| |||||||||||||||
CICS 2011 : 2011 IEEE Symposium on Computational Intelligence in Cyber Security | |||||||||||||||
Link: http://www.ieee-ssci.org/2011/cics-2011 | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
Part of IEEE Symposium Series on Computational Intelligence 2011
Computational Intelligence constitutes an umbrella of techniques, has proven to be flexible in decision making in dynamic environment. These techniques typically include Fuzzy Logic, Evolutionary Computation, Intelligent Agent Systems, Neural Networks, Cellular Automata, Artificial Immune Systems and other similar computational models. The use of these techniques allowed building efficient online monitoring tools and robust decision support modules, providing cross-linking solutions to different cyber security applications. In order to protect Internet users from Identity Theft, Phishing, Spam and other cyber infrastructure threats, we need flexible, adaptable and robust cyber defense systems, which can make intelligent decisions (in near real-time) in detecting wide variety of threats and attacks, including active and passive attacks, external attacks and internal misuses, known and unknown attacks, viruses and spam, etc. Computational Intelligent (CI) techniques appear to be promising to enhance cyber security measures, and have been increasingly applied in the area of information security and information assurance. Moreover, the multi-faceted CI approaches appear to provide a new security paradigm to deal with influx of new threats in a large network of computers. Topics This symposium will cover all the issues, research and development of the state-of-the-art CI-based technologies in solving various computer and information security problems. CI application areas include, but are not limited to: * information assurance, cyber fraud and crime detection * * security of storage systems, operating systems, and networks * intrusion detection, prediction, classification, and response * models for survivable, resilient, and self-healing systems * sensor network security, web security, wireless security * digital forensics, security information visualization * sensor fusion and decision support in computer security * Security applications and cyber infrastructure protection Symposium Co-Chairs Dipankar Dasgupta, he University of Memphis, USA Justin Zhan, National Center of Infrastructure Protection, USA Program Committee Elisa Bertino, Purdue University, USA Josep Domingo-Ferrer, Rovira i Virgili University, Spain Debin Gao, Singapore Management University, Singapore Tsan-Sheng Hsu, Academia Sinica, Taiwan Murat Kantarcioglu, University of Texas at Dallas, USA Kwok-Yan Lam, Tsinghua University, China Sihan Qing, Chinese Academy of Sciences, China Kouichi Sakurai, Kyushu University, Japan Xinyuan (Frank) Wang, George Mason University, USA Da-Wei Wang, Academia Sinica, Taiwan Alexander Tarakanov, St. Petersburg Institute for Informatics, Russia Shambhu Upadhyaya, State University of New York at Buffalo, USA Michael R. Grimaila, Air Force Institute of Technology, USA Sankardas Roy, University of Memphis, USA Son K. Dao, HRL Laboratories, LLC, CA, USA Sugata Sanyal, Tata Institute of Fundamental Research, India Qishi Wu, University of Memphis, USA Martin Rehak, Czeck Technical University, Czeck Republic Frederick Sheldon, Oak Ridge National Laboratory, USA Victor Skormin, Binghamton University, USA Anas Abou El Kalam, École Nationale Supérieure d'Ingénieur de Bourges, France Antonio Manzalini, Telecom Italia, Italy Rabinarayan Mahapatra, Texas A & M, USA Nabendu Chaki, University of Calcutta, India Gary B. Lamont, Air Force Institute of Technology, USA Indranil Sengupta, Indian Institute of Technology, India Sara Foresti, Università degli Studi di Milano, Italy Padmavathi Ganapathi, Avinashilingam University, India |
|