Call for Papers: IEEE Intelligence and Security Informatics (ISI)
Due Date: August 15, 2020
Location: Virtual
Dates: November 9 - 10, 2020
Submission Deadline: August 15, 2020
Website: http://www.isi-conf.org

Conference Chairs: Ahmed Abbasi (U. of Notre Dame), Heng Xu (American U.), 
   and Ryan Wright (U. of Virginia)
Program Chairs: Matt Jensen (U. of Oklahoma), Nan Zhang (American U.), 
   and Sagar Samtani (Indiana U.)
Publication Chairs: Victor Benjamin (Arizona State U.) 
                    Weifeng Li (U. of Georgia)

Intelligence and security informatics (ISI) is an interdisciplinary
field involving academic researchers in information technology, social
and behavioral sciences, computer science, law, and public policy. The
field also includes industry consultants, practitioners, security
managers, and chief information security officers who support physical
and cybersecurity missions at the individual, organizational,
national, and international levels (e.g., anticipation, interdiction,
prevention, preparedness, and response to threats). Since 2003, IEEE
ISI has become a premier vehicle for sharing and disseminating
knowledge pertaining to security informatics, homeland security, AI
for Cybersecurity, and high-impact topics. This year, IEEE ISI will be
delivered in its first ever virtual format. We welcome papers on
topics pertaining to, but not limited to:

Security Analytics and Threat Intelligence
 -       Threat pattern models and modeling tools
 -       Real-time situational awareness
 -       Intrusion and cybersecurity threat detection and analysis
 -       Cyber-physical-social system security and incident management
 -       Computing and networking infrastructure protection
 -       Crime analysis and prevention
 -       Forecasting threats and measuring the impact of threats
 -       Surveillance and intelligence through unconventional means
 -       Information security management standards
 -       Information systems security policies
 -       Mobile and cloud computing security
 -       Big data analytics for cybersecurity
 -       Resilient cyberinfrastructure design and protection

Data Science and Analytics in Security Informatics
 -       Data representation and fusion for security informatics
 -       Criminal/intelligence information extraction
 -       Data sharing and information visualization for security informatics
 -       Web-based intelligence monitoring and analysis
 -       Spatial-temporal data analysis for crime analysis and security
           informatics
 -       Criminal/intelligence machine learning and data mining
 -       Cyberattack and/or bio-terrorism tracking, alerting, and analysis
 -       Digital forensics and computational criminology
 -       Financial and accounting fraud analysis
 -       Consumer-generated content and security-related social media
           analytics
 -       Security-related social network analysis (radicalization,
           fund-raising, recruitment, conducting operations)
 -       Authorship analysis and identification
 -       Security-related analytical methodologies and software tools
           Emerging Topics in AI for Cybersecurity:
 -       Novel deep learning and/or adversarial machine learning methods for
           security
 -       AI-enabled vulnerability assessment and management
 -       Representation, algorithmic, or extrinsic explainable AI for
           cybersecurity
 -       Multi-view learning for fusing multiple cybersecurity data sources
 -       Graph neural network-based approaches for netflow analysis
 -       Risk management and/or uncertainty quantification via deep Bayesian
           learning
 -       Augmented intelligence or human-in-the-loop approaches for SOC
           environments
 -       Cross-lingual analytics for multi-lingual threat detection
 -       Adversarial malware evasion and detection
 -       AI approaches for IoT fingerprinting, telescopes, and measurements
 -       Automated misinformation/disinformation detection

Human Behavior and Factors in Security Applications
 -       Behavior issues in information systems security
 -       User interventions and training for secure computing
 -       Human-computer interaction and user interfaces of relevance to
           intelligence and security
 -       Social impacts of crime, cybercrime, and/or terrorism
 -       Board activism and influence
 -       Measuring the effectiveness of security interventions
 -       Citizen and employee education and training
 -       Understanding user behavior (e.g. compliance, susceptibility, and
           accountability)
 -       Security risks related to user behaviors/interactions with
           information systems
 -       Human behavior modeling, representation, and prediction for
           security applications Organizational, National, and International
           Security Applications
 -       Best practices in security protection
 -       Information sharing policy and governance
 -       Privacy, security, and civil liberties issues
 -       Emergency response and management
 -       Disaster prevention, detection, and management
 -       Protection of transportation and communications infrastructure
 -       Communication and decision support for research and rescue
 -       Assisting citizens' responses to cyber attacks, terrorism, 
           and catastrophic events
 -       Accounting and IT auditing and fraud detection
 -       Corporate governance and monitoring
 -       Election fraud and political use and abuse
 -       Machine learning for the developing world
 -       AI methods and applications for humanitarian efforts

Submission Guidelines

All papers must be original and not simultaneously submitted to
another journal or conference. Each manuscript must clearly articulate
their data (e.g., key metadata, statistical properties, etc.),
analytical procedures (e.g., representations, algorithm details,
etc.), and evaluation set up and results (e.g., performance metrics,
statistical tests, case studies, etc.). Making data, code, and
processes publicly available to facilitate scientific reproducibility
is not required, but is strongly encouraged. The following paper
categories are welcome:

Paper Format
 -       Long paper (maximum of 6 pages)
 -       Short paper (maximum of 3 pages)
 -       Poster (1 page)

Consult the IEEE publications page at
https://www.ieee.org/conferences/publishing/templates.html<https://www.ieee.org/conferences/publishing/templates.htmlf>
for formatting requirements.

All submissions must be PDF.

Accepted paper will be presented by an IEEE member. 2020 IEEE ISI
proceedings will be published by the IEEE Press in formal
proceedings. IEEE ISI Proceedings are EI-indexed. Selected papers may
also be encouraged to submit to a special issue at IEEE Transactions
on Dependable and Secure Computing (TDSC) pertaining to Explainable AI
for Cyber Threat Intelligence (XAI-CTI) or considered for IEEE
Intelligent Systems and ACM Transactions on Management Information
Systems.

Important Dates
Submission Deadline: August 15, 2020
Notification of Acceptance to Authors: October 01, 2020
Camera-ready Due Date: October 15, 2020

Please contact Victor Benjamin for any questions about paper
submissions at Victor.Benjamin@asu.edu

Please contact Amanda Morris for any questions about conference
logistics at aem8z@comm.virginia.edu