Submission is now closed.
Submission
guidelines:
The online submission system is at https://www.easychair.org/conferences/?conf=paisi2019
All papers must be submitted through the system.
Long papers (12 pages),
and short papers (6 pages), following the Springer LNAI paper templates
in English, may be submitted electronically via the site above.
Submission file formats are PDF or
Microsoft Word.
Selected
PAISI 2019 papers will be published in Springer's Lecture Notes in Artificial Intelligence (LNAI)
series, which is indexed by EI Compendex, ISI Proceedings, and Scopus.
Microsoft Word/LaTeX templates for the required Springer LNCS format can be found
here.
Submissions
may include systems, methodology,
testbed, modeling, evaluation, and
policy papers. Research should be
relevant to both informatics and
national/international security.
Topics include but are not limited
to:
I. Information Sharing and Big Data Analytics
- Intelligence-related
knowledge discovery
- Big data analytics and mining
- Criminal data
mining and network analysis
- Criminal/intelligence information sharing and visualization
- Web-based
intelligence monitoring and analysis
- Spatio-temporal data
analysis/GIS for crime analysis and security informatics
- Cyber-crime
detection and analysis
- Authorship
analysis and identification
- Privacy and civil liberties issues
-
Text processing and mining
II.
Infrastructure Protection and Emergency Responses
- Public health and bioterrorism information infrastructure
- Transportation
and communication infrastructure protection
- Cyber-infrastructure
design and protection
- Intrusion
detection
- Border/transportation
safety
- Emergency
response and management
- Disaster
prevention, detection, and management
- Communication and
decision support for search and rescue
- Infrastructure for big data analytics
III.
Cybercrime and Terrorism Informatics and Analytics
- Cyber-crime and social impacts
- Terrorism related
analytical methodologies and software tools
- Terrorism
knowledge portals and databases
- Social network
analysis (radicalization, recruitment, conducting
operations), visualization, and simulation
- Forecasting
terrorism
- Countering
terrorism
- Measuring the
impact of terrorism on society
- Computer forensics
IV.
Enterprise Risk Management, IS Security, and Social Media Analytics
- Information systems security policies
- Behavior issues in information systems security
- Fraud detection and deception detection
- Viruses and malware
- Corporate ongoing concerns and risks
- Accounting and IT auditing
- Corporate governance and monitoring
- Board activism and influence
- Corporate sentiment surveillance
- Market influence analytics and media intelligence
- Consumer-generated media and social media analytics
|