SeCIHD 2014 - 4th IFIP International Workshop on Security and Cognitive Informatics for Homeland Defense (SeCIHD 2014)
Topics/Call fo Papers
Security subjects are becoming hugely important in the light of the development and deployment of new Homeland Defense solutions. Such solutions require the design of new computer systems and techniques allowing security procedures to be executed on many different planes, from system, communication and organization security to the security of the state and ensuring its defense capabilities. Advanced IT technologies based on intelligent algorithms that can analyze group behavior and interpret complex patterns or situations are increasingly frequently becoming the building blocks of the above solutions. In this context, it is worth noting research that combines security and defense aspects with achievements in designing advanced systems for the acquisition and sophisticated semantic analysis of complex image patterns and group behaviors. Such systems use cognitive models of semantic interpretation and can be applied to develop e.g. algorithms and protocols used for the security of computer systems themselves, but also to ensure the confidentiality and security of communication networks. They can also be employed to develop globally understood safe solutions connected with activities to strengthen national defense capability.
## Topics (included, but are not limited to)
- Homeland Security and Information Processing
- Personal Security and Biometric
- Intelligent Robots and Unmanned Vehicles
- Target and Pattern Recognition
- Sensor and Data Analysis
- Semantic Image and Data Processing
- Information Fusion
- Advanced Vision Algorithms
- Security in Ambient Intelligence
- Context- and Location-aware Computing
- Embedded systems in Security
- Knowledge-based Systems for Internet Security
- Security issues and protocols for Internet services
- Privacy and trust for Internet services
- Artificial Intelligence and Computational intelligence
- Cognitive informatics
- Cognitive models of the brain
- Mathematical foundations of computing and cryptography
- Biologically inspired information systems and secret data management
- Cognitive image and scene understanding
- Intelligent Health Technologies
## Topics (included, but are not limited to)
- Homeland Security and Information Processing
- Personal Security and Biometric
- Intelligent Robots and Unmanned Vehicles
- Target and Pattern Recognition
- Sensor and Data Analysis
- Semantic Image and Data Processing
- Information Fusion
- Advanced Vision Algorithms
- Security in Ambient Intelligence
- Context- and Location-aware Computing
- Embedded systems in Security
- Knowledge-based Systems for Internet Security
- Security issues and protocols for Internet services
- Privacy and trust for Internet services
- Artificial Intelligence and Computational intelligence
- Cognitive informatics
- Cognitive models of the brain
- Mathematical foundations of computing and cryptography
- Biologically inspired information systems and secret data management
- Cognitive image and scene understanding
- Intelligent Health Technologies
Other CFPs
- 2nd International Workshop on Emerging Cyberthreats and Countermeasures (ECTCM 2014)
- International Workshop on Security in Air Traffic Management and other Critical Infrastructures (SecATM 2014)
- 3rd International Workshop on Modern Cryptography and Security Engineering (MoCrySEN 2014)
- The 4th Int. Workshop on Resilience and IT-Risk in Social Infrastructures
- 2nd International Conference on E-Health and TeleMedicine
Last modified: 2014-01-25 22:26:54