posted by user: nashwaelbendary || 5253 views || tracked by 6 users: [display]

BCISCS 2012 : Workshop on Bio-inspired and Computational Intelligence Systems in Cyber Security

FacebookTwitterLinkedInGoogle

Link: http://egyptscience.net/BCISCS2012/
 
When Aug 21, 2012 - Aug 22, 2012
Where Odense, Denmark
Submission Deadline Apr 30, 2012
Notification Due May 30, 2012
Final Version Due Jun 15, 2012
Categories    intrusion detection   digital forensic   wireless security   cryptanalysis
 

Call For Papers

Workshop on Bio-inspired and Computational Intelligence Systems in Cyber Security (BCISCS 2012) - August 21-22, 2012, Odense, Denmark.
http://egyptscience.net/BCISCS2012/
in Conjunction with (EISIC 2012), http://www.eisic.eu/.

In order to protect Internet users from identity theft, phishing, spam and other cyber infrastructure threats, we need flexible, adaptable and robust cyber defense systems, which can make intelligent decisions (in near real-time) in detecting wide variety of threats and attacks, including active and passive attacks, external attacks and internal misuses, known and unknown attacks, viruses and spam, etc. Computational Intelligent (CI)- and Bio-inspired (BI)- techniques appears to be promising to enhance cyber security measures, and have been increasingly applied in the area of information security and information assurance. Moreover, the multi-faceted CI and BI approaches appear to provide a new security paradigm to deal with influx new threats in a large network of computers.

***TOPICS***
************
Topics of interest include, but are not limited to:
*Intrusion Detection Systems
*Assured Information Sharing
*Privacy and Freedom of Expression in Cyberspace
*Computer Crimes and Digital Forensic
*Biometric technology
*Wireless Security
*Cloud Security
*Cryptography and Cryptanalysis
*Social security
*Data Mining for Cyber security
*Intelligent Cyber Security Analysis in Enterprise Networks
*Anti-disaster applications of immune computing
*Game-changing ventures, innovations and conundrums (e.g., quantum computing, QKD, phishing, malware market, denial of service, botnets)
*Authentication and identity management (e.g. critical national infrastructures, healthcare, mobile and sensor applications, etc.)

***IMPORTANT DATES***
*********************
*Paper submission due: May 12, 2012 (sharp)
*Notification of acceptance: May 30 10, 2012
*Camera ready paper due: June 15, 2012
*Authors registration due: June 15, 2012
*Workshop: August 21-22, 2012

***PAPER SUBMISSION***
**********************
Submission file formats are PDF and Microsoft Word. Full paper manuscripts must be in English with a maximum length of 6 pages for a long paper or 3 pages for a short paper (using the IEEE two-column template). Submissions should include the title, author(s), affiliation(s), e-mail address(es), tel/fax numbers, abstract, and postal address(es) on the first page. The authors who wish to present a poster and/or demo may submit a 1-page extended abstract, which, if selected, will appear in Proceedings. The papers submitted will follow an academic review process. http://www.eisic.eu/
It is important to note that accepted papers for BCISCS2012 workshop will be published with the EISIC 2012 proceedings by IEEE CPS and hence all the rules and regulations of IEEE CPS will be applied as explained in the following link: http://www.computer.org/portal/web/cscps/policies.

Paper Submission Link: http://www.easychair.org/conferences/?conf=osintwm2012

***WORKSHOP CHAIRS***
*********************
Neveen I. Ghali
Al-Azhar University, Faculty of Science,
Cairo, Egypt and Scientific Research Group in Egypt
Email: nev_ghali@yahoo.com
http://egyptscience.net/

Nashwa El-Bendary
Arab Academy for Science, Technology & Maritime Transport
Cairo, Egypt and Scientific Research Group in Egypt
nashwa_m@aast.edu
http://egyptscience.net/

Aboul Ella Hassanien
Cairo University
Faculty of Computers and Information
Cairo, Egypt, and Scientific Research Group in Egypt
Email: Aboitcairo@gmail.com
http://egyptscience.net/

*******************************************

Related Resources

ESCIM 2026   17th European Symposium on Computational Intelligence and Mathematics
MLMI 2026   2026 The 9th International Conference on Machine Learning and Machine Intelligence (MLMI 2026)
EI/Scopus-AIAS 2026   2026 International Conference on Artificial Intelligence, Autonomous Systems, and Aerospace-EI/Scopus
IJCSITCE 2026   The International Journal of Computational Science, Information Technology and Control Engineering
CETA--EI 2026   2026 5th International Conference on Computer Engineering, Technologies and Applications (CETA 2026)
BIS 2026   26th International Conference on Business Information Systems
FCST 2026   14th International Conference on Foundations of Computer Science & Technology
Cyber Science 2026   International Conference on Cybersecurity, Situational Awareness and Social Media
Cyber-AI 2026   The 2nd IEEE 2026 International Conference on Cybersecurity and AI-Based Systems (Scopus)