Conference Information
CISDA 2016: IEEE Symposium on Computational Intelligence for Security and Defense Applications
http://www.ieeeottawa.ca/ci/cisda2016/Submission Date: |
2016-08-15 Extended |
Notification Date: |
2016-09-12 |
Conference Date: |
2016-12-06 |
Location: |
Athens, Greece |
Years: |
8 |
Viewed: 16814 Tracked: 0 Attend: 1
Call For Papers
Given the current global security environment, there has been increased interest within the security and defense communities in novel techniques for solving challenging problems. The genesis of this interest lies in the fact that repeated attempts of using traditional techniques have left many important problems unsolved, and in some cases, not addressed. New problems have emerged within the broad areas of security and defense that are difficult to tackle with conventional methods, thus requiring new techniques for detecting and adapting to emerging threats.
The purpose of the symposium is to present current and ongoing efforts in computational intelligence (e.g., neural networks, fuzzy systems, evolutionary computation, swarm intelligence, and other emerging learning or optimization techniques) as applied to security and defense problems.
Scope
This symposium aims at publishing high-quality research efforts rooted in Computational Intelligence as applied to defense and security problems. First-class contributions addressing research challenges in these areas and their CI-based solutions (i.e., neural networks, fuzzy systems, evolutionary computation, swarm intelligence, rough sets, granular computing, and other emerging learning or optimization techniques) are solicited.
List of topics
Advanced Architectures for Defense Operations
Multi-Sensor Data Fusion
Hard-Soft Data Fusion
Context-Aware Data Fusion
Employment of Autonomous Vehicles
Intelligence Gathering and Exploitation
Mine Detection
Situational Assessment
Impact Assessment
Process and User Refinement
Automatic Target Recognition
Mission Weapon Pairing and Assignment
Sensor Cueing and Tasking
Self-Healing Systems
Modeling and Simulation of Defense Operations
Logistics Support
Mission Planning and Execution
Resource Management
Red Teaming
Computational Red Teaming
Course of Action Generation and Recommendation
Models for War Games
Risk-Aware Decision Support
Multi-Agent Based Simulation
Critical Infrastructure Protection
Strategic Planning
Counterterrorism and Counterinsurgency
Behavioral or Cognitive Learning
Human Modeling: Behavior, Emotion, Motion
Security Applications
Surveillance
Suspect Behavior Profiling
Anomaly Detection
Automated Handling of Dangerous Situations or People
Stationary or Mobile Object Detection, Recognition and Classification
Intrusion Detection Systems
Cyber-Security
Air, Maritime and Land Security
Network Security
Biometrics Security
Forensics Security
Authentication Technologies
Last updated by Dou Sun in 2016-07-22
Related Conferences
| Short | Full Name | Conference |
|---|---|---|
| ISDA | International Conference on Intelligent Systems Design and Applications | 2022-12-12 |
| AIA' | International Conference on Artificial Intelligence and Application | 2026-06-11 |
| AIA | International Conference on Artificial Intelligence and Applications | 2013-02-11 |
| CIG | IEEE Conference on Computational Intelligence and Games | 2015-08-31 |
| ACSAC | Annual Computer Security Applications Conference | 2025-12-09 |
| INISTA | International Symposium on INnovations in Intelligent SysTems and Applications | 2025-10-29 |
| ICCSA | International Conference on Computational Science and Its Applications | 2022-07-04 |
| ICCCI'' | International Conference on Computational Collective Intelligence Technologies and Applications | 2017-09-27 |
| CIS | International Conference on Computational Intelligence and Security | 2020-11-27 |
| CIMSA | International Conference on Computational Intelligence for Measurement Systems and Applications | 2012-07-02 |
Related Journals
| CCF | Full Name | Impact Factor | Publisher | ISSN |
|---|---|---|---|---|
| c | International Journal of Computational Intelligence and Applications | World Scientific | 1469-0268 | |
| Computational Intelligence and Neuroscience | Hindawi | 1687-5265 | ||
| International Journal on Computational Science & Applications | AIRCC | 2200-0011 | ||
| Journal of Computational Analysis and Applications | Springer | 1521-1398 | ||
| International Journal on Soft Computing, Artificial Intelligence and Applications | AIRCC | 2319-4081 | ||
| International Journal of Computational Geometry and Applications | World Scientific | 0218-1959 | ||
| International Journal of Artificial Intelligence & Applications | AIRCC | 0976-2191 | ||
| c | Journal of Information Security and Applications | 3.800 | Elsevier | 2214-2126 |
| IEEE Transactions on Computational Intelligence and AI in Games | IEEE | 1943-068X | ||
| c | Computational Intelligence | 1.800 | John Wiley & Sons, Ltd. | 1467-8640 |
| Full Name | Impact Factor | Publisher |
|---|---|---|
| International Journal of Computational Intelligence and Applications | World Scientific | |
| Computational Intelligence and Neuroscience | Hindawi | |
| International Journal on Computational Science & Applications | AIRCC | |
| Journal of Computational Analysis and Applications | Springer | |
| International Journal on Soft Computing, Artificial Intelligence and Applications | AIRCC | |
| International Journal of Computational Geometry and Applications | World Scientific | |
| International Journal of Artificial Intelligence & Applications | AIRCC | |
| Journal of Information Security and Applications | 3.800 | Elsevier |
| IEEE Transactions on Computational Intelligence and AI in Games | IEEE | |
| Computational Intelligence | 1.800 | John Wiley & Sons, Ltd. |