ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

DMCIDFIA 2012 - Data Mining and Computational Intelligence for Digital Forensics and Information Assurance(DMCIDFIA)

Date2012-06-09

Deadline2011-11-11

VenueDalian, China China

Keywords

Websitehttp://ssdut.dlut.edu.cn/iea-aie/

Topics/Call fo Papers

While advances in computer and communication technologies have greatly improved our daily activities in many ways, the unprecedented increase of digital crimes has become an inevitable challenge for the protection of public safety and national security. To efficiently defeat existing cyber crime activities, data mining and computational intelligence techniques have been proposed and applied to digital forensics and information assurance, e.g., the detection of intrusion activities, fraud behaviors, spam emails, and phishing URLs. In order to combat ever-evolving unpredictable digital crime activities, more sophisticated and intelligent methodologies need to be developed. Therefore, the objective of this special session is two-fold: to provide opportunities for sharing existing and new relevant research and to further promote the study of digital forensics and information assurance. Bridging the gap among data mining, computational intelligence, digital information forensics, and information assurance, it aims to enhance the communication and collaboration among the researchers and practitioners from academia, industry, and government.
Session topics include but not limited to the followings:
Audit and audit reduction
Biometrics
Cloud security and forensics
Cybercriminal analysis
Data mining and applications in IA and DF
Digital Forensics
Electronic commerce security
Enterprise security
Fraud detection
Forgery detection
Information assurance
Intrusion detection and prevention
Malware detection
Mobile forensics and wireless security
Multimedia security and forensics
Network forensics
Privacy and data protection
Situation awareness and assessment
Social networking security
VoIP security
Web security

Last modified: 2011-12-17 22:31:38