[AISWorld] [IEEE-ISI-CFP] The Leading Conference in Security Informatics, The Submission Deadline is April 25
王灿
wangcan2015 at ia.ac.cn
Thu Apr 20 10:02:09 EDT 2017
CALL FOR PAPERS
The 15th IEEE International Conference on Intelligence and Security Informatics (ISI), July 22-24, 2017, Beijing, China
(www.isi-conf.org)
(The submission deadline for IEEE ISI2017 has been extended to April 25th)
INTRODUCTION
Intelligence and Security Informatics (ISI) research is an interdisciplinary research field involving academic researchers in information technologies, computer science, public policy, bioinformatics, medical informatics, and social and behavior studies as well as local, state, and federal law enforcement and intelligence experts, and information technology industry consultants and practitioners to support counterterrorism and homeland security’s missions of anticipation, interdiction, prevention, preparedness and response to terrorist acts.
CONFERENCE THEME & TOPICS
The conference theme is Security and Big Data. In addition to the main academic conference, multiple satellite events centered around the security and big data theme will be organized as well.
We invite academic researchers in the field of Intelligence and Security Informatics and related areas as well as law enforcement and intelligence experts, and industry consultants and practitioners in the field to submit papers and workshop proposals.
ISI 2017 will be organized in four main tracks focusing on:
o Security Analytics and Threat Intelligence
o Data Science and Analytics in Security Informatics
o Human Behavior and Factors in the Security Applications
o Organizational, National, and International Issues in Counter-terrorism and other Security Applications
Submissions may include systems, methodology, test-bed, modeling, evaluation, and policy papers. Research should be relevant to informatics, organization, public policy, or human behavior in applications of counter-terrorism or protection of local/ national/ international security in the physical world and/or cyberspace. See specific topic suggestions below.
TOPICS INCLUDE BUT ARE NOT LIMITED TO:
Security Analytics and Threat Intelligence
Threat pattern models and modeling tools
Real-time situational awareness
Intrusion and cybersecurity threat detection and analysis
Cyber-physical-social system security and incident management
Computing and networking infrastructure protection
Crime analysis and prevention
Forecasting threats and measuring the impact of threats
Surveillance and intelligence through unconventional means
Information security management standards
Information systems security policies
Mobile and cloud computing security
Big data analytics for cybersecurity
Resilient cyber infrastructure design and protection
Data Science and Analytics in Security Informatics
Data representation and fusion for security informatics
Criminal/intelligence information extraction
Data sharing and information visualization for security informatics
Web-based intelligence monitoring and analysis
Spatial-temporal data analysis for crime analysis and security informatics
Criminal/intelligence machine learning and data mining
Bio-terrorism tracking, alerting, and analysis
Digital forensics and computational criminology
Financial and accounting fraud analysis
Consumer-generated content and security-related social media analytics
Security-related social network analysis (radicalization, recruitment, conducting operations)
Authorship analysis and identification
Terrorism related analytical methodologies and software tools
Human Behavior and Factors in Security Applications
Behavior issues in information systems security
HCI and user interfaces of relevance to intelligence and security
Social impacts of crime and terrorism
Board activism and influence
Measuring the effectiveness of counter-terrorism campaigns
Citizen education and training
Understanding user behavior in that has potential security risks
Security risks about user behavior in information systems
Human behavior modeling, representation and prediction for security applications
Organizational, National, and International Issues in Counter-terrorism and other Security Applications
Best practices in counter-terrorism or security protection
Information sharing policy and governance
Privacy, security, and civil liberties issues
Emergency response and management
Disaster prevention, detection, and management
Protection of transportation and communications infrastructure
Communication and decision support for research and rescue
Assisting citizens' responses to terrorism and catastrophic events
Border security
Accounting and IT auditing
Corporate governance and monitoring
Election fraud and political use and abuse
SUBMISSION FORMAT AND PUBLICATION
We accept three types of paper submissions on suggested topics of the proposed tracks and related topics: long paper (max. 6 pages), short paper (max. 3 pages), and poster (1 page). Submission format is PDF. Consult the IEEE publications page at
http://www.ieee.org/conferences_events/conferences/publishing/templates.html
for information on formatting. Papers will be submitted through the EasyChair submission and review system. The submission Web page for IEEE ISI 2017:
https://easychair.org/conferences/?conf=ieeeisi2017.
The accepted papers from ISI 2017 and its affiliated workshops will be published by the IEEE Press in formal Proceedings. IEEE ISI Proceedings are EI-indexed.Selected papers may also be considered for IEEE Intelligent Systems and ACM Transactions on Management Information Systems.
IMPORTANT DATES
Most submissions due:April 10, 2017
April 25, 2017
Acceptance: May 30, 2017
Camera ready copy: June 20, 2017
Authors register: June 20, 2017
Conference: July 22-24, 2017
More information about the AISWorld
mailing list