Conference Information
CISDA 2016: IEEE Symposium on Computational Intelligence for Security and Defense Applications
http://www.ieeeottawa.ca/ci/cisda2016/Submission Date: |
2016-08-15 Extended |
Notification Date: |
2016-09-12 |
Conference Date: |
2016-12-06 |
Location: |
Athens, Greece |
Years: |
8 |
Viewed: 14046 Tracked: 0 Attend: 1
Call For Papers
Given the current global security environment, there has been increased interest within the security and defense communities in novel techniques for solving challenging problems. The genesis of this interest lies in the fact that repeated attempts of using traditional techniques have left many important problems unsolved, and in some cases, not addressed. New problems have emerged within the broad areas of security and defense that are difficult to tackle with conventional methods, thus requiring new techniques for detecting and adapting to emerging threats. The purpose of the symposium is to present current and ongoing efforts in computational intelligence (e.g., neural networks, fuzzy systems, evolutionary computation, swarm intelligence, and other emerging learning or optimization techniques) as applied to security and defense problems. Scope This symposium aims at publishing high-quality research efforts rooted in Computational Intelligence as applied to defense and security problems. First-class contributions addressing research challenges in these areas and their CI-based solutions (i.e., neural networks, fuzzy systems, evolutionary computation, swarm intelligence, rough sets, granular computing, and other emerging learning or optimization techniques) are solicited. List of topics Advanced Architectures for Defense Operations Multi-Sensor Data Fusion Hard-Soft Data Fusion Context-Aware Data Fusion Employment of Autonomous Vehicles Intelligence Gathering and Exploitation Mine Detection Situational Assessment Impact Assessment Process and User Refinement Automatic Target Recognition Mission Weapon Pairing and Assignment Sensor Cueing and Tasking Self-Healing Systems Modeling and Simulation of Defense Operations Logistics Support Mission Planning and Execution Resource Management Red Teaming Computational Red Teaming Course of Action Generation and Recommendation Models for War Games Risk-Aware Decision Support Multi-Agent Based Simulation Critical Infrastructure Protection Strategic Planning Counterterrorism and Counterinsurgency Behavioral or Cognitive Learning Human Modeling: Behavior, Emotion, Motion Security Applications Surveillance Suspect Behavior Profiling Anomaly Detection Automated Handling of Dangerous Situations or People Stationary or Mobile Object Detection, Recognition and Classification Intrusion Detection Systems Cyber-Security Air, Maritime and Land Security Network Security Biometrics Security Forensics Security Authentication Technologies
Last updated by Dou Sun in 2016-07-22
Related Conferences
Related Journals
CCF | Full Name | Impact Factor | Publisher | ISSN |
---|---|---|---|---|
b | IEEE Transactions on Evolutionary Computation | 14.30 | IEEE | 1089-778X |
Computational and Structural Biotechnology Journal | 4.400 | Elsevier | 2001-0370 | |
Frontiers in Robotics and AI | 2.900 | Frontiers Media S.A. | 2296-9144 | |
Computers & Operations Research | 4.100 | Elsevier | 0305-0548 | |
Journal of Information Science and Engineering | 1.100 | Institute of Information Science | 0000-0000 | |
ACM Transactions on Modeling and Performance Evaluation of Computing Systems | 0.700 | ACM | 2376-3639 | |
c | Journal of Cybersecurity | 2.900 | Oxford University Press | 2057-2093 |
Applied Mathematics & Optimization | 1.600 | Springer | 0095-4616 | |
b | IEEE/ACM Transactions on Computational Biology and Bioinformatics | 3.600 | IEEE/ACM | 1545-5963 |
IEEE Intelligent Systems | 5.600 | IEEE | 1541-1672 |
Full Name | Impact Factor | Publisher |
---|---|---|
IEEE Transactions on Evolutionary Computation | 14.30 | IEEE |
Computational and Structural Biotechnology Journal | 4.400 | Elsevier |
Frontiers in Robotics and AI | 2.900 | Frontiers Media S.A. |
Computers & Operations Research | 4.100 | Elsevier |
Journal of Information Science and Engineering | 1.100 | Institute of Information Science |
ACM Transactions on Modeling and Performance Evaluation of Computing Systems | 0.700 | ACM |
Journal of Cybersecurity | 2.900 | Oxford University Press |
Applied Mathematics & Optimization | 1.600 | Springer |
IEEE/ACM Transactions on Computational Biology and Bioinformatics | 3.600 | IEEE/ACM |
IEEE Intelligent Systems | 5.600 | IEEE |
Recommendation