BCISCS 2012 - Workshop on Bio-inspired and Computational Intelligence Systems in Cyber Security (BCISCS2012)
Topics/Call fo Papers
Workshop on Bio-inspired and Computational Intelligence Systems in Cyber Security (BCISCS2012)
Under the framework of the 2012 European Intelligence and Security Informatics Conference (EISIC 2012)
will be held on August 22-24, 2012 in Odense, Denmark
http://www.eisic.eu/
= General Information =
In order to protect Internet users from Identity Theft, Phishing, Spam and other cyber infrastructure threats, we need flexible, adaptable and robust
cyber defense systems, which can make intelligent decisions (in near real-time) in detecting wide variety of threats and attacks, including active and
passive attacks, external attacks and internal misuses, known and unknown attacks, viruses and spam, etc. Computational Intelligent (CI)- and
Bio-inspired (BI - techniques appears to be promising to enhance cyber security measures, and have been increasingly applied in the area of information security
and information assurance. Moreover, the multi-faceted CI and BI approaches appear to provide a new security paradigm to deal with influx new threats in
a large network of computers.
= Topics of Interest =
Topics of interest include, but are not limited to:
? Intrusion Detection Systems
? Assured Information Sharing
? Privacy and Freedom of Expression in Cyberspace
? Computer Crimes and Digital Forensic
? Biometric technology
? Wireless Security
? Cloud Security
? Cryptography and Cryptanalysis
? Social security
? Data Mining for Cyber security
? Intelligent Cyber Security Analysis in Enterprise Networks
? Anti-disaster applications of immune computing
? Game-changing ventures, innovations and conundrums (e.g., quantum computing, QKD, phishing, malware market, denial of service, botnets).
? Authentication and identity management (e.g. critical national infrastructures, healthcare, databases, mobile and sensor applications, data mining, web services, digital libraries, finance and banking).
= Submission Guidelines =
Submission file formats are PDF and Microsoft Word. Full paper manuscripts must be in English with a maximum length of 6 pages for a long paper or 3 pages
for a short paper (using the IEEE two-column template). Submissions should include the title, author(s), affiliation(s), e-mail address(es), tel/fax numbers,
abstract, and postal address(es) on the first page. The papers submitted will follow an academic review process.
= Tentative Dates of Submission and Acceptance =
Paper Submission Deadline: April 30, 2012
Acceptance Notification: May 30, 2012
Camera Ready Submission and Registration Due: June 15, 2012
Workshop date: August 21-22, 2012
= Workshop Chairs =
Neveen I. Ghali
Al-Azhar University, Faculty of Science,
Cairo, Egypt
Email: nev_ghali-AT-yahoo.com
Nashwa El-Bendary
Arab Academy for Science, Technology & Maritime Transport
Cairo, Egypt
nashwa_m-AT-aast.edu
Aboul Ella Hassanien
Cairo University
Faculty of Computers and Information
Cairo, Egypt
Email: Aboitcairo-AT-gmail.com
= Program Committee =
- Aboul Ella Hassanien, Egypt
- Ali El Baz, Egypt
- Gerald Schaefer, UK
- Hala Shawki Own, Kuwait
- Jan Platos, Czech Republic
- Kazumi Nakamatsu, Japan
- Lamiaa El-Bakrawy, Egypt
- Mohamed Ghoniem, Egypt
- Mostafa Salama, Egypt
- Nashwa El-Bendary, Egypt
- Neveen I. Ghali, Egypt
- Omar Soliman, Egypt
- Qiangfu Zhao, Japan
- Soumya banerjee, India
- Tauseef Gulrez, Pakistan
- Tai-hoon Kim, Korea
- Waaeel Abdel Kader,Egypt
- Xiao, Kai, China
Under the framework of the 2012 European Intelligence and Security Informatics Conference (EISIC 2012)
will be held on August 22-24, 2012 in Odense, Denmark
http://www.eisic.eu/
= General Information =
In order to protect Internet users from Identity Theft, Phishing, Spam and other cyber infrastructure threats, we need flexible, adaptable and robust
cyber defense systems, which can make intelligent decisions (in near real-time) in detecting wide variety of threats and attacks, including active and
passive attacks, external attacks and internal misuses, known and unknown attacks, viruses and spam, etc. Computational Intelligent (CI)- and
Bio-inspired (BI - techniques appears to be promising to enhance cyber security measures, and have been increasingly applied in the area of information security
and information assurance. Moreover, the multi-faceted CI and BI approaches appear to provide a new security paradigm to deal with influx new threats in
a large network of computers.
= Topics of Interest =
Topics of interest include, but are not limited to:
? Intrusion Detection Systems
? Assured Information Sharing
? Privacy and Freedom of Expression in Cyberspace
? Computer Crimes and Digital Forensic
? Biometric technology
? Wireless Security
? Cloud Security
? Cryptography and Cryptanalysis
? Social security
? Data Mining for Cyber security
? Intelligent Cyber Security Analysis in Enterprise Networks
? Anti-disaster applications of immune computing
? Game-changing ventures, innovations and conundrums (e.g., quantum computing, QKD, phishing, malware market, denial of service, botnets).
? Authentication and identity management (e.g. critical national infrastructures, healthcare, databases, mobile and sensor applications, data mining, web services, digital libraries, finance and banking).
= Submission Guidelines =
Submission file formats are PDF and Microsoft Word. Full paper manuscripts must be in English with a maximum length of 6 pages for a long paper or 3 pages
for a short paper (using the IEEE two-column template). Submissions should include the title, author(s), affiliation(s), e-mail address(es), tel/fax numbers,
abstract, and postal address(es) on the first page. The papers submitted will follow an academic review process.
= Tentative Dates of Submission and Acceptance =
Paper Submission Deadline: April 30, 2012
Acceptance Notification: May 30, 2012
Camera Ready Submission and Registration Due: June 15, 2012
Workshop date: August 21-22, 2012
= Workshop Chairs =
Neveen I. Ghali
Al-Azhar University, Faculty of Science,
Cairo, Egypt
Email: nev_ghali-AT-yahoo.com
Nashwa El-Bendary
Arab Academy for Science, Technology & Maritime Transport
Cairo, Egypt
nashwa_m-AT-aast.edu
Aboul Ella Hassanien
Cairo University
Faculty of Computers and Information
Cairo, Egypt
Email: Aboitcairo-AT-gmail.com
= Program Committee =
- Aboul Ella Hassanien, Egypt
- Ali El Baz, Egypt
- Gerald Schaefer, UK
- Hala Shawki Own, Kuwait
- Jan Platos, Czech Republic
- Kazumi Nakamatsu, Japan
- Lamiaa El-Bakrawy, Egypt
- Mohamed Ghoniem, Egypt
- Mostafa Salama, Egypt
- Nashwa El-Bendary, Egypt
- Neveen I. Ghali, Egypt
- Omar Soliman, Egypt
- Qiangfu Zhao, Japan
- Soumya banerjee, India
- Tauseef Gulrez, Pakistan
- Tai-hoon Kim, Korea
- Waaeel Abdel Kader,Egypt
- Xiao, Kai, China
Other CFPs
- International Symposium on Open Source Intelligence & Web Mining 2012 (OSINT-WM 2012) in Conjuction with (European ISI 2012)
- First International Conference on Agro-Geoinformatics
- The Ninth International Joint Conference on Computer Science and Software Engineering
- 情報処理学会 知能システム研究会(SIG-ICS)
- IfA Annual Conference
Last modified: 2012-01-19 22:16:33