posted by user: ssamtani || 750 views || tracked by 2 users: [display]

SKM in an AI Era 2019 : International Conference on Secure Knowledge Management in an Artificial Intelligence Era


When Dec 21, 2019 - Dec 22, 2019
Where K K Birla Goa Campus, India
Submission Deadline Aug 31, 2019

Call For Papers

Call for Papers: International Conference on Secure Knowledge Management in an Artificial Intelligence Era (Due Date: August 31, 2019)
Location: BITS Pilani, K K Birla Goa Campus, India
Dates: December 21 – 22, 2019
Submission Deadline: August 31, 2019

With the advent of revolutionary technologies such as artificial intelligence, machine learning, cloud computing, big data, and IoT; Secure Knowledge Management (SKM) continues to be an important research area that deals with methodologies for systematically gathering, organizing, and disseminating information in a secure manner. The recent development of Artificial Intelligence (AI) in the security arena shows a promising future, and there is no doubt that AI can provide new ideas and tools for SKM. Therefore, this conference on SKM will bring together researchers and practitioners from academia, industry, and government on a global scale. The scope and focus of SKM-2019 conference are to present and discuss the most recent innovations, trends, and concerns including practical challenges encountered and solution adopted with special emphasis on AI. SKM-2017 was held in Tampa Florida and past iterations of SKM were held in SUNY Buffalo, SUNY Albany, SUNY Stony Brook, UT Dallas, Rutgers University, BITS Dubai and University of South Florida. Following the biennial tradition of the Secure Knowledge Management Workshop that began in 2004, SKM-2019 will be held during December 21 - 22, 2019, at BITS Pilani, Goa Campus, Goa, India. Papers offering novel research contributions in all aspects. Topics of interest include, but are not limited to:

• SKM in specific technology domains such as:
o Artificial Intelligence
o Data mining and Machine Learning
o Hybrid Cloud Computing
o Big Data in Collaborative Environment
o Internet of Things
o Cyber-Physical Systems
o Healthcare
o Online Social Networks
• Role of SKM in Design of Secure Systems
• Role of SKM in General Data Protection Regulation
• SKM for Digital Payments
• SKM for Insider Threat Detection and Mitigation
• Risk & Security Metrics for Knowledge Management
• Knowledge Management for Fake News Detection
• Trust concerning Knowledge Management

Submission Guidelines
Only original papers should be submitted. Submissions should not substantially overlap work which has been published elsewhere or simultaneously submitted to a journal or another conference with proceedings. Papers that contain any form of plagiarism will be rejected without a review.
Paper Format
• All submissions must be in English and should adhere to the CCIS Conference Proceedings Format guidelines.
• Papers should not cross the 12-page limit including references and appendices.
• To facilitate the double-blind paper evaluation, authors are kindly requested to submit the paper WITHOUT any self-reference to any of the authors anywhere in the paper, including the acknowledgments section of the paper and any other reference that may disclose the authors’ identity.
• Papers should be uploaded to EasyChair in PDF format only. After the paper submission has been successfully completed, authors will receive an automatic confirmation e-mail.
Each paper should clearly indicate the nature of its technical/scientific contribution, and the problems, domains or environments to which it is applicable. All accepted papers will be compiled, and a selection of papers presented at the conference will be invited for extension and further review for a fast-tracked special issue of Information Systems Frontiers (SCIE, Scopus, and DBLP), a Springer journal.
Authors of registered papers (including posters) must guarantee that their papers will be presented at the conference. At least one FULL registration is mandatory for each accepted paper. Papers which are not presented will be excluded from the conference proceedings. Authors can visit for guidelines.


Related Resources

AIBTAI 2022   JISYS (OA) - Artificial Intelligence based Techniques and Applications for Intelligent IoT Systems
KSEM 2022   International Conference on Knowledge Science, Engineering and Management
Computer SI on SE4RAI 2023   IEEE Computer - Special Issue on Software Engineering for Responsible AI
EvoCompAISecurity&Privacy 2022   Evolutionary Computing for AI-Driven Security and Privacy: Advancing the state-of-the-art applications
ABDAI-Sanya 2022   2022 4th International Conference on Applications of Big Data and Artificial Intelligence(ABDAI 2022)
WSCIS 2022   2022 3rd International Workshop on Smart City and Intelligent Systems (WSCIS 2022)
SENSORS Special Issue 2022   'Next Generation of Secure and Resilient Healthcare Data Processing'
FLPRSCBN 2022   JISYS (OA) - Fuzzy Logic in Pattern Recognition for Secure Connected Biological Networks
WCMSE--Ei Compendex, Scopus 2022   2022 4th World Conference on Management Science and Engineering (WCMSE 2022)--Ei Compendex, Scopus