ISI 2018

From Openresearch
Revision as of 09:35, 1 August 2019 by Tolga.karaarslan (talk | contribs)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search
ISI 2018
2018 IEEE International Conference on Intelligence and Security Informatics
Event in series ISI
Dates 2018/11/08 (iCal) - 2018/11/10
Homepage: http://isi18.azurewebsites.net/
Twitter account: https://twitter.com/ieeeisiconf
Location
Location: Miami, Florida, USA
Loading map...

Important dates
Workshops: 2018/06/22
Tutorials: 2018/07/31
Papers: 2018/07/20
Notification: 2018/09/07
Camera ready due: 2018/09/28
Registration link: https://www.regonline.com/builder/site/?eventid=2528396
Early bird student: $ 350 / {{{Early bird fee reduced}}}
Property "Early bird fee reduced" (as page type) with input value "{{{Early bird fee reduced}}}" contains invalid characters or is incomplete and therefore can cause unexpected results during a query or annotation process.
(reduced)
On site student: $ 450 / {{{On site fee reduced}}}
Property "On site fee reduced" (as page type) with input value "{{{On site fee reduced}}}" contains invalid characters or is incomplete and therefore can cause unexpected results during a query or annotation process.
(reduced)
Early bird regular: $ 480
On site regular: $ 580
Papers: Submitted 110 / Accepted 38 (34.5 %)
Committees
General chairs: Dongwon Lee
PC chairs: Nitesh Saxena, Ponnurangam Kumaraguru
Workshop chairs: Kemal Akkaya, Christopher C. Yang
Seminars Chair: Jonathan Voris, Siddharth Kaza
Keynote speaker: Engin Kirda, Kathleen M. Carkey
Table of Contents
Tweets by https://twitter.com/ieeeisiconf
">Tweets by {{{Twitter account}}}


Event


IEEE International Conference on Intelligence and Security Informatics 2018 (ISI)

Topics

Security Analytics and Threat Intelligence:

  • Threat pattern models and modelling tools
  • Real-time situational awareness
  • Intrusion and cybersecurity threat detection and analysis
  • Cyber-physical-social system security and incident management
  • Computing and networking infrastructure protection
  • Crime analysis and prevention
  • Forecasting threats and measuring the impact of threats
  • Surveillance and intelligence through unconventional means
  • Information security management standards
  • Information systems security policies
  • Mobile and cloud computing security
  • Big data analytics for cybersecurity
  • Machine learning for cybersecurity
  • Artificial Intelligence for cybersecurity
  • Resilient cyber infrastructure design and protection


Data Science and Analytics in Security Informatics:

  • Data representation and fusion for security informatics
  • Criminal/intelligence information extraction
  • Data sharing and information visualization for security informatics
  • Web-based intelligence monitoring and analysis
  • Spatial-temporal data analysis for crime analysis and security informatics
  • Criminal/intelligence machine learning and data mining
  • Bio-terrorism tracking, alerting, and analysis
  • Digital forensics and computational criminology
  • Financial and accounting fraud analysis
  • Consumer-generated content and security-related social media analytics
  • Security-related social network analysis (radicalization, fund-raising, recruitment, conducting operations)
  • Authorship analysis and identification
  • Terrorism related analytical methodologies and software tools


Human Behaviour and Factors in Security Applications:

  • Behaviour issues in information systems security
  • HCI and user interfaces of relevance to intelligence and security
  • Social impacts of crime and terrorism
  • Board activism and influence
  • Measuring the effectiveness of counter-terrorism campaigns
  • Citizen education and training
  • Understanding user behaviour in that has potential security risks
  • Security risks about user behaviour in information systems
  • Human behaviour modelling, representation and prediction for security applications


Organizational, National, and International Issues in Counter-terrorism and other Security Applications:

  • Best practices in counter-terrorism or security protection
  • Information sharing policy and governance
  • Privacy, security, and civil liberties issues
  • Emergency response and management
  • Disaster prevention, detection, and management
  • Protection of transportation and communications infrastructure
  • Communication and decision support for research and rescue
  • Assisting citizens' responses to terrorism and catastrophic events
  • Border security
  • Accounting and IT auditing
  • Corporate governance and monitoring
  • Election fraud and political use and abuse


Important Dates

Conference Dates: November 8-10, 2018

Paper Submission: July 20, 2018 August 17, 2018 (Extended Deadline)

Workshop Proposal: June 22, 2018

Tutorial Proposal: July 31, 2018

Tutorial Proposal Acceptance Notification: August 15, 2018

Paper Acceptance Notification: September 7, 2018 September 14, 2018 (Extended Deadline)

Camera-Ready Papers Due: September 28, 2018


Committees

General Chair:

  • Dongwon Lee, Pennsylvania State University, USA


Local Chair:

  • A. Selcuk Uluagac, Florida International University, USA


Program Co-Chairs:

  • Nitesh Saxena, University of Alabama at Birmingham, USA
  • Ponnurangam Kumaraguru, Indraprastha Institute of Information Technology, New Delhi, India


Publication Chair:

  • Ghita Mezzour, International University of Rabat, Morocco


Finance Chair:

  • Fengjun Li, The University of Kansas, USA


Publicity Chair:

  • Anna Squicciarini, Pennsylvania State University, USA


Web Chair:

  • Leonardo Babun, Florida International University, USA


Workshop Co-Chairs:

  • Kemal Akkaya, Florida International University, USA
  • Christopher C. Yang, Drexel University, USA


Tutorial Co-Chairs:

  • Jonathan Voris, New York Institute of Technology, USA
  • Siddharth Kaza, Towson University, USA


Registration Co-Chairs:

  • Wingyan Chung, University of Central Florida, USA
  • K.P. Chow, The University of Hong Kong, Hong Kong


Registration Specialist:

  • Jinwei Liu, University of Central Florida, USA


PROGRAM COMMITTEE

Chairs:

  • Ponnurangam Kumaraguru, Indraprastha Institute of Information Technology, Delhi, India
  • Nitesh Saxena, University of Alabama at Birmingham, USA


Committee:

  • Swati Agarwal, Indraprastha Institute of Information Technology, Delhi, India
  • Anupama Aggarwal, Indraprastha Institute of Information Technology, Delhi, India
  • Massimiliano Albanese, George Mason University, USA
  • S. Abhishek Anand, University of Alabama at Birmingham, USA
  • Sandhya Aneja, Institute of Informatics and Communication, University of Delhi, India
  • Jie Bai, Chinese Academy of Sciences, China
  • Jeremy Blackburn, University of Alabama at Birmingham, USA
  • Joel Brynielsson, KTH Royal Institute of Technology, Sweden
  • Jose Luis Calvo-Rolle, University of A. Coruña, Spain
  • Weiping Chang, Central Police University, Taiwan
  • K. P. Chow, The University of Hong Kong, Hong Kong
  • Wingyan Chung, University of Central Florida, USA
  • Amitava Das, Indian Institute of Information Technology, Sri City, India
  • Leon Deligiannidis, Wentworth Institute of Technology, USA
  • Norah Dunbar, University of California Santa Barbara, USA
  • Guanggang Geng, Chinese Academy of Sciences, China
  • Roberto Giacobazzi, University of Verona, Italy
  • Anuradha Gupta, Jaypee Institute of Information Technology, India
  • Tzipora Halevi, Brooklyn College, USA
  • Sue Kase, Army Research Laboratory, USA
  • Sergii Kavun, Kharkiv Educational and Scientific Institute of the University of Banking, Ukraine
  • Jeroen Keppens, King's College London, UK
  • Latifur Khan, University of Texas at Dallas, USA
  • Jörn Kohlhammer, Fraunhofer Institute for Computer Graphics Research IGD, Deutschland
  • Steve Kramer, Paragon Science, Inc.
  • Qiudan Li, Chinese Academy of Sciences, Beijing, China
  • Luca Mazzola, Deutsche Forschungszentrum für Künstliche Intelligenz GmbH (DFKI), Germany
  • Michael Mcguire, Towson University, USA
  • Manar Mohamed, Miami University, USA
  • Ajaya Neupane, University of California Riverside, USA
  • Greg Newby, Compute Canada
  • Cyril Onwubiko, Cyber Security and Intelligence at Research Series Limited
  • Andrew Park, Thompson Rivers University, Canada
  • Jakub Piskorski, Joint Research Centre of the European Commission, Poland
  • Andrea Pugliese, University of Calabria, Italy
  • Guangzhi Qu, Oakland University, USA
  • Björn Schuller, University of Augsburg / Imperial College London, UK
  • Abdul Serwadda, Louisiana Tech University, USA
  • Maliheh Shirvanian, University of Alabama at Birmingham, USA
  • Babins Shrestha, VISA Inc., Austin, USA
  • Gerardo Simari, Universidad Nacional del Sur and CONICET, Argentina
  • Yannis Stamatiou, University of Patras, Greece
  • Robyn Torok, Edith Cowan University, Australia
  • Hien Thi Thu Truong, NEC Labs Europe
  • Khan Ferdous Wahid, Airbus Group
  • Jenq-Haur Wang, National Taipei University of Technology, Taiwan
  • Uffe Wiil, University of Southern Denmark, Denmark
  • Christian Wolff, Regensburg University, Germany
  • Guobin Xu, Frostburg State University, USA
  • Shouhuai Xu, University of Texas at San Antonio, USA
  • Qingpeng Zhang, City University of Hong Kong, Hong Kong
  • Xiaolong Zheng, Chinese Academy of Sciences, Beijing, China
  • Bin Zhou, University of Maryland, USA