SKM in an AI Era 2019 : International Conference on Secure Knowledge Management in an Artificial Intelligence Era
Call For Papers
Call for Papers: International Conference on Secure Knowledge Management in an Artificial Intelligence Era (Due Date: August 31, 2019)
Location: BITS Pilani, K K Birla Goa Campus, India
Dates: December 21 – 22, 2019
Submission Deadline: August 31, 2019
With the advent of revolutionary technologies such as artificial intelligence, machine learning, cloud computing, big data, and IoT; Secure Knowledge Management (SKM) continues to be an important research area that deals with methodologies for systematically gathering, organizing, and disseminating information in a secure manner. The recent development of Artificial Intelligence (AI) in the security arena shows a promising future, and there is no doubt that AI can provide new ideas and tools for SKM. Therefore, this conference on SKM will bring together researchers and practitioners from academia, industry, and government on a global scale. The scope and focus of SKM-2019 conference are to present and discuss the most recent innovations, trends, and concerns including practical challenges encountered and solution adopted with special emphasis on AI. SKM-2017 was held in Tampa Florida and past iterations of SKM were held in SUNY Buffalo, SUNY Albany, SUNY Stony Brook, UT Dallas, Rutgers University, BITS Dubai and University of South Florida. Following the biennial tradition of the Secure Knowledge Management Workshop that began in 2004, SKM-2019 will be held during December 21 - 22, 2019, at BITS Pilani, Goa Campus, Goa, India. Papers offering novel research contributions in all aspects. Topics of interest include, but are not limited to:
• SKM in specific technology domains such as:
o Artificial Intelligence
o Data mining and Machine Learning
o Hybrid Cloud Computing
o Big Data in Collaborative Environment
o Internet of Things
o Cyber-Physical Systems
o Online Social Networks
• Role of SKM in Design of Secure Systems
• Role of SKM in General Data Protection Regulation
• SKM for Digital Payments
• SKM for Insider Threat Detection and Mitigation
• Risk & Security Metrics for Knowledge Management
• Knowledge Management for Fake News Detection
• Trust concerning Knowledge Management
Only original papers should be submitted. Submissions should not substantially overlap work which has been published elsewhere or simultaneously submitted to a journal or another conference with proceedings. Papers that contain any form of plagiarism will be rejected without a review.
• All submissions must be in English and should adhere to the CCIS Conference Proceedings Format guidelines.
• Papers should not cross the 12-page limit including references and appendices.
• To facilitate the double-blind paper evaluation, authors are kindly requested to submit the paper WITHOUT any self-reference to any of the authors anywhere in the paper, including the acknowledgments section of the paper and any other reference that may disclose the authors’ identity.
• Papers should be uploaded to EasyChair in PDF format only. After the paper submission has been successfully completed, authors will receive an automatic confirmation e-mail.
Each paper should clearly indicate the nature of its technical/scientific contribution, and the problems, domains or environments to which it is applicable. All accepted papers will be compiled, and a selection of papers presented at the conference will be invited for extension and further review for a fast-tracked special issue of Information Systems Frontiers (SCIE, Scopus, and DBLP), a Springer journal.
Authors of registered papers (including posters) must guarantee that their papers will be presented at the conference. At least one FULL registration is mandatory for each accepted paper. Papers which are not presented will be excluded from the conference proceedings. Authors can visit www.secure-km.org for guidelines.
FOR ANY QUERIES, PLEASE CONTACT: email@example.com