posted by system || 7221 views || tracked by 12 users: [display]

PAISI 2012 : Pacific Asia Workshop on Intelligence and Security Informatics

FacebookTwitterLinkedInGoogle


Conference Series : Pacific Asia Workshop on Intelligence and Security Informatics
 
Link: http://www.fbe.hku.hk/~mchau/paisi/2012
 
When May 29, 2012 - May 29, 2012
Where Kuala Lumpur, Malaysia
Submission Deadline Jan 13, 2012
Categories    security
 

Call For Papers

------------------------------------------------------------------
Pacific Asia Workshop on Intelligence and Security Informatics
***** PAISI 2012 *****

(to be held in conjunction with PAKDD 2012)

Workshop Website: http://www.business.hku.hk/paisi/2012/

May 29, 2012, Kuala Lumpur, Malaysia
------------------------------------------------------------------

Important Dates
===============
Submission due: January 13, 2012
Notification of acceptance: February 10, 2012
Camera-ready copy due: February 24, 2012

Workshop Scope
==============
Intelligence and Security Informatics (ISI) is concerned with the
study of the development and use of advanced information technologies
and systems for national, international, and societal security-related
applications. The annual IEEE International Conference series on ISI
was started in 2003. In 2006, the Workshop on ISI was started in
Singapore in conjunction with PAKDD, with most contributors and
participants from the Pacific Asian region. Since then, PAISI was held
annually in Chengdu (2007), Taipei (2008), Bangkok (2009), Hyderabad
(2010), and Beijing (2011). This year, PAISI 2012 will once again be
held in conjunction with PAKDD and will provide a stimulating forum
for ISI researchers in Pacific Asia and other regions of the world to
exchange ideas and report research progress.

Paper Submission/Areas of Interest
==================================
Submissions may include systems, methodology, testbed, modeling,
evaluation, and policy papers. Topics include but are not limited to:

I. Information Sharing and Data/Text Mining
- Intelligence-related knowledge discovery
- Criminal data mining and network analysis
- Criminal/intelligence information sharing and visualization
- Web-based intelligence monitoring and analysis
- Spatio-temporal data analysis/GIS for crime analysis and security
informatics
- Cyber-crime detection and analysis
- Authorship analysis and identification
- Privacy and civil liberties issues
- Text processing and mining for Pacific Asian Languages

II. Infrastructure Protection and Emergency Responses
- Public/animal health and bioterrorism information infrastructure
- Transportation and communication infrastructure protection
- Cyber-infrastructure design and protection
- Intrusion detection
- Border/transportation safety
- Emergency response and management
- Disaster prevention, detection, and management
- Communication and decision support for search and rescue

III. Terrorism Informatics
- Terrorism related analytical methodologies and software tools
- Terrorism knowledge portals and databases
- Social network analysis (radicalization, recruitment, conducting
operations), visualization, and simulation
- Forecasting terrorism
- Countering terrorism
- Measuring the impact of terrorism on society

IV. Enterprise Risk Management and Information Systems Security
- Information systems security policies
- Behavior issues in information systems security
- Fraud detection
- Corporate going concerns and risks
- Accounting and IT auditing
- Corporate governance and monitoring
- Board activism and influence
- Corporate sentiment surveillance
- Market influence analytics and media intelligence
- Consumer-generated media and social media analytics

Long papers (15-page) and short papers (8-page) in English may be
submitted electronically via the online submission site
(http://www.easychair.org/conferences/?conf=paisi2012). Submission
file formats are PDF, Microsoft Word, or LaTeX. We are in the process
of making arrangements with Springer to publish accepted PAISI 2012
papers in its Lecture Notes in Computer Science (LNCS) series
(indexed by EI Compendex, ISI Proceedings, and Scopus), same as all
past PAISI proceedings including WISI 2006 and PAISI 2007 to 2011.
Required LNCS Microsoft Word/LaTeX templates can be found on the
workshop website.

Hosts and Major Sponsors
========================
The University of Arizona
The University of Hong Kong

Workshop Organizing Co-chairs
=============================
Hsinchun Chen, The University of Arizona
Michael Chau, The University of Hong Kong
G. Alan Wang, Virginia Tech
Wei Thoo Yue, City University of Hong Kong

Related Resources

IEEE COINS 2022   IEEE COINS 2022: Hybrid (3 days on-site | 2 days virtual)
IEEE COINS 2022   Internet of Things IoT | Artificial Intelligence | Machine Learning | Big Data | Blockchain | Edge & Cloud Computing | Security | Embedded Systems |
S&P 2022   IEEE Symposium on Security and Privacy (Third deadline)
EvoCompAISecurity&Privacy 2022   Evolutionary Computing for AI-Driven Security and Privacy: Advancing the state-of-the-art applications
CEVVE 2022   2022 International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2022)
Sensors Special Issue 2022   Artificial Intelligence in Medical Sensors II
CSW 2022   2022 International Workshop on Cyber Security (CSW 2022)
Sensors 2022   Sustainable Computing based on Internet of Things Empowered with Artificial Intelligence and Blockchain
CCNET 2022   9th International Conference on Computer Networks & Communications
AI Meets Cybersecurity 2022   Call for Papers: AI Meets Cybersecurity from Journal of Intelligent Information Systems