ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

CIS 2012 - The 8th International Conference on Computational Intelligence and Security

Date2012-11-17

Deadline2012-06-15

VenueGuangzhou, China China

Keywords

Websitehttps://www.cis-lab.org/cis2012

Topics/Call fo Papers

International Conference on Computational Intelligence and Security (CIS) is a major annual international conference to bring together researchers, engineers, developers and practitioners from academia and industry working in all areas of two crucial fields in information processing: computational intelligence (CI) and information security(IS), to share the experience, exchange and cross-fertilize ideas. In particular,the series of CIS conference provides an ideal platform to explore the otential applications of CI models, algorithms and technologies to IS.
Following the great success of CIS'2005-2011, the eighth conference CIS'2012 serves as a forum for the dissemination of the state-of-the-art research, development, and implementations of systems, technologies and applications in these two broad fields. CIS'2012 is organized by Guangdong University of Technology. Also, it is co-sponsored by Xidian University and and Beijing Normal University. CIS'2012 will be held at Guangzhou, GuangDong Province, China on November 17-18, 2012.
Prospective authors are invited to submit high-quality manuscripts written in English.
The topics include but are not limited to:
Computational Intelligence Information Security Applications
?Artificial Immune Systems ?Access Control ?Anti-Virus
?Autonomy-Oriented Computing ?Authentication and Authorization ?Biometrics
?Artificial Neural Systems ?Block/Stream Ciphers ?Content Security
?Bayesian earning ?Cryptography and Coding ?Cryptography and Applications
?Biological Computing ?Cryptographic Protocols ?Communication Security
?Data Mining ?Cryptanalysis ?Copyright Protection
?DNA Computing ?Computer Forensics ?Database Security
?Evolutionary Programming ?Hash Functions ?Digital Signatures
?Evolutionary Algorithms ?Information and System Integrity ?Data Privacy
?Image Understanding ?Intrusion Detection ?Distributed Systems Security
?Intelligent Systems ?Information Hiding ?Detection of Abnormality
?Knowledge Discovery ?Internet/Intranet Security ?Elliptic Curve Cryptosystems
?Learning Algorithms ?Information Security Management ?Financial Security
?Machine Learning ?Key/Identity Management ?Electronic Commerce Security
?Multi-Agent Systems ?Mobile Communications Security ?Information Discovery
?Multi-Objective EA ?Malicious Codes ?Mobile Device Security
?Neural Networks ?Mobile Code & Agent Security ?Multimedia Security
?Particle Swarm Optimization ?Network & Wireless Security ?Software Encryption
?Probabilistic Reasoning ?Public Key Cryptosystems ?System Security
?Reinforcement Learning ?Public Key Infrastructure ?Statistical Data Analysis
?Supervised Learning ?Secret Sharing ?Web Privacy and Trust
?Swarm Intelligence ?Security Management ?Web Authentication
?Probabilistic Learning Steganography & Watermarking ?Web Security and Integrity

Last modified: 2012-05-04 22:28:09