posted by user: bliu2000 || 4755 views || tracked by 7 users: [display]

ISI-KDD 2010 : ACM SIGKDD Workshop on Intelligence and Security Informatics 2010

FacebookTwitterLinkedInGoogle

Link: http://www.ischool.drexel.edu/isi-kdd2010
 
When Jul 25, 2010 - Jul 25, 2010
Where Washington, DC, USA
Submission Deadline May 4, 2010
Notification Due May 21, 2010
Final Version Due Jun 1, 2010
Categories    security
 

Call For Papers

ACM SIGKDD Workshop on Intelligence and Security Informatics 2010 (ISI-KDD 2010)
held in conjunction with the 16th ACM SIGKDD Conference on Knowledge Discovery and Data Mining 2010
(http://www.ischool.drexel.edu/isi-kdd2010/)

July 25, 2010
Washington, DC, USA

Important Dates:
Submission date for papers: May 4, 2010
Author notification: May 21, 201
Submission of camera-ready papers: June 1, 2010

Intelligence and Security Informatics (ISI) is concerned with the study of the development and use of advanced information technologies and systems for national, international, and societal security-related applications. ISI is an interdisciplinary research field involving academic researchers in information technologies, computer science, public policy, bioinformatics, medical informatics, and social and behavior studies as well as local, state, and federal law enforcement and intelligence experts, and information technology industry consultants and practitioners to support counterterrorism and homeland security missions of anticipation, interdiction, prevention, preparedness and response to terrorist acts.

Topic of Interest:
I. Information Sharing and Data/Text/Web Mining
Intelligence-related knowledge discovery
Criminal data mining and network analysis
Criminal/intelligence information sharing and visualization
Web-based intelligence monitoring and analysis
Spatial-temporal data analysis/GIS for crime analysis and security informatics
Deception and intent detection
Cyber-crime detection and analysis
Authorship analysis and identification
Agents and collaborative systems for intelligence sharing
HCI and user interfaces of relevance to intelligence and security
Information sharing policy and governance
II. Infrastructure Protection and Emergency Responses
Public/animal health and bioterrorism information infrastructure
Transportation and communication infrastructure protection
Cyber-infrastructure design and protection
Intrusion detection
Border/transportation safety
Emergency response and management
Disaster prevention, detection, and management
Communication and decision support for search and rescue
Assisting citizens? responses to terrorism and catastrophic events
III. Terrorism Informatics
Terrorism related analytical methodologies and software tools
Terrorism knowledge portals and databases
Terrorist incident chronology databases
Terrorism root cause analysis
Social network analysis, visualization, and simulation
Forecasting terrorism
Countering terrorism
Measuring the impact of terrorism on society
Measuring the ?effectiveness of counter-terrorism campaigns
IV. Enterprise Risk Management and Information Systems Security
Information security management standards
Information systems security policies
Behavior issues in information systems security
Fraud detection
Cyber crime and social impacts
Corporate going concerns and risks
Accounting and IT auditing
Corporate governance and monitoring
Board activism and influence
Corporate sentiment surveillance
Market influence analytics and media intelligence
Consumer-generated media and social media analytics


ISI-KDD Challenge

In addition, we are also organizing the ISI-KDD Challenge, participants are challenged to ?find the more radical and infectious threads, members, postings, ideas and ideologies? in a Dark Web Portal of several complete multi-year extremist forums. Participants of the workshop will be granted access to more than 1,000,000 messages and postings by these radical members.

Participants are free to develop novel computational techniques and algorithms, e.g., linguistic analysis, topic extraction, multilingual text parsing, sentiment analysis, social network analysis, time-series analysis, etc. for the challenge. Participants are requested to describe their methods and results in papers. A panel of terrorism study experts will help evaluate the validity and value of the computing results.


Workshop Chairs:

Hsinchun Chen (The University of Arizona, Tucson, USA)
Christopher C. Yang (College of Information Science and Technology, Drexel Univ., USA)


Submission Instructions

Manuscripts should be in English and must not exceed 10 pages using the standard ACM format found at http://www.acm.org/sigs/publications/proceedings-templates in PDF format.

Please make submission through the online submission system at:
http://www.easychair.org/conferences/?conf=isikdd2010


Publication

All submitted papers will be refereed for quality and originality by the Program Committee. Papers accepted for presentation at the workshop will be published in the workshop proceedings, which will be included in the ACM Digital Library.


Contacts

For general inquiries about the workshop, please contact:
Christopher C. Yang
Drexel University
College of Information Science and Technology
3141 Chestnut Street
Philadelphia, PA 19104
USA
Email: chris.yang(-AT-)ischool.drexel.edu

Related Resources

KDD 2024   30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining
CSW 2024   2024 3rd International Conference on Cyber Security
ACM AICCC 2024   ACM--2024 7th Artificial Intelligence and Cloud Computing Conference (AICCC 2024)
CEVVE 2024   2024 2nd International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2024)
IEEE-JBHI (SI) 2024   Special Issue on Revolutionizing Healthcare Informatics with Generative AI: Innovations and Implications
IOTCB 2024   3rd International Conference on IOT, Cloud and Big Data
ACM ICNCC 2024   ACM--2024 The 13th International Conference on Networks, Communication and Computing (ICNCC 2024)
CSITY 2024   10th International Conference on Computer Science, Engineering and Information Technology
InCIT 2024   The 8th International Conference on Information Technology
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust