Sign for Notice Everyday    Sign Up| Sign In| Link| English|

Our Sponsors

    Receive Latest News

    Feedburner
    Share Us


    FLAIRS-29: AICYS 2016 - The 29th International FLAIRS Conference - AI and Cyber Security Special Track

    View: 642

    Website https://sites.google.com/site/flairs29strackonaiandcs/ | Want to Edit it Edit Freely

    Category AI and Cyber Security

    Deadline: November 16, 2015 | Date: May 16, 2016-May 18, 2016

    Venue/Country: Key Largo, Florida, U.S.A

    Updated: 2015-07-28 22:57:08 (GMT+9)

    Call For Papers - CFP

    Cyber Security is an interdisciplinary area that focuses on maintaining and reducing risks to the confidentiality, integrity, and availability of information and resources in computer and network systems. The exchange and storage of electronic information must be protected to ensure business continuity within an institution. The challenges are high because of the number of people that can be affected when a single computer system or a network are comprised. Information systems can present vulnerabilities related to various threats whose sources can be of an intrinsic nature (design, technology, etc.) or human nature (external, internal, deliberate, mistake or negligence). These vulnerabilities have been increased because of computer commoditization, complexity, and ineffective automation. The complexity of modern systems and the diversity of threat vectors both social and technical, require intelligent, adaptive, multimodal solutions for which artificial intelligence (AI) approaches are well suited.

    This track will focus on identifying state of the art artificial intelligence based solutions to problems related to cyber security. The objective of the track is to target researchers interested in all aspects of the application of artificial intelligence techniques to ensure high security and privacy of information. We are also interested in applications and case studies of intelligent secure systems in different practical domains. This track will be of interest to researchers and leading edge practitioners in academia, industry, and government agencies concerned with computer and network security.

    - Original high quality papers are sought for leading edge research and applications relating to the application of AI and Cyber Security. Topics of interest may include but are not limited to:

    ? Machine Learning for Intrusion Detection Systems

    ? NLP for text analysis in Cyber Security

    ? Video and CCTV semantic analysis for terrorist or criminal action detection

    ? AI & Biometrics

    ? AI & SCADA systems security

    ? AI & Network Systems security

    ? AI & Embedded Systems security

    ? AI & Internet of Things

    ? AI & Cloud Computing security

    ? Formal and theoretical approaches of intelligent security in WSNs

    ? Legal and policy issues in intelligent security

    ? Integrity, privacy, authentication and access control

    ? Intelligent secure systems in multimedia databases

    ? Social networks security

    ? Intelligent incident response techniques in network and communication systems

    ? Risk analysis and intelligent management

    ? Virtual Private Network’s intelligent security

    ? Automated reasoning techniques of incidents and evidence analysis

    ? Evidentiary aspects of digital forensics

    ? Collaborative intelligent investigation

    ? Intelligent systems in management, storage and reassembly

    ? Steganography, watermarking, and forensic techniques in multimedia content processing

    ? Lightweight security techniques

    ? Intelligent Large-scale investigations and Big Data

    ? Innovative non-repudiation techniques

    ? Intelligent vulnerability analysis and assessment

    ? Attacks tracking

    ? Data hiding, tamper detection and recovery techniques

    ? Security of e- healthcare systems and applications

    Note: We invite original papers (i.e. work not previously submitted, in submission, or to be submitted to another conference during the reviewing process).

    Submission Guidelines

    Interested authors should format their papers according to AAAI formatting guidelines. Papers should not exceed 6 pages (4 pages for a poster) and are due by November 16, 2015. All FLAIRS papers are reviewed using a double blind process. Fake author names and affiliations must be used on submitted papers. Papers must be submitted as PDF through the EasyChair conference system, which can be accessed through the main conference web site (http://www.flairs-29.info/). Note: do not use a fake name for your EasyChair login - your EasyChair account information is hidden from reviewers. Authors should indicate the AI and Cyber Security special track for submissions. The proceedings of FLAIRS will be published by the AAAI. Authors of accepted papers will be required to sign a form transferring copyright of their contribution to AAAI. FLAIRS requires that there be at least one full author registration per paper.

    Please, check the website http://www.flairs-29.info/ for further information.


    Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
    Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.