In the last years, significant work has been undertaken by Governments and local agencies with respect to the protection of critical infrastructures and public-private sector coordination in the event of a cyber-attack. Threats to cities and their social infrastructures, e.g. from crime, and terrorism, endanger human life directly and indirectly. Resilience of critical infrastructures is gaining importance as a core concept to cope with such threats. In general, this means strengthening social infrastructures to prevent or mitigate such threats and to consistently deliver the intended services in a trustworthy and "normal" way even in changing situations.
Information and communication infrastructure (ICT) is a primary part of the social infrastructure and therefore one of the central objects of these attacks. As a consequence, effective response capabilities must be properly organized and closely coordinated because, at the time of a cyber-attack, it is not possible to immediately determine whether the attacker is a script kiddie, an insider, a rogue actor (organized crime, terrorist organization, or radical), or a nation state. Unlike traditional Defense categories (i.e., land, air, and sea), the capabilities required to respond to an attack on criticalinfrastructures will necessarily involve infrastructure owned and operated by both the public and the private sector.
This Workshop aims at bringing together leading researchers and practitioners from academia, government, and industry to discuss novel research contributions related to any area of Security and Cognitive Informatics for Homeland Defense.
• Homeland Security and Information Processing
• Personal Security and Biometric
• Intelligent Robots and Unmanned Vehicles
• Target and Pattern Recognition
• Sensor and Data Analysis
• Semantic Image and Data Processing
• Information Fusion
• Advanced Vision Algorithms
• Security in Ambient Intelligence
• Context- and Location-aware Computing
• Embedded systems in Security
• Knowledge-based Systems for Internet Security
• Security issues and protocols for Internet services
• Privacy and trust for Internet services
• Artificial Intelligence and Computational intelligence
• Cognitive informatics
• Cognitive models of the brain
• Mathematical foundations of computing and cryptography
• Cognitive image and scene understanding
• Intelligent Health Technologies
User Name : shaun
Posted 16-09-2016 on 11:16:32 AEDT