CALL FOR PAPERS AI and CYBER-SECURITY Special Track at The 29th International FLAIRS Conference: http://www.flairs-29.info/ In cooperation with the American Association for Artificial Intelligence May 16 - 18, 2016
All accepted papers will be published as FLAIRS proceedings by AAAI SELECTED PAPERS WILL BE CONSIDERED FOR PUBLICATION IN JOURNAL OF INNOVATION IN DIGITAL ECOSYSTEMS BY ELSEVIER Important Dates Paper submission deadline: November 16, 2015.Notifications: January 18, 2016. Camera ready version due: February 22, 2016 Cyber Security is an interdisciplinary area that focuses on maintaining and reducing risks to the confidentiality, integrity, and availability of information and resources in computer and network systems. The exchange and storage of electronic information must be protected to ensure business continuity within an institution. The challenges are high because of the number of people that can be affected when a single computer system or a network are comprised. Information systems can present vulnerabilities related to various threats whose sources can be of an intrinsic nature (design, technology, etc.) or human nature (external, internal, deliberate, mistake or negligence). These vulnerabilities have been increased because of computer commoditization, complexity, and ineffective automation. The complexity of modern systems and the diversity of threat vectors both social and technical, require intelligent, adaptive, multimodal solutions for which artificial intelligence (AI) approaches are well suited. This track will focus on identifying state of the art artificial intelligence based solutions to problems related to cyber security. The objective of the track is to target researchers interested in all aspects of the application of artificial intelligence techniques to ensure high security and privacy of information. We are also interested in applications and case studies of intelligent secure systems in different practical domains. This track will be of interest to researchers and leading edge practitioners in academia, industry, and government agencies concerned with computer and network security. - Original high quality papers are sought for leading edge research and applications relating to the application of AI and Cyber Security. Topics of interest may include but are not limited to: · Machine Learning for Intrusion Detection Systems · NLP for text analysis in Cyber Security · Video and CCTV semantic analysis for terrorist or criminal action detection · AI & Biometrics · AI & SCADA systems security · AI & Network Systems security · AI & Embedded Systems security · AI & Internet of Things · AI & Cloud Computing security · Formal and theoretical approaches of intelligent security in WSNs · Legal and policy issues in intelligent security · Integrity, privacy, authentication and access control · Intelligent secure systems in multimedia databases · Social networks security · Intelligent incident response techniques in network and communication systems · Risk analysis and intelligent management · Virtual Private Network’s intelligent security · Automated reasoning techniques of incidents and evidence analysis · Evidentiary aspects of digital forensics · Collaborative intelligent investigation · Intelligent systems in management, storage and reassembly · Steganography, watermarking, and forensic techniques in multimedia content processing · Lightweight security techniques · Intelligent Large-scale investigations and Big Data · Innovative non-repudiation techniques · Intelligent vulnerability analysis and assessment · Attacks tracking · Data hiding, tamper detection and recovery techniques
· Security of e- healthcare systems and applications Note: We invite original papers (i.e. work not previously submitted, in submission, or to be submitted to another conference during the reviewing process).
Submission Guidelines Interested authors should format their papers according to AAAI formatting guidelines. Papers should not exceed 6 pages (4 pages for a poster) and are due by November 16, 2015. All FLAIRS papers are reviewed using a double blind process. Fake author names and affiliations must be used on submitted papers. Papers must be submitted as PDF through the EasyChair conference system, which can be accessed through the main conference web site (http://www.flairs-29.info/). Note: do not use a fake name for your EasyChair login - your EasyChair account information is hidden from reviewers. Authors should indicate the AI and Cyber Security special track for submissions. The proceedings of FLAIRS will be published by the AAAI. Authors of accepted papers will be required to sign a form transferring copyright of their contribution to AAAI. FLAIRS requires that there be at least one full author registration per paper. Please, check the website http://www.flairs-29.info/ for further information. Track Co-chairs · Lamri Laouamer, Qassim University, KSA and University of Bretagne Occidentale, France (laoamr@qu.edu.sa) · Anca Pascu, University of Bretagne Occidentale, France, Anca.Pascu@univ-brest.fr · Laurent T. Nana, University of Bretagne Occidentale, France, (nana@univ-brest.fr ) · Chutima Boonthum-Denecke, Hampton University (chutima.boonthum@hamptonu.edu ) · Soon Ae Chun, City University of New York (soon.chun@csi.cuny.edu ) · Ricardo A. Calix, Purdue University Calumet (ricardo.calix@purduecal.edu )
· David Bisant, Central Security Services (bisant@umbc.edu) Program Committee ( to be completed) Ismail Biskri, University of Quebec at Trois Rivieres, CANADA Salah Zidi, Qassim University, KSA Zaki Malik, Wayne State University, USA Bechir Alaya, Qassim University, KSA Morad
Benyoucef, University of Ottawa,
CANADA Saad Harous, United Arab Emirates University, UAE Rebecca Caldwell, WSSU University, North Carolina, USA Thorna Humphries, NSU University, USA Yen-Hung Hu, NSU University, USA Moayed Daneshyari, Hampton University, Virginia, USA Jackson Adams, Essex University, UK Tarek Moulahi, Qassim University, KSA Adel Alti, University of Setif II, ALGERIA Elva Jones, WSSU University, North Carolina, USA Sherif Sakr, University of New South Walls, AUSTRALIA Ghazi Al-Naymat, Princess Sumaya University for Technology, JORDAN Nora Cuppens, Télécom Bretagne, FRANCE Frédéric Cuppens, Télécom Bretagne, FRANCE Caroline Fontaine, Télécom Bretagne, FRANCE Gouenou Coatrieux, Télécom Bretagne, FRANCE David Espes, University of Bretagne Occidentale, FRANCE Muath AlShaikh, Lab-STICC, UBO, FRANCE Musab Ghadi, University of Bretagne Occidentale, FRANCE William Puech, LIRMM, University of Montpellier, FRANCE Alfredo Cuzzocrea, University of Trieste, ITALY Wail Mardini, Jordan University of Science and technology, JORDAN Omar Tayan, NOOR IT Center, Taibah University, KSA Steven Jilcott, Raytheon BBN Technologies, USA Invited Speakers To be announced |