy of Sciences & Shenzhen Artificial Intelligence and Data Science Institute
- Liang Chen, Chinese Academy of Sciences & Shenzhen Artificial Intelligence and Data Science Institute