ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

MLISSI 2013 - Special Session on Machine Learning in Information and System Security Issues

Date2013-12-04

Deadline2013-08-05

VenueFlorida, USA - United States USA - United States

Keywords

Websitehttps://icmla-conference.org/icmla13

Topics/Call fo Papers

Recent developments in information technologies require secure accessing, processing, storing, and sharing information in electronic media. The importance of information and system security increases more than ever in diversity as well as in quantity because of continuous threats encountered in many new forms on internet and in systems. In order to secure information and systems, new approaches,
methods, techniques, technologies and concepts are always required.
Advances in Machine Learning (ML) provide new challenges and solutions to the security problems encountered in applications, technologies and teories. Machine Learning (ML) techniques have found widespread applications and implementations in security issues. Many ML techniques, approaches, algorithms, methods and tools are extensively used by security experts and reserachers to achieve better results and to design robust systems.
The aims of this special session on Information and System Security Issues are to:
? share the current and new research topics.
? bring researchers and experts together to discuss and share their experiences,
? enhance personal, enterprise, national and international awareness,
? increase the collaboration among university ? industry - institutions, in applications of ML methods to the information and system security fields.
This session also aims to provide a platform to present and discuss recent advancements in security applications using ML methods.
A wide range of topics that include Security Applications and Implementations using ML methods but are not limited to
? Information Security
? Cryptography and Cryptoanalysis
? Steganography and Steganalysis
? Security Risk Analysis, Modelling, Evaluation and Management
? Software Security
? Secure Coding, Source Code Auditing and Review
? Critical Information and Infrastructure Security
? Security Standards, Protocols and Policies
? Trust Models

Last modified: 2013-06-27 16:58:04