Difference between revisions of "ISI 2017"
Line 19: | Line 19: | ||
'''Security Analytics and Threat Intelligence:''' | '''Security Analytics and Threat Intelligence:''' | ||
− | • Threat pattern models and modeling tools | + | • Threat pattern models and modeling tools<br> |
− | • Real-time situational awareness | + | • Real-time situational awareness<br> |
− | • Intrusion and cybersecurity threat detection and analysis | + | • Intrusion and cybersecurity threat detection and analysis<br> |
− | • Cyber-physical-social system security and incident management | + | • Cyber-physical-social system security and incident management<br> |
− | • Computing and networking infrastructure protection | + | • Computing and networking infrastructure protection<br> |
− | • Crime analysis and prevention | + | • Crime analysis and prevention<br> |
− | • Forecasting threats and measuring the impact of threats | + | • Forecasting threats and measuring the impact of threats<br> |
− | • Surveillance and intelligence through unconventional means | + | • Surveillance and intelligence through unconventional means<br> |
− | • Information security management standards | + | • Information security management standards<br> |
− | • Information systems security policies | + | • Information systems security policies<br> |
− | • Mobile and cloud computing security | + | • Mobile and cloud computing security<br> |
− | • Big data analytics for cybersecurity | + | • Big data analytics for cybersecurity<br> |
− | • Resilient cyber infrastructure design and protection | + | • Resilient cyber infrastructure design and protection<br> |
'''Data Science and Analytics in Security Informatics:''' | '''Data Science and Analytics in Security Informatics:''' | ||
− | • Data representation and fusion for security informatics | + | • Data representation and fusion for security informatics<br> |
− | • Criminal/intelligence information extraction | + | • Criminal/intelligence information extraction<br> |
− | • Data sharing and information visualization for security informatics | + | • Data sharing and information visualization for security informatics<br> |
− | • Web-based intelligence monitoring and analysis | + | • Web-based intelligence monitoring and analysis<br> |
− | • Spatial-temporal data analysis for crime analysis and security informatics | + | • Spatial-temporal data analysis for crime analysis and security informatics<br> |
− | • Criminal/intelligence machine learning and data mining | + | • Criminal/intelligence machine learning and data mining<br> |
− | • Bio-terrorism tracking, alerting, and analysis | + | • Bio-terrorism tracking, alerting, and analysis<br> |
− | • Digital forensics and computational criminology | + | • Digital forensics and computational criminology<br> |
− | • Financial and accounting fraud analysis | + | • Financial and accounting fraud analysis<br> |
− | • Consumer-generated content and security-related social media analytics | + | • Consumer-generated content and security-related social media analytics<br> |
− | • Security-related social network analysis (radicalization, recruitment, conducting operations) | + | • Security-related social network analysis (radicalization, recruitment, conducting operations)<br> |
− | • Authorship analysis and identification | + | • Authorship analysis and identification<br> |
− | • Terrorism related analytical methodologies and software tools | + | • Terrorism related analytical methodologies and software tools<br> |
'''Human Behavior and Factors in Security Applications:''' | '''Human Behavior and Factors in Security Applications:''' | ||
− | • Behavior issues in information systems security | + | • Behavior issues in information systems security<br> |
− | • HCI and user interfaces of relevance to intelligence and security | + | • HCI and user interfaces of relevance to intelligence and security<br> |
− | • Social impacts of crime and terrorism | + | • Social impacts of crime and terrorism<br> |
− | • Board activism and influence | + | • Board activism and influence<br> |
− | • Measuring the effectiveness of counter-terrorism campaigns | + | • Measuring the effectiveness of counter-terrorism campaigns<br> |
− | • Citizen education and training | + | • Citizen education and training<br> |
− | • Understanding user behavior in that has potential security risks | + | • Understanding user behavior in that has potential security risks<br> |
− | • Security risks about user behavior in information systems | + | • Security risks about user behavior in information systems<br> |
− | • Human behavior modeling, representation and prediction for security applications | + | • Human behavior modeling, representation and prediction for security applications<br> |
'''Organizational, National, and International Issues in Counter-terrorism and other Security Applications:''' | '''Organizational, National, and International Issues in Counter-terrorism and other Security Applications:''' | ||
− | • Best practices in counter-terrorism or security protection | + | • Best practices in counter-terrorism or security protection<br> |
− | • Information sharing policy and governance | + | • Information sharing policy and governance<br> |
− | • Privacy, security, and civil liberties issues | + | • Privacy, security, and civil liberties issues<br> |
− | • Emergency response and management | + | • Emergency response and management<br> |
− | • Disaster prevention, detection, and management | + | • Disaster prevention, detection, and management<br> |
− | • Protection of transportation and communications infrastructure | + | • Protection of transportation and communications infrastructure<br> |
− | • Communication and decision support for research and rescue | + | • Communication and decision support for research and rescue<br> |
− | • Assisting citizens' responses to terrorism and catastrophic events | + | • Assisting citizens' responses to terrorism and catastrophic events<br> |
− | • Border security | + | • Border security<br> |
− | • Accounting and IT auditing | + | • Accounting and IT auditing<br> |
− | • Corporate governance and monitoring | + | • Corporate governance and monitoring<br> |
− | • Election fraud and political use and abuse | + | • Election fraud and political use and abuse<br> |
==Submissions== | ==Submissions== | ||
==Important Dates== | ==Important Dates== |
Revision as of 07:45, 1 August 2019
ISI 2017 | |
---|---|
2017 IEEE International Conference on Intelligence and Security Informatics
| |
Event in series | ISI |
Dates | 2017/07/22 (iCal) - 2017/07/24 |
Homepage: | http://www.isi-conf.org/ |
Location | |
Location: | Beijing, China |
Loading map... | |
Important dates | |
Submissions: | 2017/04/10 |
Notification: | 2017/05/30 |
Table of Contents | |
IEEE International Conference on Intelligence and Security Informatics (ISI), July 22-24, 2017, Beijing, China
Topics
Security Analytics and Threat Intelligence:
• Threat pattern models and modeling tools
• Real-time situational awareness
• Intrusion and cybersecurity threat detection and analysis
• Cyber-physical-social system security and incident management
• Computing and networking infrastructure protection
• Crime analysis and prevention
• Forecasting threats and measuring the impact of threats
• Surveillance and intelligence through unconventional means
• Information security management standards
• Information systems security policies
• Mobile and cloud computing security
• Big data analytics for cybersecurity
• Resilient cyber infrastructure design and protection
Data Science and Analytics in Security Informatics:
• Data representation and fusion for security informatics
• Criminal/intelligence information extraction
• Data sharing and information visualization for security informatics
• Web-based intelligence monitoring and analysis
• Spatial-temporal data analysis for crime analysis and security informatics
• Criminal/intelligence machine learning and data mining
• Bio-terrorism tracking, alerting, and analysis
• Digital forensics and computational criminology
• Financial and accounting fraud analysis
• Consumer-generated content and security-related social media analytics
• Security-related social network analysis (radicalization, recruitment, conducting operations)
• Authorship analysis and identification
• Terrorism related analytical methodologies and software tools
Human Behavior and Factors in Security Applications:
• Behavior issues in information systems security
• HCI and user interfaces of relevance to intelligence and security
• Social impacts of crime and terrorism
• Board activism and influence
• Measuring the effectiveness of counter-terrorism campaigns
• Citizen education and training
• Understanding user behavior in that has potential security risks
• Security risks about user behavior in information systems
• Human behavior modeling, representation and prediction for security applications
Organizational, National, and International Issues in Counter-terrorism and other Security Applications:
• Best practices in counter-terrorism or security protection
• Information sharing policy and governance
• Privacy, security, and civil liberties issues
• Emergency response and management
• Disaster prevention, detection, and management
• Protection of transportation and communications infrastructure
• Communication and decision support for research and rescue
• Assisting citizens' responses to terrorism and catastrophic events
• Border security
• Accounting and IT auditing
• Corporate governance and monitoring
• Election fraud and political use and abuse
Submissions
Important Dates
Committees
- Co-Organizers
- General Co-Chairs
- some person, some affiliation, country
- PC Co-Chairs
- some person, some affiliation, country
- Workshop Chair
- some person, some affiliation, country
- Panel Chair
- some person, some affiliation, country
- Seminars Chair
- some person, some affiliation, country
- Demonstration Co-Chairs
- some person, some affiliation, country
- some person, some affiliation, country
- Local Organizing Co-Chairs
- some person, some affiliation, country
- Program Committee Members
- some person, some affiliation, country
Acronym | ISI 2017 + |
End date | July 24, 2017 + |
Event in series | ISI + |
Event type | Conference + |
Has coordinates | 40° 11' 26", 116° 24' 44"Latitude: 40.190633333333 Longitude: 116.41214444444 + |
Has location city | Beijing + |
Has location country | Category:China + |
Has program chair | Xiaolong Zheng +, Hui Zhang + and Chunxiao Xing + |
Homepage | http://www.isi-conf.org/ + |
IsA | Event + |
Notification | May 30, 2017 + |
Start date | July 22, 2017 + |
Submission deadline | April 10, 2017 + |
Title | 2017 IEEE International Conference on Intelligence and Security Informatics + |