posted by user: isyou || 3859 views || tracked by 6 users: [display]

SeCIHD 2011 : 2011 International Workshop on Security and Cognitive Informatics for Homeland Defense

FacebookTwitterLinkedInGoogle

Link: http://isyou.hosting.paran.com/secihd11/
 
When Aug 22, 2011 - Aug 22, 2011
Where Vienna
Submission Deadline Apr 15, 2011
Notification Due May 15, 2011
Final Version Due Jun 1, 2011
Categories    homeland security   cognitive informatics   security issues and protocols
 

Call For Papers

======================================================================
2011 International Workshop on
Security and Cognitive Informatics for Homeland Defense
(SeCIHD'11)
 
August 22-26, 2011, Vienna, Austria
In conjunction with ARES 2011

======================================================================

## HOT NEWS
Authors of selected papers accepted and presented at the conference will be invited to submit their work with extended results in the specials issues or regular ones of the following journals:
- Journal of Internet Technology (SCIE)
- Computers & Electrical Engineering (SCIE)
- Computing And Informatics (SCIE)


## Overview

Security subjects are becoming hugely important in the light of the development and deployment of new Homeland Defense solutions. Such solutions require the design of new computer systems and techniques allowing security procedures to be executed on many different planes, from system, communication and organization security to the security of the state and ensuring its defense capabilities. Advanced IT technologies based on intelligent algorithms that can analyze group behavior and interpret complex patterns or situations are increasingly frequently becoming the building blocks of the above solutions. In this context, it is worth noting research that combines security and defense aspects with achievements in designing advanced systems for the acquisition and sophisticated semantic analysis of complex image patterns and group behaviors. Such systems use cognitive models of semantic interpretation and can be applied to develop e.g. algorithms and protocols used for the security of computer systems themselves, but also to ensure the confidentiality and security of communication networks. They can also be employed to develop globally understood safe solutions connected with activities to strengthen national defense capability.
[top]

 
## Topics (included, but are not limited to)
- Homeland Security and Information Processing
- Personal Security and Biometric
- Intelligent Robots and Unmanned Vehicles
- Target and Pattern Recognition
- Sensor and Data Analysis
- Semantic Image and Data Processing
- Information Fusion
- Advanced Vision Algorithms
- Security in Ambient Intelligence
- Context- and Location-aware Computing
- Embedded systems in Security
- Knowledge-based Systems for Internet Security
- Security issues and protocols for Internet services
- Privacy and trust for Internet services
- Artificial Intelligence and Computational intelligence
- Cognitive informatics
- Cognitive models of the brain
- Mathematical foundations of computing and cryptography
- Biologically inspired information systems and secret data management
- Cognitive image and scene understanding
- Intelligent Health Technologies
 
## Important Dates
- Submission Deadline: April 15, 2011
- Author Notification: May 15, 2011
- Author Registration: June 1st, 2011
- Proceedings Version: June 1st, 2011


## Organization

**** General Chair
Ilsun You (Korean Bible University, Republic of Korea)

**** General Vice Chair
Moin Uddin (Delhi Technological University, India)

**** Program Chair
Marek R. Ogiela (AGH University of Science & Technology Institute of Automatics, Poland)

*** Publicity Chair
N.S. Raghava (Delhi Technological University, India)

*** Program Committee
Anirban Basu (Tokai University, Japan)
Pascal Bouvry (Luxembourg University, Luxembourg)
Jorg Cassens (Norwegian University of Science and Technology, Norway)
Aniello Castiglione (University of Salerno, Italy)
Fumiharu Etoh (ISIT, Japan)
Tomasz Hachaj (Pedagogical University in Krakow, Poland)
Zhang Jie (Nanyang Technological University, Singapore)
Rahul Katarya (Delhi Technological University, India)
Hoon Ko (Institute of Engineering-Polytechnic of Porto, Portugal)
Gabriele Lenzini (SnT - Univ. of Luxembourg, Luxembourg)
Fang-Yie Leu (Tunghai University, Taiwan)
Lidia D. Ogiela (AGH University of Science and Technology)
Dhananjay Singh (National Institute for Mathematical Sciences, Korea)
James Stanier (University of Sussex, UK)
Chul Sur (Kyushu University, Japan)
Miroslaw Trzupek (AGH University of Science and Technology, Poland)
Baokang Zhao (National University of Defense Technology, China)
Toshihiro Yamauchi (Okayama University, Japan)
Kangbin Yim (Soonchunhyang University, Republic of Korea)

[Additional members still being invited]

## Author Instruction
Authors are invited to submit original papers:
they must not substantially duplicate work that any of the authors have published elsewhere or have submitted in parallel to any other conferences that have proceedings.

Submissions must be in English and conform to the "Springer LNCS Series" format.
Please use the LNCS templates and style files available from http://www.springer.com/computer/lncs?SGWID=0-164-7-72376-0
for templates (MS Word or Latex only).
The proceedings of the workshop will be published by Springer LNCS.

Submissions must not exceed more than 16 pages, including tables and figures, and must be in PDF only.
Submission of a paper implies that should the paper be accepted, at least one of the authors will register and present the paper at the workshop.

Each paper needs to be submitted to the workshop via the easychair: https://www.easychair.org/conferences/?conf=secihd11

## Proceedings & Special Issue
Proceedings of the workshop will be published by Springer Lecture Notes in Computer Science (LNCS) with IFIP logo (indexed by EI).
The proceedings will be available at the workshop.
At least one author of an accepted paper must register at the ARES 2011 site and present the paper at the workshop.

There will be a special issue of Journal of Internet Technology (JIT), which is indexed by SCIE (http://jit.ndhu.edu.tw/englisha.php).
This special issue will be mainly composed of the extended versions of the selected papers presented at the workshop.

Also, other selected papers will be invited to be extended
for the following journals:

- Computers & Electrical Engineering [ELSEVIER, SCIE]
www.elsevier.com/locate/compeleceng

- Computing And Informatics (CAI) [SCIE]
http://www.cai.sk/

## Contact
For further information regarding the workshop and paper submission, please contact Prof. Ilsun You at ilsunu@gmail.com

Related Resources

COGNITIVE 2025   The Seventeenth International Conference on Advanced Cognitive Technologies and Applications
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
DHSS 2024   International Defense and Homeland Security Simulation Workshop
USENIX Security 2025   The 34th USENIX Security Symposium - Cycle 2
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
HEALTHINF 2025   18th International Conference on Health Informatics
SACI 2025   19th IEEE International Symposium on Applied Computational Intelligence and Informatics
IEEE CogMI 2024   IEEE International Conference on Cognitive Machine Intelligence
SECRYPT 2025   22nd International Conference on Security and Cryptography
IEEE CSR 2025   2025 IEEE International Conference on Cyber Security and Resilience