Difference between revisions of "ISI 2018"
 (modified through wikirestore by Th)  | 
				 (modified through wikirestore by orapi)  | 
				||
| Line 1: | Line 1: | ||
{{Event  | {{Event  | ||
| + | |Acronym=ISI 2018  | ||
| + | |Title=2018 IEEE International Conference on Intelligence and Security Informatics  | ||
| + | |Series=ISI  | ||
| + | |Type=Conference  | ||
|Field=Computer security and reliability  | |Field=Computer security and reliability  | ||
| + | |Start date=2018/11/08  | ||
| + | |End date=2018/11/10  | ||
| + | |Homepage=http://isi18.azurewebsites.net/  | ||
|Twitter account=https://twitter.com/ieeeisiconf  | |Twitter account=https://twitter.com/ieeeisiconf  | ||
| + | |City=Miami  | ||
| + | |State=Florida  | ||
| + | |Country=USA  | ||
|Paper deadline=2018/07/20  | |Paper deadline=2018/07/20  | ||
|Workshop deadline=2018/06/22  | |Workshop deadline=2018/06/22  | ||
| Line 18: | Line 28: | ||
|Early bird student=350  | |Early bird student=350  | ||
|Registration link=https://www.regonline.com/builder/site/?eventid=2528396  | |Registration link=https://www.regonline.com/builder/site/?eventid=2528396  | ||
| + | |Submitted papers=110  | ||
| + | |Accepted papers=38  | ||
|has Proceedings Link=https://ieeexplore.ieee.org/xpl/conhome/8575039/proceeding  | |has Proceedings Link=https://ieeexplore.ieee.org/xpl/conhome/8575039/proceeding  | ||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
}}  | }}  | ||
'''IEEE International Conference on Intelligence and Security Informatics 2018''' ('''ISI''')  | '''IEEE International Conference on Intelligence and Security Informatics 2018''' ('''ISI''')  | ||
Revision as of 14:56, 3 November 2021
Event Rating
| median | worst | 
|---|---|
List of all ratings can be found at ISI 2018/rating
| ISI 2018 | |
|---|---|
2018 IEEE International Conference on Intelligence and Security Informatics 
 | |
| Event in series | ISI | 
| Dates | 2018/11/08 (iCal) - 2018/11/10 | 
| Homepage: | http://isi18.azurewebsites.net/ | 
| Twitter account: | https://twitter.com/ieeeisiconf | 
| Location | |
| Location: | Miami, Florida, USA | 
| Important dates | |
| Workshops: | 2018/06/22 | 
| Tutorials: | 2018/07/31 | 
| Papers: | 2018/07/20 | 
| Notification: | 2018/09/07 | 
| Camera ready due: | 2018/09/28 | 
| Registration link: | https://www.regonline.com/builder/site/?eventid=2528396 | 
| Early bird student: | $ 350 / {{{Early bird fee reduced}}} (reduced) | 
| On site student: | $ 450 / {{{On site fee reduced}}} (reduced) | 
| Early bird regular: | $ 480 | 
| On site regular: | $ 580 | 
| Papers: | Submitted 110 / Accepted 38 (34.5 %) | 
| Committees | |
| General chairs: | Dongwon Lee | 
| PC chairs: | Nitesh Saxena, Ponnurangam Kumaraguru | 
| Workshop chairs: | Kemal Akkaya, Christopher C. Yang | 
| Seminars Chair: | Jonathan Voris, Siddharth Kaza | 
| Keynote speaker: | Engin Kirda, Kathleen M. Carkey | 
| Table of Contents | |
| Tweets by https://twitter.com/ieeeisiconf%7C  colspan="2" style="padding-top: 2px; " |   https://twitter.com/ieeeisiconf">Tweets by {{{Twitter account}}}  
 | |
IEEE International Conference on Intelligence and Security Informatics 2018 (ISI)
Topics
Security Analytics and Threat Intelligence:
- Threat pattern models and modelling tools
 - Real-time situational awareness
 - Intrusion and cybersecurity threat detection and analysis
 - Cyber-physical-social system security and incident management
 - Computing and networking infrastructure protection
 - Crime analysis and prevention
 - Forecasting threats and measuring the impact of threats
 - Surveillance and intelligence through unconventional means
 - Information security management standards
 - Information systems security policies
 - Mobile and cloud computing security
 - Big data analytics for cybersecurity
 - Machine learning for cybersecurity
 - Artificial Intelligence for cybersecurity
 - Resilient cyber infrastructure design and protection
 
Data Science and Analytics in Security Informatics:
- Data representation and fusion for security informatics
 - Criminal/intelligence information extraction
 - Data sharing and information visualization for security informatics
 - Web-based intelligence monitoring and analysis
 - Spatial-temporal data analysis for crime analysis and security informatics
 - Criminal/intelligence machine learning and data mining
 - Bio-terrorism tracking, alerting, and analysis
 - Digital forensics and computational criminology
 - Financial and accounting fraud analysis
 - Consumer-generated content and security-related social media analytics
 - Security-related social network analysis (radicalization, fund-raising, recruitment, conducting operations)
 - Authorship analysis and identification
 - Terrorism related analytical methodologies and software tools
 
Human Behaviour and Factors in Security Applications:
- Behaviour issues in information systems security
 - HCI and user interfaces of relevance to intelligence and security
 - Social impacts of crime and terrorism
 - Board activism and influence
 - Measuring the effectiveness of counter-terrorism campaigns
 - Citizen education and training
 - Understanding user behaviour in that has potential security risks
 - Security risks about user behaviour in information systems
 - Human behaviour modelling, representation and prediction for security applications
 
Organizational, National, and International Issues in Counter-terrorism and other Security Applications:
- Best practices in counter-terrorism or security protection
 - Information sharing policy and governance
 - Privacy, security, and civil liberties issues
 - Emergency response and management
 - Disaster prevention, detection, and management
 - Protection of transportation and communications infrastructure
 - Communication and decision support for research and rescue
 - Assisting citizens' responses to terrorism and catastrophic events
 - Border security
 - Accounting and IT auditing
 - Corporate governance and monitoring
 - Election fraud and political use and abuse
 
Important Dates
Conference Dates:
November 8-10, 2018
Paper Submission:
July 20, 2018
August 17, 2018 (Extended Deadline)
Workshop Proposal:
June 22, 2018
Tutorial Proposal:
July 31, 2018
Tutorial Proposal Acceptance Notification:
August 15, 2018
Paper Acceptance Notification:
September 7, 2018
September 14, 2018 (Extended Deadline)
Camera-Ready Papers Due:
September 28, 2018
Committees
General Chair:
- Dongwon Lee, Pennsylvania State University, USA
 
Local Chair:
- A. Selcuk Uluagac, Florida International University, USA
 
Program Co-Chairs:
- Nitesh Saxena, University of Alabama at Birmingham, USA
 - Ponnurangam Kumaraguru, Indraprastha Institute of Information Technology, New Delhi, India
 
Publication Chair:
- Ghita Mezzour, International University of Rabat, Morocco
 
Finance Chair:
- Fengjun Li, The University of Kansas, USA
 
Publicity Chair:
- Anna Squicciarini, Pennsylvania State University, USA
 
Web Chair:
- Leonardo Babun, Florida International University, USA
 
Workshop Co-Chairs:
- Kemal Akkaya, Florida International University, USA
 - Christopher C. Yang, Drexel University, USA
 
Tutorial Co-Chairs:
- Jonathan Voris, New York Institute of Technology, USA
 - Siddharth Kaza, Towson University, USA
 
Registration Co-Chairs:
- Wingyan Chung, University of Central Florida, USA
 - K.P. Chow, The University of Hong Kong, Hong Kong
 
Registration Specialist:
- Jinwei Liu, University of Central Florida, USA
 
PROGRAM COMMITTEE
Chairs:
- Ponnurangam Kumaraguru, Indraprastha Institute of Information Technology, Delhi, India
 - Nitesh Saxena, University of Alabama at Birmingham, USA
 
Committee:
- Swati Agarwal, Indraprastha Institute of Information Technology, Delhi, India
 - Anupama Aggarwal, Indraprastha Institute of Information Technology, Delhi, India
 - Massimiliano Albanese, George Mason University, USA
 - S. Abhishek Anand, University of Alabama at Birmingham, USA
 - Sandhya Aneja, Institute of Informatics and Communication, University of Delhi, India
 - Jie Bai, Chinese Academy of Sciences, China
 - Jeremy Blackburn, University of Alabama at Birmingham, USA
 - Joel Brynielsson, KTH Royal Institute of Technology, Sweden
 - Jose Luis Calvo-Rolle, University of A. Coruña, Spain
 - Weiping Chang, Central Police University, Taiwan
 - K. P. Chow, The University of Hong Kong, Hong Kong
 - Wingyan Chung, University of Central Florida, USA
 - Amitava Das, Indian Institute of Information Technology, Sri City, India
 - Leon Deligiannidis, Wentworth Institute of Technology, USA
 - Norah Dunbar, University of California Santa Barbara, USA
 - Guanggang Geng, Chinese Academy of Sciences, China
 - Roberto Giacobazzi, University of Verona, Italy
 - Anuradha Gupta, Jaypee Institute of Information Technology, India
 - Tzipora Halevi, Brooklyn College, USA
 - Sue Kase, Army Research Laboratory, USA
 - Sergii Kavun, Kharkiv Educational and Scientific Institute of the University of Banking, Ukraine
 - Jeroen Keppens, King's College London, UK
 - Latifur Khan, University of Texas at Dallas, USA
 - Jörn Kohlhammer, Fraunhofer Institute for Computer Graphics Research IGD, Deutschland
 - Steve Kramer, Paragon Science, Inc.
 - Qiudan Li, Chinese Academy of Sciences, Beijing, China
 - Luca Mazzola, Deutsche Forschungszentrum für Künstliche Intelligenz GmbH (DFKI), Germany
 - Michael Mcguire, Towson University, USA
 - Manar Mohamed, Miami University, USA
 - Ajaya Neupane, University of California Riverside, USA
 - Greg Newby, Compute Canada
 - Cyril Onwubiko, Cyber Security and Intelligence at Research Series Limited
 - Andrew Park, Thompson Rivers University, Canada
 - Jakub Piskorski, Joint Research Centre of the European Commission, Poland
 - Andrea Pugliese, University of Calabria, Italy
 - Guangzhi Qu, Oakland University, USA
 - Björn Schuller, University of Augsburg / Imperial College London, UK
 - Abdul Serwadda, Louisiana Tech University, USA
 - Maliheh Shirvanian, University of Alabama at Birmingham, USA
 - Babins Shrestha, VISA Inc., Austin, USA
 - Gerardo Simari, Universidad Nacional del Sur and CONICET, Argentina
 - Yannis Stamatiou, University of Patras, Greece
 - Robyn Torok, Edith Cowan University, Australia
 - Hien Thi Thu Truong, NEC Labs Europe
 - Khan Ferdous Wahid, Airbus Group
 - Jenq-Haur Wang, National Taipei University of Technology, Taiwan
 - Uffe Wiil, University of Southern Denmark, Denmark
 - Christian Wolff, Regensburg University, Germany
 - Guobin Xu, Frostburg State University, USA
 - Shouhuai Xu, University of Texas at San Antonio, USA
 - Qingpeng Zhang, City University of Hong Kong, Hong Kong
 - Xiaolong Zheng, Chinese Academy of Sciences, Beijing, China
 - Bin Zhou, University of Maryland, USA