Difference between revisions of "ISI 2017"
(Created page with "{{Event |Acronym=ISI 2017 |Title=2017 IEEE International Conference on Intelligence and Security Informatics |Series=ISI |Type=Conference |Field=Computer security and reliabil...") |
|||
Line 17: | Line 17: | ||
==Topics== | ==Topics== | ||
− | Security Analytics and Threat Intelligence | + | '''Security Analytics and Threat Intelligence:''' |
• Threat pattern models and modeling tools | • Threat pattern models and modeling tools | ||
Line 33: | Line 33: | ||
• Resilient cyber infrastructure design and protection | • Resilient cyber infrastructure design and protection | ||
− | Data Science and Analytics in Security Informatics | + | |
+ | '''Data Science and Analytics in Security Informatics:''' | ||
• Data representation and fusion for security informatics | • Data representation and fusion for security informatics | ||
Line 49: | Line 50: | ||
• Terrorism related analytical methodologies and software tools | • Terrorism related analytical methodologies and software tools | ||
− | Human Behavior and Factors in Security Applications | + | |
+ | '''Human Behavior and Factors in Security Applications:''' | ||
• Behavior issues in information systems security | • Behavior issues in information systems security | ||
Line 61: | Line 63: | ||
• Human behavior modeling, representation and prediction for security applications | • Human behavior modeling, representation and prediction for security applications | ||
− | Organizational, National, and International Issues in Counter-terrorism and other Security Applications | + | |
+ | '''Organizational, National, and International Issues in Counter-terrorism and other Security Applications:''' | ||
• Best practices in counter-terrorism or security protection | • Best practices in counter-terrorism or security protection |
Revision as of 07:44, 1 August 2019
ISI 2017 | |
---|---|
2017 IEEE International Conference on Intelligence and Security Informatics
| |
Event in series | ISI |
Dates | 2017/07/22 (iCal) - 2017/07/24 |
Homepage: | http://www.isi-conf.org/ |
Location | |
Location: | Beijing, China |
Loading map... | |
Important dates | |
Submissions: | 2017/04/10 |
Notification: | 2017/05/30 |
Table of Contents | |
IEEE International Conference on Intelligence and Security Informatics (ISI), July 22-24, 2017, Beijing, China
Topics
Security Analytics and Threat Intelligence:
• Threat pattern models and modeling tools • Real-time situational awareness • Intrusion and cybersecurity threat detection and analysis • Cyber-physical-social system security and incident management • Computing and networking infrastructure protection • Crime analysis and prevention • Forecasting threats and measuring the impact of threats • Surveillance and intelligence through unconventional means • Information security management standards • Information systems security policies • Mobile and cloud computing security • Big data analytics for cybersecurity • Resilient cyber infrastructure design and protection
Data Science and Analytics in Security Informatics:
• Data representation and fusion for security informatics • Criminal/intelligence information extraction • Data sharing and information visualization for security informatics • Web-based intelligence monitoring and analysis • Spatial-temporal data analysis for crime analysis and security informatics • Criminal/intelligence machine learning and data mining • Bio-terrorism tracking, alerting, and analysis • Digital forensics and computational criminology • Financial and accounting fraud analysis • Consumer-generated content and security-related social media analytics • Security-related social network analysis (radicalization, recruitment, conducting operations) • Authorship analysis and identification • Terrorism related analytical methodologies and software tools
Human Behavior and Factors in Security Applications:
• Behavior issues in information systems security • HCI and user interfaces of relevance to intelligence and security • Social impacts of crime and terrorism • Board activism and influence • Measuring the effectiveness of counter-terrorism campaigns • Citizen education and training • Understanding user behavior in that has potential security risks • Security risks about user behavior in information systems • Human behavior modeling, representation and prediction for security applications
Organizational, National, and International Issues in Counter-terrorism and other Security Applications:
• Best practices in counter-terrorism or security protection • Information sharing policy and governance • Privacy, security, and civil liberties issues • Emergency response and management • Disaster prevention, detection, and management • Protection of transportation and communications infrastructure • Communication and decision support for research and rescue • Assisting citizens' responses to terrorism and catastrophic events • Border security • Accounting and IT auditing • Corporate governance and monitoring • Election fraud and political use and abuse
Submissions
Important Dates
Committees
- Co-Organizers
- General Co-Chairs
- some person, some affiliation, country
- PC Co-Chairs
- some person, some affiliation, country
- Workshop Chair
- some person, some affiliation, country
- Panel Chair
- some person, some affiliation, country
- Seminars Chair
- some person, some affiliation, country
- Demonstration Co-Chairs
- some person, some affiliation, country
- some person, some affiliation, country
- Local Organizing Co-Chairs
- some person, some affiliation, country
- Program Committee Members
- some person, some affiliation, country
Acronym | ISI 2017 + |
End date | July 24, 2017 + |
Event in series | ISI + |
Event type | Conference + |
Has OC member | Some person + |
Has PC member | Some person + |
Has coordinates | 40° 11' 26", 116° 24' 44"Latitude: 40.190633333333 Longitude: 116.41214444444 + |
Has demo chair | Some person + |
Has general chair | Some person + |
Has local chair | Some person + |
Has location city | Beijing + |
Has location country | Category:China + |
Has program chair | Some person + |
Has tutorial chair | Some person + |
Has workshop chair | Some person + |
Homepage | http://www.isi-conf.org/ + |
IsA | Event + |
Notification | May 30, 2017 + |
Start date | July 22, 2017 + |
Submission deadline | April 10, 2017 + |
Title | 2017 IEEE International Conference on Intelligence and Security Informatics + |