m (Text replacement - "[ \s]User:Curator 83" to " Ch") |
Curator 100 (talk | contribs) |
||
(8 intermediate revisions by 2 users not shown) | |||
Line 2: | Line 2: | ||
|Acronym=ISI 2019 | |Acronym=ISI 2019 | ||
|Title=2019 IEEE International Conference on Intelligence and Security Informatics | |Title=2019 IEEE International Conference on Intelligence and Security Informatics | ||
+ | |In Event Series=Event Series:ISI | ||
+ | |Single Day Event=no | ||
+ | |Start Date=2019/07/01 | ||
+ | |End Date=2019/07/03 | ||
+ | |Event Status=as scheduled | ||
+ | |Event Mode=on site | ||
+ | |City=Shenzhen | ||
+ | |Country=Country:CN | ||
+ | |Academic Field=Computer Reliability; Computer Security | ||
+ | |Official Website=http://www.isi-conf.org/ | ||
+ | |Submission Link=https://easychair.org/account/signin?l=17A3HDxxWUdFXtfZ65Twpd | ||
+ | |Registration Link=https://meeting.yizhifubj.com.cn/web/index.action?meetingId=480 | ||
+ | |DOI=10.25798/v79x-yp57 | ||
|Type=Conference | |Type=Conference | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
|Attendance fee currency=$ | |Attendance fee currency=$ | ||
|On site regular=540 | |On site regular=540 | ||
Line 15: | Line 21: | ||
|On site student=360 | |On site student=360 | ||
|Early bird student=310 | |Early bird student=310 | ||
− | |||
|pageCreator=User:Curator 75 | |pageCreator=User:Curator 75 | ||
|pageEditor=User:Curator 75 | |pageEditor=User:Curator 75 | ||
|contributionType=1 | |contributionType=1 | ||
− | |||
− | |||
− | |||
− | |||
}} | }} | ||
+ | {{Event Deadline | ||
+ | |Camera-Ready Deadline=2019/05/14 | ||
+ | }} | ||
+ | {{Event Metric}} | ||
+ | {{S Event}} | ||
The '''17th IEEE International Conference on Intelligence and Security Informatics''' ('''ISI''') | The '''17th IEEE International Conference on Intelligence and Security Informatics''' ('''ISI''') | ||
Line 118: | Line 124: | ||
'''Publication Chairs:''' | '''Publication Chairs:''' | ||
− | *Alan Wang, Virginia Tech | + | *Alan Wang, Virginia Tech |
*Lina Zhou, UMBC | *Lina Zhou, UMBC | ||
Latest revision as of 12:01, 29 January 2024
Deadlines
|
||
Camera-Ready |
Metrics
Venue
Shenzhen, China
Warning: Venue is missing. The map might not show the exact location.
The 17th IEEE International Conference on Intelligence and Security Informatics (ISI)
Topics
Security Analytics and Threat Intelligence:
- Threat pattern models and modeling tools
- Real-time situational awareness
- Intrusion and cybersecurity threat detection and analysis
- Cyber-physical-social system security and incident management
- Computing and networking infrastructure protection
- Crime analysis and prevention
- Forecasting threats and measuring the impact of threats
- Surveillance and intelligence through unconventional means
- Information security management standards
- Information systems security policies
- Mobile and cloud computing security
- Big data analytics for cybersecurity
- Resilient cyber infrastructure design and protection
Data Science and Analytics in Security Informatics:
- Data representation and fusion for security informatics
- Criminal/intelligence information extraction
- Data sharing and information visualization for security informatics
- Web-based intelligence monitoring and analysis
- Spatial-temporal data analysis for crime analysis and security informatics
- Criminal/intelligence machine learning and data mining
- Bio-terrorism tracking, alerting, and analysis
- Digital forensics and computational criminology
- Financial and accounting fraud analysis
- Consumer-generated content and security-related social media analytics
- Security-related social network analysis (radicalization, recruitment, conducting operations)
- Authorship analysis and identification
- Terrorism related analytical methodologies and software tools
Human Behavior and Factors in Security Applications:
- Behavior issues in information systems security
- HCI and user interfaces of relevance to intelligence and security
- Social impacts of crime and terrorism
- Board activism and influence
- Measuring the effectiveness of counter-terrorism campaigns
- Citizen education and training
- Understanding user behavior in that has potential security risks
- Security risks about user behavior in information systems
- Human behavior modeling, representation and prediction for security applications
Organizational, National, and International Issues in Counter-terrorism and other Security Applications:
- Best practices in counter-terrorism or security protection
- Information sharing policy and governance
- Privacy, security, and civil liberties issues
- Emergency response and management
- Disaster prevention, detection, and management
- Protection of transportation and communications infrastructure
- Communication and decision support for research and rescue
- Assisting citizens' responses to terrorism and catastrophic events
- Border security
- Accounting and IT auditing
- Corporate governance and monitoring
- Election fraud and political use and abuse
Important Dates
- Most submissions due: April 10,2019
- Acceptance: April 30, 2019
- Camera ready copy: May 14, 2019
*Author registration: May 14, 2019
*Conference: July 1-3, 2019
Committees
Honorary Chair:
- Hsinchun Chen, University of Arizona & Tsinghua University
Conference Co-Chairs:
- Daniel Zeng, Chinese Academy of Sciences & Shenzhen Artificial Intelligence and Data Science Institute
- Chris Yang, Drexel University
Program Co-Chairs:
- Xiaolong Zheng, Chinese Academy of Sciences & Shenzhen Artificial Intelligence and Data Science Institute
- Ahmed Abbasi, University of Virginia
- Michael Chau, University of Hong Kong
Publication Chairs:
- Alan Wang, Virginia Tech
- Lina Zhou, UMBC
Local Arrangements Co-Chairs:
- Xiaoyan Huang, Chinese Academy of Sciences & Shenzhen Artificial Intelligence and Data Science Institute
- Liang Chen, Chinese Academy of Sciences & Shenzhen Artificial Intelligence and Data Science Institute