posted by user: nashwaelbendary || 3545 views || tracked by 6 users: [display]

BCISCS 2012 : Workshop on Bio-inspired and Computational Intelligence Systems in Cyber Security

FacebookTwitterLinkedInGoogle

Link: http://egyptscience.net/BCISCS2012/
 
When Aug 21, 2012 - Aug 22, 2012
Where Odense, Denmark
Submission Deadline Apr 30, 2012
Notification Due May 30, 2012
Final Version Due Jun 15, 2012
Categories    intrusion detection   digital forensic   wireless security   cryptanalysis
 

Call For Papers

Workshop on Bio-inspired and Computational Intelligence Systems in Cyber Security (BCISCS 2012) - August 21-22, 2012, Odense, Denmark.
http://egyptscience.net/BCISCS2012/
in Conjunction with (EISIC 2012), http://www.eisic.eu/.

In order to protect Internet users from identity theft, phishing, spam and other cyber infrastructure threats, we need flexible, adaptable and robust cyber defense systems, which can make intelligent decisions (in near real-time) in detecting wide variety of threats and attacks, including active and passive attacks, external attacks and internal misuses, known and unknown attacks, viruses and spam, etc. Computational Intelligent (CI)- and Bio-inspired (BI)- techniques appears to be promising to enhance cyber security measures, and have been increasingly applied in the area of information security and information assurance. Moreover, the multi-faceted CI and BI approaches appear to provide a new security paradigm to deal with influx new threats in a large network of computers.

***TOPICS***
************
Topics of interest include, but are not limited to:
*Intrusion Detection Systems
*Assured Information Sharing
*Privacy and Freedom of Expression in Cyberspace
*Computer Crimes and Digital Forensic
*Biometric technology
*Wireless Security
*Cloud Security
*Cryptography and Cryptanalysis
*Social security
*Data Mining for Cyber security
*Intelligent Cyber Security Analysis in Enterprise Networks
*Anti-disaster applications of immune computing
*Game-changing ventures, innovations and conundrums (e.g., quantum computing, QKD, phishing, malware market, denial of service, botnets)
*Authentication and identity management (e.g. critical national infrastructures, healthcare, mobile and sensor applications, etc.)

***IMPORTANT DATES***
*********************
*Paper submission due: May 12, 2012 (sharp)
*Notification of acceptance: May 30 10, 2012
*Camera ready paper due: June 15, 2012
*Authors registration due: June 15, 2012
*Workshop: August 21-22, 2012

***PAPER SUBMISSION***
**********************
Submission file formats are PDF and Microsoft Word. Full paper manuscripts must be in English with a maximum length of 6 pages for a long paper or 3 pages for a short paper (using the IEEE two-column template). Submissions should include the title, author(s), affiliation(s), e-mail address(es), tel/fax numbers, abstract, and postal address(es) on the first page. The authors who wish to present a poster and/or demo may submit a 1-page extended abstract, which, if selected, will appear in Proceedings. The papers submitted will follow an academic review process. http://www.eisic.eu/
It is important to note that accepted papers for BCISCS2012 workshop will be published with the EISIC 2012 proceedings by IEEE CPS and hence all the rules and regulations of IEEE CPS will be applied as explained in the following link: http://www.computer.org/portal/web/cscps/policies.

Paper Submission Link: http://www.easychair.org/conferences/?conf=osintwm2012

***WORKSHOP CHAIRS***
*********************
Neveen I. Ghali
Al-Azhar University, Faculty of Science,
Cairo, Egypt and Scientific Research Group in Egypt
Email: nev_ghali@yahoo.com
http://egyptscience.net/

Nashwa El-Bendary
Arab Academy for Science, Technology & Maritime Transport
Cairo, Egypt and Scientific Research Group in Egypt
nashwa_m@aast.edu
http://egyptscience.net/

Aboul Ella Hassanien
Cairo University
Faculty of Computers and Information
Cairo, Egypt, and Scientific Research Group in Egypt
Email: Aboitcairo@gmail.com
http://egyptscience.net/

*******************************************

Related Resources

DEPLING 2023   International Conference on Dependency Linguistics
DIMVA 2023   20th Conference on Detection of Intrusions and Malware & Vulnerability Assessment
IEEE SSCI 2023   2023 IEEE Symposium Series on Computational Intelligence
SIUSAI 2023   2023 International Symposium on Intelligent Unmanned Systems and Artificial Intelligence (SIUSAI 2023)
IEEE CCNC STP-CPS 2023   5th International Workshop on Security Trust Privacy for Cyber-Physical Systems (STP-CPS'23) with IEEE CCNC 2023, 8-11 January, Las Vegas, NV, USA
Electronics SI 2022   Electronics: Special Issue on Cybersecurity and Privacy Issues in Cyber-Physical Systems and Industrial Control Systems
ICACII 2023   2nd International Conference on Advances in Computational Intelligence and Informatics
SSCI 2023   2023 IEEE Symposium Series on Computational Intelligence
evoAPPS 2023   EvoApplications 2023 - 26th European Conference on the Applications of Evolutionary and bio-inspired Computation
PRAI 2023   2023 the 6th International Conference on Pattern Recognition and Artificial Intelligence (PRAI 2023)