Beijing, China

July 22-24, 2017

IEEE

For more information, contact Cathy Larson, workshop and conference coordinator, at ailab@email.arizona.edu.

Gondy Leroy: Dr. Gondy Leroy is Associate Professor at the University of Arizona. Her areas of expertise include natural language processing and text mining and text analytics, medical and biomedical informatics, and human computer interaction. She has received numerous grants and awards for research in text mining and text analytics, as well as for developing and supporting educational initiatives to improve diversity in IT.

  • Papers Due: June 3, 2016
  • Poster Abstracts Due: June 3, 2016
  • Acceptance Notification: July 15, 2016
  • Camera ready copy: August 19, 2016
  • Authors register: August 19, 2016
  • Conference Dates: September 28-30, 2016

WOMEN IN CYBERSECURITY SPECIAL TOPIC

Ambareen Siraj: Dr. Siraj is Associate Professor in Computer Science at Tennessee Tech University in Cookeville, TN. She is the founder of the annual “Women in Cybersecurity” conference sponsored by the National Science Foundation. Dr. Siraj teaches computer security, and programming and software engineering courses. Her research interests include network security, security in smart grid, and security education.

Accepted papers and posters will be included in the formal ISI conference proceedings published by the IEEE Press. IEEE ISI Proceedings are EI-indexed. Having your paper accepted at an IEEE conference is a great way to promote your work and learn from others.

Bhavani Thuraisingham: Dr. Thuraisingham is Louis A. Beecherl, Jr. Distinguished Professor in the Department of Computer Science at the University of Texas at Dallas. Her research has included innovations in secure cloud data management and big data analytics tools, and developing solutions to semantic web-based policy management for information sharing among organizations, among other areas. She teaches in data and applications security, digital forensics, trustworthy web services, secure cloud computing, and in other areas of information and computer security.

Copyright 2016, Arizona Board of Regents, University of Arizona, and the 2016 IEEE International Conference on Intelligence and Security Informatics. All rights reserved.

Important Dates



Women in Cybersecurity is being offered at ISI as a special topic for the first time.  Conference organizers are especially interested in encouraging first-time authors to participate. The committee invites students, academic researchers, industry consultants, practitioners in the field, law enforcement and intelligence experts, engineers, and anyone else working in the broad field of cybersecurity to submit a paper or poster!









PROGRAM OUTLINE:

The 2 1/2 day conference program will allow participants to interact with women who have followed varied IT career paths and to learn about educational and other opportunities specifically in cybersecurity. A specal session will round out the program. Throughout the conference, participants will have the opportunity to network with professionals and peers; participate in scientific, technical, and educational information exchange; and appreciate the important roles woman play in all aspects of cybersecurity!


TO SUBMIT YOUR WORK:

  • SUBMISSIONS ARE NOW CLOSED.
  • The intent of the sessions is on sharing lessons learned and on promoting fellowship within the field. While the main conference theme is cybersecurity and big data, authors may submit papers on any topic relevant to cybersecurity, whether research, technical solutions, policies, or educational endeavors and programs.
  • Authors may submit long papers (up to 6 pages), short papers (up to 3 pages), or posters (1-page abstracts) for presentation.
  • Submission must follow the IEEE double-column format:  See the IEEE publications page at http://www.ieee.org/conferences_events/conferences/publishing/templates.html for information on formatting (link opens in new window).  Submission format is  PDF.
  • Papers and poster abstracts will be submitted through the EasyChair submission and review system. The submission link will be available soon.


PRESENTATION SCHEDULE:

  • Authors of accepted long and short papers will present their work during the regular conference program and also present their work through a poster at the all-conference poster session on Thursday, September 29th.
  • Authors of accepted posters (submitted as 1-page abstracts) will attend the conference and present their posters at the all-conference poster session.


AUTHOR REGISTRATION:

All papers and posters must have at least one author registered and presenting at the conference. Authors must register by the date listed above in "Important Dates" to ensure that their papers and/or posters will be published in the conference proceedings and can be presented at the conference. Authors not registering by that day may be dropped from the program and their papers/posters dropped from the conference proceedings. All registered authors receive a free copy of the conference proceedings.


RECOGNITION

  • Recognitions will be awarded for the best papers and posters, and best student papers and posters (student must be listed as first author and have responsibility for over 50% of the work, writing, and presentation).


SPECIAL TOPIC CO-CHAIRS: