Difference between revisions of "ISI 2018"

From Openresearch
Jump to: navigation, search
(Created page with "{{Event |Acronym=ISI 2018 |Title=2018 IEEE International Conference on Intelligence and Security Informatics |Series=ISI |Type=Conference |Field=Computer security and reliabil...")
 
 
(3 intermediate revisions by the same user not shown)
Line 8: Line 8:
 
|End date=2018/11/10
 
|End date=2018/11/10
 
|Homepage=http://isi18.azurewebsites.net/
 
|Homepage=http://isi18.azurewebsites.net/
 +
|Twitter account=https://twitter.com/ieeeisiconf
 
|City=Miami
 
|City=Miami
 
|State=Florida
 
|State=Florida
 
|Country=USA
 
|Country=USA
 +
|Paper deadline=2018/07/20
 +
|Workshop deadline=2018/06/22
 +
|Tutorial deadline=2018/07/31
 +
|Notification=2018/09/07
 +
|Camera ready=2018/09/28
 
|has general chair=Dongwon Lee
 
|has general chair=Dongwon Lee
 
|has program chair=Nitesh Saxena, Ponnurangam Kumaraguru
 
|has program chair=Nitesh Saxena, Ponnurangam Kumaraguru
 
|has workshop chair=Kemal Akkaya, Christopher C. Yang
 
|has workshop chair=Kemal Akkaya, Christopher C. Yang
 
|has tutorial chair=Jonathan Voris, Siddharth Kaza
 
|has tutorial chair=Jonathan Voris, Siddharth Kaza
 +
|has Keynote speaker=Engin Kirda, Kathleen M. Carkey
 +
|Attendance fee currency=$
 +
|On site regular=580
 +
|Early bird regular=480
 +
|On site student=450
 +
|Early bird student=350
 +
|Registration link=https://www.regonline.com/builder/site/?eventid=2528396
 
|Submitted papers=110
 
|Submitted papers=110
 
|Accepted papers=38
 
|Accepted papers=38
 
|has Proceedings Link=https://ieeexplore.ieee.org/xpl/conhome/8575039/proceeding
 
|has Proceedings Link=https://ieeexplore.ieee.org/xpl/conhome/8575039/proceeding
 
}}
 
}}
''Enter your description here. Maybe just paste in the call for papers.''
+
'''IEEE International Conference on Intelligence and Security Informatics 2018''' ('''ISI''')
  
 
==Topics==
 
==Topics==
==Submissions==
+
 
 +
'''Security Analytics and Threat Intelligence:'''
 +
 
 +
*Threat pattern models and modelling tools
 +
*Real-time situational awareness
 +
*Intrusion and cybersecurity threat detection and analysis
 +
*Cyber-physical-social system security and incident management
 +
*Computing and networking infrastructure protection
 +
*Crime analysis and prevention
 +
*Forecasting threats and measuring the impact of threats
 +
*Surveillance and intelligence through unconventional means
 +
*Information security management standards
 +
*Information systems security policies
 +
*Mobile and cloud computing security
 +
*Big data analytics for cybersecurity
 +
*Machine learning for cybersecurity
 +
*Artificial Intelligence for cybersecurity
 +
*Resilient cyber infrastructure design and protection
 +
 
 +
 
 +
'''Data Science and Analytics in Security Informatics:'''
 +
 
 +
*Data representation and fusion for security informatics<br>
 +
*Criminal/intelligence information extraction<br>
 +
*Data sharing and information visualization for security informatics<br>
 +
*Web-based intelligence monitoring and analysis<br>
 +
*Spatial-temporal data analysis for crime analysis and security informatics<br>
 +
*Criminal/intelligence machine learning and data mining<br>
 +
*Bio-terrorism tracking, alerting, and analysis<br>
 +
*Digital forensics and computational criminology<br>
 +
*Financial and accounting fraud analysis<br>
 +
*Consumer-generated content and security-related social media analytics<br>
 +
*Security-related social network analysis (radicalization, fund-raising, recruitment, conducting operations)<br>
 +
*Authorship analysis and identification<br>
 +
*Terrorism related analytical methodologies and software tools<br>
 +
 
 +
 
 +
'''Human Behaviour and Factors in Security Applications:'''
 +
 
 +
*Behaviour issues in information systems security<br>
 +
*HCI and user interfaces of relevance to intelligence and security<br>
 +
*Social impacts of crime and terrorism<br>
 +
*Board activism and influence<br>
 +
*Measuring the effectiveness of counter-terrorism campaigns<br>
 +
*Citizen education and training<br>
 +
*Understanding user behaviour in that has potential security risks<br>
 +
*Security risks about user behaviour in information systems<br>
 +
*Human behaviour modelling, representation and prediction for security applications<br>
 +
 
 +
 
 +
'''Organizational, National, and International Issues in Counter-terrorism and other Security Applications:'''
 +
 
 +
*Best practices in counter-terrorism or security protection<br>
 +
*Information sharing policy and governance<br>
 +
*Privacy, security, and civil liberties issues<br>
 +
*Emergency response and management<br>
 +
*Disaster prevention, detection, and management<br>
 +
*Protection of transportation and communications infrastructure<br>
 +
*Communication and decision support for research and rescue<br>
 +
*Assisting citizens' responses to terrorism and catastrophic events<br>
 +
*Border security<br>
 +
*Accounting and IT auditing<br>
 +
*Corporate governance and monitoring<br>
 +
*Election fraud and political use and abuse<br>
 +
 
 +
 
 
==Important Dates==
 
==Important Dates==
 +
 +
Conference Dates:
 +
November 8-10, 2018<br>
 +
 +
Paper Submission:
 +
July 20, 2018
 +
August 17, 2018 (Extended Deadline)<br>
 +
 +
Workshop Proposal:
 +
June 22, 2018<br>
 +
 +
Tutorial Proposal:
 +
July 31, 2018<br>
 +
 +
Tutorial Proposal Acceptance Notification:
 +
August 15, 2018<br>
 +
 +
Paper Acceptance Notification:
 +
September 7, 2018
 +
September 14, 2018 (Extended Deadline)<br>
 +
 +
Camera-Ready Papers Due:
 +
September 28, 2018<br>
 +
  
 
==Committees==
 
==Committees==
  
General Chair:
+
'''General Chair:'''
 
*Dongwon Lee, Pennsylvania State University, USA
 
*Dongwon Lee, Pennsylvania State University, USA
  
  
Local Chair:
+
'''Local Chair:'''
 
*A. Selcuk Uluagac, Florida International University, USA
 
*A. Selcuk Uluagac, Florida International University, USA
  
  
Program Co-Chairs:
+
'''Program Co-Chairs:'''
 
*Nitesh Saxena, University of Alabama at Birmingham, USA
 
*Nitesh Saxena, University of Alabama at Birmingham, USA
 
*Ponnurangam Kumaraguru, Indraprastha Institute of Information Technology, New Delhi, India
 
*Ponnurangam Kumaraguru, Indraprastha Institute of Information Technology, New Delhi, India
  
  
Publication Chair:
+
'''Publication Chair:'''
 
*Ghita Mezzour, International University of Rabat, Morocco
 
*Ghita Mezzour, International University of Rabat, Morocco
  
  
Finance Chair:
+
'''Finance Chair:'''
 
*Fengjun Li, The University of Kansas, USA
 
*Fengjun Li, The University of Kansas, USA
  
  
Publicity Chair:
+
'''Publicity Chair:'''
 
*Anna Squicciarini, Pennsylvania State University, USA
 
*Anna Squicciarini, Pennsylvania State University, USA
  
  
Web Chair:
+
'''Web Chair:'''
 
*Leonardo Babun, Florida International University, USA
 
*Leonardo Babun, Florida International University, USA
  
  
Workshop Co-Chairs:
+
'''Workshop Co-Chairs:'''
 
*Kemal Akkaya, Florida International University, USA
 
*Kemal Akkaya, Florida International University, USA
 
*Christopher C. Yang, Drexel University, USA
 
*Christopher C. Yang, Drexel University, USA
  
  
Tutorial Co-Chairs:
+
'''Tutorial Co-Chairs:'''
 
*Jonathan Voris, New York Institute of Technology, USA
 
*Jonathan Voris, New York Institute of Technology, USA
 
*Siddharth Kaza, Towson University, USA
 
*Siddharth Kaza, Towson University, USA
  
  
Registration Co-Chairs:
+
'''Registration Co-Chairs:'''
 
*Wingyan Chung, University of Central Florida, USA
 
*Wingyan Chung, University of Central Florida, USA
 
*K.P. Chow, The University of Hong Kong, Hong Kong
 
*K.P. Chow, The University of Hong Kong, Hong Kong
  
  
Registration Specialist:
+
'''Registration Specialist:'''
 
*Jinwei Liu, University of Central Florida, USA
 
*Jinwei Liu, University of Central Florida, USA
  

Latest revision as of 09:35, 1 August 2019

ISI 2018
2018 IEEE International Conference on Intelligence and Security Informatics
Event in series ISI
Dates 2018/11/08 (iCal) - 2018/11/10
Homepage: http://isi18.azurewebsites.net/
Twitter account: https://twitter.com/ieeeisiconf
Location
Location: Miami, Florida, USA
Loading map...

Important dates
Workshops: 2018/06/22
Tutorials: 2018/07/31
Papers: 2018/07/20
Notification: 2018/09/07
Camera ready due: 2018/09/28
Registration link: https://www.regonline.com/builder/site/?eventid=2528396
Early bird student: $ 350 / {{{Early bird fee reduced}}}
Property "Early bird fee reduced" (as page type) with input value "{{{Early bird fee reduced}}}" contains invalid characters or is incomplete and therefore can cause unexpected results during a query or annotation process.
(reduced)
On site student: $ 450 / {{{On site fee reduced}}}
Property "On site fee reduced" (as page type) with input value "{{{On site fee reduced}}}" contains invalid characters or is incomplete and therefore can cause unexpected results during a query or annotation process.
(reduced)
Early bird regular: $ 480
On site regular: $ 580
Papers: Submitted 110 / Accepted 38 (34.5 %)
Committees
General chairs: Dongwon Lee
PC chairs: Nitesh Saxena, Ponnurangam Kumaraguru
Workshop chairs: Kemal Akkaya, Christopher C. Yang
Seminars Chair: Jonathan Voris, Siddharth Kaza
Keynote speaker: Engin Kirda, Kathleen M. Carkey
Table of Contents
Tweets by https://twitter.com/ieeeisiconf
">Tweets by {{{Twitter account}}}


IEEE International Conference on Intelligence and Security Informatics 2018 (ISI)

Topics

Security Analytics and Threat Intelligence:

  • Threat pattern models and modelling tools
  • Real-time situational awareness
  • Intrusion and cybersecurity threat detection and analysis
  • Cyber-physical-social system security and incident management
  • Computing and networking infrastructure protection
  • Crime analysis and prevention
  • Forecasting threats and measuring the impact of threats
  • Surveillance and intelligence through unconventional means
  • Information security management standards
  • Information systems security policies
  • Mobile and cloud computing security
  • Big data analytics for cybersecurity
  • Machine learning for cybersecurity
  • Artificial Intelligence for cybersecurity
  • Resilient cyber infrastructure design and protection


Data Science and Analytics in Security Informatics:

  • Data representation and fusion for security informatics
  • Criminal/intelligence information extraction
  • Data sharing and information visualization for security informatics
  • Web-based intelligence monitoring and analysis
  • Spatial-temporal data analysis for crime analysis and security informatics
  • Criminal/intelligence machine learning and data mining
  • Bio-terrorism tracking, alerting, and analysis
  • Digital forensics and computational criminology
  • Financial and accounting fraud analysis
  • Consumer-generated content and security-related social media analytics
  • Security-related social network analysis (radicalization, fund-raising, recruitment, conducting operations)
  • Authorship analysis and identification
  • Terrorism related analytical methodologies and software tools


Human Behaviour and Factors in Security Applications:

  • Behaviour issues in information systems security
  • HCI and user interfaces of relevance to intelligence and security
  • Social impacts of crime and terrorism
  • Board activism and influence
  • Measuring the effectiveness of counter-terrorism campaigns
  • Citizen education and training
  • Understanding user behaviour in that has potential security risks
  • Security risks about user behaviour in information systems
  • Human behaviour modelling, representation and prediction for security applications


Organizational, National, and International Issues in Counter-terrorism and other Security Applications:

  • Best practices in counter-terrorism or security protection
  • Information sharing policy and governance
  • Privacy, security, and civil liberties issues
  • Emergency response and management
  • Disaster prevention, detection, and management
  • Protection of transportation and communications infrastructure
  • Communication and decision support for research and rescue
  • Assisting citizens' responses to terrorism and catastrophic events
  • Border security
  • Accounting and IT auditing
  • Corporate governance and monitoring
  • Election fraud and political use and abuse


Important Dates

Conference Dates: November 8-10, 2018

Paper Submission: July 20, 2018 August 17, 2018 (Extended Deadline)

Workshop Proposal: June 22, 2018

Tutorial Proposal: July 31, 2018

Tutorial Proposal Acceptance Notification: August 15, 2018

Paper Acceptance Notification: September 7, 2018 September 14, 2018 (Extended Deadline)

Camera-Ready Papers Due: September 28, 2018


Committees

General Chair:

  • Dongwon Lee, Pennsylvania State University, USA


Local Chair:

  • A. Selcuk Uluagac, Florida International University, USA


Program Co-Chairs:

  • Nitesh Saxena, University of Alabama at Birmingham, USA
  • Ponnurangam Kumaraguru, Indraprastha Institute of Information Technology, New Delhi, India


Publication Chair:

  • Ghita Mezzour, International University of Rabat, Morocco


Finance Chair:

  • Fengjun Li, The University of Kansas, USA


Publicity Chair:

  • Anna Squicciarini, Pennsylvania State University, USA


Web Chair:

  • Leonardo Babun, Florida International University, USA


Workshop Co-Chairs:

  • Kemal Akkaya, Florida International University, USA
  • Christopher C. Yang, Drexel University, USA


Tutorial Co-Chairs:

  • Jonathan Voris, New York Institute of Technology, USA
  • Siddharth Kaza, Towson University, USA


Registration Co-Chairs:

  • Wingyan Chung, University of Central Florida, USA
  • K.P. Chow, The University of Hong Kong, Hong Kong


Registration Specialist:

  • Jinwei Liu, University of Central Florida, USA


PROGRAM COMMITTEE

Chairs:

  • Ponnurangam Kumaraguru, Indraprastha Institute of Information Technology, Delhi, India
  • Nitesh Saxena, University of Alabama at Birmingham, USA


Committee:

  • Swati Agarwal, Indraprastha Institute of Information Technology, Delhi, India
  • Anupama Aggarwal, Indraprastha Institute of Information Technology, Delhi, India
  • Massimiliano Albanese, George Mason University, USA
  • S. Abhishek Anand, University of Alabama at Birmingham, USA
  • Sandhya Aneja, Institute of Informatics and Communication, University of Delhi, India
  • Jie Bai, Chinese Academy of Sciences, China
  • Jeremy Blackburn, University of Alabama at Birmingham, USA
  • Joel Brynielsson, KTH Royal Institute of Technology, Sweden
  • Jose Luis Calvo-Rolle, University of A. Coruña, Spain
  • Weiping Chang, Central Police University, Taiwan
  • K. P. Chow, The University of Hong Kong, Hong Kong
  • Wingyan Chung, University of Central Florida, USA
  • Amitava Das, Indian Institute of Information Technology, Sri City, India
  • Leon Deligiannidis, Wentworth Institute of Technology, USA
  • Norah Dunbar, University of California Santa Barbara, USA
  • Guanggang Geng, Chinese Academy of Sciences, China
  • Roberto Giacobazzi, University of Verona, Italy
  • Anuradha Gupta, Jaypee Institute of Information Technology, India
  • Tzipora Halevi, Brooklyn College, USA
  • Sue Kase, Army Research Laboratory, USA
  • Sergii Kavun, Kharkiv Educational and Scientific Institute of the University of Banking, Ukraine
  • Jeroen Keppens, King's College London, UK
  • Latifur Khan, University of Texas at Dallas, USA
  • Jörn Kohlhammer, Fraunhofer Institute for Computer Graphics Research IGD, Deutschland
  • Steve Kramer, Paragon Science, Inc.
  • Qiudan Li, Chinese Academy of Sciences, Beijing, China
  • Luca Mazzola, Deutsche Forschungszentrum für Künstliche Intelligenz GmbH (DFKI), Germany
  • Michael Mcguire, Towson University, USA
  • Manar Mohamed, Miami University, USA
  • Ajaya Neupane, University of California Riverside, USA
  • Greg Newby, Compute Canada
  • Cyril Onwubiko, Cyber Security and Intelligence at Research Series Limited
  • Andrew Park, Thompson Rivers University, Canada
  • Jakub Piskorski, Joint Research Centre of the European Commission, Poland
  • Andrea Pugliese, University of Calabria, Italy
  • Guangzhi Qu, Oakland University, USA
  • Björn Schuller, University of Augsburg / Imperial College London, UK
  • Abdul Serwadda, Louisiana Tech University, USA
  • Maliheh Shirvanian, University of Alabama at Birmingham, USA
  • Babins Shrestha, VISA Inc., Austin, USA
  • Gerardo Simari, Universidad Nacional del Sur and CONICET, Argentina
  • Yannis Stamatiou, University of Patras, Greece
  • Robyn Torok, Edith Cowan University, Australia
  • Hien Thi Thu Truong, NEC Labs Europe
  • Khan Ferdous Wahid, Airbus Group
  • Jenq-Haur Wang, National Taipei University of Technology, Taiwan
  • Uffe Wiil, University of Southern Denmark, Denmark
  • Christian Wolff, Regensburg University, Germany
  • Guobin Xu, Frostburg State University, USA
  • Shouhuai Xu, University of Texas at San Antonio, USA
  • Qingpeng Zhang, City University of Hong Kong, Hong Kong
  • Xiaolong Zheng, Chinese Academy of Sciences, Beijing, China
  • Bin Zhou, University of Maryland, USA