ISI 2017: Difference between revisions
No edit summary |
No edit summary |
||
| Line 19: | Line 19: | ||
'''Security Analytics and Threat Intelligence:''' | '''Security Analytics and Threat Intelligence:''' | ||
• Threat pattern models and modeling tools | • Threat pattern models and modeling tools<br> | ||
• Real-time situational awareness | • Real-time situational awareness<br> | ||
• Intrusion and cybersecurity threat detection and analysis | • Intrusion and cybersecurity threat detection and analysis<br> | ||
• Cyber-physical-social system security and incident management | • Cyber-physical-social system security and incident management<br> | ||
• Computing and networking infrastructure protection | • Computing and networking infrastructure protection<br> | ||
• Crime analysis and prevention | • Crime analysis and prevention<br> | ||
• Forecasting threats and measuring the impact of threats | • Forecasting threats and measuring the impact of threats<br> | ||
• Surveillance and intelligence through unconventional means | • Surveillance and intelligence through unconventional means<br> | ||
• Information security management standards | • Information security management standards<br> | ||
• Information systems security policies | • Information systems security policies<br> | ||
• Mobile and cloud computing security | • Mobile and cloud computing security<br> | ||
• Big data analytics for cybersecurity | • Big data analytics for cybersecurity<br> | ||
• Resilient cyber infrastructure design and protection | • Resilient cyber infrastructure design and protection<br> | ||
'''Data Science and Analytics in Security Informatics:''' | '''Data Science and Analytics in Security Informatics:''' | ||
• Data representation and fusion for security informatics | • Data representation and fusion for security informatics<br> | ||
• Criminal/intelligence information extraction | • Criminal/intelligence information extraction<br> | ||
• Data sharing and information visualization for security informatics | • Data sharing and information visualization for security informatics<br> | ||
• Web-based intelligence monitoring and analysis | • Web-based intelligence monitoring and analysis<br> | ||
• Spatial-temporal data analysis for crime analysis and security informatics | • Spatial-temporal data analysis for crime analysis and security informatics<br> | ||
• Criminal/intelligence machine learning and data mining | • Criminal/intelligence machine learning and data mining<br> | ||
• Bio-terrorism tracking, alerting, and analysis | • Bio-terrorism tracking, alerting, and analysis<br> | ||
• Digital forensics and computational criminology | • Digital forensics and computational criminology<br> | ||
• Financial and accounting fraud analysis | • Financial and accounting fraud analysis<br> | ||
• Consumer-generated content and security-related social media analytics | • Consumer-generated content and security-related social media analytics<br> | ||
• Security-related social network analysis (radicalization, recruitment, conducting operations) | • Security-related social network analysis (radicalization, recruitment, conducting operations)<br> | ||
• Authorship analysis and identification | • Authorship analysis and identification<br> | ||
• Terrorism related analytical methodologies and software tools | • Terrorism related analytical methodologies and software tools<br> | ||
'''Human Behavior and Factors in Security Applications:''' | '''Human Behavior and Factors in Security Applications:''' | ||
• Behavior issues in information systems security | • Behavior issues in information systems security<br> | ||
• HCI and user interfaces of relevance to intelligence and security | • HCI and user interfaces of relevance to intelligence and security<br> | ||
• Social impacts of crime and terrorism | • Social impacts of crime and terrorism<br> | ||
• Board activism and influence | • Board activism and influence<br> | ||
• Measuring the effectiveness of counter-terrorism campaigns | • Measuring the effectiveness of counter-terrorism campaigns<br> | ||
• Citizen education and training | • Citizen education and training<br> | ||
• Understanding user behavior in that has potential security risks | • Understanding user behavior in that has potential security risks<br> | ||
• Security risks about user behavior in information systems | • Security risks about user behavior in information systems<br> | ||
• Human behavior modeling, representation and prediction for security applications | • Human behavior modeling, representation and prediction for security applications<br> | ||
'''Organizational, National, and International Issues in Counter-terrorism and other Security Applications:''' | '''Organizational, National, and International Issues in Counter-terrorism and other Security Applications:''' | ||
• Best practices in counter-terrorism or security protection | • Best practices in counter-terrorism or security protection<br> | ||
• Information sharing policy and governance | • Information sharing policy and governance<br> | ||
• Privacy, security, and civil liberties issues | • Privacy, security, and civil liberties issues<br> | ||
• Emergency response and management | • Emergency response and management<br> | ||
• Disaster prevention, detection, and management | • Disaster prevention, detection, and management<br> | ||
• Protection of transportation and communications infrastructure | • Protection of transportation and communications infrastructure<br> | ||
• Communication and decision support for research and rescue | • Communication and decision support for research and rescue<br> | ||
• Assisting citizens' responses to terrorism and catastrophic events | • Assisting citizens' responses to terrorism and catastrophic events<br> | ||
• Border security | • Border security<br> | ||
• Accounting and IT auditing | • Accounting and IT auditing<br> | ||
• Corporate governance and monitoring | • Corporate governance and monitoring<br> | ||
• Election fraud and political use and abuse | • Election fraud and political use and abuse<br> | ||
==Submissions== | ==Submissions== | ||
==Important Dates== | ==Important Dates== | ||
Revision as of 06:45, 1 August 2019
| ISI 2017 | |
|---|---|
2017 IEEE International Conference on Intelligence and Security Informatics
| |
| Event in series | ISI |
| Dates | 2017/07/22 (iCal) - 2017/07/24 |
| Homepage: | http://www.isi-conf.org/ |
| Location | |
| Location: | Beijing, China |
| Important dates | |
| Submissions: | 2017/04/10 |
| Notification: | 2017/05/30 |
| Table of Contents | |
IEEE International Conference on Intelligence and Security Informatics (ISI), July 22-24, 2017, Beijing, China
Topics
Security Analytics and Threat Intelligence:
• Threat pattern models and modeling tools
• Real-time situational awareness
• Intrusion and cybersecurity threat detection and analysis
• Cyber-physical-social system security and incident management
• Computing and networking infrastructure protection
• Crime analysis and prevention
• Forecasting threats and measuring the impact of threats
• Surveillance and intelligence through unconventional means
• Information security management standards
• Information systems security policies
• Mobile and cloud computing security
• Big data analytics for cybersecurity
• Resilient cyber infrastructure design and protection
Data Science and Analytics in Security Informatics:
• Data representation and fusion for security informatics
• Criminal/intelligence information extraction
• Data sharing and information visualization for security informatics
• Web-based intelligence monitoring and analysis
• Spatial-temporal data analysis for crime analysis and security informatics
• Criminal/intelligence machine learning and data mining
• Bio-terrorism tracking, alerting, and analysis
• Digital forensics and computational criminology
• Financial and accounting fraud analysis
• Consumer-generated content and security-related social media analytics
• Security-related social network analysis (radicalization, recruitment, conducting operations)
• Authorship analysis and identification
• Terrorism related analytical methodologies and software tools
Human Behavior and Factors in Security Applications:
• Behavior issues in information systems security
• HCI and user interfaces of relevance to intelligence and security
• Social impacts of crime and terrorism
• Board activism and influence
• Measuring the effectiveness of counter-terrorism campaigns
• Citizen education and training
• Understanding user behavior in that has potential security risks
• Security risks about user behavior in information systems
• Human behavior modeling, representation and prediction for security applications
Organizational, National, and International Issues in Counter-terrorism and other Security Applications:
• Best practices in counter-terrorism or security protection
• Information sharing policy and governance
• Privacy, security, and civil liberties issues
• Emergency response and management
• Disaster prevention, detection, and management
• Protection of transportation and communications infrastructure
• Communication and decision support for research and rescue
• Assisting citizens' responses to terrorism and catastrophic events
• Border security
• Accounting and IT auditing
• Corporate governance and monitoring
• Election fraud and political use and abuse
Submissions
Important Dates
Committees
- Co-Organizers
- General Co-Chairs
- some person, some affiliation, country
- PC Co-Chairs
- some person, some affiliation, country
- Workshop Chair
- some person, some affiliation, country
- Panel Chair
- some person, some affiliation, country
- Seminars Chair
- some person, some affiliation, country
- Demonstration Co-Chairs
- some person, some affiliation, country
- some person, some affiliation, country
- Local Organizing Co-Chairs
- some person, some affiliation, country
- Program Committee Members
- some person, some affiliation, country