You do not have permission to edit this page, for the following reason:
The action you have requested is limited to users in the group: Users.
Add another
'''IEEE International Conference on Intelligence and Security Informatics''' ('''ISI'''), July 22-24, 2017, Beijing, China ==Topics== '''Security Analytics and Threat Intelligence:''' • Threat pattern models and modeling tools<br> • Real-time situational awareness<br> • Intrusion and cybersecurity threat detection and analysis<br> • Cyber-physical-social system security and incident management<br> • Computing and networking infrastructure protection<br> • Crime analysis and prevention<br> • Forecasting threats and measuring the impact of threats<br> • Surveillance and intelligence through unconventional means<br> • Information security management standards<br> • Information systems security policies<br> • Mobile and cloud computing security<br> • Big data analytics for cybersecurity<br> • Resilient cyber infrastructure design and protection<br> '''Data Science and Analytics in Security Informatics:''' • Data representation and fusion for security informatics<br> • Criminal/intelligence information extraction<br> • Data sharing and information visualization for security informatics<br> • Web-based intelligence monitoring and analysis<br> • Spatial-temporal data analysis for crime analysis and security informatics<br> • Criminal/intelligence machine learning and data mining<br> • Bio-terrorism tracking, alerting, and analysis<br> • Digital forensics and computational criminology<br> • Financial and accounting fraud analysis<br> • Consumer-generated content and security-related social media analytics<br> • Security-related social network analysis (radicalization, recruitment, conducting operations)<br> • Authorship analysis and identification<br> • Terrorism related analytical methodologies and software tools<br> '''Human Behavior and Factors in Security Applications:''' • Behavior issues in information systems security<br> • HCI and user interfaces of relevance to intelligence and security<br> • Social impacts of crime and terrorism<br> • Board activism and influence<br> • Measuring the effectiveness of counter-terrorism campaigns<br> • Citizen education and training<br> • Understanding user behavior in that has potential security risks<br> • Security risks about user behavior in information systems<br> • Human behavior modeling, representation and prediction for security applications<br> '''Organizational, National, and International Issues in Counter-terrorism and other Security Applications:''' • Best practices in counter-terrorism or security protection<br> • Information sharing policy and governance<br> • Privacy, security, and civil liberties issues<br> • Emergency response and management<br> • Disaster prevention, detection, and management<br> • Protection of transportation and communications infrastructure<br> • Communication and decision support for research and rescue<br> • Assisting citizens' responses to terrorism and catastrophic events<br> • Border security<br> • Accounting and IT auditing<br> • Corporate governance and monitoring<br> • Election fraud and political use and abuse<br>
Save page Show preview Cancel