ISI’11 将和 2011年国际电气电子工程师学会汽车电子与安全国际会议(ICVES’11)以及2011年国际电气电子工程师学会服务运筹、物流与信息化国际会议(SOLI’11)同时召开。
情报与安全信息学国际会议 (ISI’11) 是由国际电气电子工程师学会智能交通系统委员会主办的年度会议。会议目的是为情报与安全信息学领域的研究者和工程师们提供该领域内原创科学的沟通机会,探讨情报与安全信息学的研究与应用。ISI’11 欢迎情报与安全信息学各个研究方向的文章。
征文范围
有关系统、方法、测试平台、建模、评估、政策和定位等方面的文章均可投稿。研究内容要求跟信息学,组织,公共反恐政策,地区/国家/国际物理和网络空间安全防护等相关。会议主题包括但不限于:
• 信息共享和数据/文本挖掘 —— 情报相关知识发现 ● 计算机或网络犯罪调查和数字取证 ● 罪犯调查的准则和计算机犯罪过程标准 ● 罪犯数据挖掘和网络分析 ● 犯罪预报及影响 ● 罪犯/情报信息共享及可视化 ● 犯罪模式识别及建模工具 ● 基于网络的情报监控和分析 ● 时空数据分析/犯罪分析和安全信息学中的GIS ● 欺骗和意图检测 ● 网络犯罪检测与分析 ● 署名权分析与鉴定 ● 数字图书馆技术在情报数据处理、保存、共享和分析中的应用 ● 情报共享中的智能体和协同系统 ● 情报与安全相关HCI及用户接口 ● 信息共享政策与管治 ● 隐私,安全与公民自由 ● 情报-计算机化社区安全与监控系统
• 基础设施防护和应急 —— 网络-物理-社会系统安全和突发事件管理 ● 网络基础设施设计和防护 ● 入侵检测 ● 生物-恐怖主义攻击,预警和分析 ● 生物-恐怖主义信息基础设施 ● 交通及通信基础设施防护 ● 边境/交通安全 ● 法律执行决策支持系统 ● 应急与管理 ● 灾难预防,检测及管理 ● 搜救通信和决策支持 ● 公民应对恐怖主义和灾难性事件辅助 ● 计算机取证及罪犯发现 ● 反欺诈信息技术
• 反恐信息学(恐怖信息学) —— 恐怖主义相关分析方法和软件工具 ● 恐怖主义知识门户和数据库 ● 恐怖事件年表数据库 ● 恐怖主义产生根源分析 ● 社会网络分析(激进、招募、传导) ● 可视化和仿真 ● 恐怖活动预测 ● 反恐 ● 恐怖主义社会影响测量 ● 反恐效果测量 ● 犯罪情报及网络犯罪调查 ● 移民及安全
• 企业风险管理和信息系统安全 —— 信息安全管理标准 ● 信息系统安全政策 ● 安全信息学中的行为问题 ● 欺诈检测 ● 网络犯罪及社会影响 ● 公司运营关注及风险 ● 会计和IT审计 ● 公司治理和监管 ● 董事会行动及影响 ● 公司情感监控 ● 市场影响分析及媒体情报 ● 消费者生成媒体及社会媒体分析
论文提交
所有被大会收录的论文全部收录到IEEE数据库中,并被EI、ISTP检索,提交的论文文字必须是英文。
CALL FOR PAPERS
2011 IEEE International Conference on Intelligence and Security Informatics
(IEEE ISI’2011)
July 10-12, 2011, Beijing, China
Sponsored by the IEEE Intelligent Transportation Systems Society
Venue ISI’11 will be held together along with 2011 IEEE International Conference on Service Operations and Logistics, and Informatics (IEEE SOLI 2011) and 2011 IEEE International Conference on Vehicular Electronics and Safety (IEEE ICVES 2011).
Conference Scope and Themes Intelligence and Security Informatics (ISI) research is an interdisciplinary research field involving academic researchers in information technologies, computer science, public policy, bioinformatics, medical informatics, and social and behavior studies as well as local, state, and federal law enforcement and intelligence experts, and information technology industry consultants and practitioners to support counterterrorism and national/international security missions of anticipation, interdiction, prevention, preparedness and response to terrorist acts.
Areas of Interest Submissions may include systems, methodology, testbed, modeling, evaluation, policy, and position papers. Research should be relevant to informatics, organization, and/or public policy in applications of counter-terrorism or protection of local/ national/ international security in the physical world and/or cyberspace. Topics include but are not limited to:
• Information Sharing and Data/Text Mining - Intelligence-related knowledge discovery ● Computer or cyber crime investigations and digital forensics ● Criminal investigative criteria and standard of procedure on Computer crime ● Criminal data mining and network analysis ● Forecasting crime and the impact of crime ● Criminal/ intelligence information sharing and visualization ● Crime pattern recognition and modeling tools ● Web-based intelligence monitoring and analysis ● Spatial-temporal data analysis/GIS for crime analysis and security informatics ● Deception and intent detection ● Cyber-crime detection and analysis ● Authorship analysis and identification ● Applications of digital library technologies in intelligence data processing, preservation, sharing, and analysis ● Agents and collaborative systems for intelligence sharing ● HCI and user interfaces of relevance to intelligence and security ● Information sharing policy and governance ● Privacy, security, and civil liberties issues ● Intelligence-computerized community security and surveillance system
• Infrastructure Protection and Emergency Responses - Cyber-Physical-Social system security and incident management ● Cyber-infrastructure design and protection ● Intrusion detection ● Bio-terrorism tracking, alerting, and analysis ● Bio-terrorism information infrastructure ● Transportation and communication infrastructure protection ● Border/transportation safety ● Law Enforcement decision support systems ● Emergency response and management ● Disaster prevention, detection, and management ● Communication and decision support for search and rescue ● Assisting citizens" responses to terrorism and catastrophic events ● Computer forensics and crime lead discovery ● Anti-fraud information technology
• Terrorism Informatics - Terrorism related analytical methodologies and software tools ● Terrorism knowledge portals and databases ● Terrorist incident chronology databases ● Terrorism root cause analysis ● Social network analysis (radicalization, recruitment, conducting operations), visualization, and simulation ● Forecasting terrorism ● Countering terrorism ● Measuring the impact of terrorism on society ● Measuring the effectiveness of counter-terrorism campaigns ● Crime intelligence and cyberspace crime investigation ● Immigration and security
• Enterprise Risk Management and Information Systems Security - Information security management standards ● Information systems security policies ● Behavior issues in information systems security ● Fraud detection ● Cyber crime and social impacts ● Corporate going concerns and risks ● Accounting and IT auditing ● Corporate governance and monitoring ● Board activism and influence ● Corporate sentiment surveillance ● Market influence analytics and media intelligence ● Consumer-generated media and social media analytics
Important Dates
March 15, 2011
Paper submission deadline
April 15, 2011
Notification of acceptance
April 22, 2011
Camera-ready copy due
For detail and most updated information, please visit the conference web site at