Difference between revisions of "Event:ISI 2019"

From ConfIDent
(mobo import Concept___Events-migrated)
Line 5: Line 5:
 
|Homepage=http://www.isi-conf.org/
 
|Homepage=http://www.isi-conf.org/
 
|City=Shenzhen
 
|City=Shenzhen
|Country=China
+
|Country=Country:CN
 
|Camera ready=2019/05/14
 
|Camera ready=2019/05/14
 
|Submitting link=https://easychair.org/account/signin?l=17A3HDxxWUdFXtfZ65Twpd
 
|Submitting link=https://easychair.org/account/signin?l=17A3HDxxWUdFXtfZ65Twpd
Line 23: Line 23:
 
|End Date=2019/07/03
 
|End Date=2019/07/03
 
|Academic Field=Computer Security;Computer Reliability
 
|Academic Field=Computer Security;Computer Reliability
 +
|Event Status=as scheduled
 +
|Event Mode=on site
 
}}
 
}}
 
The '''17th IEEE International Conference on Intelligence and Security Informatics''' ('''ISI''')
 
The '''17th IEEE International Conference on Intelligence and Security Informatics''' ('''ISI''')

Revision as of 14:34, 6 September 2022

The 17th IEEE International Conference on Intelligence and Security Informatics (ISI)

Topics

Security Analytics and Threat Intelligence:

  • Threat pattern models and modeling tools
  • Real-time situational awareness
  • Intrusion and cybersecurity threat detection and analysis
  • Cyber-physical-social system security and incident management
  • Computing and networking infrastructure protection
  • Crime analysis and prevention
  • Forecasting threats and measuring the impact of threats
  • Surveillance and intelligence through unconventional means
  • Information security management standards
  • Information systems security policies
  • Mobile and cloud computing security
  • Big data analytics for cybersecurity
  • Resilient cyber infrastructure design and protection


Data Science and Analytics in Security Informatics:

  • Data representation and fusion for security informatics
  • Criminal/intelligence information extraction
  • Data sharing and information visualization for security informatics
  • Web-based intelligence monitoring and analysis
  • Spatial-temporal data analysis for crime analysis and security informatics
  • Criminal/intelligence machine learning and data mining
  • Bio-terrorism tracking, alerting, and analysis
  • Digital forensics and computational criminology
  • Financial and accounting fraud analysis
  • Consumer-generated content and security-related social media analytics
  • Security-related social network analysis (radicalization, recruitment, conducting operations)
  • Authorship analysis and identification
  • Terrorism related analytical methodologies and software tools


Human Behavior and Factors in Security Applications:

  • Behavior issues in information systems security
  • HCI and user interfaces of relevance to intelligence and security
  • Social impacts of crime and terrorism
  • Board activism and influence
  • Measuring the effectiveness of counter-terrorism campaigns
  • Citizen education and training
  • Understanding user behavior in that has potential security risks
  • Security risks about user behavior in information systems
  • Human behavior modeling, representation and prediction for security applications


Organizational, National, and International Issues in Counter-terrorism and other Security Applications:

  • Best practices in counter-terrorism or security protection
  • Information sharing policy and governance
  • Privacy, security, and civil liberties issues
  • Emergency response and management
  • Disaster prevention, detection, and management
  • Protection of transportation and communications infrastructure
  • Communication and decision support for research and rescue
  • Assisting citizens' responses to terrorism and catastrophic events
  • Border security
  • Accounting and IT auditing
  • Corporate governance and monitoring
  • Election fraud and political use and abuse


Important Dates

  • Most submissions due: April 10,2019​
  • Acceptance: April 30, 2019​
  • Camera ready copy: May 14, 2019

​*Author registration: May 14, 2019
​*Conference: July 1-3, 2019


Committees

Honorary Chair:

  • Hsinchun Chen, University of Arizona & Tsinghua University


Conference Co-Chairs:

  • Daniel Zeng, Chinese Academy of Sciences & Shenzhen Artificial Intelligence and Data Science Institute
  • Chris Yang, Drexel University


Program Co-Chairs:

  • Xiaolong Zheng, Chinese Academy of Sciences & Shenzhen Artificial Intelligence and Data Science Institute
  • Ahmed Abbasi, University of Virginia
  • Michael Chau, University of Hong Kong


Publication Chairs:

  • Alan Wang, Virginia Tech
  • Lina Zhou, UMBC


Local Arrangements Co-Chairs:

  • Xiaoyan Huang, Chinese Academy of Sciences & Shenzhen Artificial Intelligence and Data Science Institute
  • Liang Chen, Chinese Academy of Sciences & Shenzhen Artificial Intelligence and Data Science Institute
Cookies help us deliver our services. By using our services, you agree to our use of cookies.