posted by user: madengineer || 4811 views || tracked by 7 users: [display]

EST 2010 : Emerging Security Technologies

FacebookTwitterLinkedInGoogle

Link: http://www.est-2010.info/
 
When Sep 6, 2010 - Sep 7, 2010
Where Canterbury, UK
Submission Deadline Apr 23, 2010
Notification Due Jun 4, 2010
Final Version Due Jun 14, 2010
Categories    security
 

Call For Papers

EST-2010 is a follow on from the successful Symposia on Bio-Inspired
Learning and Intelligent Systems for Security (BLISS) which took place
at the University of Edinburgh from 2007 to 2009. EST-2010 will be
hosted by the University of Kent and take place in the beautiful
cathedral city of Canterbury, UK, on the 6th and 7th September 2010.


SCOPE:

The EST-2010 conference aims to be a forum for discussion of the
emerging technologies in the security field. It will discuss
technologies at various levels of readiness, from early concepts
to recent demonstrations and first results from field deployment.
The conference is targeted at both technologists who can present
their latest ideas and development efforts to system integrators
and program managers who are looking for solutions that will
provide their system/application with the needed advantage.

Contributions are invited in the whole spectrum of system integration
and application domain: from novel detectors and sensors which can be
integrated in handheld devices e.g. for personal ID to airborne platforms
that provide continuous ISSR, to space technologies for monitoring,
search, and intervention. Both hardware and software technologies are
invited. Examples of areas of interest include: cybersecurity - detection
and prevention of cyber-crimes and identity theft, internet security,
security of financial systems, security of public transportation systems,
emergency response systems (e.g. combining space-based systems with
geographical information systems), forensics, biometric security,
perimeter security, border security, homeland security, personal security,
wireless security, robot/unmanned systems security, hybrid security systems. Contributions to related topics such as risk mitigation, diagnostic and prognostic for security systems. Attacks and countermeasure trees, emergency and contingency plans, etc.

Topics to be covered include, but are not limited to:

Technologies:

- Detectors and sensors
- Signal processing
- Biometrics
- Machine Learning
- Soft computing techniques (fuzzy, neural, evolutionary, etc)
- Modelling and simulations
- Prediction techniques
- Pattern recognition
- Neural networks
- Decision-making systems
- Sensor fusion
- System engineering approaches for security
- Bio-inspired algorithms and technologies
- Hyperspectral & Multispectral Imaging
- Remote Sensing Information Extraction
- Multi-Classifier systems

Application areas:

- Sensing (remote sensing, sensor networks, etc)
- Space-based systems
- Early warning systems
- Robotic systems
- Language translation systems
- Financial systems
- Human-centric systems
- Decision support systems
- Training systems (modeling, simulation, virtual environments)
- Complex systems reliability
- Geographic Information Systems
- Transportation systems
- Detection/prevention of Identity theft
- Crime detection/prevention
- ID security
- Wireless communications security
- Cyberspace security
- Biometric security systems




Prospective authors are invited to submit the electronic version of their
full paper (i.e. PS, PDF, MSWord) on the conference web site. Papers are
limited to 6 pages and should be submitted in single-spaced, 10 point type
on a 8.5" X 11" or equivalent paper with 1" margins on all sides. Each
submission should contain the following items: (1) title of paper, (2)
author name(s), (3) first author physical address, (4) first author e-mail
address, (5) first author phone number, (6) a maximum 200 words abstract
(7) the text of the paper, and (8) references. Accepted papers will be
published in the conference proceedings published by IEEE Computer Society's
Conference Publishing Services (CPS) and made available through the IEEE Xplore.

Please find attached CFP in pdf format.

Please see for details: http://www.est-2010.info


===============================================================

Organized by
- The University of Kent, UK
- The University of Edinburgh, UK
- European Centre for Secure Information and Systems

Supported by
- Society for Adaptive and Evolvable Hardware and Systems (ADEVO)

Conference Co-Chairs
Gareth Howells The University of Kent, UK
Ahmet T. Erdogan The University of Edinburgh, UK
Isabella Panella Selex Galileo, UK
Konstantinos Sirlantzis The University of Kent, UK

Steering Committee
Adrian Stoica Jet Propulsion Laboratory, USA
Tughrul Arslan The University of Edinburgh, UK

===============================================================

Related Resources

IEMIS 2020   2nd INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES IN DATA MINING AND INFORMATION SECURITY
SP 2020   IEEE Symposium on Security and Privacy
ICENT--EI Compendex, Scopus 2020   2020 2nd International Conference on Emerging Networks Technologies (ICENT 2020)--Ei Compendex, Scopus
IEEE COINS 2020   Internet of Things IoT | Artificial Intelligence | Machine Learning | Big Data | Blockchain | Edge & Cloud Computing | Security | Embedded Systems | Circuit and Systems | WSN | 5G
CASM_SI_5GIoT 2020   CASM Special Issue on Emerging Technologies in 5G-Based IoT
SPTM 2020   8th International Conference of Security, Privacy and Trust Management
IEEE OJ-COMS 2020   Special Issue on Cyber Forensics for Emerging Technologies, IEEE Open Journal of the Communications Society
MoWiN 2020   9th International Conference on Mobile & Wireless Networks
iCETiC 2020   3rd International Conference on Emerging Technologies in Computing 2020
PST 2020   18th Annual International Conference on Privacy, Security, and Trust (PST2020)