ISI 2019
ISI 2019 | |
---|---|
2019 IEEE International Conference on Intelligence and Security Informatics
| |
Event in series | ISI |
Dates | 2019/07/01 (iCal) - 2019/07/03 |
Homepage: | http://www.isi-conf.org/ |
Submitting link: | https://easychair.org/account/signin?l=17A3HDxxWUdFXtfZ65Twpd |
Location | |
Location: | Shenzhen, China |
Loading map... | |
Important dates | |
Camera ready due: | 2019/05/14 |
Registration link: | https://meeting.yizhifubj.com.cn/web/index.action?meetingId=480 |
Early bird student: | $ 310 / {{{Early bird fee reduced}}} Property "Early bird fee reduced" (as page type) with input value "{{{Early bird fee reduced}}}" contains invalid characters or is incomplete and therefore can cause unexpected results during a query or annotation process. (reduced)
|
On site student: | $ 360 / {{{On site fee reduced}}} Property "On site fee reduced" (as page type) with input value "{{{On site fee reduced}}}" contains invalid characters or is incomplete and therefore can cause unexpected results during a query or annotation process. (reduced)
|
Early bird regular: | $ 490 |
On site regular: | $ 540 |
Keynote speaker: | Hsinchun Chen, Hui Zhang, Winson Peng |
Table of Contents | |
Contents | |
The following coordinate was not recognized: Geocoding failed.
The following coordinate was not recognized: Geocoding failed.
The 17th IEEE International Conference on Intelligence and Security Informatics (ISI)
Topics
Security Analytics and Threat Intelligence:
- Threat pattern models and modeling tools
- Real-time situational awareness
- Intrusion and cybersecurity threat detection and analysis
- Cyber-physical-social system security and incident management
- Computing and networking infrastructure protection
- Crime analysis and prevention
- Forecasting threats and measuring the impact of threats
- Surveillance and intelligence through unconventional means
- Information security management standards
- Information systems security policies
- Mobile and cloud computing security
- Big data analytics for cybersecurity
- Resilient cyber infrastructure design and protection
Data Science and Analytics in Security Informatics:
- Data representation and fusion for security informatics
- Criminal/intelligence information extraction
- Data sharing and information visualization for security informatics
- Web-based intelligence monitoring and analysis
- Spatial-temporal data analysis for crime analysis and security informatics
- Criminal/intelligence machine learning and data mining
- Bio-terrorism tracking, alerting, and analysis
- Digital forensics and computational criminology
- Financial and accounting fraud analysis
- Consumer-generated content and security-related social media analytics
- Security-related social network analysis (radicalization, recruitment, conducting operations)
- Authorship analysis and identification
- Terrorism related analytical methodologies and software tools
Human Behavior and Factors in Security Applications:
- Behavior issues in information systems security
- HCI and user interfaces of relevance to intelligence and security
- Social impacts of crime and terrorism
- Board activism and influence
- Measuring the effectiveness of counter-terrorism campaigns
- Citizen education and training
- Understanding user behavior in that has potential security risks
- Security risks about user behavior in information systems
- Human behavior modeling, representation and prediction for security applications
Organizational, National, and International Issues in Counter-terrorism and other Security Applications:
- Best practices in counter-terrorism or security protection
- Information sharing policy and governance
- Privacy, security, and civil liberties issues
- Emergency response and management
- Disaster prevention, detection, and management
- Protection of transportation and communications infrastructure
- Communication and decision support for research and rescue
- Assisting citizens' responses to terrorism and catastrophic events
- Border security
- Accounting and IT auditing
- Corporate governance and monitoring
- Election fraud and political use and abuse
Important Dates
- Most submissions due: April 10,2019
- Acceptance: April 30, 2019
- Camera ready copy: May 14, 2019
*Author registration: May 14, 2019
*Conference: July 1-3, 2019
Committees
Honorary Chair:
- Hsinchun Chen, University of Arizona & Tsinghua University
Conference Co-Chairs:
- Daniel Zeng, Chinese Academy of Sciences & Shenzhen Artificial Intelligence and Data Science Institute
- Chris Yang, Drexel University
Program Co-Chairs:
- Xiaolong Zheng, Chinese Academy of Sciences & Shenzhen Artificial Intelligence and Data Science Institute
- Ahmed Abbasi, University of Virginia
- Michael Chau, University of Hong Kong
Publication Chairs:
- Alan Wang, Virginia Tech
- Lina Zhou, UMBC
Local Arrangements Co-Chairs:
- Xiaoyan Huang, Chinese Academy of Sciences & Shenzhen Artificial Intelligence and Data Science Institute
- Liang Chen, Chinese Academy of Sciences & Shenzhen Artificial Intelligence and Data Science Institute
Facts about "ISI 2019"
Acronym | ISI 2019 + |
Attendance fee currency | $ + |
Camera ready due | May 14, 2019 + |
Early bird regular | 490.00 + |
Early bird student | 310.00 + |
End date | July 3, 2019 + |
Event in series | ISI + |
Event type | Conference + |
Has Keynote speaker | Hsinchun Chen +, Hui Zhang + and Winson Peng + |
Has Submitting link | https://easychair.org/account/signin?l=17A3HDxxWUdFXtfZ65Twpd + |
Has location city | Shenzhen + |
Has location country | Category:China + |
Homepage | http://www.isi-conf.org/ + |
IsA | Event + |
On site regular | 540.00 + |
On site student | 360.00 + |
Registration link | https://meeting.yizhifubj.com.cn/web/index.action?meetingId=480 + |
Start date | July 1, 2019 + |
Title | 2019 IEEE International Conference on Intelligence and Security Informatics + |