TBA
IISA2017 | ISS: Intelligent Secured Systems
8290
singular,single,single-post,postid-8290,single-format-standard,ajax_fade,page_not_loaded,,qode-child-theme-ver-1.0.0,qode-theme-ver-3.1,wpb-js-composer js-comp-ver-4.11.1,vc_responsive
 

Blog

ISS: Intelligent Secured Systems

  |   Special Sessions   |   No comment

Cyber Security is an interdisciplinary area that focuses on maintaining and reducing risks to the confidentiality, integrity, and availability of information and resources in computer and network systems. The exchange and storage of electronic information must be protected to ensure business continuity within an institution…

Background and Goals

Cyber Security is an interdisciplinary area that focuses on maintaining and reducing risks to the confidentiality, integrity, and availability of information and resources in computer and network systems. The exchange and storage of electronic information must be protected to ensure business continuity within an institution. The challenges are high because of the number of people that can be affected when a single computer system or a network are comprised. Information systems can present vulnerabilities related to various threats whose sources can be of an intrinsic nature (design, technology, etc.) or human nature (external, internal, deliberate, mistake or negligence). These vulnerabilities have been increased because of computer commoditization, complexity, and ineffective automation. The complexity of modern systems and the diversity of threat vectors both social and technical, require intelligent, adaptive, multimodal solutions for which artificial intelligence (AI) approaches are well suited.

Topics of Interests
  • Machine Learning for Intrusion Detection Systems
  • NLP for text analysis in Cyber Security
  • Video and CCTV semantic analysis for terrorist or criminal action detection
  • AI & Biometrics
  • AI & SCADA systems security
  • AI & Network Systems security
  • AI & Embedded Systems security
  • AI & Internet of Things
  • AI & Cloud Computing security
  • Formal and theoretical approaches of intelligent security in WSNs
  • Legal and policy issues in intelligent security
  • Integrity, privacy, authentication and access control
  • Intelligent secure systems in multimedia databases
  • Social networks security
  • Intelligent incident response techniques in network and communication systems
  • Risk analysis and intelligent management
  • Virtual Private Network’s intelligent security
  • Automated reasoning techniques of incidents and evidence analysis
  • Evidentiary aspects of digital forensics
  • Collaborative intelligent investigation
  • Intelligent systems in management, storage and reassembly
  • Steganography, watermarking, and forensic techniques in multimedia content processing
  • Lightweight security techniques
  • Intelligent Large-scale investigations and Big Data
  • Innovative non-repudiation techniques
  • Intelligent vulnerability analysis and assessment
  • Attacks tracking
  • Data hiding, tamper detection and recovery techniques
  • Security of e- healthcare systems and applications
Chairs

Lamri Laouamer, Qassim University, KSA and University of Bretagne Occidentale, France (laoamr@qu.edu.sa)
Chutima Boonthum-Denecke, Hampton University, USA, (chutima.boonthum@hamptonu.edu )

Program Committee
Ismail Biskri, University of Quebec at Trois Rivieres, CANADA
Meryem ElMouhtadi, University of Mohammed V, Rabat, MOROCCO
Salah Zidi, Qassim University, KSA
Anca Chrisitine Pascu, University of Brest, FRANCE
Zaki Malik, Wayne State University, USA
Morad Benyoucef, University of Ottawa, CANADA
Saad Harous, United Arab Emirates University, UAE
Jackson Adams, Essex University, UK
Adel Alti, University of Setif II, ALGERIA
Sherif Sakr, University of New South Walls, AUSTRALIA
Ghazi Al-Naymat, Princess Sumaya University for Technology, JORDAN
Wail Mardini, Jordan University of Science and technology, JORDAN
Musab Ghadi, Lab-STICC, University of Bretagne Occidentale, FRANCE
Chaffa Hamrouni, ENIG, University of Gabes, Tunisia
Instructions of Authors

Papers must be submitted in IEEE Conference Style format, which can be downloaded from
http://www.ieee.org/conferences_events/conferences/publishing/templates.html
Papers must be limited to 6 pages in length. Please, check the website http://iisa2017.unipi.gr/ for further information.

Call for Papers

Cyber Security is an interdisciplinary area that focuses on maintaining and reducing risks to the confidentiality, integrity, and availability of information and resources in computer and network systems. The exchange and storage of electronic information must be protected to ensure business continuity within an institution. The challenges are high because of the number of people that can be affected when a single computer system or a network are comprised. Information systems can present vulnerabilities related to various threats whose sources can be of an intrinsic nature (design, technology, etc.) or human nature (external, internal, deliberate, mistake or negligence). These vulnerabilities have been increased because of computer commoditization, complexity, and ineffective automation. The complexity of modern systems and the diversity of threat vectors both social and technical, require intelligent, adaptive, multimodal solutions for which artificial intelligence (AI) approaches are well suited.
This track will focus on identifying state of the art artificial intelligence based solutions to problems related to cyber security. The objective of the track is to target researchers interested in all aspects of the application of artificial intelligence techniques to ensure high security and privacy of information. We are also interested in applications and case studies of intelligent secure systems in different practical domains. This track will be of interest to researchers and leading edge practitioners in academia, industry, and government agencies concerned with computer and network security.
– Original high quality papers are sought for leading edge research and applications relating to the application of AI and Cyber Security. Topics of interest may include but are not limited to:
Machine Learning for Intrusion Detection Systems
NLP for text analysis in Cyber Security
Video and CCTV semantic analysis for terrorist or criminal action detection
AI & Biometrics
AI & SCADA systems security
AI & Network Systems security
AI & Embedded Systems security
AI & Internet of Things
AI & Cloud Computing security
Formal and theoretical approaches of intelligent security in WSNs
Legal and policy issues in intelligent security
Integrity, privacy, authentication and access control
Intelligent secure systems in multimedia databases
Social networks security
Intelligent incident response techniques in network and communication systems
Risk analysis and intelligent management
Virtual Private Network’s intelligent security
Automated reasoning techniques of incidents and evidence analysis
Evidentiary aspects of digital forensics
Collaborative intelligent investigation
Intelligent systems in management, storage and reassembly
Steganography, watermarking, and forensic techniques in multimedia content processing
Lightweight security techniques
Intelligent Large-scale investigations and Big Data
Innovative non-repudiation techniques
Intelligent vulnerability analysis and assessment
Attacks tracking
Data hiding, tamper detection and recovery techniques
Security of e- healthcare systems and applications
Note: We invite original papers (i.e. work not previously submitted, in submission, or to be submitted to another conference during the reviewing process).
Submission Guidelines
Papers must be submitted in IEEE Conference Style format, which can be downloaded from
http://www.ieee.org/conferences_events/conferences/publishing/templates.html
Papers must be limited to 6 pages in length. Please, check the website http://iisa2017.unipi.gr/ for further information.

Important Dates
Important Dates
Paper Submission: April 24, 2017
Author Notification: May 29, 2017
Camera-Ready: June 12, 2017
Contact us
Lamri Laouamer, Qassim University, KSA and University of Bretagne Occidentale, France (laoamr@qu.edu.sa)
Chutima Boonthum-Denecke, Hampton University, USA, (chutima.boonthum@hamptonu.edu )