Conference Information
ISI'' 2020: IEEE International Conference on Intelligence and Security Informatics
http://www.isi-conf.org/
Submission Date:
2020-08-15 Extended
Notification Date:
2020-10-01
Conference Date:
2020-11-16
Location:
Washington DC, USA
Years:
18
Viewed: 7217   Tracked: 6   Attend: 0

Conference Location
Call For Papers
Intelligence and security informatics (ISI) is an interdisciplinary field involving academic researchers in information technology, social and behavioral sciences, computer science, law, and public policy. The field also includes industry consultants, practitioners, security managers, and chief information security officers who support physical and cybersecurity missions at the individual, organizational, national, and international levels (e.g., anticipation, interdiction, prevention, preparedness, and response to threats).

CONFERENCE THEME & TOPICS:

The conference theme is AI and analytics for sociotechnical security solutions. In addition to the main academic conference, multiple satellite events centered around the AI-enabled analytics theme will be offered.

We invite academic researchers in the field of ISI and related areas, as well as IT, security, and analytics professionals; intelligence experts; and industry consultants and practitioners in the field, to submit papers and workshop proposals.

ISI 2020 submissions may include empirical, behavioral, systems, methodology, test-bed, modeling, evaluation, and policy papers. Research should be relevant to informatics, organizations, public policy, or human behavior in applications of security or protection of local/national/international security in the physical world, cyber-physical systems, and/or cyberspace. 

​​TOPICS INCLUDE BUT ARE NOT LIMITED TO:

Security Analytics and Threat Intelligence

    Threat pattern models and modeling tools
    Real-time situational awareness
    Intrusion and cybersecurity threat detection and analysis
    Cyber-physical-social system security and incident management
    Computing and networking infrastructure protection
    Crime analysis and prevention
    Forecasting threats and measuring the impact of threats
    Surveillance and intelligence through unconventional means
    Information security management standards
    Information systems security policies
    Mobile and cloud computing security
    Big data analytics for cybersecurity
    Machine learning for cybersecurity
    Artificial Intelligence for cybersecurity
    Resilient cyber infrastructure design and protection

Data Science and Analytics in Security Informatics

    Data representation and fusion for security informatics
    Criminal/intelligence information extraction
    Data sharing and information visualization for security informatics
    Web-based intelligence monitoring and analysis
    Spatial-temporal data analysis for crime analysis and security informatics
    Criminal/intelligence machine learning and data mining
    Cyber attack and/or bio-terrorism tracking, alerting, and analysis
    Digital forensics and computational criminology
    Financial and accounting fraud analysis
    Consumer-generated content and security-related social media analytics
    Security-related social network analysis (radicalization, fund-raising, recruitment, conducting operations)
    Authorship analysis and identification
    Security-related analytical methodologies and software tools

Human Behavior and Factors in Security Applications

    Behavior issues in information systems security
    Human-computer interaction and user interfaces of relevance to intelligence and security
    Social impacts of crime, cybercrime, and/or terrorism
    Board activism and influence
    Measuring the effectiveness of security interventions
    Citizen and employee education and training
    Understanding user behavior (e.g. compliance, susceptibility, and accountability)
    Security risks related to user behaviors/interactions with information systems
    Human behavior modelling, representation and prediction for security applications

Organizational, National, and International Security Applications

    Best practices in security protection
    Information sharing policy and governance
    Privacy, security, and civil liberties issues
    Emergency response and management
    Disaster prevention, detection, and management
    Protection of transportation and communications infrastructure
    Communication and decision support for research and rescue
    Assisting citizens' responses to cyber attacks, terrorism, and catastrophic events
    Accounting and IT auditing and fraud detection
    Corporate governance and monitoring
    Election fraud and political use and abuse
    Machine learning for the developing world
    AI methods and applications for humanitarian efforts
Last updated by Dou Sun in 2020-06-18
Related Conferences
CCFCOREQUALISShortFull NameSubmissionNotificationConference
ICCANSInternational Conference on Computer Applications and Network Security2011-04-112011-04-152011-05-27
b1AICTAdvanced International Conference on Telecommunications2020-05-182020-07-182020-09-27
ICICNInternational Conference on Information and Computer Networks2014-12-302015-01-252015-03-19
NCCCNational Conference on Cognitive Computing2019-01-102019-02-102019-03-22
SALENTO AVRInternational Conference on Augmented Reality, Virtual Reality and Computer Graphics2019-02-152019-03-222019-06-24
ICoIASInternational Conference on Intelligent Autonomous Systems2019-12-252020-01-102020-02-26
ICAIPInternational Conference on Advances in Image Processing2020-09-202020-10-102020-11-13
MSMEInternational Conference on Materials Science and Manufacturing Engineering2020-10-052020-10-202020-11-05
WICTWorld Congress on Information and Communication Technologies2012-08-312012-09-202012-10-27
ISCISATInternational Seminar on Computer Information Science and Application Technology2018-09-23 2018-09-28
Recommendation