Difference between revisions of "ISI 2017"

From Openresearch
Jump to: navigation, search
(Created page with "{{Event |Acronym=ISI 2017 |Title=2017 IEEE International Conference on Intelligence and Security Informatics |Series=ISI |Type=Conference |Field=Computer security and reliabil...")
 
 
(2 intermediate revisions by the same user not shown)
Line 12: Line 12:
 
|Submission deadline=2017/04/10
 
|Submission deadline=2017/04/10
 
|Notification=2017/05/30
 
|Notification=2017/05/30
 +
|has program chair=Xiaolong Zheng, Hui Zhang, Chunxiao Xing
 +
|has Proceedings Link=https://ieeexplore.ieee.org/xpl/conhome/7999198/proceeding
 
}}
 
}}
 
'''IEEE International Conference on Intelligence and Security Informatics''' ('''ISI'''), July 22-24, 2017, Beijing, China  
 
'''IEEE International Conference on Intelligence and Security Informatics''' ('''ISI'''), July 22-24, 2017, Beijing, China  
Line 17: Line 19:
 
==Topics==
 
==Topics==
  
Security Analytics and Threat Intelligence
+
'''Security Analytics and Threat Intelligence:'''
  
• Threat pattern models and modeling tools
+
• Threat pattern models and modeling tools<br>
• Real-time situational awareness
+
• Real-time situational awareness<br>
• Intrusion and cybersecurity threat detection and analysis
+
• Intrusion and cybersecurity threat detection and analysis<br>
• Cyber-physical-social system security and incident management
+
• Cyber-physical-social system security and incident management<br>
• Computing and networking infrastructure protection
+
• Computing and networking infrastructure protection<br>
• Crime analysis and prevention
+
• Crime analysis and prevention<br>
• Forecasting threats and measuring the impact of threats
+
• Forecasting threats and measuring the impact of threats<br>
• Surveillance and intelligence through unconventional means
+
• Surveillance and intelligence through unconventional means<br>
• Information security management standards
+
• Information security management standards<br>
• Information systems security policies
+
• Information systems security policies<br>
• Mobile and cloud computing security
+
• Mobile and cloud computing security<br>
• Big data analytics for cybersecurity
+
• Big data analytics for cybersecurity<br>
• Resilient cyber infrastructure design and protection
+
• Resilient cyber infrastructure design and protection<br>
  
Data Science and Analytics in Security Informatics
 
  
Data representation and fusion for security informatics
+
'''Data Science and Analytics in Security Informatics:'''
• Criminal/intelligence information extraction
 
• Data sharing and information visualization for security informatics
 
• Web-based intelligence monitoring and analysis
 
• Spatial-temporal data analysis for crime analysis and security informatics
 
• Criminal/intelligence machine learning and data mining
 
• Bio-terrorism tracking, alerting, and analysis
 
• Digital forensics and computational criminology
 
• Financial and accounting fraud analysis
 
• Consumer-generated content and security-related social media analytics
 
Security-related social network analysis (radicalization, recruitment, conducting operations)
 
• Authorship analysis and identification
 
• Terrorism related analytical methodologies and software tools
 
  
Human Behavior and Factors in Security Applications
+
• Data representation and fusion for security informatics<br>
 +
• Criminal/intelligence information extraction<br>
 +
• Data sharing and information visualization for security informatics<br>
 +
• Web-based intelligence monitoring and analysis<br>
 +
• Spatial-temporal data analysis for crime analysis and security informatics<br>
 +
• Criminal/intelligence machine learning and data mining<br>
 +
• Bio-terrorism tracking, alerting, and analysis<br>
 +
• Digital forensics and computational criminology<br>
 +
• Financial and accounting fraud analysis<br>
 +
• Consumer-generated content and security-related social media analytics<br>
 +
Security-related social network analysis (radicalization, recruitment, conducting operations)<br>
 +
• Authorship analysis and identification<br>
 +
• Terrorism related analytical methodologies and software tools<br>
  
• Behavior issues in information systems security
 
• HCI and user interfaces of relevance to intelligence and security
 
• Social impacts of crime and terrorism
 
• Board activism and influence
 
• Measuring the effectiveness of counter-terrorism campaigns
 
• Citizen education and training
 
• Understanding user behavior in that has potential security risks
 
• Security risks about user behavior in information systems
 
• Human behavior modeling, representation and prediction for security applications
 
  
Organizational, National, and International Issues in Counter-terrorism and other Security Applications
+
'''Human Behavior and Factors in Security Applications:'''
  
Best practices in counter-terrorism or security protection
+
Behavior issues in information systems security<br>
Information sharing policy and governance
+
HCI and user interfaces of relevance to intelligence and security<br>
• Privacy, security, and civil liberties issues
+
Social impacts of crime and terrorism<br>
Emergency response and management
+
Board activism and influence<br>
Disaster prevention, detection, and management
+
Measuring the effectiveness of counter-terrorism campaigns<br>
Protection of transportation and communications infrastructure
+
Citizen education and training<br>
Communication and decision support for research and rescue
+
Understanding user behavior in that has potential security risks<br>
Assisting citizens' responses to terrorism and catastrophic events
+
Security risks about user behavior in information systems<br>
• Border security
+
Human behavior modeling, representation and prediction for security applications<br>
Accounting and IT auditing
 
Corporate governance and monitoring
 
• Election fraud and political use and abuse
 
==Submissions==
 
==Important Dates==
 
  
==Committees==
 
* Co-Organizers
 
* General Co-Chairs
 
** [[has general chair::some person]], some affiliation, country
 
  
* PC Co-Chairs
+
'''Organizational, National, and International Issues in Counter-terrorism and other Security Applications:'''
** [[has program chair::some person]], some affiliation, country
 
  
* Workshop Chair
+
• Best practices in counter-terrorism or security protection<br>
** [[has workshop chair::some person]], some affiliation, country
+
• Information sharing policy and governance<br>
 
+
• Privacy, security, and civil liberties issues<br>
* Panel Chair
+
• Emergency response and management<br>
** [[has OC member::some person]], some affiliation, country
+
• Disaster prevention, detection, and management<br>
 
+
• Protection of transportation and communications infrastructure<br>
* Seminars Chair
+
• Communication and decision support for research and rescue<br>
** [[has tutorial chair::some person]], some affiliation, country
+
• Assisting citizens' responses to terrorism and catastrophic events<br>
 
+
• Border security<br>
* Demonstration Co-Chairs
+
• Accounting and IT auditing<br>
** [[has demo chair::some person]], some affiliation, country
+
• Corporate governance and monitoring<br>
** [[has demo chair::some person]], some affiliation, country
+
• Election fraud and political use and abuse<br>
 
 
* Local Organizing Co-Chairs
 
** [[has local chair::some person]], some affiliation, country
 
 
 
* Program Committee Members
 
** [[has PC member::some person]], some affiliation, country
 

Latest revision as of 07:55, 1 August 2019

ISI 2017
2017 IEEE International Conference on Intelligence and Security Informatics
Event in series ISI
Dates 2017/07/22 (iCal) - 2017/07/24
Homepage: http://www.isi-conf.org/
Location
Location: Beijing, China
Loading map...

Important dates
Submissions: 2017/04/10
Notification: 2017/05/30
Committees
PC chairs: Xiaolong Zheng, Hui Zhang, Chunxiao Xing
Table of Contents

Contents


IEEE International Conference on Intelligence and Security Informatics (ISI), July 22-24, 2017, Beijing, China

Topics

Security Analytics and Threat Intelligence:

• Threat pattern models and modeling tools
• Real-time situational awareness
• Intrusion and cybersecurity threat detection and analysis
• Cyber-physical-social system security and incident management
• Computing and networking infrastructure protection
• Crime analysis and prevention
• Forecasting threats and measuring the impact of threats
• Surveillance and intelligence through unconventional means
• Information security management standards
• Information systems security policies
• Mobile and cloud computing security
• Big data analytics for cybersecurity
• Resilient cyber infrastructure design and protection


Data Science and Analytics in Security Informatics:

• Data representation and fusion for security informatics
• Criminal/intelligence information extraction
• Data sharing and information visualization for security informatics
• Web-based intelligence monitoring and analysis
• Spatial-temporal data analysis for crime analysis and security informatics
• Criminal/intelligence machine learning and data mining
• Bio-terrorism tracking, alerting, and analysis
• Digital forensics and computational criminology
• Financial and accounting fraud analysis
• Consumer-generated content and security-related social media analytics
• Security-related social network analysis (radicalization, recruitment, conducting operations)
• Authorship analysis and identification
• Terrorism related analytical methodologies and software tools


Human Behavior and Factors in Security Applications:

• Behavior issues in information systems security
• HCI and user interfaces of relevance to intelligence and security
• Social impacts of crime and terrorism
• Board activism and influence
• Measuring the effectiveness of counter-terrorism campaigns
• Citizen education and training
• Understanding user behavior in that has potential security risks
• Security risks about user behavior in information systems
• Human behavior modeling, representation and prediction for security applications


Organizational, National, and International Issues in Counter-terrorism and other Security Applications:

• Best practices in counter-terrorism or security protection
• Information sharing policy and governance
• Privacy, security, and civil liberties issues
• Emergency response and management
• Disaster prevention, detection, and management
• Protection of transportation and communications infrastructure
• Communication and decision support for research and rescue
• Assisting citizens' responses to terrorism and catastrophic events
• Border security
• Accounting and IT auditing
• Corporate governance and monitoring
• Election fraud and political use and abuse