Conference Information
CISDA 2016: IEEE Symposium on Computational Intelligence for Security and Defense Applications
Submission Date:
2016-08-15 Extended
Notification Date:
Conference Date:
Athens, Greece
Viewed: 11890   Tracked: 0   Attend: 1

Call For Papers
Given the current global security environment, there has been increased interest within the security and defense communities in novel techniques for solving challenging problems. The genesis of this interest lies in the fact that repeated attempts of using traditional techniques have left many important problems unsolved, and in some cases, not addressed. New problems have emerged within the broad areas of security and defense that are difficult to tackle with conventional methods, thus requiring new techniques for detecting and adapting to emerging threats.

The purpose of the symposium is to present current and ongoing efforts in computational intelligence (e.g., neural networks, fuzzy systems, evolutionary computation, swarm intelligence, and other emerging learning or optimization techniques) as applied to security and defense problems.


This symposium aims at publishing high-quality research efforts rooted in Computational Intelligence as applied to defense and security problems. First-class contributions addressing research challenges in these areas and their CI-based solutions (i.e., neural networks, fuzzy systems, evolutionary computation, swarm intelligence, rough sets, granular computing, and other emerging learning or optimization techniques) are solicited.

List of topics

Advanced Architectures for Defense Operations

    Multi-Sensor Data Fusion
    Hard-Soft Data Fusion
    Context-Aware Data Fusion
    Employment of Autonomous Vehicles
    Intelligence Gathering and Exploitation
    Mine Detection
    Situational Assessment
    Impact Assessment
    Process and User Refinement
    Automatic Target Recognition
    Mission Weapon Pairing and Assignment
    Sensor Cueing and Tasking
    Self-Healing Systems

Modeling and Simulation of Defense Operations

    Logistics Support
    Mission Planning and Execution
    Resource Management
    Red Teaming
    Computational Red Teaming
    Course of Action Generation and Recommendation
    Models for War Games
    Risk-Aware Decision Support
    Multi-Agent Based Simulation
    Critical Infrastructure Protection
    Strategic Planning
    Counterterrorism and Counterinsurgency
    Behavioral or Cognitive Learning
    Human Modeling: Behavior, Emotion, Motion

Security Applications

    Suspect Behavior Profiling
    Anomaly Detection
    Automated Handling of Dangerous Situations or People
    Stationary or Mobile Object Detection, Recognition and Classification
    Intrusion Detection Systems
    Air, Maritime and Land Security
    Network Security
    Biometrics Security
    Forensics Security
    Authentication Technologies
Last updated by Dou Sun in 2016-07-22
Related Conferences
Related Journals