| |||||||||||
CISIS 2020 : 13th International Conference on Computational Intelligence in Security for Information SystemsConference Series : Computational Intelligence in Security for Information Systems | |||||||||||
Link: http://2020.cisisconference.eu | |||||||||||
| |||||||||||
Call For Papers | |||||||||||
The 13th International Conference on Computational Intelligence in Security for Information Systems
Burgos, Spain. CISIS’20 Postponed to 16-18 September 2020 http://cisisconference.eu The 13th International Conference on Computational Intelligence in Security for Information Systems (CISIS’20) aims to offer a meeting opportunity for academic and industry-related researchers belonging to the various, vast communities of Computational Intelligence, Cybersecurity, and Data Science. Due to the COVID-19 outbreak, the 2020 edition is going to be blended, combining onsite and online participation. CISIS’20 will be held in conjunction with: SOCO’20 http://sococonference.eu ICEUTE’20 http://iceuteconference.eu —————————————————————- Technically Co-Sponsored by: Startup Olé - http://startupole.eu IEEE Systems, Man, and Cybernetics Society, Spanish Chapter - http://ieee-smc.es IEEE Systems, Man, and Cybernetics Society, Portuguese Chapter IEEE Systems, Man, and Cybernetics Society, French Chapter - https://smc028.hds.utc.fr/ IEEE Systems, Man, and Cybernetics Society, Italian Chapter ——————————————————————– *** SPECIAL ISSUES *** All the accepted papers of CISIS conference (submitted both to the general track and the special sessions) will be considered for its possible inclusion in a special issue of the following journals: * Neural Computing & Applications (Springer). 2018 JCR Impact Factor: 4.664 – Q1 * Logic Journal of the IGPL (Oxford University Press). 2018 JCR Impact Factor: 0.609 – Q2 * Expert Systems (Wiley). 2018 JCR Impact Factor: 1.505 – Q2 ——————————————————————– *** IMPORTANT DATES *** Paper Submission Deadline: 20th January 2020 (may be extended) Acceptance notification: 1st April 2020 Submission of revised papers: 8th April 2020 Final version submission: 11th April 2020 Payment Deadline: 11th April 2020 Conference Dates: 24th-26th June 2020 ——————————————————————– *** SPECIAL SESSIONS *** The following special sessions have been confirmed up to now: SS01 - Fake News Detection and Prevention SS02 - Mathematical methods and models in Cybersecurity SS03 - Security Advances In Computational Intelligence for Permissioned & Permissionless Blockchains SS04 - Measurements for a Dynamic Cyber-risk Assessment SS05 - Cibersecurity in a Hybrid Quantum World SS06 - Anomaly/Intrusion Detection Further information about the special sessions is available at http://2020.cisisconference.eu/special-sessions —————————————————————- *** PROCEEDINGS *** CISIS’20 proceedings will be published by Springer in a special volume of Advances in Intelligent Systems and Computing, indexed by ISI Proceedings, DBLP and Springerlink, among others. All submissions will be refereed by experts in the field based on originality, significance, quality and clarity. Every submitted paper to CISIS’20 will be reviewed by at least two members of the Program Committee. ——————————————————————– *** TOPICS *** The Conference topics can be identified by, but are not limited to, the following subjects (related to Security Information Systems): - Machine Learning for Data Mining - Data Mining Methods for Security - Agent and Multi-Agent Systems - Hybrid Systems - Unsupervised Learning - Classification Methods - Novelty Detection - Intrusion Detection Systems - Log Correlation Methods - Adaptive Defense of Network Infrastucture - Adaptive Reasoning - Information Forensics - Document Classification and Processing - Ontologies and Conceptual Information Processing - Semantic Information Representation - Natural Language Acquisition - Web Semantics in Intelligence and Law-Enforcement - Industrial and Commercial Applications of Intelligent Methods for Security - Intelligent Control and Monitoring of Critical Systems - Dynamic Adaptive Railway Operation - Centralized Control Systems - Adaptive Planning for Strategic Reasoning - Intelligent Methods in Energy and Transportation - Planning and Automated Reasoning in Large System Control - Biometric Identification and Recognition - Biometric Surveillance - Biometric Access Control - Extraction of Biometric Features (fingerprint, iris, face, voice, palm, gait) - Cryptography - Applied Cryptography and provably-secure cryptographic protocols - Design and analysis of efficient cryptographic primitives: public-key and symmetric-key cryptosystems, block ciphers, and hash functions - Economic fraud on the Internet: phishing, pharming, spam, and click fraud - Email and web security - Intellectual property protection: metering, watermarking, and digital rights management. - Computer Science, namely on HPC and Grid computing issues - Computational Sciences, with requirements in HPC and Grid - Computational Engineering with a similar focus. - Grid Middleware, Grid Computing, Data and Networking Infrastructures - Distributed and Large-Scale Data Access and Management - Data Repositories, Distributed Resource Management and Scheduling - Supercomputer/cluster/grid integration issues - Grid Performance Evaluation, QoS and SLA Negotiation - Grid and HPC Applications, including e-Science in general and also Science Gateways, Nanomaterials, High Energy Physics, e-Health, e-Business, e-Administration, Life Sciences, Earth Sciences, Civil Protection, Computational Sciences and Engineering, … - User Development Environments and Programming Tools for Grid Computing. - Infrastructure as a service (IaaS) - Virtualization in data centers - Virtualization for resource management and QoS assurance - Security aspects of using virtualization in a distributed environment - Virtual networks - Virtual data, storage as a service - Fault tolerance in virtualized environments - Virtualization in P2P systems - Virtualization-based adaptive/autonomic systems - The creation and management of environments/appliances - Virtualization technologies - Performance modeling (applications and systems) - Virtualization techniques for energy/thermal management - Case studies of applications on IaaS platforms - Deployment studies of virtualization technologies - Tools relevant to virtualization ——————————————————————– ***PAPER SUBMISSION*** All submissions will be refereed by experts in the field based on originality, significance, quality and clarity. Every submitted paper to CISIS’20 will be reviewed by at least two members of the Program Committee. Papers must be prepared according to Springer’s templates (MS Word or LaTeX format) for the Advances in Intelligent and Computing volume series (http://www.springer.com/series/11156) and must be no more than ten (10) pages long, including figures and bibliography. Additional pages (over 10 pages) will be charged at 150 Euro each. The submission system is available at https://easychair.org/conferences/?conf=cisis2020 For further information, please visit http://2020.cisisconference.eu/paper-submission-publication/ ——————————————————————– *** SOCIAL ACTIVITIES *** The conference will be held during the local fair (Saint Peter) so there is going to be plenty of social and leisure activities. ——————————————————————– *** CONTACT *** Dr. Álvaro Herrero University of Burgos (Spain) GICAP Research Group E-mail: ahcosio@ubu.es Web: http://gicap.ubu.es Dr. Emilio Corchado University of Salamanca (Spain) BISITE Research Group Web: http://bisite.usal.es For more information and updates about CISIS’20, please refer to the conference website: http://cisisconference.eu |
|