CISIS 2011 - 4th International Conference on Computational Intelligence in Security for Information Systems
Topics/Call fo Papers
4th International Conference on
Computational Intelligence in
Security for Information Systems
Under the frame of IWANN 2011
Torremolinos, Málaga, Spain
June 8-10th, 2011
CISIS aims to offer a meeting opportunity for academic and industry-related researchers belonging to the various, vast communities of Computational Intelligence, Information Security, and Data Mining. The need for intelligent, flexible behaviour by large, complex systems, especially in mission-critical domains, is intended to be the catalyst and the aggregation stimulus for the overall event.
The proceedings are to be published by Springer in the prestigious Lecture Notes in Computer Science Series.
CISIS is included in the ranking of the best conferences established by the Computer Science Conference Ranking of the Computing Research and Education Association of Australasia, concretely in B category.
The Conference topics can be identified by, but are not limited to, the following subjects:
Machine Learning for Data Mining
Data Mining Methods for Security
Agent and Multi-Agent Systems
Hybrid Systems
Unsupervised Learning
Classification Methods
Novelty Detection
Intrusion Detection Systems
Log Correlation Methods
Adaptive Defense of Network Infrastucture
Adaptive Reasoning
Information Forensics
Document Classification and Processing
Ontologies and Conceptual Information Processing
Semantic Information Representation
Natural Language Acquisition
Web Semantics in Intelligence and Law-Enforcement
Industrial and Commercial Applications of Intelligent Methods for Security
Intelligent Control and Monitoring of Critical Systems
Dynamic Adaptive Railway Operation
Centralized Control Systems
Adaptive Planning for Strategic Reasoning
Intelligent Methods in Energy and Transportation
Planning and Automated Reasoning in Large System Control
Biometric Identification and Recognition
Biometric Surveillance
Biometric Access Control
Extraction of Biometric Features (fingerprint, iris, face, voice, palm, gait)
Cryptography
Applied Cryptography and provably-secure cryptographic protocols
Design and analysis of efficient cryptographic primitives:
public-key and symmetric-key cryptosystems, block ciphers, and hash functions
Economic fraud on the Internet: phishing, pharming, spam, and click fraud
Email and web security
Intellectual property protection:
metering, watermarking, and digital rights management.
Computer Science, namely on HPC and Grid computing issues
Computational Sciences, with requirements in HPC and Grid
Computational Engineering with a similar focus.
Grid Middleware, Grid Computing, Data and Networking Infrastructures
Distributed and Large-Scale Data Access and Management
Data Repositories, Distributed Resource Management and Scheduling
Supercomputer/cluster/grid integration issues
Grid Performance Evaluation, QoS and SLA Negotiation
Grid and HPC Applications, including e-Science in general and also Science Gateways, Nanomaterials, High Energy Physics, e-Health, e-Business, e-Administration, Life Sciences, Earth Sciences, Civil Protection, Computational Sciences and Engineering, ...
User Development Environments and Programming Tools for Grid Computing.
Infrastructure as a service (IaaS)
Virtualization in data centers
Virtualization for resource management and QoS assurance
Security aspects of using virtualization in a distributed environment
Virtual networks
Virtual data, storage as a service
Fault tolerance in virtualized environments
Virtualization in P2P systems
Virtualization-based adaptive/autonomic systems
The creation and management of environments/appliances
Virtualization technologies
Performance modeling (applications and systems)
Virtualization techniques for energy/thermal management
Case studies of applications on IaaS platforms
Deployment studies of virtualization technologies
Tools relevant to virtualization
Computational Intelligence in
Security for Information Systems
Under the frame of IWANN 2011
Torremolinos, Málaga, Spain
June 8-10th, 2011
CISIS aims to offer a meeting opportunity for academic and industry-related researchers belonging to the various, vast communities of Computational Intelligence, Information Security, and Data Mining. The need for intelligent, flexible behaviour by large, complex systems, especially in mission-critical domains, is intended to be the catalyst and the aggregation stimulus for the overall event.
The proceedings are to be published by Springer in the prestigious Lecture Notes in Computer Science Series.
CISIS is included in the ranking of the best conferences established by the Computer Science Conference Ranking of the Computing Research and Education Association of Australasia, concretely in B category.
The Conference topics can be identified by, but are not limited to, the following subjects:
Machine Learning for Data Mining
Data Mining Methods for Security
Agent and Multi-Agent Systems
Hybrid Systems
Unsupervised Learning
Classification Methods
Novelty Detection
Intrusion Detection Systems
Log Correlation Methods
Adaptive Defense of Network Infrastucture
Adaptive Reasoning
Information Forensics
Document Classification and Processing
Ontologies and Conceptual Information Processing
Semantic Information Representation
Natural Language Acquisition
Web Semantics in Intelligence and Law-Enforcement
Industrial and Commercial Applications of Intelligent Methods for Security
Intelligent Control and Monitoring of Critical Systems
Dynamic Adaptive Railway Operation
Centralized Control Systems
Adaptive Planning for Strategic Reasoning
Intelligent Methods in Energy and Transportation
Planning and Automated Reasoning in Large System Control
Biometric Identification and Recognition
Biometric Surveillance
Biometric Access Control
Extraction of Biometric Features (fingerprint, iris, face, voice, palm, gait)
Cryptography
Applied Cryptography and provably-secure cryptographic protocols
Design and analysis of efficient cryptographic primitives:
public-key and symmetric-key cryptosystems, block ciphers, and hash functions
Economic fraud on the Internet: phishing, pharming, spam, and click fraud
Email and web security
Intellectual property protection:
metering, watermarking, and digital rights management.
Computer Science, namely on HPC and Grid computing issues
Computational Sciences, with requirements in HPC and Grid
Computational Engineering with a similar focus.
Grid Middleware, Grid Computing, Data and Networking Infrastructures
Distributed and Large-Scale Data Access and Management
Data Repositories, Distributed Resource Management and Scheduling
Supercomputer/cluster/grid integration issues
Grid Performance Evaluation, QoS and SLA Negotiation
Grid and HPC Applications, including e-Science in general and also Science Gateways, Nanomaterials, High Energy Physics, e-Health, e-Business, e-Administration, Life Sciences, Earth Sciences, Civil Protection, Computational Sciences and Engineering, ...
User Development Environments and Programming Tools for Grid Computing.
Infrastructure as a service (IaaS)
Virtualization in data centers
Virtualization for resource management and QoS assurance
Security aspects of using virtualization in a distributed environment
Virtual networks
Virtual data, storage as a service
Fault tolerance in virtualized environments
Virtualization in P2P systems
Virtualization-based adaptive/autonomic systems
The creation and management of environments/appliances
Virtualization technologies
Performance modeling (applications and systems)
Virtualization techniques for energy/thermal management
Case studies of applications on IaaS platforms
Deployment studies of virtualization technologies
Tools relevant to virtualization
Other CFPs
- The 8th International Conference on Mobile Web Information Systems (MobiWIS)
- 12th International IFIP Conference on Distributed Applications and Interoperable Systems
- 2012 4th International Conference on Electronics Computer Technology - ICECT 2012
- The XIIIth International Colloquium on Roman Provincial Art
- 2011第三届生物信息与生物医?技?国?会? (ICBBT 2011)
Last modified: 2010-12-14 12:07:24