Sign for Notice Everyday    注册| 登陆| 友情链接| English|

Our Sponsors


    DMCIDFIA 2012 - Data Mining and Computational Intelligence for Digital Forensics and Information Assurance(DMCIDFIA)

    View: 3857

    Website ssdut.dlut.edu.cn/iea-aie/ | Want to Edit it Edit Freely

    Category DMCIDFIA 2012

    Deadline: November 11, 2011 | Date: June 09, 2012-June 12, 2012

    Venue/Country: Dalian, China

    Updated: 2011-12-17 22:31:38 (GMT+9)

    Call For Papers - CFP

    While advances in computer and communication technologies have greatly improved our daily activities in many ways, the unprecedented increase of digital crimes has become an inevitable challenge for the protection of public safety and national security. To efficiently defeat existing cyber crime activities, data mining and computational intelligence techniques have been proposed and applied to digital forensics and information assurance, e.g., the detection of intrusion activities, fraud behaviors, spam emails, and phishing URLs. In order to combat ever-evolving unpredictable digital crime activities, more sophisticated and intelligent methodologies need to be developed. Therefore, the objective of this special session is two-fold: to provide opportunities for sharing existing and new relevant research and to further promote the study of digital forensics and information assurance. Bridging the gap among data mining, computational intelligence, digital information forensics, and information assurance, it aims to enhance the communication and collaboration among the researchers and practitioners from academia, industry, and government.

    Session topics include but not limited to the followings:

    Audit and audit reduction

    Biometrics

    Cloud security and forensics

    Cybercriminal analysis

    Data mining and applications in IA and DF

    Digital Forensics

    Electronic commerce security

    Enterprise security

    Fraud detection

    Forgery detection

    Information assurance

    Intrusion detection and prevention

    Malware detection

    Mobile forensics and wireless security

    Multimedia security and forensics

    Network forensics

    Privacy and data protection

    Situation awareness and assessment

    Social networking security

    VoIP security

    Web security


    Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
    Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.