| |||||||||||||||||
DMC@ICONIP 2009 : Call for Papers for Special Session on Data Mining for Cybersecurity | |||||||||||||||||
Link: http://www.iconip09.org/ | |||||||||||||||||
| |||||||||||||||||
Call For Papers | |||||||||||||||||
Organizers:
Dr. Tao Ban, Information Security Research Center, National Institute of Information and Communications Technology, Japan. bantao@nict.go.jp Dr. Daisuke Inoue, Network Security Incident Response Group, Information Security Research Center, National Institute of Information and Communications Technology, Japan. dai@nict.go.jp Dr. Shaoning Paul Pang, Knowledge Engineering and Discovery Research Institute, Auckland University of Technology, NZ. spang@aut.ac.nz Prof. Youki Kadobayashi, Graduate School of Information Science, Nara Institute of Science and Technology, Japan. youki-k@is.aist-nara.ac.jp Overview As a result of our increasing dependence on computer network communications and cyber infrastructure, cyber security becomes extremely important for a wide variety of practical domains, such as Internet service providing, banking industry and e-commerce, and privacy preserving communications. The combination of emerging vulnerabilities, stakes, and threats has made cyber security an actual barrier for the further development of modern cyberspace “mechanization.” Fortunately, the research of computational intelligence (CI) has clarified the broad utility of data mining and machine intelligence for dynamic decision making. This research leads to our proposed research forum on efficient and robust decision support algorithms, cross-linking methods, and Cybersecurity solutions. The special session on Data Mining for Cybersecurity, which took place for the second consecutive year at ICONIP, desires to bring together experts in computational intelligence disciplines and researchers from the security community to counterattack new cyber threats with advanced computing technology. Topics Topics of interest include, but are not limited to: Intelligent intrusion detection systems, Cyber forensic and malicious code analysis, Spam filtering algorithms and fraud analysis, Privacy-preserving data mining and data mining over data streams, Text mining, text clustering, and text classification. Submission Accepted papers will be published in proceedings of ICONIP'09 as a Springer LNCS volume. Extended verion of selected papers will be invited for publication in special issues of international journals. See more information of the conference proceedings and special issues at http://www.iconip09.org/. It is recommended to submit the special session papers in PDF format following the Springer LNCS format through the paper submission site, the page limit is eight A4-pages. More information on manuscript submission can be found at http://www.iconip09.org/submit.php. |
|