ISI 2018
ISI 2018 | |
---|---|
2018 IEEE International Conference on Intelligence and Security Informatics
| |
Event in series | ISI |
Dates | 2018/11/08 (iCal) - 2018/11/10 |
Homepage: | http://isi18.azurewebsites.net/ |
Twitter account: | https://twitter.com/ieeeisiconf |
Location | |
Location: | Miami, Florida, USA |
Loading map... | |
Important dates | |
Workshops: | 2018/06/22 |
Tutorials: | 2018/07/31 |
Papers: | 2018/07/20 |
Notification: | 2018/09/07 |
Camera ready due: | 2018/09/28 |
Registration link: | https://www.regonline.com/builder/site/?eventid=2528396 |
Early bird student: | $ 350 / {{{Early bird fee reduced}}} Property "Early bird fee reduced" (as page type) with input value "{{{Early bird fee reduced}}}" contains invalid characters or is incomplete and therefore can cause unexpected results during a query or annotation process. (reduced)
|
On site student: | $ 450 / {{{On site fee reduced}}} Property "On site fee reduced" (as page type) with input value "{{{On site fee reduced}}}" contains invalid characters or is incomplete and therefore can cause unexpected results during a query or annotation process. (reduced)
|
Early bird regular: | $ 480 |
On site regular: | $ 580 |
Papers: | Submitted 110 / Accepted 38 (34.5 %) |
Committees | |
General chairs: | Dongwon Lee |
PC chairs: | Nitesh Saxena, Ponnurangam Kumaraguru |
Workshop chairs: | Kemal Akkaya, Christopher C. Yang |
Seminars Chair: | Jonathan Voris, Siddharth Kaza |
Keynote speaker: | Engin Kirda, Kathleen M. Carkey |
Table of Contents | |
Contents | |
Tweets by https://twitter.com/ieeeisiconf | |
https://twitter.com/ieeeisiconf">Tweets by {{{Twitter account}}}
|
IEEE International Conference on Intelligence and Security Informatics 2018 (ISI)
Topics
Security Analytics and Threat Intelligence:
- Threat pattern models and modelling tools
- Real-time situational awareness
- Intrusion and cybersecurity threat detection and analysis
- Cyber-physical-social system security and incident management
- Computing and networking infrastructure protection
- Crime analysis and prevention
- Forecasting threats and measuring the impact of threats
- Surveillance and intelligence through unconventional means
- Information security management standards
- Information systems security policies
- Mobile and cloud computing security
- Big data analytics for cybersecurity
- Machine learning for cybersecurity
- Artificial Intelligence for cybersecurity
- Resilient cyber infrastructure design and protection
Data Science and Analytics in Security Informatics:
- Data representation and fusion for security informatics
- Criminal/intelligence information extraction
- Data sharing and information visualization for security informatics
- Web-based intelligence monitoring and analysis
- Spatial-temporal data analysis for crime analysis and security informatics
- Criminal/intelligence machine learning and data mining
- Bio-terrorism tracking, alerting, and analysis
- Digital forensics and computational criminology
- Financial and accounting fraud analysis
- Consumer-generated content and security-related social media analytics
- Security-related social network analysis (radicalization, fund-raising, recruitment, conducting operations)
- Authorship analysis and identification
- Terrorism related analytical methodologies and software tools
Human Behaviour and Factors in Security Applications:
- Behaviour issues in information systems security
- HCI and user interfaces of relevance to intelligence and security
- Social impacts of crime and terrorism
- Board activism and influence
- Measuring the effectiveness of counter-terrorism campaigns
- Citizen education and training
- Understanding user behaviour in that has potential security risks
- Security risks about user behaviour in information systems
- Human behaviour modelling, representation and prediction for security applications
Organizational, National, and International Issues in Counter-terrorism and other Security Applications:
- Best practices in counter-terrorism or security protection
- Information sharing policy and governance
- Privacy, security, and civil liberties issues
- Emergency response and management
- Disaster prevention, detection, and management
- Protection of transportation and communications infrastructure
- Communication and decision support for research and rescue
- Assisting citizens' responses to terrorism and catastrophic events
- Border security
- Accounting and IT auditing
- Corporate governance and monitoring
- Election fraud and political use and abuse
Important Dates
Conference Dates:
November 8-10, 2018
Paper Submission:
July 20, 2018
August 17, 2018 (Extended Deadline)
Workshop Proposal:
June 22, 2018
Tutorial Proposal:
July 31, 2018
Tutorial Proposal Acceptance Notification:
August 15, 2018
Paper Acceptance Notification:
September 7, 2018
September 14, 2018 (Extended Deadline)
Camera-Ready Papers Due:
September 28, 2018
Committees
General Chair:
- Dongwon Lee, Pennsylvania State University, USA
Local Chair:
- A. Selcuk Uluagac, Florida International University, USA
Program Co-Chairs:
- Nitesh Saxena, University of Alabama at Birmingham, USA
- Ponnurangam Kumaraguru, Indraprastha Institute of Information Technology, New Delhi, India
Publication Chair:
- Ghita Mezzour, International University of Rabat, Morocco
Finance Chair:
- Fengjun Li, The University of Kansas, USA
Publicity Chair:
- Anna Squicciarini, Pennsylvania State University, USA
Web Chair:
- Leonardo Babun, Florida International University, USA
Workshop Co-Chairs:
- Kemal Akkaya, Florida International University, USA
- Christopher C. Yang, Drexel University, USA
Tutorial Co-Chairs:
- Jonathan Voris, New York Institute of Technology, USA
- Siddharth Kaza, Towson University, USA
Registration Co-Chairs:
- Wingyan Chung, University of Central Florida, USA
- K.P. Chow, The University of Hong Kong, Hong Kong
Registration Specialist:
- Jinwei Liu, University of Central Florida, USA
PROGRAM COMMITTEE
Chairs:
- Ponnurangam Kumaraguru, Indraprastha Institute of Information Technology, Delhi, India
- Nitesh Saxena, University of Alabama at Birmingham, USA
Committee:
- Swati Agarwal, Indraprastha Institute of Information Technology, Delhi, India
- Anupama Aggarwal, Indraprastha Institute of Information Technology, Delhi, India
- Massimiliano Albanese, George Mason University, USA
- S. Abhishek Anand, University of Alabama at Birmingham, USA
- Sandhya Aneja, Institute of Informatics and Communication, University of Delhi, India
- Jie Bai, Chinese Academy of Sciences, China
- Jeremy Blackburn, University of Alabama at Birmingham, USA
- Joel Brynielsson, KTH Royal Institute of Technology, Sweden
- Jose Luis Calvo-Rolle, University of A. Coruña, Spain
- Weiping Chang, Central Police University, Taiwan
- K. P. Chow, The University of Hong Kong, Hong Kong
- Wingyan Chung, University of Central Florida, USA
- Amitava Das, Indian Institute of Information Technology, Sri City, India
- Leon Deligiannidis, Wentworth Institute of Technology, USA
- Norah Dunbar, University of California Santa Barbara, USA
- Guanggang Geng, Chinese Academy of Sciences, China
- Roberto Giacobazzi, University of Verona, Italy
- Anuradha Gupta, Jaypee Institute of Information Technology, India
- Tzipora Halevi, Brooklyn College, USA
- Sue Kase, Army Research Laboratory, USA
- Sergii Kavun, Kharkiv Educational and Scientific Institute of the University of Banking, Ukraine
- Jeroen Keppens, King's College London, UK
- Latifur Khan, University of Texas at Dallas, USA
- Jörn Kohlhammer, Fraunhofer Institute for Computer Graphics Research IGD, Deutschland
- Steve Kramer, Paragon Science, Inc.
- Qiudan Li, Chinese Academy of Sciences, Beijing, China
- Luca Mazzola, Deutsche Forschungszentrum für Künstliche Intelligenz GmbH (DFKI), Germany
- Michael Mcguire, Towson University, USA
- Manar Mohamed, Miami University, USA
- Ajaya Neupane, University of California Riverside, USA
- Greg Newby, Compute Canada
- Cyril Onwubiko, Cyber Security and Intelligence at Research Series Limited
- Andrew Park, Thompson Rivers University, Canada
- Jakub Piskorski, Joint Research Centre of the European Commission, Poland
- Andrea Pugliese, University of Calabria, Italy
- Guangzhi Qu, Oakland University, USA
- Björn Schuller, University of Augsburg / Imperial College London, UK
- Abdul Serwadda, Louisiana Tech University, USA
- Maliheh Shirvanian, University of Alabama at Birmingham, USA
- Babins Shrestha, VISA Inc., Austin, USA
- Gerardo Simari, Universidad Nacional del Sur and CONICET, Argentina
- Yannis Stamatiou, University of Patras, Greece
- Robyn Torok, Edith Cowan University, Australia
- Hien Thi Thu Truong, NEC Labs Europe
- Khan Ferdous Wahid, Airbus Group
- Jenq-Haur Wang, National Taipei University of Technology, Taiwan
- Uffe Wiil, University of Southern Denmark, Denmark
- Christian Wolff, Regensburg University, Germany
- Guobin Xu, Frostburg State University, USA
- Shouhuai Xu, University of Texas at San Antonio, USA
- Qingpeng Zhang, City University of Hong Kong, Hong Kong
- Xiaolong Zheng, Chinese Academy of Sciences, Beijing, China
- Bin Zhou, University of Maryland, USA