Organisers
Hongmei Heh.he@cranfield.ac.uk
Ashutosh Tiwari
A.Tiwari@cranfield.ac.uk
Jörn Mehnen
j.mehnen@cranfield.ac.uk
Tim Watson
tw@warwick.ac.uk
Yaochu Jin
yaochu.jin@surrey.ac.uk
Bogdan Gabrys
BGabrys@bournemouth.ac.uk
Internet of Things (IoT) delivers new value by connecting People, Process and Data. It brings great opportunities and is changing our life style. However, great opportunities also bring large risks that the IoT enabled systems could be threaten with various cyber-attacks, crimes and terrorism, as the IoT enabled systems produce a large cyber space. Hence, cyber security is particularly important in IoT enabled systems, and has raised much attention of researchers and industry recently. Evolutionary Computation and other Computational Intelligence techniques have been applied in various areas, such as computational biology, medical science, finance, engineering, etc. Cyber Security will be another area, where we can explore the power of Evolutional Computation and other Computational Intelligence techniques.
Scope and Topics
This special session will cover the following topics of Cyber Security enabled by Evolutionary Computation and other Computational Intelligence techniques, but not limited.- Bio-inspired cyber security architecture
- Cloud security
- Web spider defence
- Biometrics-based authentication
- Cyber-matrices based authentication
- Prediction of attacks
- Detection of spam emails
- Detection and analysis of malware
- Autonomous Security
- Information security
- Privacy and anonymity
- Secure protocols
- Adaptive, secure protocols
Submission
Please follow the IEEE CEC2016 instruction for authors and submit your paper via the IEEE CEC 2016 online submission system (http://ieee-cis.org/conferences/cec2016/upload.php). Please select ‘7az: Evolutionary Computation and Other Computational Intelligence Techniques for Cyber Security’ as the main research topic of your paper.Important Dates
Paper Submission Deadline: 15 Jan 2016Notification of Acceptance: 15 Mar 2016
Final Paper Submission Deadline: 15 Apr 2016
No comments:
Post a Comment
Note: only a member of this blog may post a comment.