| |||||||||||||||
IEA/AIE.DMCIDFIA 2012 : Data Mining and Computational Intelligence for Digital Forensics and Information Assurance (DMCIDFIA) | |||||||||||||||
Link: http://ssdut.dlut.edu.cn/iea-aie/webpages/sessions.htm | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
IEA/AIE special session:
Data Mining and Computational Intelligence for Digital Forensics and Information Assurance (DMCIDFIA) Topic description: While advances in computer and communication technologies have greatly improved our daily activities in many ways, the unprecedented increase of digital crimes has become an inevitable challenge for the protection of public safety and national security. To efficiently defeat existing cyber crime activities, data mining and computational intelligence techniques have been proposed and applied to digital forensics and information assurance, e.g., the detection of intrusion activities, fraud behaviors, spam emails, and phishing URLs. In order to combat ever-evolving unpredictable digital crime activities, more sophisticated and intelligent methodologies need to be developed. Therefore, the objective of this special session is two-fold: to provide opportunities for sharing existing and new relevant research and to further promote the study of digital forensics and information assurance. Bridging the gap among data mining, computational intelligence, digital information forensics, and information assurance, it aims to enhance the communication and collaboration among the researchers and practitioners from academia, industry, and government. Session topics include but not limited to the followings: • Audit and audit reduction • Biometrics • Cloud security and forensics • Cybercriminal analysis • Data mining and applications in IA and DF • Digital Forensics • Electronic commerce security • Enterprise security • Fraud detection • Forgery detection • Information assurance • Intrusion detection and prevention • Malware detection • Mobile forensics and wireless security • Multimedia security and forensics • Network forensics • Privacy and data protection • Situation awareness and assessment • Social networking security • VoIP security • Web security Submission format: Please see the conference website at http://ssdut.dlut.edu.cn/iea-aie/webpages/index.htm Submission: http://www.easychair.org/conferences/?conf=ieaaie2012 Publications: Accepted papers will be published by Springer-Verlag (format instructions available at http://www.springer.de/comp/lncs/authors.html) in its 'Lecture Notes in Artificial Intelligence' series. Referees will be asked to nominate papers for a Best Paper Award to be announced at the conference. Outstanding papers in the session will be automatically considered for publication in an expanded form in selected international journals, including Applied Intelligence, Soft Computing, Evolutionary Intelligence, Journal of Ambient Intelligence and Humanized Computing. Session organizers: Dr. Lei Chen, Assistant Professor, Sam Houston State University, Huntsville, TX 77341, Email: chen@shsu.edu Dr. Hyuk Cho, Assistant Professor, Sam Houston State University, Huntsville, TX 77341, Email: hyukcho@shsu.edu Dr. Qingzhong Liu, Assistant Professor, Sam Houston State University, Huntsville, TX 77341, Email: liu@shsu.edu Important dates: Paper submission deadline: January 06, 2012 Notification deadline: February 6, 2012 Final camera deadline: March 1, 2012 |
|