Workshop on Intelligence and Security Informatics for International Security (IIS'16)
Threats to our societies, governments and commercial infrastructures are very real due to the growth of terrorism, criminal networks and cyber-attacks. These threats are high precedence in government strategy planning. The science of Intelligence and Security Informatics (ISI) focuses on the development of advanced information technologies, systems, algorithms, and databases for international, national and homeland security related applications, through an integrated technological, organizational, and policy-based approach.
With the continuous advance of IT technologies and the increasing sophistication of national and international security, in recent years, new directions in ISI research and applications have emerged to address complicated problems with advanced technologies. The goal of International Workshop on Intelligence and Security Informatics for International Security (IIS) is to gather people from previously disparate communities to provide a stimulating forum for exchange of ideas and results. The past editions were co-located with the International Conference on Security in Computer Networks and Distributed Systems (SNDS).
We invite academic researchers, law enforcement and intelligence experts, as well as information technology companies, industry consultants and practitioners in the fields involved to submit original and unpublished work. Authors should submit their papers online. Further instructions for submission are posted at http://acn-conference.org/sscc2016/submission.html
All papers that conform to submission guidelines will be peer reviewed and evaluated based on originality, technical and/or research content/depth, correctness, relevance to conference, contributions, and readability. Acceptance of papers will be communicated to authors by email. All accepted papers will be published in the Conference proceedings.
The workshop provides a venue to present early work in the relevant areas. Topics of interest include, but are not limited to, the following:
- Agents and collaborative systems for intelligence sharing
- Bio-terrorism tracking, alerting, and analysis
- Computer or cybercrime investigations and digital forensics
- Consumer-generated media and social media analytics
- Corporate sentiment surveillance
- Crime pattern recognition and modeling tools
- Criminal/ intelligence information sharing and visualization
- Criminal data mining and network analysis
- Critical infrastructure protection
- Cybercrime and social impacts, Cyber-crime detection and analysis
- Deception and intent detection
- Disaster prevention, detection, and management
- Emergency response and management
- Forecasting and countering terrorism
- Immigration and security
- Information security management standards
- Intelligence-related knowledge discovery
- Link analysis and network mining
- Measuring the impact of terrorism on society
- Privacy, security, and civil liberties issues
- Quantification of threats and risks
- Social network analysis
- Authorship analysis and Attribution
- Surveillance and Reconnaissance infrastructure
- Terrorism knowledge portals and databases
- Text mining and Web mining applied to blogs and Web communities
- Web-based intelligence monitoring and analysis
- Recognition of secure patterns
- Adversarial active learning
- Secure machine learning
- Natural language processing for security
- Big data analytics for security
Technical Program Committee
- Alireza Abdollahpouri, University of Hamburg, Germany
- Mohamad Kasim Abdul Jalil, Universiti Teknologi Malaysia (UTM), Malaysia
- Thomas Chen, City University London, United Kingdom
- Chawki Djeddi, University of Tebessa, Algeria
- Suzanne McIntosh, New York University, USA
- Dmitry Zaitsev, International Humanitarian University, Ukraine
Key Dates
Full Paper Submission Ends | June 25, 2016 |
Acceptance Notification | July 15, 2016 |
Final paper Deadline | July 31, 2016 |