ISI 2018: Difference between revisions

From Openresearch
Jump to navigation Jump to search
No edit summary
No edit summary
 
(2 intermediate revisions by the same user not shown)
Line 8: Line 8:
|End date=2018/11/10
|End date=2018/11/10
|Homepage=http://isi18.azurewebsites.net/
|Homepage=http://isi18.azurewebsites.net/
|Twitter account=https://twitter.com/ieeeisiconf
|City=Miami
|City=Miami
|State=Florida
|State=Florida
|Country=USA
|Country=USA
|Paper deadline=2018/07/20
|Workshop deadline=2018/06/22
|Tutorial deadline=2018/07/31
|Notification=2018/09/07
|Camera ready=2018/09/28
|has general chair=Dongwon Lee
|has general chair=Dongwon Lee
|has program chair=Nitesh Saxena, Ponnurangam Kumaraguru
|has program chair=Nitesh Saxena, Ponnurangam Kumaraguru
|has workshop chair=Kemal Akkaya, Christopher C. Yang
|has workshop chair=Kemal Akkaya, Christopher C. Yang
|has tutorial chair=Jonathan Voris, Siddharth Kaza
|has tutorial chair=Jonathan Voris, Siddharth Kaza
|has Keynote speaker=Engin Kirda, Kathleen M. Carkey
|Attendance fee currency=$
|On site regular=580
|Early bird regular=480
|On site student=450
|Early bird student=350
|Registration link=https://www.regonline.com/builder/site/?eventid=2528396
|Submitted papers=110
|Submitted papers=110
|Accepted papers=38
|Accepted papers=38
|has Proceedings Link=https://ieeexplore.ieee.org/xpl/conhome/8575039/proceeding
|has Proceedings Link=https://ieeexplore.ieee.org/xpl/conhome/8575039/proceeding
}}
}}
''Enter your description here. Maybe just paste in the call for papers.''
'''IEEE International Conference on Intelligence and Security Informatics 2018''' ('''ISI''')


==Topics==
==Topics==
==Submissions==
 
'''Security Analytics and Threat Intelligence:'''
 
*Threat pattern models and modelling tools
*Real-time situational awareness
*Intrusion and cybersecurity threat detection and analysis
*Cyber-physical-social system security and incident management
*Computing and networking infrastructure protection
*Crime analysis and prevention
*Forecasting threats and measuring the impact of threats
*Surveillance and intelligence through unconventional means
*Information security management standards
*Information systems security policies
*Mobile and cloud computing security
*Big data analytics for cybersecurity
*Machine learning for cybersecurity
*Artificial Intelligence for cybersecurity
*Resilient cyber infrastructure design and protection
 
 
'''Data Science and Analytics in Security Informatics:'''
 
*Data representation and fusion for security informatics<br>
*Criminal/intelligence information extraction<br>
*Data sharing and information visualization for security informatics<br>
*Web-based intelligence monitoring and analysis<br>
*Spatial-temporal data analysis for crime analysis and security informatics<br>
*Criminal/intelligence machine learning and data mining<br>
*Bio-terrorism tracking, alerting, and analysis<br>
*Digital forensics and computational criminology<br>
*Financial and accounting fraud analysis<br>
*Consumer-generated content and security-related social media analytics<br>
*Security-related social network analysis (radicalization, fund-raising, recruitment, conducting operations)<br>
*Authorship analysis and identification<br>
*Terrorism related analytical methodologies and software tools<br>
 
 
'''Human Behaviour and Factors in Security Applications:'''
 
*Behaviour issues in information systems security<br>
*HCI and user interfaces of relevance to intelligence and security<br>
*Social impacts of crime and terrorism<br>
*Board activism and influence<br>
*Measuring the effectiveness of counter-terrorism campaigns<br>
*Citizen education and training<br>
*Understanding user behaviour in that has potential security risks<br>
*Security risks about user behaviour in information systems<br>
*Human behaviour modelling, representation and prediction for security applications<br>
 
 
'''Organizational, National, and International Issues in Counter-terrorism and other Security Applications:'''
 
*Best practices in counter-terrorism or security protection<br>
*Information sharing policy and governance<br>
*Privacy, security, and civil liberties issues<br>
*Emergency response and management<br>
*Disaster prevention, detection, and management<br>
*Protection of transportation and communications infrastructure<br>
*Communication and decision support for research and rescue<br>
*Assisting citizens' responses to terrorism and catastrophic events<br>
*Border security<br>
*Accounting and IT auditing<br>
*Corporate governance and monitoring<br>
*Election fraud and political use and abuse<br>
 
 
==Important Dates==
==Important Dates==
Conference Dates:
November 8-10, 2018<br>
Paper Submission:
July 20, 2018
August 17, 2018 (Extended Deadline)<br>
Workshop Proposal:
June 22, 2018<br>
Tutorial Proposal:
July 31, 2018<br>
Tutorial Proposal Acceptance Notification:
August 15, 2018<br>
Paper Acceptance Notification:
September 7, 2018
September 14, 2018 (Extended Deadline)<br>
Camera-Ready Papers Due:
September 28, 2018<br>


==Committees==
==Committees==

Latest revision as of 07:35, 1 August 2019

ISI 2018
2018 IEEE International Conference on Intelligence and Security Informatics
Event in series ISI
Dates 2018/11/08 (iCal) - 2018/11/10
Homepage: http://isi18.azurewebsites.net/
Twitter account: https://twitter.com/ieeeisiconf
Location
Location: Miami, Florida, USA
Loading map...

Important dates
Workshops: 2018/06/22
Tutorials: 2018/07/31
Papers: 2018/07/20
Notification: 2018/09/07
Camera ready due: 2018/09/28
Registration link: https://www.regonline.com/builder/site/?eventid=2528396
Early bird student: $ 350 / {{{Early bird fee reduced}}}Property "Early bird fee reduced" (as page type) with input value "{{{Early bird fee reduced}}}" contains invalid characters or is incomplete and therefore can cause unexpected results during a query or annotation process. (reduced)
On site student: $ 450 / {{{On site fee reduced}}}Property "On site fee reduced" (as page type) with input value "{{{On site fee reduced}}}" contains invalid characters or is incomplete and therefore can cause unexpected results during a query or annotation process. (reduced)
Early bird regular: $ 480
On site regular: $ 580
Papers: Submitted 110 / Accepted 38 (34.5 %)
Committees
General chairs: Dongwon Lee
PC chairs: Nitesh Saxena, Ponnurangam Kumaraguru
Workshop chairs: Kemal Akkaya, Christopher C. Yang
Seminars Chair: Jonathan Voris, Siddharth Kaza
Keynote speaker: Engin Kirda, Kathleen M. Carkey
Table of Contents
Tweets by https://twitter.com/ieeeisiconf
">Tweets by {{{Twitter account}}}


IEEE International Conference on Intelligence and Security Informatics 2018 (ISI)

Topics

Security Analytics and Threat Intelligence:

  • Threat pattern models and modelling tools
  • Real-time situational awareness
  • Intrusion and cybersecurity threat detection and analysis
  • Cyber-physical-social system security and incident management
  • Computing and networking infrastructure protection
  • Crime analysis and prevention
  • Forecasting threats and measuring the impact of threats
  • Surveillance and intelligence through unconventional means
  • Information security management standards
  • Information systems security policies
  • Mobile and cloud computing security
  • Big data analytics for cybersecurity
  • Machine learning for cybersecurity
  • Artificial Intelligence for cybersecurity
  • Resilient cyber infrastructure design and protection


Data Science and Analytics in Security Informatics:

  • Data representation and fusion for security informatics
  • Criminal/intelligence information extraction
  • Data sharing and information visualization for security informatics
  • Web-based intelligence monitoring and analysis
  • Spatial-temporal data analysis for crime analysis and security informatics
  • Criminal/intelligence machine learning and data mining
  • Bio-terrorism tracking, alerting, and analysis
  • Digital forensics and computational criminology
  • Financial and accounting fraud analysis
  • Consumer-generated content and security-related social media analytics
  • Security-related social network analysis (radicalization, fund-raising, recruitment, conducting operations)
  • Authorship analysis and identification
  • Terrorism related analytical methodologies and software tools


Human Behaviour and Factors in Security Applications:

  • Behaviour issues in information systems security
  • HCI and user interfaces of relevance to intelligence and security
  • Social impacts of crime and terrorism
  • Board activism and influence
  • Measuring the effectiveness of counter-terrorism campaigns
  • Citizen education and training
  • Understanding user behaviour in that has potential security risks
  • Security risks about user behaviour in information systems
  • Human behaviour modelling, representation and prediction for security applications


Organizational, National, and International Issues in Counter-terrorism and other Security Applications:

  • Best practices in counter-terrorism or security protection
  • Information sharing policy and governance
  • Privacy, security, and civil liberties issues
  • Emergency response and management
  • Disaster prevention, detection, and management
  • Protection of transportation and communications infrastructure
  • Communication and decision support for research and rescue
  • Assisting citizens' responses to terrorism and catastrophic events
  • Border security
  • Accounting and IT auditing
  • Corporate governance and monitoring
  • Election fraud and political use and abuse


Important Dates

Conference Dates: November 8-10, 2018

Paper Submission: July 20, 2018 August 17, 2018 (Extended Deadline)

Workshop Proposal: June 22, 2018

Tutorial Proposal: July 31, 2018

Tutorial Proposal Acceptance Notification: August 15, 2018

Paper Acceptance Notification: September 7, 2018 September 14, 2018 (Extended Deadline)

Camera-Ready Papers Due: September 28, 2018


Committees

General Chair:

  • Dongwon Lee, Pennsylvania State University, USA


Local Chair:

  • A. Selcuk Uluagac, Florida International University, USA


Program Co-Chairs:

  • Nitesh Saxena, University of Alabama at Birmingham, USA
  • Ponnurangam Kumaraguru, Indraprastha Institute of Information Technology, New Delhi, India


Publication Chair:

  • Ghita Mezzour, International University of Rabat, Morocco


Finance Chair:

  • Fengjun Li, The University of Kansas, USA


Publicity Chair:

  • Anna Squicciarini, Pennsylvania State University, USA


Web Chair:

  • Leonardo Babun, Florida International University, USA


Workshop Co-Chairs:

  • Kemal Akkaya, Florida International University, USA
  • Christopher C. Yang, Drexel University, USA


Tutorial Co-Chairs:

  • Jonathan Voris, New York Institute of Technology, USA
  • Siddharth Kaza, Towson University, USA


Registration Co-Chairs:

  • Wingyan Chung, University of Central Florida, USA
  • K.P. Chow, The University of Hong Kong, Hong Kong


Registration Specialist:

  • Jinwei Liu, University of Central Florida, USA


PROGRAM COMMITTEE

Chairs:

  • Ponnurangam Kumaraguru, Indraprastha Institute of Information Technology, Delhi, India
  • Nitesh Saxena, University of Alabama at Birmingham, USA


Committee:

  • Swati Agarwal, Indraprastha Institute of Information Technology, Delhi, India
  • Anupama Aggarwal, Indraprastha Institute of Information Technology, Delhi, India
  • Massimiliano Albanese, George Mason University, USA
  • S. Abhishek Anand, University of Alabama at Birmingham, USA
  • Sandhya Aneja, Institute of Informatics and Communication, University of Delhi, India
  • Jie Bai, Chinese Academy of Sciences, China
  • Jeremy Blackburn, University of Alabama at Birmingham, USA
  • Joel Brynielsson, KTH Royal Institute of Technology, Sweden
  • Jose Luis Calvo-Rolle, University of A. Coruña, Spain
  • Weiping Chang, Central Police University, Taiwan
  • K. P. Chow, The University of Hong Kong, Hong Kong
  • Wingyan Chung, University of Central Florida, USA
  • Amitava Das, Indian Institute of Information Technology, Sri City, India
  • Leon Deligiannidis, Wentworth Institute of Technology, USA
  • Norah Dunbar, University of California Santa Barbara, USA
  • Guanggang Geng, Chinese Academy of Sciences, China
  • Roberto Giacobazzi, University of Verona, Italy
  • Anuradha Gupta, Jaypee Institute of Information Technology, India
  • Tzipora Halevi, Brooklyn College, USA
  • Sue Kase, Army Research Laboratory, USA
  • Sergii Kavun, Kharkiv Educational and Scientific Institute of the University of Banking, Ukraine
  • Jeroen Keppens, King's College London, UK
  • Latifur Khan, University of Texas at Dallas, USA
  • Jörn Kohlhammer, Fraunhofer Institute for Computer Graphics Research IGD, Deutschland
  • Steve Kramer, Paragon Science, Inc.
  • Qiudan Li, Chinese Academy of Sciences, Beijing, China
  • Luca Mazzola, Deutsche Forschungszentrum für Künstliche Intelligenz GmbH (DFKI), Germany
  • Michael Mcguire, Towson University, USA
  • Manar Mohamed, Miami University, USA
  • Ajaya Neupane, University of California Riverside, USA
  • Greg Newby, Compute Canada
  • Cyril Onwubiko, Cyber Security and Intelligence at Research Series Limited
  • Andrew Park, Thompson Rivers University, Canada
  • Jakub Piskorski, Joint Research Centre of the European Commission, Poland
  • Andrea Pugliese, University of Calabria, Italy
  • Guangzhi Qu, Oakland University, USA
  • Björn Schuller, University of Augsburg / Imperial College London, UK
  • Abdul Serwadda, Louisiana Tech University, USA
  • Maliheh Shirvanian, University of Alabama at Birmingham, USA
  • Babins Shrestha, VISA Inc., Austin, USA
  • Gerardo Simari, Universidad Nacional del Sur and CONICET, Argentina
  • Yannis Stamatiou, University of Patras, Greece
  • Robyn Torok, Edith Cowan University, Australia
  • Hien Thi Thu Truong, NEC Labs Europe
  • Khan Ferdous Wahid, Airbus Group
  • Jenq-Haur Wang, National Taipei University of Technology, Taiwan
  • Uffe Wiil, University of Southern Denmark, Denmark
  • Christian Wolff, Regensburg University, Germany
  • Guobin Xu, Frostburg State University, USA
  • Shouhuai Xu, University of Texas at San Antonio, USA
  • Qingpeng Zhang, City University of Hong Kong, Hong Kong
  • Xiaolong Zheng, Chinese Academy of Sciences, Beijing, China
  • Bin Zhou, University of Maryland, USA