ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

2013 - CICS 2013 2013 IEEE Symposium on Computational Intelligence in Cyber Security

Date2013-04-16

Deadline2012-10-10

VenueSingapore, Singapore Singapore

Keywords

Websitehttp://ieee-ssci.org

Topics/Call fo Papers

Computational Intelligence constitutes an umbrella of techniques, has proven to be flexible in decision making in dynamic environment. These techniques typically include Fuzzy Logic, Evolutionary Computation, Intelligent Agent Systems, Neural Networks, Cellular Automata, Artificial Immune Systems and other similar computational models. The use of these techniques allowed building efficient online monitoring tools and robust decision support modules, providing cross-linking solutions to different cyber security applications.

In order to protect Internet users from Identity Theft, Phishing, Spam and other cyber infrastructure threats, we need flexible, adaptable and robust cyber defense systems, which can make intelligent decisions (in near real-time) in detecting wide variety of threats and attacks, including active and passive attacks, external attacks and internal misuses, known and unknown attacks, viruses and spam, etc. Computational Intelligent (CI) techniques appear to be promising to enhance cyber security measures, and have been increasingly applied in the area of information security and information assurance. Moreover, the multi-faceted CI approaches appear to provide a new security paradigm to deal with influx of new threats in a large network of computers.

Topics
This symposium will cover all the issues, research and development of the state-of-the-art CI-based technologies in solving various computer and information security problems. CI application areas include, but are not limited to:

information assurance, cyber fraud and crime detection
security of storage systems, operating systems, and networks
intrusion detection, prediction, classification, and response
models for survivable, resilient, and self-healing systems
sensor network security, web security, wireless security
digital forensics, security information visualization
sensor fusion and decision support in computer security
Security applications and cyber infrastructure protection
Keynote, Tutorial and Panel Sessions
Please forward your proposals with detailed abstract and bio-sketches of the speakers to Symposium Co-Chairs and SSCI Keynote-Tutorial Chair, Dr S. Das.

Last modified: 2011-08-26 17:55:58