楼主: baijie0709
1999 0

[信息技术] 【EI】2017-IEEE情报与安全信息学国际会议征稿启事 [推广有奖]

  • 0关注
  • 0粉丝

小学生

21%

还不是VIP/贵宾

-

威望
0
论坛币
20 个
通用积分
0
学术水平
4 点
热心指数
0 点
信用等级
0 点
经验
150 点
帖子
3
精华
0
在线时间
1 小时
注册时间
2013-8-2
最后登录
2017-3-24

楼主
baijie0709 发表于 2017-3-1 20:32:51 |AI写论文

+2 论坛币
k人 参与回答

经管之家送您一份

应届毕业生专属福利!

求职就业群
赵安豆老师微信:zhaoandou666

经管之家联合CDA

送您一个全额奖学金名额~ !

感谢您参与论坛问题回答

经管之家送您两个论坛币!

+2 论坛币

CALL FOR PAPERS

IEEE International Conference on Intelligenceand Security Informatics (ISI), July 22-24, 2017, Beijing, China

(www.isi-conf.org)

INTRODUCTION

Intelligence and SecurityInformatics (ISI) research is an interdisciplinary research field involvingacademic researchers in information technologies, computer science, publicpolicy, bioinformatics, medical informatics, and social and behavior studies aswell as local, state, and federal law enforcement and intelligence experts, andinformation technology industry consultants and practitioners to supportcounterterrorism and homeland security’s missions of anticipation,interdiction, prevention, preparedness and response to terrorist acts.

The annual IEEE International Conference on ISI (IEEE ISI) was started in 2003 in Tucson, Arizona. Since then,the conference has been hosted in Atlanta, San Diego, New Brunswick, Taipei,Dallas, Vancouver, Beijing, Seattle, Washington DC, the Hague, Baltimore andTucson. Over the past 14 years, the IEEE ISI Conference has evolved from itstraditional orientation of intelligence and security domain towards a moreintegrated alignment of multiple domains, including technology, humans, organization,and security. The scientific community has increasingly recognized the need toaddress intelligence and security threats by understanding theinterrelationships between these different components, and by integratingrecent advances from different domains. This year, the IEEE ISI conference willbe held in Beijing, China.

CONFERENCE THEME & TOPICS

The conference theme isSecurity and Big Data. In addition to the main academic conference, multiplesatellite events centered around the security and big data theme will be organizedas well.


We invite academic researchers in the field of Intelligence and SecurityInformatics and related areas as well as law enforcement and intelligenceexperts, and industry consultants and practitioners in the field to submitpapers and workshop proposals.


ISI 2017 will be organized in four main tracks focusing on:

o  SecurityAnalytics and Threat Intelligence

o  DataScience and Analytics in Security Informatics

o  HumanBehavior and Factors in the Security Applications

o  Organizational,National, and International Issues in Counter-terrorism and other Security Applications

Submissions may includesystems, methodology, test-bed, modeling, evaluation, and policypapers.  Research should be relevant to informatics, organization, publicpolicy, or human behavior in applications of counter-terrorism or protection oflocal/ national/ international security in the physical world and/orcyberspace. Seespecific topic suggestions below.

TOPICSINCLUDE BUT ARE NOT LIMITED TO:

Security Analytics and Threat Intelligence


  • Threat pattern models     and modeling tools
  • Real-time situational     awareness
  • Intrusion and     cybersecurity threat detection and analysis
  • Cyber-physical-social      system security and incident management
  • Computing and networking     infrastructure protection
  • Crime analysis and     prevention
  • Forecasting threats and     measuring the impact of threats
  • Surveillance and     intelligence through unconventional means
  • Information security     management standards
  • Information systems     security policies
  • Mobile and cloud     computing security
  • Big data analytics for     cybersecurity
  • Resilient cyber     infrastructure design and protection


Data Science and Analytics in Security Informatics


  • Data representation and     fusion for security informatics
  • Criminal/intelligence information     extraction
  • Data sharing and     information visualization for security informatics
  • Web-based intelligence     monitoring and analysis
  • Spatial-temporal data     analysis for crime analysis and security informatics
  • Criminal/intelligence     machine learning and data mining
  • Bio-terrorism tracking,     alerting, and analysis
  • Digital forensics and     computational criminology
  • Financial and     accounting  fraud analysis
  • Consumer-generated     content and security-related social media analytics
  • Security-related social     network analysis (radicalization, recruitment, conducting      operations)
  • Authorship analysis and     identification
  • Terrorism related     analytical methodologies and software tools
Human Behavior and Factors in SecurityApplications

  • Behavior     issues in information systems security
  • HCI     and user interfaces of relevance to intelligence and security
  • Social     impacts of crime and terrorism
  • Board     activism and influence
  • Measuring     the effectiveness of counter-terrorism campaigns
  • Citizen     education and training
  • Understanding     user behavior in that has potential security risks
  • Security     risks about user behavior in information systems
  • Human     behavior modeling, representation and prediction for security applications
Organizational, National, and InternationalIssues in Counter-terrorism and other Security Applications

  • Best     practices in counter-terrorism or security protection
  • Information     sharing policy and governance
  • Privacy,     security, and civil liberties issues
  • Emergency     response and management
  • Disaster     prevention, detection, and management
  • Protection     of  transportation and communications infrastructure
  • Communication     and decision support for research and rescue
  • Assisting     citizens' responses to terrorism and catastrophic events
  • Border     security
  • Accounting     and IT auditing
  • Corporate     governance and monitoring
  • Election     fraud and political use and abuse

SUBMISSIONFORMAT AND PUBLICATION

We accept three types of papersubmissions on suggested topics of the proposed tracks and related topics: longpaper (max. 6 pages), short paper (max. 3 pages), and poster (1 page).Submission format is PDF.  Consult the IEEE publications page at
http://www.ieee.org/conferences_events/conferences/publishing/templates.html
for information on formatting. Papers will besubmitted through the EasyChair submission and review system. The submissionWeb page for IEEE ISI 2017:
https://easychair.org/conferences/?conf=ieeeisi2017.

The accepted papers from ISI 2017 and its affiliated workshops will bepublished by the IEEE Press in formal Proceedings. IEEE ISI Proceedings areEI-indexed.

IMPORTANTDATES

Most submissions due: April 10, 2017

Acceptance: May30, 2017

Camera ready copy: June 20, 2017

Authors register: June 20, 2017


Conference: July22-24, 2017


二维码

扫码加我 拉你入群

请注明:姓名-公司-职位

以便审核进群资格,未注明则拒绝

关键词:国际会议 信息学

您需要登录后才可以回帖 登录 | 我要注册

本版微信群
扫码
拉您进交流群
GMT+8, 2026-1-17 03:56