CICS 2011 - CICS 2011 2011 IEEE Symposium on Computational Intelligence in Cyber Security
Topics/Call fo Papers
CICS 2011
2011 IEEE Symposium on Computational Intelligence in Cyber Security
Computational Intelligence constitutes an umbrella of techniques, has proven to be flexible in decision making in dynamic environment. These techniques typically include Fuzzy Logic, Evolutionary Computation, Intelligent Agent Systems, Neural Networks, Cellular Automata, Artificial Immune Systems and other similar computational models. The use of these techniques allowed building efficient online monitoring tools and robust decision support modules, providing cross-linking solutions to different cyber security applications.
In order to protect Internet users from Identity Theft, Phishing, Spam and other cyber infrastructure threats, we need flexible, adaptable and robust cyber defense systems, which can make intelligent decisions (in near real-time) in detecting wide variety of threats and attacks, including active and passive attacks, external attacks and internal misuses, known and unknown attacks, viruses and spam, etc. Computational Intelligent (CI) techniques appear to be promising to enhance cyber security measures, and have been increasingly applied in the area of information security and information assurance. Moreover, the multi-faceted CI approaches appear to provide a new security paradigm to deal with influx of new threats in a large network of computers.
Topics
This symposium will cover all the issues, research and development of the state-of-the-art CI-based technologies in solving various computer and information security problems. CI application areas include, but are not limited to:
information assurance, cyber fraud and crime detection
security of storage systems, operating systems, and networks
intrusion detection, prediction, classification, and response
models for survivable, resilient, and self-healing systems
sensor network security, web security, wireless security
digital forensics, security information visualization
sensor fusion and decision support in computer security
Security applications and cyber infrastructure protection
Symposium Co-Chairs
Dipankar Dasgupta, The University of Memphis, USA
Justin Zhan, National Center of Infrastructure Protection, USA
Program Committee
Robert K. Abercrombie, Oak Ridge National Laboratory, USA
Gail-Joon Ahn, Ohio State University, USA
Nikolaos Bartzoudis, CTTC, Barcelona, Spain
Elisa Bertino, Purdue University, USA
Nabendu Chaki, University of Calcutta, India
Bogdan Czejdo, Fayetteville State University, USA
Son K. Dao, HRL Laboratories, LLC, CA, USA
Sajal Das, University of Texas, Arlington, USA
Josep Domingo-Ferrer, Rovira i Virgili University, Spain
Gerry V. Dozier, North Carolina A. T. State University, USA
Anas Abou El Kalam, École Nationale Supérieure d'Ingénieur de Bourges, France
Sara Foresti, Università degli Studi di Milano, Italy
Padmavathi Ganapathi, Avinashilingam University, India
Debin Gao, Singapore Management University, Singapore
Michael R. Grimaila, Air Force Institute of Technology, USA
Drew Hamilton, Auburn University, USA
Tsan-Sheng Hsu, Academia Sinica, Taiwan
Murat Kantarcioglu, University of Texas at Dallas, USA
Engin Kirda, Institut Eurecom, France
Ponnurangam Kumaraguru, IIIT Delhi, India
Kwok-Yan Lam, Tsinghua University, China
Gary B. Lamont, Air Force Institute of Technology, USA
C. Veni Madhavan, Indian Institute of Science, Bangalore, India
Rabinarayan Mahapatra, Texas A & M, USA
Antonio Manzalini, Telecom Italia, Italy
Owen McCusker, Sonalysts, USA
Suku Nair, Southern Methodist University, USA
Sihan Qing, Chinese Academy of Sciences, China
Martin Rehak, Czeck Technical University, Czeck Republic
Sankardas Roy, University of Memphis, USA
Kouichi Sakurai, Kyushu University, Japan
Xinyuan (Frank) Wang, George Mason University, USA
Sugata Sanyal, Tata Institute of Fundamental Research, India
Indranil Sengupta, Indian Institute of Technology, India
Frederick Sheldon, Oak Ridge National Laboratory, USA
Victor Skormin, Binghamton University, USA
Mario Strasser, ETH Zürich, Switzerland
Shamik Sural, Indian Institute of Technology, Kharagpur, India
Alexander Tarakanov, St. Petersburg Institute for Informatics, Russia
Shambhu Upadhyaya, State University of New York at Buffalo, USA
Da-Wei Wang, Academia Sinica, Taiwan
Qishi Wu, University of Memphis, USA
Nan Zhang, George Washington University, USA
2011 IEEE Symposium on Computational Intelligence in Cyber Security
Computational Intelligence constitutes an umbrella of techniques, has proven to be flexible in decision making in dynamic environment. These techniques typically include Fuzzy Logic, Evolutionary Computation, Intelligent Agent Systems, Neural Networks, Cellular Automata, Artificial Immune Systems and other similar computational models. The use of these techniques allowed building efficient online monitoring tools and robust decision support modules, providing cross-linking solutions to different cyber security applications.
In order to protect Internet users from Identity Theft, Phishing, Spam and other cyber infrastructure threats, we need flexible, adaptable and robust cyber defense systems, which can make intelligent decisions (in near real-time) in detecting wide variety of threats and attacks, including active and passive attacks, external attacks and internal misuses, known and unknown attacks, viruses and spam, etc. Computational Intelligent (CI) techniques appear to be promising to enhance cyber security measures, and have been increasingly applied in the area of information security and information assurance. Moreover, the multi-faceted CI approaches appear to provide a new security paradigm to deal with influx of new threats in a large network of computers.
Topics
This symposium will cover all the issues, research and development of the state-of-the-art CI-based technologies in solving various computer and information security problems. CI application areas include, but are not limited to:
information assurance, cyber fraud and crime detection
security of storage systems, operating systems, and networks
intrusion detection, prediction, classification, and response
models for survivable, resilient, and self-healing systems
sensor network security, web security, wireless security
digital forensics, security information visualization
sensor fusion and decision support in computer security
Security applications and cyber infrastructure protection
Symposium Co-Chairs
Dipankar Dasgupta, The University of Memphis, USA
Justin Zhan, National Center of Infrastructure Protection, USA
Program Committee
Robert K. Abercrombie, Oak Ridge National Laboratory, USA
Gail-Joon Ahn, Ohio State University, USA
Nikolaos Bartzoudis, CTTC, Barcelona, Spain
Elisa Bertino, Purdue University, USA
Nabendu Chaki, University of Calcutta, India
Bogdan Czejdo, Fayetteville State University, USA
Son K. Dao, HRL Laboratories, LLC, CA, USA
Sajal Das, University of Texas, Arlington, USA
Josep Domingo-Ferrer, Rovira i Virgili University, Spain
Gerry V. Dozier, North Carolina A. T. State University, USA
Anas Abou El Kalam, École Nationale Supérieure d'Ingénieur de Bourges, France
Sara Foresti, Università degli Studi di Milano, Italy
Padmavathi Ganapathi, Avinashilingam University, India
Debin Gao, Singapore Management University, Singapore
Michael R. Grimaila, Air Force Institute of Technology, USA
Drew Hamilton, Auburn University, USA
Tsan-Sheng Hsu, Academia Sinica, Taiwan
Murat Kantarcioglu, University of Texas at Dallas, USA
Engin Kirda, Institut Eurecom, France
Ponnurangam Kumaraguru, IIIT Delhi, India
Kwok-Yan Lam, Tsinghua University, China
Gary B. Lamont, Air Force Institute of Technology, USA
C. Veni Madhavan, Indian Institute of Science, Bangalore, India
Rabinarayan Mahapatra, Texas A & M, USA
Antonio Manzalini, Telecom Italia, Italy
Owen McCusker, Sonalysts, USA
Suku Nair, Southern Methodist University, USA
Sihan Qing, Chinese Academy of Sciences, China
Martin Rehak, Czeck Technical University, Czeck Republic
Sankardas Roy, University of Memphis, USA
Kouichi Sakurai, Kyushu University, Japan
Xinyuan (Frank) Wang, George Mason University, USA
Sugata Sanyal, Tata Institute of Fundamental Research, India
Indranil Sengupta, Indian Institute of Technology, India
Frederick Sheldon, Oak Ridge National Laboratory, USA
Victor Skormin, Binghamton University, USA
Mario Strasser, ETH Zürich, Switzerland
Shamik Sural, Indian Institute of Technology, Kharagpur, India
Alexander Tarakanov, St. Petersburg Institute for Informatics, Russia
Shambhu Upadhyaya, State University of New York at Buffalo, USA
Da-Wei Wang, Academia Sinica, Taiwan
Qishi Wu, University of Memphis, USA
Nan Zhang, George Washington University, USA
Other CFPs
- CICA 2011 2011 IEEE Symposium on Computational Intelligence in Control and Automation
- CIBIM 2011 2011 IEEE Workshop on Computational Intelligence in Biometrics and Identity Management
- CIBCB 2011 The eighth annual IEEE Symposium on Computational Intelligence in Bioinformatics and Computational Biology
- CIASG 2011 2011 IEEE Symposium on Computational Intelligence Applications in Smart Grid
- CCMB 2011 2011 IEEE Symposium on Computational Intelligence, Cognitive Algorithms, Mind, and Brain
Last modified: 2010-08-02 13:28:25