AI and Cyber Security

Special Track at

The 30th International FLAIRS Conference

In cooperation with the American Association for Artificial Intelligence

Hilton, Marco Island, Florida

May 22 - 24, 2017

Paper submission deadline: November 21, 2016. 
Notifications: January 23, 2017.

Camera ready version due: February 27, 2017.


  • All accepted papers are published as FLAIRS proceedings by the AAAI.
  • Selected papers will be invited for publication in a special issue for Journal of Innovation in Digital Ecosystems by Elsevier

Accepted Papers

  • Maryam Najafabadi, Taghi Khoshgoftaar, Chad Calvert and Cliff Kemp. A Text Mining Approach for Anomaly Detection in Application Layer DDoS Attacks
  • Lenin Mookiah, Chris Dean and William Eberle. Graph-Based Anomaly Detection on Smart Grid Data
  • Chulwoo Kim, Sung-Hyuk Cha, Yoo Jung An and Ned Wilson. On ROC Curve Analysis of Artificial Neural Network Classifiers

Call for Papers

Cyber Security is an interdisciplinary area that focuses on maintaining and reducing risks to the confidentiality, integrity, and availability of information and resources in computer and network systems. The exchange and storage of electronic information must be protected to ensure business continuity within an institution. Due to the hyper connectivity and interdependency in digital space, the cybersecurity risks and damages are high, because the breaches can not only affect the assets and people within a single organization, but result in damages that may not be easily assessed.  Information systems can present vulnerabilities related to various threats whose sources can be of an intrinsic nature (design, technology, etc.) or human nature (external, internal, deliberate, mistake or negligence). These vulnerabilities are increasing because of computer commoditization, complexity, and ineffective automation. The complexity of modern systems and the diversity of threat vectors (both social and technical) require intelligent, adaptive, multimodal solutions for which artificial intelligence (AI) approaches are well suited. Various AI and data mining approaches leveraging the use of machine learning have been improving information security applications.


This track will focus on featuring state of the art artificial intelligence based solutions to cyber security to protect critical infrastructure.  Specifically, priority areas include: (1) security analytics using data mining and machine learning techniques to identify, detect, protect, and analyze risks, events, dissemination behaviors and patterns, (2) advancing innovations to design intelligent protection and control mechanisms; (3) AI techniques for intelligent forensics of incidents and evidence; (4) collaboration for enhancing cybersecurity, and (5) various domain specific applications for cybersecurity and privacy issues.


The objective of the track is to target researchers interested in all aspects of the application of AI techniques to ensure security and privacy of information. We are also interested in applications and case studies of intelligent secure systems in different practical domains. This track will be of interest to researchers and leading edge practitioners in academia, industry, and government agencies concerned with all aspects of cybersecurity, including computer, network and data security, socio-technical security and privacy issues such as human behavior and motivation modeling for automated security detection and solutions.  


Original high quality papers are sought for leading edge research and applications relating to the application of AI and Cyber Security.  Topics of interest may include but are not limited to


Security Data Analytics, Machine Learning, Data Mining

·         Big Data analysis for Cyber Security applications

·         Intelligent Large-scale investigations and Big Data

·         Intelligent vulnerability analysis and assessment

·         Cyber crime analytics

·         Cyber attack behavior modeling

·         Pattern recognition, computer vision and image processing for Cyber Security

·         Machine Learning for Intrusion Detection Systems

·         Video and CCTV semantic analysis for terrorist or criminal action detection

·         NLP for text analysis in Cyber Security

·         Privacy-preserving data mining

Security Infrastructure:  Controls and mechanisms

·         AI & Biometrics

·         Security of Cyber Physical Systems, SCADA Systems

·         AI & Network Systems security

·         AI & Embedded Systems security

·         AI & Internet of Things

·         AI & Cloud Computing security

·         Formal and theoretical approaches of intelligent security

·         Legal and policy issues in intelligent security

·         Integrity, privacy, authentication and access control

·         Intelligent secure systems in multimedia databases

·         Social networks security

·         Mobile security

Forensics and incident responses

·         Intelligent incident response techniques in network and communication systems

·         Risk analysis and intelligent management

·         Digital forensics, software security and malicious software (malware) detection

·         Automated reasoning techniques of incidents and evidence analysis

·         Evidentiary aspects of digital forensics

·         Steganography, watermarking, and forensic techniques in multimedia content processing

·         Attacks tracking

·         Data hiding, tamper detection and recovery techniques

Collaboration in Cybersecurity

·         Collaborative intelligence investigation

·         Intelligent systems in management, storage and reassembly

·         Lightweight security techniques

·         Innovative non-repudiation techniques

·         Global cyber security – monitoring, collaborative investigations

Cybersecurity Applications

·         Security of e-healthcare systems and other applications

·         Security and privacy engineering, ontology and reasoning

·         Cybersecurity, cyber intelligence:  education and training

·         Cyberwarfare and military applications of security

·         Cyber defense policies and strategies

Note: We invite original papers (i.e. work not previously submitted, in submission, or to be submitted to another conference during the reviewing process). 


Submission Guidelines

Interested authors should format their papers according to AAAI formatting guidelines. Papers should not exceed 6 pages (4 pages for a poster) and are due by November 21, 2016. All FLAIRS papers are reviewed using a double blind process. Fake author names and affiliations must be used on submitted papers. Papers must be submitted as PDF through the EasyChair conference system, which can be accessed through the main conference web site ( Note: do not use a fake name for your EasyChair login - your EasyChair account information is hidden from reviewers. Authors should indicate the AI and Cyber Security special track for submissions. The proceedings of FLAIRS will be published by the AAAI. Authors of accepted papers will be required to sign a form transferring copyright of their contribution to AAAI. FLAIRS requires that there be at least one full author registration per paper.

Conference Proceedings

Papers will be refereed and all accepted papers will appear in the conference proceedings, which will be published by AAAI Press.