SeCIHD 2013 - 3rd IFIP International Workshop on Security and Cognitive Informatics for Homeland Defense (SeCIHD 2013)
Topics/Call fo Papers
Security subjects are becoming hugely important in the light of the development and deployment of new Homeland Defense solutions. Such solutions require the design of new computer systems and techniques allowing security procedures to be executed on many different planes, from system, communication and organization security to the security of the state and ensuring its defense capabilities. Advanced IT technologies based on intelligent algorithms that can analyze group behavior and interpret complex patterns or situations are increasingly frequently becoming the building blocks of the above solutions. In this context, it is worth noting research that combines security and defense aspects with achievements in designing advanced systems for the acquisition and sophisticated semantic analysis of complex image patterns and group behaviors. Such systems use cognitive models of semantic interpretation and can be applied to develop e.g. algorithms and protocols used for the security of computer systems themselves, but also to ensure the confidentiality and security of communication networks. They can also be employed to develop globally understood safe solutions connected with activities to strengthen national defense capability.
## Topics (included, but are not limited to)
- Homeland Security and Information Processing
- Personal Security and Biometric
- Intelligent Robots and Unmanned Vehicles
- Target and Pattern Recognition
- Sensor and Data Analysis
- Semantic Image and Data Processing
- Information Fusion
- Advanced Vision Algorithms
- Security in Ambient Intelligence
- Context- and Location-aware Computing
- Embedded systems in Security
- Knowledge-based Systems for Internet Security
- Security issues and protocols for Internet services
- Privacy and trust for Internet services
- Artificial Intelligence and Computational intelligence
- Cognitive informatics
- Cognitive models of the brain
- Mathematical foundations of computing and cryptography
- Biologically inspired information systems and secret data management
- Cognitive image and scene understanding
- Intelligent Health Technologies
## Topics (included, but are not limited to)
- Homeland Security and Information Processing
- Personal Security and Biometric
- Intelligent Robots and Unmanned Vehicles
- Target and Pattern Recognition
- Sensor and Data Analysis
- Semantic Image and Data Processing
- Information Fusion
- Advanced Vision Algorithms
- Security in Ambient Intelligence
- Context- and Location-aware Computing
- Embedded systems in Security
- Knowledge-based Systems for Internet Security
- Security issues and protocols for Internet services
- Privacy and trust for Internet services
- Artificial Intelligence and Computational intelligence
- Cognitive informatics
- Cognitive models of the brain
- Mathematical foundations of computing and cryptography
- Biologically inspired information systems and secret data management
- Cognitive image and scene understanding
- Intelligent Health Technologies
Other CFPs
- 2nd International Workshop on Security Ontologies and Taxonomies (SecOnT 2013)
- 3rd International Workshop on Resilience and IT-Risk in Social Infrastructures (RISI 2013)
- 8th International Workshop on Frontiers in Availability, Reliability and Security (FARES 2013)
- The 5th International Workshop on Organizational Security Aspects (OSA 2013)
- 2nd International Workshop on Security of Mobile Applications (IWSMA 2013)
Last modified: 2013-01-20 17:30:11