Sign for Notice Everyday    Sign Up| Sign In| Link| English|

Our Sponsors


    CICS 2011 - CICS 2011 2011 IEEE Symposium on Computational Intelligence in Cyber Security

    View: 1505

    Website www.ieee-ssci.org | Want to Edit it Edit Freely

    Category CICS 2011

    Deadline: October 31, 2010 | Date: April 11, 2011-April 15, 2011

    Venue/Country: Paris, France

    Updated: 2010-08-02 13:28:25 (GMT+9)

    Call For Papers - CFP

    CICS 2011

    2011 IEEE Symposium on Computational Intelligence in Cyber Security

    Computational Intelligence constitutes an umbrella of techniques, has proven to be flexible in decision making in dynamic environment. These techniques typically include Fuzzy Logic, Evolutionary Computation, Intelligent Agent Systems, Neural Networks, Cellular Automata, Artificial Immune Systems and other similar computational models. The use of these techniques allowed building efficient online monitoring tools and robust decision support modules, providing cross-linking solutions to different cyber security applications.

    In order to protect Internet users from Identity Theft, Phishing, Spam and other cyber infrastructure threats, we need flexible, adaptable and robust cyber defense systems, which can make intelligent decisions (in near real-time) in detecting wide variety of threats and attacks, including active and passive attacks, external attacks and internal misuses, known and unknown attacks, viruses and spam, etc. Computational Intelligent (CI) techniques appear to be promising to enhance cyber security measures, and have been increasingly applied in the area of information security and information assurance. Moreover, the multi-faceted CI approaches appear to provide a new security paradigm to deal with influx of new threats in a large network of computers.

    Topics

    This symposium will cover all the issues, research and development of the state-of-the-art CI-based technologies in solving various computer and information security problems. CI application areas include, but are not limited to:

    information assurance, cyber fraud and crime detection

    security of storage systems, operating systems, and networks

    intrusion detection, prediction, classification, and response

    models for survivable, resilient, and self-healing systems

    sensor network security, web security, wireless security

    digital forensics, security information visualization

    sensor fusion and decision support in computer security

    Security applications and cyber infrastructure protection

    Symposium Co-Chairs

    Dipankar Dasgupta, The University of Memphis, USA

    Justin Zhan, National Center of Infrastructure Protection, USA

    Program Committee

    Robert K. Abercrombie, Oak Ridge National Laboratory, USA

    Gail-Joon Ahn, Ohio State University, USA

    Nikolaos Bartzoudis, CTTC, Barcelona, Spain

    Elisa Bertino, Purdue University, USA

    Nabendu Chaki, University of Calcutta, India

    Bogdan Czejdo, Fayetteville State University, USA

    Son K. Dao, HRL Laboratories, LLC, CA, USA

    Sajal Das, University of Texas, Arlington, USA

    Josep Domingo-Ferrer, Rovira i Virgili University, Spain

    Gerry V. Dozier, North Carolina A. T. State University, USA

    Anas Abou El Kalam, École Nationale Supérieure d'Ingénieur de Bourges, France

    Sara Foresti, Università degli Studi di Milano, Italy

    Padmavathi Ganapathi, Avinashilingam University, India

    Debin Gao, Singapore Management University, Singapore

    Michael R. Grimaila, Air Force Institute of Technology, USA

    Drew Hamilton, Auburn University, USA

    Tsan-Sheng Hsu, Academia Sinica, Taiwan

    Murat Kantarcioglu, University of Texas at Dallas, USA

    Engin Kirda, Institut Eurecom, France

    Ponnurangam Kumaraguru, IIIT Delhi, India

    Kwok-Yan Lam, Tsinghua University, China

    Gary B. Lamont, Air Force Institute of Technology, USA

    C. Veni Madhavan, Indian Institute of Science, Bangalore, India

    Rabinarayan Mahapatra, Texas A & M, USA

    Antonio Manzalini, Telecom Italia, Italy

    Owen McCusker, Sonalysts, USA

    Suku Nair, Southern Methodist University, USA

    Sihan Qing, Chinese Academy of Sciences, China

    Martin Rehak, Czeck Technical University, Czeck Republic

    Sankardas Roy, University of Memphis, USA

    Kouichi Sakurai, Kyushu University, Japan

    Xinyuan (Frank) Wang, George Mason University, USA

    Sugata Sanyal, Tata Institute of Fundamental Research, India

    Indranil Sengupta, Indian Institute of Technology, India

    Frederick Sheldon, Oak Ridge National Laboratory, USA

    Victor Skormin, Binghamton University, USA

    Mario Strasser, ETH Zürich, Switzerland

    Shamik Sural, Indian Institute of Technology, Kharagpur, India

    Alexander Tarakanov, St. Petersburg Institute for Informatics, Russia

    Shambhu Upadhyaya, State University of New York at Buffalo, USA

    Da-Wei Wang, Academia Sinica, Taiwan

    Qishi Wu, University of Memphis, USA

    Nan Zhang, George Washington University, USA


    Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
    Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.