posted by organizer: lamri || 3939 views || tracked by 30 users: [display]



When May 16, 2016 - May 18, 2016
Where KeyLargo, Florida
Submission Deadline Nov 16, 2015
Notification Due Jan 18, 2016
Final Version Due Feb 22, 2016
Categories    computer science   artificial intelligence   security

Call For Papers

Cyber Security is an interdisciplinary area that focuses on maintaining and reducing risks to the confidentiality, integrity, and availability of information and resources in computer and network systems. The exchange and storage of electronic information must be protected to ensure business continuity within an institution. The challenges are high because of the number of people that can be affected when a single computer system or a network are comprised. Information systems can present vulnerabilities related to various threats whose sources can be of an intrinsic nature (design, technology, etc.) or human nature (external, internal, deliberate, mistake or negligence). These vulnerabilities have been increased because of computer commoditization, complexity, and ineffective automation. The complexity of modern systems and the diversity of threat vectors both social and technical, require intelligent, adaptive, multimodal solutions for which artificial intelligence (AI) approaches are well suited.

This track will focus on identifying state of the art artificial intelligence based solutions to problems related to cyber security. The objective of the track is to target researchers interested in all aspects of the application of artificial intelligence techniques to ensure high security and privacy of information. We are also interested in applications and case studies of intelligent secure systems in different practical domains. This track will be of interest to researchers and leading edge practitioners in academia, industry, and government agencies concerned with computer and network security.

- Original high quality papers are sought for leading edge research and applications relating to the application of AI and Cyber Security. Topics of interest may include but are not limited to:

· Machine Learning for Intrusion Detection Systems

· NLP for text analysis in Cyber Security

· Video and CCTV semantic analysis for terrorist or criminal action detection

· AI & Biometrics

· AI & SCADA systems security

· AI & Network Systems security

· AI & Embedded Systems security

· AI & Internet of Things

· AI & Cloud Computing security

· Formal and theoretical approaches of intelligent security in WSNs

· Legal and policy issues in intelligent security

· Integrity, privacy, authentication and access control

· Intelligent secure systems in multimedia databases

· Social networks security

· Intelligent incident response techniques in network and communication systems

· Risk analysis and intelligent management

· Virtual Private Network’s intelligent security

· Automated reasoning techniques of incidents and evidence analysis

· Evidentiary aspects of digital forensics

· Collaborative intelligent investigation

· Intelligent systems in management, storage and reassembly

· Steganography, watermarking, and forensic techniques in multimedia content processing

· Lightweight security techniques

· Intelligent Large-scale investigations and Big Data

· Innovative non-repudiation techniques

· Intelligent vulnerability analysis and assessment

· Attacks tracking

· Data hiding, tamper detection and recovery techniques

· Security of e- healthcare systems and applications

Note: We invite original papers (i.e. work not previously submitted, in submission, or to be submitted to another conference during the reviewing process).

Submission Guidelines

Interested authors should format their papers according to AAAI formatting guidelines. Papers should not exceed 6 pages (4 pages for a poster) and are due by November 16, 2015. All FLAIRS papers are reviewed using a double blind process. Fake author names and affiliations must be used on submitted papers. Papers must be submitted as PDF through the EasyChair conference system, which can be accessed through the main conference web site ( Note: do not use a fake name for your EasyChair login - your EasyChair account information is hidden from reviewers. Authors should indicate the AI and Cyber Security special track for submissions. The proceedings of FLAIRS will be published by the AAAI. Authors of accepted papers will be required to sign a form transferring copyright of their contribution to AAAI. FLAIRS requires that there be at least one full author registration per paper.

Please, check the website for further information.

Track Co-chairs

· Lamri Laouamer, Qassim University, KSA and University of Bretagne Occidentale, France (

· Anca Pascu, University of Bretagne Occidentale, France,

· Laurent T. Nana, University of Bretagne Occidentale, France, ( )

· Chutima Boonthum-Denecke, Hampton University ( )

· Soon Ae Chun, City University of New York ( )

· Ricardo A. Calix, Purdue University Calumet ( )

· David Bisant, Central Security Services (

Related Resources

IJCAI 2017   International Joint Conference on Artificial Intelligence
ICML 2017   34th International Conference on Machine Learning
IROS 2017   IEEE/RSJ International Conference on Intelligent Robots and Systems
EPIA 2017   EPIA Conference on Artificial Intelligence -- Journal Track
ISMIS 2017   23rd International Symposium on Methodologies for Intelligent Systems
CTI 2017   Cyber Threat Intelligence - Springer Book Chapter
PAKDD 2017   The 21st Pacific-Asia Conference on Knowledge Discovery and Data Mining
FLAIRS 2017   FLAIRS-30: Special Track in Data Mining
IJCNN 2017   International Joint Conference on Neural Networks
IUI 2017   Intelligent User Interfaces