Artificial Intelligence & Cyber-Security Track

                           
                                      

CALL FOR PAPERS

AI and CYBER-SECURITY

Special Track at

The 29th International FLAIRS Conference:    http://www.flairs-29.info/

In cooperation with the American Association for Artificial Intelligence

KeyLargo, Florida

May 16 - 18, 2016

                                    
                                                  


All accepted papers will be published as FLAIRS proceedings by AAAI 

SELECTED PAPERS WILL BE CONSIDERED FOR PUBLICATION IN JOURNAL OF INNOVATION IN DIGITAL ECOSYSTEMS BY ELSEVIER


Important Dates

Paper submission deadline: November 16, 2015. 
Notifications: January 18, 2016. 
Camera ready version due: February 22, 2016


Cyber Security is an interdisciplinary area that focuses on maintaining and reducing risks to the confidentiality, integrity, and availability of information and resources in computer and network systems.  The exchange and storage of electronic information must be protected to ensure business continuity within an institution. The challenges are high because of the number of people that can be affected when a single computer system or a network are comprised. Information systems can present vulnerabilities related to various threats whose sources can be of an intrinsic nature (design, technology, etc.) or human nature (external, internal, deliberate, mistake or negligence). These vulnerabilities have been increased because of computer commoditization, complexity, and ineffective automation. The complexity of modern systems and the diversity of threat vectors both social and technical, require intelligent, adaptive, multimodal solutions for which artificial intelligence (AI) approaches are well suited.

This track will focus on identifying state of the art artificial intelligence based solutions to problems related to cyber security. The objective of the track is to target researchers interested in all aspects of the application of artificial intelligence techniques to ensure high security and privacy of information. We are also interested in applications and case studies of intelligent secure systems in different practical domains. This track will be of interest to researchers and leading edge practitioners in academia, industry, and government agencies concerned with computer and network security. 

- Original high quality papers are sought for leading edge research and applications relating to the application of AI and Cyber Security.  Topics of interest may include but are not limited to:

·         Machine Learning for Intrusion Detection Systems

·         NLP for text analysis in Cyber Security

·         Video and CCTV semantic analysis for terrorist or criminal action detection

·         AI & Biometrics

·         AI & SCADA systems security

·         AI & Network Systems security

·         AI & Embedded Systems security

·         AI & Internet of Things

·         AI & Cloud Computing security

·         Formal and theoretical approaches of intelligent security in WSNs

·         Legal and policy issues in intelligent security

·         Integrity, privacy, authentication and access control

·         Intelligent secure systems in multimedia databases

·         Social networks security

·         Intelligent incident response techniques in network and communication systems

·         Risk analysis and intelligent management

·         Virtual Private Network’s intelligent security

·         Automated reasoning techniques of incidents and evidence analysis

·         Evidentiary aspects of digital forensics

·         Collaborative intelligent investigation

·         Intelligent systems in management, storage and reassembly

·         Steganography, watermarking, and forensic techniques in multimedia content processing

·         Lightweight security techniques

·         Intelligent Large-scale investigations and Big Data

·         Innovative non-repudiation techniques

·         Intelligent vulnerability analysis and assessment

·         Attacks tracking

·         Data hiding, tamper detection and recovery techniques

·         Security of e- healthcare systems and applications 


Note: We invite original papers (i.e. work not previously submitted, in submission, or to be submitted to another conference during the reviewing process).

 

Submission Guidelines

Interested authors should format their papers according to AAAI formatting guidelines. Papers should not exceed 6 pages (4 pages for a poster) and are due by November 16, 2015. All FLAIRS papers are reviewed using a double blind process. Fake author names and affiliations must be used on submitted papers. Papers must be submitted as PDF through the EasyChair conference system, which can be accessed through the main conference web site (http://www.flairs-29.info/). Note: do not use a fake name for your EasyChair login - your EasyChair account information is hidden from reviewers. Authors should indicate the AI and Cyber Security special track for submissions. The proceedings of FLAIRS will be published by the AAAI. Authors of accepted papers will be required to sign a form transferring copyright of their contribution to AAAI. FLAIRS requires that there be at least one full author registration per paper.

Please, check the website http://www.flairs-29.info/  for further information.


Track Co-chairs

·         Lamri Laouamer, Qassim University, KSA and University of Bretagne Occidentale, France (laoamr@qu.edu.sa)

·         Anca Pascu, University of Bretagne Occidentale, France, Anca.Pascu@univ-brest.fr

·         Laurent T. Nana, University of Bretagne Occidentale, France, (nana@univ-brest.fr )

·         Chutima Boonthum-Denecke, Hampton University (chutima.boonthum@hamptonu.edu )

·         Soon Ae Chun, City University of New York (soon.chun@csi.cuny.edu )

·         Ricardo A. Calix, Purdue University Calumet (ricardo.calix@purduecal.edu )

·         David Bisant, Central Security Services (bisant@umbc.edu)


Program Committee ( to be completed)

Ismail Biskri, University of Quebec at Trois Rivieres, CANADA

Salah Zidi, Qassim University, KSA

Zaki Malik, Wayne State University, USA

Bechir Alaya, Qassim University, KSA

Morad Benyoucef, University of Ottawa, CANADA

Saad Harous, United Arab Emirates University, UAE

Rebecca Caldwell, WSSU University, North Carolina, USA

Thorna Humphries, NSU University, USA

Yen-Hung Hu, NSU University, USA 

Moayed Daneshyari, Hampton University, Virginia, USA

Jackson Adams, Essex University, UK

Tarek Moulahi, Qassim University, KSA

Adel Alti, University of Setif II, ALGERIA

Elva  Jones, WSSU University, North Carolina, USA

Sherif Sakr, University of New South Walls, AUSTRALIA

Ghazi Al-Naymat, Princess Sumaya University for Technology, JORDAN

Nora Cuppens, Télécom Bretagne, FRANCE

Frédéric Cuppens, Télécom Bretagne, FRANCE

Caroline Fontaine, Télécom Bretagne, FRANCE

Gouenou Coatrieux, Télécom Bretagne, FRANCE

David Espes, University of Bretagne Occidentale, FRANCE

Muath AlShaikh, Lab-STICC, UBO, FRANCE

Musab Ghadi, University of Bretagne Occidentale, FRANCE

William Puech, LIRMM, University of Montpellier, FRANCE

Alfredo Cuzzocrea, University of Trieste, ITALY

Wail Mardini, Jordan University of Science and technology, JORDAN

Omar Tayan, NOOR IT Center, Taibah University, KSA

Steven Jilcott, Raytheon BBN Technologies, USA


Invited Speakers

To be announced