allconferencecfpalerts
   

Event       Publishers
  • Home
  • Login
  • Categories
  • Archive
  • Post Cfp
  • Academic Resources
  • Contact Us

 

4th ACM Workshop on Genetic and Evolutionary Computation in Defense, Security, and Risk Management

google+
Views: 760                 

When :  2017-07-15

Where :  Berlin,Germany

Submission Deadline :  2017-03-24

Categories :   Software Engineering & Security ,  Networks & Communications      

4th ACM Workshop on Genetic and Evolutionary Computation in Defense, Security, and Risk Management (SecDef 2017)
15-19 July 2017,Berlin,Germany

Call for Papers:

The Fourth ACM Workshop on Genetic and Evolutionary Computation in Defense, Security, and Risk Management (SecDef’2017) will be held in conjunction with the ACM Genetic and Evolutionary Computation Conference (GECCO) in Berlin, Germany, July 15-19, 2017.

With the constant appearance of new threats, research in the areas of defense, security and risk management has acquired an increasing importance over the past few years. These new challenges often require innovative solutions and computational intelligence techniques can play a significant role in finding them.
We invite both completed and work in progress, with the aim to encourage communication between active researchers and practitioners to better understand the current scope of efforts within this domain. The ultimate goal is to understand, discuss, and help set future directions for computational intelligence in security and defense problems.

We invite completed or ongoing work, with the aim to encourage communication between active researchers and practitioners to better understand the current scope of efforts within genetic and evolutionary computation on defense, security and risk. The ultimate goal is to understand, discuss, and help set future directions for our community.

Topics:

Authors are invited to submit papers that fall into or are related to one or multiple topic areas listed below:
• Security:
- Intrusion Detection
- Anomaly Detection
- Signature-Based Detection
- Behavior Monitoring
- Network Traffic Analysis
- System Data Analysis
- Application Data Analysis
- Attack Prevention and Defense Systems
- Threat Forecasting Systems
- Anti Spam and/or Antivirus Systems
- Bring Your Own Device
- Critical Infrastructure Protection
- Advanced Persistent Threats
• Defense:
- Design of Military Systems and Sub-Systems
- Logistics and Scheduling of Military Operations
- Strategic Planning and Tactical Decision Making
- Logistics and Scheduling of Military Operations
- Examining Tradeoffs in Military and Counter-Terrorism Procedures
- Automated Discovery of Tactics and Procedures for Military and Defense Systems
- Cyber Warfare
- Cyber Fraud
• Risk:
- Identification, Prevention, Monitoring, and Handling of Risks
- Risk Impact and Probability Estimation Systems
- Contingency Plans,
- Real Time Risk Management
- Policy Management

Important Dates:

  • Paper Submission Deadline: March 24, 2017
  • Acceptance Notification: April 15, 2017
  • Camera-Ready Papers: April 24, 2017
  • Workshop Date: July 15 - 16, 2017

User Name : shaun
Posted 16-02-2017 on 21:46:21 AEDT


Related CFPs

IJSPTM   International Journal of Security, Privacy and Trust Management
ICASIS 2026   The 4th International Conference on Advanced Sensing and Intelligent Systems
IJCACS   International Journal of Control, Automation, Communication and Systems
WiMNeT 2026   13th International Conference on Wireless and Mobile Network

All Rights Reserved @ Call for Papers - Conference & Journals