ntelligence and Security Informatics (ISI)is an interdisciplinary research field involving academic researchers in information technologies, computer science, public policy, bioinformatics, medical informatics, and social and behavior studies; local, state, and federal law enforcement and intelligence experts; and information technology industry consultants and practitioners. ISI supports counterterrorism and homeland security’s missions of anticipation, prevention, preparedness and response to security events, in physical, cyber, enterprise, and societal spaces. The 2016 conference will be held in Tucson, Arizona. This year, special workshops will provide participants with even more opportunities for information exchange, networking, and cross-domain problem-solving. We invite academic researchers in the field of Intelligence and Security Informatics and related areas, as well as law enforcement and intelligence experts, and industry consultants and practitioners in the field, to submit papers and workshop proposals.
Cybersecurity Analytics and Threat Intelligence
Threat pattern models and modeling tools
Real-time situational awareness
Intrusion and cybersecurity threat detection and analysis
Cyber-physical-social system security and incident management
Computing and networking infrastructure protection
Cybercrime analysis and prevention
Forecasting threats and measuring the impact of threats
Surveillance and intelligence through unconventional means
Information security management standards
Information systems security policies
Mobile and cloud computing security
Big data analytics for cybersecurity
Resilient cyber infrastructure design and protection
Data Science and Analytics in Security Informatics
Data representation and fusion for security informatics
Criminal/intelligence information extraction
Data sharing and information visualization for security informatics
Web-based intelligence monitoring and analysis
Spatial-temporal data analysis for crime analysis and security informatics
Criminal/intelligence machine learning and data mining
Bio-terrorism tracking, alerting, and analysis
Digital forensics and computational criminology
Financial and accounting fraud analysis
Consumer-generated content and security-related social media analytics
Security-related social network analysis (radicalization, recruitment, conducting operations)
Authorship analysis and identification
Terrorism related analytical methodologies and software tools
Human Behavior and Factors in Security Applications
Behavior issues in information systems security
HCI and user interfaces of relevance to intelligence and security
Social impacts of cybercrime and terrorism
Board activism and influence
Measuring the effectiveness of counter-terrorism campaigns
Citizen education and training
Understanding user behavior in that has potential security risks
Security risks about user behavior in information systems
Human behavior modeling, representation and prediction for security applications
Organizational, National, and International Issues in Counter-terrorism and other Security Applications
Best practices in counter-terrorism or security protection
Information sharing policy and governance
Privacy, security, and civil liberties issues
Emergency response and management
Disaster prevention, detection, and management
Protection of transportation and communications infrastructure
Communication and decision support for research and rescue
Assisting citizens' responses to terrorism and catastrophic events
Border security
Accounting and IT auditing
Corporate governance and monitoring
Election fraud and political use and abuse
09月27日
2016
09月30日
2016
摘要截稿日期
初稿截稿日期
初稿录用通知日期
终稿截稿日期
注册截止日期
2025年07月12日 香港-中国 Hongkong
2025 IEEE International Conference on Intelligence and Security Informatics (ISI)2017年07月22日 中国 Beijing
2017 IEEE International Conference on Intelligence and Security Informatics2015年05月26日 美国
2015年IEEE情报与安全信息学国际会议
留言