ISI 2018: Difference between revisions
Created page with "{{Event |Acronym=ISI 2018 |Title=2018 IEEE International Conference on Intelligence and Security Informatics |Series=ISI |Type=Conference |Field=Computer security and reliabil..." |
No edit summary |
||
| (3 intermediate revisions by the same user not shown) | |||
| Line 8: | Line 8: | ||
|End date=2018/11/10 | |End date=2018/11/10 | ||
|Homepage=http://isi18.azurewebsites.net/ | |Homepage=http://isi18.azurewebsites.net/ | ||
|Twitter account=https://twitter.com/ieeeisiconf | |||
|City=Miami | |City=Miami | ||
|State=Florida | |State=Florida | ||
|Country=USA | |Country=USA | ||
|Paper deadline=2018/07/20 | |||
|Workshop deadline=2018/06/22 | |||
|Tutorial deadline=2018/07/31 | |||
|Notification=2018/09/07 | |||
|Camera ready=2018/09/28 | |||
|has general chair=Dongwon Lee | |has general chair=Dongwon Lee | ||
|has program chair=Nitesh Saxena, Ponnurangam Kumaraguru | |has program chair=Nitesh Saxena, Ponnurangam Kumaraguru | ||
|has workshop chair=Kemal Akkaya, Christopher C. Yang | |has workshop chair=Kemal Akkaya, Christopher C. Yang | ||
|has tutorial chair=Jonathan Voris, Siddharth Kaza | |has tutorial chair=Jonathan Voris, Siddharth Kaza | ||
|has Keynote speaker=Engin Kirda, Kathleen M. Carkey | |||
|Attendance fee currency=$ | |||
|On site regular=580 | |||
|Early bird regular=480 | |||
|On site student=450 | |||
|Early bird student=350 | |||
|Registration link=https://www.regonline.com/builder/site/?eventid=2528396 | |||
|Submitted papers=110 | |Submitted papers=110 | ||
|Accepted papers=38 | |Accepted papers=38 | ||
|has Proceedings Link=https://ieeexplore.ieee.org/xpl/conhome/8575039/proceeding | |has Proceedings Link=https://ieeexplore.ieee.org/xpl/conhome/8575039/proceeding | ||
}} | }} | ||
'' | '''IEEE International Conference on Intelligence and Security Informatics 2018''' ('''ISI''') | ||
==Topics== | ==Topics== | ||
'''Security Analytics and Threat Intelligence:''' | |||
*Threat pattern models and modelling tools | |||
*Real-time situational awareness | |||
*Intrusion and cybersecurity threat detection and analysis | |||
*Cyber-physical-social system security and incident management | |||
*Computing and networking infrastructure protection | |||
*Crime analysis and prevention | |||
*Forecasting threats and measuring the impact of threats | |||
*Surveillance and intelligence through unconventional means | |||
*Information security management standards | |||
*Information systems security policies | |||
*Mobile and cloud computing security | |||
*Big data analytics for cybersecurity | |||
*Machine learning for cybersecurity | |||
*Artificial Intelligence for cybersecurity | |||
*Resilient cyber infrastructure design and protection | |||
'''Data Science and Analytics in Security Informatics:''' | |||
*Data representation and fusion for security informatics<br> | |||
*Criminal/intelligence information extraction<br> | |||
*Data sharing and information visualization for security informatics<br> | |||
*Web-based intelligence monitoring and analysis<br> | |||
*Spatial-temporal data analysis for crime analysis and security informatics<br> | |||
*Criminal/intelligence machine learning and data mining<br> | |||
*Bio-terrorism tracking, alerting, and analysis<br> | |||
*Digital forensics and computational criminology<br> | |||
*Financial and accounting fraud analysis<br> | |||
*Consumer-generated content and security-related social media analytics<br> | |||
*Security-related social network analysis (radicalization, fund-raising, recruitment, conducting operations)<br> | |||
*Authorship analysis and identification<br> | |||
*Terrorism related analytical methodologies and software tools<br> | |||
'''Human Behaviour and Factors in Security Applications:''' | |||
*Behaviour issues in information systems security<br> | |||
*HCI and user interfaces of relevance to intelligence and security<br> | |||
*Social impacts of crime and terrorism<br> | |||
*Board activism and influence<br> | |||
*Measuring the effectiveness of counter-terrorism campaigns<br> | |||
*Citizen education and training<br> | |||
*Understanding user behaviour in that has potential security risks<br> | |||
*Security risks about user behaviour in information systems<br> | |||
*Human behaviour modelling, representation and prediction for security applications<br> | |||
'''Organizational, National, and International Issues in Counter-terrorism and other Security Applications:''' | |||
*Best practices in counter-terrorism or security protection<br> | |||
*Information sharing policy and governance<br> | |||
*Privacy, security, and civil liberties issues<br> | |||
*Emergency response and management<br> | |||
*Disaster prevention, detection, and management<br> | |||
*Protection of transportation and communications infrastructure<br> | |||
*Communication and decision support for research and rescue<br> | |||
*Assisting citizens' responses to terrorism and catastrophic events<br> | |||
*Border security<br> | |||
*Accounting and IT auditing<br> | |||
*Corporate governance and monitoring<br> | |||
*Election fraud and political use and abuse<br> | |||
==Important Dates== | ==Important Dates== | ||
Conference Dates: | |||
November 8-10, 2018<br> | |||
Paper Submission: | |||
July 20, 2018 | |||
August 17, 2018 (Extended Deadline)<br> | |||
Workshop Proposal: | |||
June 22, 2018<br> | |||
Tutorial Proposal: | |||
July 31, 2018<br> | |||
Tutorial Proposal Acceptance Notification: | |||
August 15, 2018<br> | |||
Paper Acceptance Notification: | |||
September 7, 2018 | |||
September 14, 2018 (Extended Deadline)<br> | |||
Camera-Ready Papers Due: | |||
September 28, 2018<br> | |||
==Committees== | ==Committees== | ||
General Chair: | '''General Chair:''' | ||
*Dongwon Lee, Pennsylvania State University, USA | *Dongwon Lee, Pennsylvania State University, USA | ||
Local Chair: | '''Local Chair:''' | ||
*A. Selcuk Uluagac, Florida International University, USA | *A. Selcuk Uluagac, Florida International University, USA | ||
Program Co-Chairs: | '''Program Co-Chairs:''' | ||
*Nitesh Saxena, University of Alabama at Birmingham, USA | *Nitesh Saxena, University of Alabama at Birmingham, USA | ||
*Ponnurangam Kumaraguru, Indraprastha Institute of Information Technology, New Delhi, India | *Ponnurangam Kumaraguru, Indraprastha Institute of Information Technology, New Delhi, India | ||
Publication Chair: | '''Publication Chair:''' | ||
*Ghita Mezzour, International University of Rabat, Morocco | *Ghita Mezzour, International University of Rabat, Morocco | ||
Finance Chair: | '''Finance Chair:''' | ||
*Fengjun Li, The University of Kansas, USA | *Fengjun Li, The University of Kansas, USA | ||
Publicity Chair: | '''Publicity Chair:''' | ||
*Anna Squicciarini, Pennsylvania State University, USA | *Anna Squicciarini, Pennsylvania State University, USA | ||
Web Chair: | '''Web Chair:''' | ||
*Leonardo Babun, Florida International University, USA | *Leonardo Babun, Florida International University, USA | ||
Workshop Co-Chairs: | '''Workshop Co-Chairs:''' | ||
*Kemal Akkaya, Florida International University, USA | *Kemal Akkaya, Florida International University, USA | ||
*Christopher C. Yang, Drexel University, USA | *Christopher C. Yang, Drexel University, USA | ||
Tutorial Co-Chairs: | '''Tutorial Co-Chairs:''' | ||
*Jonathan Voris, New York Institute of Technology, USA | *Jonathan Voris, New York Institute of Technology, USA | ||
*Siddharth Kaza, Towson University, USA | *Siddharth Kaza, Towson University, USA | ||
Registration Co-Chairs: | '''Registration Co-Chairs:''' | ||
*Wingyan Chung, University of Central Florida, USA | *Wingyan Chung, University of Central Florida, USA | ||
*K.P. Chow, The University of Hong Kong, Hong Kong | *K.P. Chow, The University of Hong Kong, Hong Kong | ||
Registration Specialist: | '''Registration Specialist:''' | ||
*Jinwei Liu, University of Central Florida, USA | *Jinwei Liu, University of Central Florida, USA | ||
Latest revision as of 07:35, 1 August 2019
| ISI 2018 | |
|---|---|
2018 IEEE International Conference on Intelligence and Security Informatics
| |
| Event in series | ISI |
| Dates | 2018/11/08 (iCal) - 2018/11/10 |
| Homepage: | http://isi18.azurewebsites.net/ |
| Twitter account: | https://twitter.com/ieeeisiconf |
| Location | |
| Location: | Miami, Florida, USA |
| Important dates | |
| Workshops: | 2018/06/22 |
| Tutorials: | 2018/07/31 |
| Papers: | 2018/07/20 |
| Notification: | 2018/09/07 |
| Camera ready due: | 2018/09/28 |
| Registration link: | https://www.regonline.com/builder/site/?eventid=2528396 |
| Early bird student: | $ 350 / {{{Early bird fee reduced}}}Property "Early bird fee reduced" (as page type) with input value "{{{Early bird fee reduced}}}" contains invalid characters or is incomplete and therefore can cause unexpected results during a query or annotation process. (reduced) |
| On site student: | $ 450 / {{{On site fee reduced}}}Property "On site fee reduced" (as page type) with input value "{{{On site fee reduced}}}" contains invalid characters or is incomplete and therefore can cause unexpected results during a query or annotation process. (reduced) |
| Early bird regular: | $ 480 |
| On site regular: | $ 580 |
| Papers: | Submitted 110 / Accepted 38 (34.5 %) |
| Committees | |
| General chairs: | Dongwon Lee |
| PC chairs: | Nitesh Saxena, Ponnurangam Kumaraguru |
| Workshop chairs: | Kemal Akkaya, Christopher C. Yang |
| Seminars Chair: | Jonathan Voris, Siddharth Kaza |
| Keynote speaker: | Engin Kirda, Kathleen M. Carkey |
| Table of Contents | |
| Tweets by https://twitter.com/ieeeisiconf | |
https://twitter.com/ieeeisiconf">Tweets by {{{Twitter account}}}
| |
IEEE International Conference on Intelligence and Security Informatics 2018 (ISI)
Topics
Security Analytics and Threat Intelligence:
- Threat pattern models and modelling tools
- Real-time situational awareness
- Intrusion and cybersecurity threat detection and analysis
- Cyber-physical-social system security and incident management
- Computing and networking infrastructure protection
- Crime analysis and prevention
- Forecasting threats and measuring the impact of threats
- Surveillance and intelligence through unconventional means
- Information security management standards
- Information systems security policies
- Mobile and cloud computing security
- Big data analytics for cybersecurity
- Machine learning for cybersecurity
- Artificial Intelligence for cybersecurity
- Resilient cyber infrastructure design and protection
Data Science and Analytics in Security Informatics:
- Data representation and fusion for security informatics
- Criminal/intelligence information extraction
- Data sharing and information visualization for security informatics
- Web-based intelligence monitoring and analysis
- Spatial-temporal data analysis for crime analysis and security informatics
- Criminal/intelligence machine learning and data mining
- Bio-terrorism tracking, alerting, and analysis
- Digital forensics and computational criminology
- Financial and accounting fraud analysis
- Consumer-generated content and security-related social media analytics
- Security-related social network analysis (radicalization, fund-raising, recruitment, conducting operations)
- Authorship analysis and identification
- Terrorism related analytical methodologies and software tools
Human Behaviour and Factors in Security Applications:
- Behaviour issues in information systems security
- HCI and user interfaces of relevance to intelligence and security
- Social impacts of crime and terrorism
- Board activism and influence
- Measuring the effectiveness of counter-terrorism campaigns
- Citizen education and training
- Understanding user behaviour in that has potential security risks
- Security risks about user behaviour in information systems
- Human behaviour modelling, representation and prediction for security applications
Organizational, National, and International Issues in Counter-terrorism and other Security Applications:
- Best practices in counter-terrorism or security protection
- Information sharing policy and governance
- Privacy, security, and civil liberties issues
- Emergency response and management
- Disaster prevention, detection, and management
- Protection of transportation and communications infrastructure
- Communication and decision support for research and rescue
- Assisting citizens' responses to terrorism and catastrophic events
- Border security
- Accounting and IT auditing
- Corporate governance and monitoring
- Election fraud and political use and abuse
Important Dates
Conference Dates:
November 8-10, 2018
Paper Submission:
July 20, 2018
August 17, 2018 (Extended Deadline)
Workshop Proposal:
June 22, 2018
Tutorial Proposal:
July 31, 2018
Tutorial Proposal Acceptance Notification:
August 15, 2018
Paper Acceptance Notification:
September 7, 2018
September 14, 2018 (Extended Deadline)
Camera-Ready Papers Due:
September 28, 2018
Committees
General Chair:
- Dongwon Lee, Pennsylvania State University, USA
Local Chair:
- A. Selcuk Uluagac, Florida International University, USA
Program Co-Chairs:
- Nitesh Saxena, University of Alabama at Birmingham, USA
- Ponnurangam Kumaraguru, Indraprastha Institute of Information Technology, New Delhi, India
Publication Chair:
- Ghita Mezzour, International University of Rabat, Morocco
Finance Chair:
- Fengjun Li, The University of Kansas, USA
Publicity Chair:
- Anna Squicciarini, Pennsylvania State University, USA
Web Chair:
- Leonardo Babun, Florida International University, USA
Workshop Co-Chairs:
- Kemal Akkaya, Florida International University, USA
- Christopher C. Yang, Drexel University, USA
Tutorial Co-Chairs:
- Jonathan Voris, New York Institute of Technology, USA
- Siddharth Kaza, Towson University, USA
Registration Co-Chairs:
- Wingyan Chung, University of Central Florida, USA
- K.P. Chow, The University of Hong Kong, Hong Kong
Registration Specialist:
- Jinwei Liu, University of Central Florida, USA
PROGRAM COMMITTEE
Chairs:
- Ponnurangam Kumaraguru, Indraprastha Institute of Information Technology, Delhi, India
- Nitesh Saxena, University of Alabama at Birmingham, USA
Committee:
- Swati Agarwal, Indraprastha Institute of Information Technology, Delhi, India
- Anupama Aggarwal, Indraprastha Institute of Information Technology, Delhi, India
- Massimiliano Albanese, George Mason University, USA
- S. Abhishek Anand, University of Alabama at Birmingham, USA
- Sandhya Aneja, Institute of Informatics and Communication, University of Delhi, India
- Jie Bai, Chinese Academy of Sciences, China
- Jeremy Blackburn, University of Alabama at Birmingham, USA
- Joel Brynielsson, KTH Royal Institute of Technology, Sweden
- Jose Luis Calvo-Rolle, University of A. Coruña, Spain
- Weiping Chang, Central Police University, Taiwan
- K. P. Chow, The University of Hong Kong, Hong Kong
- Wingyan Chung, University of Central Florida, USA
- Amitava Das, Indian Institute of Information Technology, Sri City, India
- Leon Deligiannidis, Wentworth Institute of Technology, USA
- Norah Dunbar, University of California Santa Barbara, USA
- Guanggang Geng, Chinese Academy of Sciences, China
- Roberto Giacobazzi, University of Verona, Italy
- Anuradha Gupta, Jaypee Institute of Information Technology, India
- Tzipora Halevi, Brooklyn College, USA
- Sue Kase, Army Research Laboratory, USA
- Sergii Kavun, Kharkiv Educational and Scientific Institute of the University of Banking, Ukraine
- Jeroen Keppens, King's College London, UK
- Latifur Khan, University of Texas at Dallas, USA
- Jörn Kohlhammer, Fraunhofer Institute for Computer Graphics Research IGD, Deutschland
- Steve Kramer, Paragon Science, Inc.
- Qiudan Li, Chinese Academy of Sciences, Beijing, China
- Luca Mazzola, Deutsche Forschungszentrum für Künstliche Intelligenz GmbH (DFKI), Germany
- Michael Mcguire, Towson University, USA
- Manar Mohamed, Miami University, USA
- Ajaya Neupane, University of California Riverside, USA
- Greg Newby, Compute Canada
- Cyril Onwubiko, Cyber Security and Intelligence at Research Series Limited
- Andrew Park, Thompson Rivers University, Canada
- Jakub Piskorski, Joint Research Centre of the European Commission, Poland
- Andrea Pugliese, University of Calabria, Italy
- Guangzhi Qu, Oakland University, USA
- Björn Schuller, University of Augsburg / Imperial College London, UK
- Abdul Serwadda, Louisiana Tech University, USA
- Maliheh Shirvanian, University of Alabama at Birmingham, USA
- Babins Shrestha, VISA Inc., Austin, USA
- Gerardo Simari, Universidad Nacional del Sur and CONICET, Argentina
- Yannis Stamatiou, University of Patras, Greece
- Robyn Torok, Edith Cowan University, Australia
- Hien Thi Thu Truong, NEC Labs Europe
- Khan Ferdous Wahid, Airbus Group
- Jenq-Haur Wang, National Taipei University of Technology, Taiwan
- Uffe Wiil, University of Southern Denmark, Denmark
- Christian Wolff, Regensburg University, Germany
- Guobin Xu, Frostburg State University, USA
- Shouhuai Xu, University of Texas at San Antonio, USA
- Qingpeng Zhang, City University of Hong Kong, Hong Kong
- Xiaolong Zheng, Chinese Academy of Sciences, Beijing, China
- Bin Zhou, University of Maryland, USA