posted by user: tao || 3761 views || tracked by 6 users: [display]

DMC@ICONIP 2009 : Call for Papers for Special Session on Data Mining for Cybersecurity

FacebookTwitterLinkedInGoogle

Link: http://www.iconip09.org/
 
When Dec 1, 2009 - Dec 5, 2009
Where Bangkok, Thailand
Abstract Registration Due Sep 6, 2009
Submission Deadline Jul 28, 2009
Notification Due Aug 15, 2009
Final Version Due Sep 6, 2009
Categories    cybersecurity   data mining   computing intelligence
 

Call For Papers

Organizers:

Dr. Tao Ban, Information Security Research Center, National Institute of Information and
Communications Technology, Japan. bantao@nict.go.jp

Dr. Daisuke Inoue, Network Security Incident Response Group, Information Security Research
Center, National Institute of Information and Communications Technology, Japan. dai@nict.go.jp

Dr. Shaoning Paul Pang, Knowledge Engineering and Discovery Research Institute, Auckland
University of Technology, NZ. spang@aut.ac.nz

Prof. Youki Kadobayashi, Graduate School of Information Science, Nara Institute of Science and
Technology, Japan. youki-k@is.aist-nara.ac.jp

Overview

As a result of our increasing dependence on computer network communications and cyber
infrastructure, cyber security becomes extremely important for a wide variety of practical domains,
such as Internet service providing, banking industry and e-commerce, and privacy preserving
communications. The combination of emerging vulnerabilities, stakes, and threats has made cyber
security an actual barrier for the further development of modern cyberspace “mechanization.”
Fortunately, the research of computational intelligence (CI) has clarified the broad utility of data
mining and machine intelligence for dynamic decision making. This research leads to our proposed
research forum on efficient and robust decision support algorithms, cross-linking methods, and
Cybersecurity solutions.

The special session on Data Mining for Cybersecurity, which took place for the second consecutive
year at ICONIP, desires to bring together experts in computational intelligence disciplines and
researchers from the security community to counterattack new cyber threats with advanced
computing technology.

Topics

Topics of interest include, but are not limited to:
Intelligent intrusion detection systems,
Cyber forensic and malicious code analysis,
Spam filtering algorithms and fraud analysis,
Privacy-preserving data mining and data mining over data streams,
Text mining, text clustering, and text classification.

Submission

Accepted papers will be published in proceedings of ICONIP'09 as a Springer LNCS volume.
Extended verion of selected papers will be invited for publication in special issues of international
journals. See more information of the conference proceedings and special issues at
http://www.iconip09.org/.

It is recommended to submit the special session papers in PDF format following the
Springer LNCS format through the paper submission site, the page limit is eight A4-pages. More
information on manuscript submission can be found at http://www.iconip09.org/submit.php.

Related Resources

MLDM 2018   14th International Conference on Machine Learning and Data Mining MLDM 2018
ADAH 2017   Advanced Data Analytics in Health
AIAI 2018   14th Artificial Intelligence Applications and Innovations 2018
ICDM 2018   18th Industrial Conference on Data Mining ICDM 2018
KES 2018 PR-TAC 2018   KES Invited Session on Pattern Recognition: Trends, Applications and Challenges
IEEE TETCI 2018   IEEE Transactions on Emerging Topics in Computational Intelligence Special Issue on Computational Intelligence in Data-Driven Optimization
TrustCom 2018   The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications
INISTA 2018   IEEE International Conference on Innovations in Intelligent SysTems and Applications
IEEE - ICBDA 2018   2018 IEEE 3rd International Conference on Big Data Analysis (ICBDA 2018)--IEEE Xplore and Ei Compendex
DISP 2018   Special Issue on Data Intelligence in Security and Privacy, Journal of Information Security and Applications