IEEE ISI 2016 Table of Contents
Total Page:16
File Type:pdf, Size:1020Kb
IEEE ISI 2016 Table of Contents Welcome Message from the Conference Co-Chairs ................................ 2 Message from the Program Co-Chairs ..................................................... 3 Keynote Speakers .................................................................................... 4 Conference Schedule at a Glance ............................................................ 5 Detailed Program and Schedule ............................................................... 6 Wednesday, September 28, 2016 ....................................................... 6 Thursday, September 29, 2016 ........................................................... 9 Friday, September 30, 2016 .............................................................. 11 Invited Speakers and Panelists .............................................................. 12 ISI 2016 Conference Organizers ............................................................ 19 ISI 2016 Program Committee Members ................................................. 20 Conference and Local Information .......................................................... 22 Wireless Network Access Instructions .................................................... 23 Map of Student Union ............................................................................. 24 Map of Campus and Hotels .................................................................... 26 Conference Hosts and Sponsors .............................................. Back cover 1 IEEE ISI 2016 Welcome Message from the Conference Co-Chairs We are extremely pleased to welcome you to the 2016 IEEE International Conference on Intelligence and Security Informatics (IEEE ISI 2016), and to our beautiful campus here at The University of Arizona. Thank you very much for choosing to participate in IEEE ISI 2016. We hope that all of you will enjoy both the conference and your stay in Tucson, Arizona, USA. IEEE ISI 2016 is the 14th event in the annual IEEE International ISI Conference series (http://www.isi-conf.org) started in 2003. The first two meetings were held in Tucson, Arizona; followed by meetings in Atlanta, Georgia; San Diego, California; New Brunswick, New Jersey; Taipei, Taiwan; Dallas, Texas; Vancouver, Canada; Beijing, China; Washington, DC; Seattle, Washington; the Hague, Netherlands; and Baltimore, Maryland. This event continues to be a unique venue, bringing together academic researchers, law enforcement and intelligence experts, and information technology consultants and practitioners to present their work and discuss critical issues and views on cutting-edge ISI research and practice. ISI topics include information technologies, computer science, computational criminology, public policy, bioinformatics, medical informatics, and social and behavior studies, as well as counterterrorism studies. Over the past 13 years, the IEEE International ISI Conference has evolved from its traditional orientation of intelligence and security domain towards a more integrated alignment of multiple domains, including technology, humans, organization, and security. This year's conference theme is Cybersecurity and Big Data. Cybersecurity has become a major priority for businesses and organizations in all sectors. Big data analytics is offering new opportunities for an increased understanding of cybersecurity and ISI concerns. The conference could not be a success without help from many people. Special thanks to all the authors and keynote and invited speakers and panelists for contributing to IEEE ISI 2016. We also express our sincere appreciation to the program chairs and the program committee members, our publication chair Dr. Alan Wang, our finance and local arrangements co-chairs Catherine A. Larson and Anji Siegel, our sponsorship co-chairs Drs. Paulo Goes and Matthew Hashim, and our student supporters from the University of Arizona for their active role in conference organization and logistical support. We would like to thank the host of the event, the University of Arizona, for their sponsorship and support. We are especially grateful to the IEEE Intelligent Transportation Systems Society, the National Science Foundation, the Office of the University of Arizona Vice President for Research, Eller College and Department of Management Information Systems at the University of Arizona, the Artificial Intelligence Lab at the University of Arizona, and Datalink for their financial support. Hsinchun Chen, University of Arizona, USA Salim Hariri, University of Arizona, USA Bhavani Thuraisingham, University of Texas at Dallas, USA Daniel Zeng, University of Arizona, USA Conference Co-Chairs 2 IEEE ISI 2016 Message from the Program Co-Chairs Intelligence and Security Informatics (ISI) research is an interdisciplinary research field involving academic researchers in information technologies, computer science, public policy, bioinformatics, medical informatics, and social and behavior studies; local, state, and federal law enforcement and intelligence experts; and information technology industry consultants and practitioners. ISI supports counterterrorism and homeland security’s missions of anticipation, prevention, preparedness and response to terrorist acts and other security events, in physical, cyber, enterprise, and societal spaces. The theme of the IEEE ISI 2016 is Cybersecurity and Big Data. In the past and present, the IEEE ISI conferences have provided an international forum for academic researchers, law enforcement and intelligence experts, and information technology consultants and practitioners to showcase their research and practices, and discuss their relevant ideas, experiences, and results on various topics about ISI. The ISI Conference series (http://www.isi-conf..org) was first started in Tucson, Arizona in 2003 and 2004. Sponsorship by the IEEE Intelligent Transportation Systems Society began with ISI 2005 and continues through the present. The ISI conference has also held many international events including the Pacific-Asian International Workshop on Intelligence and Security Informatics (PAISI) and the European Conference in Intelligence Security Informatics (EISIC), among others. ISI 2016 is hosted by the University of Arizona. The three-day conference program includes paper presentation sessions, keynote and invited speakers, panel discussions, a doctoral consortium, a poster session, workshops and special thematic sessions, and receptions and networking events. The conference proceedings of the ISI conference includes 33 long papers, 10 short papers, and 3 poster papers. These papers focus on four main areas: 1) cybersecurity analytics and threat intelligence, 2) data science and analytics in security informatics, 3) human behavior and factors in security applications, and 4) organizational, national, and international issues in counter-terrorism and other security applications. The proceedings also include 6 papers accepted by the Workshop on Big Data Analytics for Cybersecurity Computing, 8 papers accepted by the Workshop on Cybersecurity Education & Workforce, 3 papers accepted by the Workshop on Women in Cybersecurity, and 7 papers accepted by the Doctoral Consortium. We are grateful to the Program Committee members who provided high-quality and constructive review comments to help maintain the quality of the program. These members came from 27 different countries. We would like to express our gratitude to all authors for contributing their high-quality work to the program, and to session chairs and panel moderators for coordinating the exciting and interesting sessions. Our special thanks go to the publication chair, Dr. Alan Wang, who put forth much time and effort in preparing the proceedings. Our sincere gratitude goes to Drs. Hsinchun Chen, Salim Hariri, Bhavani Thuraisingham, and Daniel Zeng for their advice and leadership in the ISI Conference series. Marielle den Hengst-Bruggeling Latifur Kahn Sidd Kaza Mark Patton ISI 2016 Program Co-Chairs 3 IEEE ISI 2016 Keynote Speakers Plenary Keynote, Wednesday Ann Cox “DHS’s Internet Measurement and Attack Modeling Program” Dr. Ann Cox is Program Manager in the Cyber Security Division of the Homeland Security Advanced Research Projects Agency within the Science and Technology Directorate of the Department of Homeland Security (DHS). Dr. Cox manages the Internet Measurement and Attack Modeling project (IMAM), which seeks to solve national security threats related to cyberspace. Dr. Cox’s research focuses on Resilient Systems and Networks; Modeling of Internet Attacks; and Network Mapping and Measurement. Her research interests and related programs are in these areas. Prior to her work at DHS, Dr. Cox spent sixteen years at the National Security Agency (NSA) where she worked in the office of Weapons and Space before returning to research, focusing on network measurement projects. She provided leadership and technical direction for projects involving coordination with domestic and international technical experts from multiple government agencies, academic institutions, and private companies. Before coming to NSA, Dr. Cox taught full-time at Brigham Young University (BYU) for several years and was the owner and purchasing agent for a small business. She earned her Bachelor’s degree in Mathematics from BYU, Master’s degree in Mathematics from Idaho State University, Master’s degree in Computer Science from James Madison University, and her Ph.D. in Mathematics from Auburn University. Dr. Cox is the mother of six and grandmother of eleven. Dr.