SeCIHD 2015 - 5th IFIP International Workshop on Security and Cognitive Informatics for Homeland Defense (SeCIHD 2015)
Topics/Call fo Papers
Security subjects are becoming hugely important in the light of the development and deployment of new Homeland Defense solutions. Such solutions require the design of new computer systems and techniques allowing security procedures to be executed on many different planes, from system, communication and organization security to the security of the state and ensuring its defense capabilities. Advanced IT technologies based on intelligent algorithms that can analyze group behavior and interpret complex patterns or situations are increasingly frequently becoming the building blocks of the above solutions. In this context, it is worth noting research that combines security and defense aspects with achievements in designing advanced systems for the acquisition and sophisticated semantic analysis of complex image patterns and group behaviors. Such systems use cognitive models of semantic interpretation and can be applied to develop e.g. algorithms and protocols used for the security of computer systems themselves, but also to ensure the confidentiality and security of communication networks. They can also be employed to develop globally understood safe solutions connected with activities to strengthen national defense capability.
Aims and scope
The aim of this workshop is collecting and discussing new ideas and solutions that can be used to develop globally understood safe solutions connected with activities to strengthen national defense capability.
Target Audience
The event is aimed at both industry professionals and research/academic audience. Professionals will gain knowledge about basic concepts in Homeland defense, and become capable to manage defensive response capabilities. Researchers and academics will develop together with industry professionals the new solutions, technologies and security instruments that underpin international peace and security into the electronic age.
## Topics (included, but are not limited to)
- Homeland Security and Information Processing.
- Investigative and Computer System Related Forensic Techniques, Trends and Methods.
- Network Forensics, Wireless and Mobile Forensics.
- Cyber-Defense Threat Analysis.
- Emergency Management, Including Prevention, Planning, Response, and Recovery.
- Secure Communications, Cyber-Attack Countermeasures.
- Vulnerability Analysis and Countermeasures.
- Anomaly Detection.
- Information Sharing and Secrecy.
- Cryptographic Models for Homeland Defense.
- Personal Security and Biometric.
- Intelligent Robots and Unmanned Vehicles.
- Target and Pattern Recognition.
- Sensor and Data Analysis.
- Semantic Image and Data Processing.
- Information Fusion.
- Emerging Threats in Intelligent Energy Systems.
- Advanced Vision Algorithms.
- Security and Privacy in Ambient Intelligence.
- Context and Location-aware Computing.
- Embedded Systems in Security.
- Knowledge-based Systems for Internet Security.
- Security Issues and Protocols for Internet Services.
- Privacy and Trust for Internet Services.
- Artificial Intelligence and Computational Intelligence.
- Cognitive Informatics.
- Security and Privacy in Power-Grid Systems.
- Cognitive Models of the Brain.
- Mathematical Foundations of Computing and Cryptography.
- Biologically Inspired Information Systems and Secret Data Management.
- Cognitive Image and Scene Understanding.
- Intelligent Health Technologies.
Aims and scope
The aim of this workshop is collecting and discussing new ideas and solutions that can be used to develop globally understood safe solutions connected with activities to strengthen national defense capability.
Target Audience
The event is aimed at both industry professionals and research/academic audience. Professionals will gain knowledge about basic concepts in Homeland defense, and become capable to manage defensive response capabilities. Researchers and academics will develop together with industry professionals the new solutions, technologies and security instruments that underpin international peace and security into the electronic age.
## Topics (included, but are not limited to)
- Homeland Security and Information Processing.
- Investigative and Computer System Related Forensic Techniques, Trends and Methods.
- Network Forensics, Wireless and Mobile Forensics.
- Cyber-Defense Threat Analysis.
- Emergency Management, Including Prevention, Planning, Response, and Recovery.
- Secure Communications, Cyber-Attack Countermeasures.
- Vulnerability Analysis and Countermeasures.
- Anomaly Detection.
- Information Sharing and Secrecy.
- Cryptographic Models for Homeland Defense.
- Personal Security and Biometric.
- Intelligent Robots and Unmanned Vehicles.
- Target and Pattern Recognition.
- Sensor and Data Analysis.
- Semantic Image and Data Processing.
- Information Fusion.
- Emerging Threats in Intelligent Energy Systems.
- Advanced Vision Algorithms.
- Security and Privacy in Ambient Intelligence.
- Context and Location-aware Computing.
- Embedded Systems in Security.
- Knowledge-based Systems for Internet Security.
- Security Issues and Protocols for Internet Services.
- Privacy and Trust for Internet Services.
- Artificial Intelligence and Computational Intelligence.
- Cognitive Informatics.
- Security and Privacy in Power-Grid Systems.
- Cognitive Models of the Brain.
- Mathematical Foundations of Computing and Cryptography.
- Biologically Inspired Information Systems and Secret Data Management.
- Cognitive Image and Scene Understanding.
- Intelligent Health Technologies.
Other CFPs
- 10th International Workshop on Frontiers in Availability, Reliability and Security
- 8th International Workshop on Digital Forensics
- 5th International Workshop on Resilience and IT-Risk in Social Infrastructures
- 3rd International Workshop on Recent Advances in Security Information and Event Management
- 2nd International Workshop on Statistical Methods in Reliability Assessment of Complex Industrial Multi-state Systems
Last modified: 2014-12-24 17:03:22