ISI 2019

From Openresearch
Jump to: navigation, search
ISI 2019
2019 IEEE International Conference on Intelligence and Security Informatics
Event in series ISI
Dates 2019/07/01 (iCal) - 2019/07/03
Homepage: http://www.isi-conf.org/
Submitting link: https://easychair.org/account/signin?l=17A3HDxxWUdFXtfZ65Twpd
Location
Location: Shenzhen, China
Loading map...

Important dates
Camera ready due: 2019/05/14
Registration link: https://meeting.yizhifubj.com.cn/web/index.action?meetingId=480
Early bird student: $ 310 / {{{Early bird fee reduced}}}
Property "Early bird fee reduced" (as page type) with input value "{{{Early bird fee reduced}}}" contains invalid characters or is incomplete and therefore can cause unexpected results during a query or annotation process.
(reduced)
On site student: $ 360 / {{{On site fee reduced}}}
Property "On site fee reduced" (as page type) with input value "{{{On site fee reduced}}}" contains invalid characters or is incomplete and therefore can cause unexpected results during a query or annotation process.
(reduced)
Early bird regular: $ 490
On site regular: $ 540
Keynote speaker: Hsinchun Chen, Hui Zhang, Winson Peng
Table of Contents


The following coordinate was not recognized: Geocoding failed.
The following coordinate was not recognized: Geocoding failed.


The 17th IEEE International Conference on Intelligence and Security Informatics (ISI)

Topics

Security Analytics and Threat Intelligence:

  • Threat pattern models and modeling tools
  • Real-time situational awareness
  • Intrusion and cybersecurity threat detection and analysis
  • Cyber-physical-social system security and incident management
  • Computing and networking infrastructure protection
  • Crime analysis and prevention
  • Forecasting threats and measuring the impact of threats
  • Surveillance and intelligence through unconventional means
  • Information security management standards
  • Information systems security policies
  • Mobile and cloud computing security
  • Big data analytics for cybersecurity
  • Resilient cyber infrastructure design and protection


Data Science and Analytics in Security Informatics:

  • Data representation and fusion for security informatics
  • Criminal/intelligence information extraction
  • Data sharing and information visualization for security informatics
  • Web-based intelligence monitoring and analysis
  • Spatial-temporal data analysis for crime analysis and security informatics
  • Criminal/intelligence machine learning and data mining
  • Bio-terrorism tracking, alerting, and analysis
  • Digital forensics and computational criminology
  • Financial and accounting fraud analysis
  • Consumer-generated content and security-related social media analytics
  • Security-related social network analysis (radicalization, recruitment, conducting operations)
  • Authorship analysis and identification
  • Terrorism related analytical methodologies and software tools


Human Behavior and Factors in Security Applications:

  • Behavior issues in information systems security
  • HCI and user interfaces of relevance to intelligence and security
  • Social impacts of crime and terrorism
  • Board activism and influence
  • Measuring the effectiveness of counter-terrorism campaigns
  • Citizen education and training
  • Understanding user behavior in that has potential security risks
  • Security risks about user behavior in information systems
  • Human behavior modeling, representation and prediction for security applications


Organizational, National, and International Issues in Counter-terrorism and other Security Applications:

  • Best practices in counter-terrorism or security protection
  • Information sharing policy and governance
  • Privacy, security, and civil liberties issues
  • Emergency response and management
  • Disaster prevention, detection, and management
  • Protection of transportation and communications infrastructure
  • Communication and decision support for research and rescue
  • Assisting citizens' responses to terrorism and catastrophic events
  • Border security
  • Accounting and IT auditing
  • Corporate governance and monitoring
  • Election fraud and political use and abuse


Important Dates

  • Most submissions due: April 10,2019​
  • Acceptance: April 30, 2019​
  • Camera ready copy: May 14, 2019

​*Author registration: May 14, 2019
​*Conference: July 1-3, 2019


Committees

Honorary Chair:

  • Hsinchun Chen, University of Arizona & Tsinghua University


Conference Co-Chairs:

  • Daniel Zeng, Chinese Academy of Sciences & Shenzhen Artificial Intelligence and Data Science Institute
  • Chris Yang, Drexel University


Program Co-Chairs:

  • Xiaolong Zheng, Chinese Academy of Sciences & Shenzhen Artificial Intelligence and Data Science Institute
  • Ahmed Abbasi, University of Virginia
  • Michael Chau, University of Hong Kong


Publication Chairs:

  • Alan Wang, Virginia Tech
  • Lina Zhou, UMBC


Local Arrangements Co-Chairs:

  • Xiaoyan Huang, Chinese Academy of Sciences & Shenzhen Artificial Intelligence and Data Science Institute
  • Liang Chen, Chinese Academy of Sciences & Shenzhen Artificial Intelligence and Data Science Institute