Gondy Leroy: Dr. Gondy Leroy is Associate Professor at the University of Arizona. Her areas of expertise include natural language processing and text mining and text analytics, medical and biomedical informatics, and human computer interaction. She has received numerous grants and awards for research in text mining and text analytics, as well as for developing and supporting educational initiatives to improve diversity in IT.
WOMEN IN CYBERSECURITY SPECIAL TOPIC
Ambareen Siraj: Dr. Siraj is Associate Professor in Computer Science at Tennessee Tech University in Cookeville, TN. She is the founder of the annual “Women in Cybersecurity” conference sponsored by the National Science Foundation. Dr. Siraj teaches computer security, and programming and software engineering courses. Her research interests include network security, security in smart grid, and security education.
Accepted papers and posters will be included in the formal ISI conference proceedings published by the IEEE Press. IEEE ISI Proceedings are EI-indexed. Having your paper accepted at an IEEE conference is a great way to promote your work and learn from others.
Bhavani Thuraisingham: Dr. Thuraisingham is Louis A. Beecherl, Jr. Distinguished Professor in the Department of Computer Science at the University of Texas at Dallas. Her research has included innovations in secure cloud data management and big data analytics tools, and developing solutions to semantic web-based policy management for information sharing among organizations, among other areas. She teaches in data and applications security, digital forensics, trustworthy web services, secure cloud computing, and in other areas of information and computer security.
Copyright 2016, Arizona Board of Regents, University of Arizona, and the 2016 IEEE International Conference on Intelligence and Security Informatics. All rights reserved.
Women in Cybersecurity is being offered at ISI as a special topic for the first time. Conference organizers are especially interested in encouraging first-time authors to participate. The committee invites students, academic researchers, industry consultants, practitioners in the field, law enforcement and intelligence experts, engineers, and anyone else working in the broad field of cybersecurity to submit a paper or poster!
The 2 1/2 day conference program will allow participants to interact with women who have followed varied IT career paths and to learn about educational and other opportunities specifically in cybersecurity. A specal session will round out the program. Throughout the conference, participants will have the opportunity to network with professionals and peers; participate in scientific, technical, and educational information exchange; and appreciate the important roles woman play in all aspects of cybersecurity!
All papers and posters must have at least one author registered and presenting at the conference. Authors must register by the date listed above in "Important Dates" to ensure that their papers and/or posters will be published in the conference proceedings and can be presented at the conference. Authors not registering by that day may be dropped from the program and their papers/posters dropped from the conference proceedings. All registered authors receive a free copy of the conference proceedings.
Intelligence and Security Informatics
For more information, contact Cathy Larson, workshop and conference coordinator, at firstname.lastname@example.org.