[AISWorld] [IEEE-ISI-CFP] The Leading Conference in Security Informatics, The Submission Deadline is April 25

王灿 wangcan2015 at ia.ac.cn
Thu Apr 20 10:02:09 EDT 2017





CALL FOR PAPERS

The 15th IEEE International Conference on Intelligence and Security Informatics (ISI), July 22-24, 2017, Beijing, China

(www.isi-conf.org)

(The submission deadline for IEEE ISI2017 has been extended to April 25th)

INTRODUCTION

Intelligence and Security Informatics (ISI) research is an interdisciplinary research field involving academic researchers in information technologies, computer science, public policy, bioinformatics, medical informatics, and social and behavior studies as well as local, state, and federal law enforcement and intelligence experts, and information technology industry consultants and practitioners to support counterterrorism and homeland security’s missions of anticipation, interdiction, prevention, preparedness and response to terrorist acts.

CONFERENCE THEME & TOPICS

The conference theme is Security and Big Data. In addition to the main academic conference, multiple satellite events centered around the security and big data theme will be organized as well.


We invite academic researchers in the field of Intelligence and Security Informatics and related areas as well as law enforcement and intelligence experts, and industry consultants and practitioners in the field to submit papers and workshop proposals.


ISI 2017 will be organized in four main tracks focusing on:

o   Security Analytics and Threat Intelligence

o   Data Science and Analytics in Security Informatics

o   Human Behavior and Factors in the Security Applications

o   Organizational, National, and International Issues in Counter-terrorism and other Security Applications

Submissions may include systems, methodology, test-bed, modeling, evaluation, and policy papers.  Research should be relevant to informatics, organization, public policy, or human behavior in applications of counter-terrorism or protection of local/ national/ international security in the physical world and/or cyberspace.  See specific topic suggestions below.

TOPICS INCLUDE BUT ARE NOT LIMITED TO:

Security Analytics and Threat Intelligence

Threat pattern models and modeling tools
Real-time situational awareness
Intrusion and cybersecurity threat detection and analysis
Cyber-physical-social  system security and incident management
Computing and networking infrastructure protection
Crime analysis and prevention
Forecasting threats and measuring the impact of threats
Surveillance and intelligence through unconventional means
Information security management standards
Information systems security policies
Mobile and cloud computing security
Big data analytics for cybersecurity
Resilient cyber infrastructure design and protection


Data Science and Analytics in Security Informatics

Data representation and fusion for security informatics
Criminal/intelligence information extraction
Data sharing and information visualization for security informatics
Web-based intelligence monitoring and analysis
Spatial-temporal data analysis for crime analysis and security informatics
Criminal/intelligence machine learning and data mining
Bio-terrorism tracking, alerting, and analysis
Digital forensics and computational criminology
Financial and accounting  fraud analysis
Consumer-generated content and security-related social media analytics
Security-related social network analysis (radicalization, recruitment, conducting  operations)
Authorship analysis and identification
Terrorism related analytical methodologies and software tools

Human Behavior and Factors in Security Applications

Behavior issues in information systems security
HCI and user interfaces of relevance to intelligence and security
Social impacts of crime and terrorism
Board activism and influence
Measuring the effectiveness of counter-terrorism campaigns
Citizen education and training
Understanding user behavior in that has potential security risks
Security risks about user behavior in information systems
Human behavior modeling, representation and prediction for security applications

Organizational, National, and International Issues in Counter-terrorism and other Security Applications

Best practices in counter-terrorism or security protection
Information sharing policy and governance
Privacy, security, and civil liberties issues
Emergency response and management
Disaster prevention, detection, and management
Protection of  transportation and communications infrastructure
Communication and decision support for research and rescue
Assisting citizens' responses to terrorism and catastrophic events
Border security
Accounting and IT auditing
Corporate governance and monitoring
Election fraud and political use and abuse

SUBMISSION FORMAT AND PUBLICATION

We accept three types of paper submissions on suggested topics of the proposed tracks and related topics: long paper (max. 6 pages), short paper (max. 3 pages), and poster (1 page). Submission format is PDF.  Consult the IEEE publications page at

http://www.ieee.org/conferences_events/conferences/publishing/templates.html

for information on formatting. Papers will be submitted through the EasyChair submission and review system. The submission Web page for IEEE ISI 2017:

https://easychair.org/conferences/?conf=ieeeisi2017.

The accepted papers from ISI 2017 and its affiliated workshops will be published by the IEEE Press in formal Proceedings. IEEE ISI Proceedings are EI-indexed.Selected papers may also be considered for IEEE Intelligent Systems and ACM Transactions on Management Information Systems.

IMPORTANT DATES

Most submissions due:April 10, 2017

        April 25, 2017

Acceptance: May 30, 2017

Camera ready copy: June 20, 2017

Authors register:  June 20, 2017

Conference: July 22-24, 2017




More information about the AISWorld mailing list