Conference Information
CISDA 2016 : IEEE Symposium on Computational Intelligence for Security and Defense Applications
Submission Date:
2016-08-15 Extended
Notification Date:
Conference Date:
Athens, Greece
Viewed: 5104   Tracked: 0   Attend: 1

Conference Location
Call For Papers
Given the current global security environment, there has been increased interest within the security and defense communities in novel techniques for solving challenging problems. The genesis of this interest lies in the fact that repeated attempts of using traditional techniques have left many important problems unsolved, and in some cases, not addressed. New problems have emerged within the broad areas of security and defense that are difficult to tackle with conventional methods, thus requiring new techniques for detecting and adapting to emerging threats.

The purpose of the symposium is to present current and ongoing efforts in computational intelligence (e.g., neural networks, fuzzy systems, evolutionary computation, swarm intelligence, and other emerging learning or optimization techniques) as applied to security and defense problems.


This symposium aims at publishing high-quality research efforts rooted in Computational Intelligence as applied to defense and security problems. First-class contributions addressing research challenges in these areas and their CI-based solutions (i.e., neural networks, fuzzy systems, evolutionary computation, swarm intelligence, rough sets, granular computing, and other emerging learning or optimization techniques) are solicited.

List of topics

Advanced Architectures for Defense Operations

    Multi-Sensor Data Fusion
    Hard-Soft Data Fusion
    Context-Aware Data Fusion
    Employment of Autonomous Vehicles
    Intelligence Gathering and Exploitation
    Mine Detection
    Situational Assessment
    Impact Assessment
    Process and User Refinement
    Automatic Target Recognition
    Mission Weapon Pairing and Assignment
    Sensor Cueing and Tasking
    Self-Healing Systems

Modeling and Simulation of Defense Operations

    Logistics Support
    Mission Planning and Execution
    Resource Management
    Red Teaming
    Computational Red Teaming
    Course of Action Generation and Recommendation
    Models for War Games
    Risk-Aware Decision Support
    Multi-Agent Based Simulation
    Critical Infrastructure Protection
    Strategic Planning
    Counterterrorism and Counterinsurgency
    Behavioral or Cognitive Learning
    Human Modeling: Behavior, Emotion, Motion

Security Applications

    Suspect Behavior Profiling
    Anomaly Detection
    Automated Handling of Dangerous Situations or People
    Stationary or Mobile Object Detection, Recognition and Classification
    Intrusion Detection Systems
    Air, Maritime and Land Security
    Network Security
    Biometrics Security
    Forensics Security
    Authentication Technologies
Last updated by Dou Sun in 2016-07-22
Related Publications
Related Conferences
CCFCOREQUALISShortFull NameSubmissionNotificationConference
cSIEDSIEEE Systems and Information Engineering Design Symposium2015-02-092015-03-022015-04-24
EMSEInternational Conference on Education, Management and Systems Engineering2017-05-11 2017-05-21
ICIECAInternational Conference on Innovative trends in Electronics Communication and Applications2015-10-302015-11-102015-12-19
ICECCInternational Conference on Electronics, Communications and Control Engineering2017-12-012017-12-202018-03-06
cab1SATInternational Conference on Theory and Applications of Satisfiability Testing2016-02-142016-04-032016-07-05
ICETCSITInternational Conference on Emerging Trends in Computer Science & Information Technology2013-03-152013-03-152013-03-16
CogInfoComIEEE International Conference on Cognitive InfoCommunications2016-07-152016-08-152016-10-16
ICCS''International Cloud Computing Summit2012-07-302012-08-302012-10-24
cb1SEAAEuromicro Conference on Software Engineering and Advanced Applications2018-03-012018-05-152018-08-29