International Conference on Computational Intelligence in Security for Information Systems (CISIS)

June 24th, 2020

 June 24th, 2020 - June 26th, 2020 

International Conference on Computational Intelligence in Security for Information Systems (CISIS)

Event submitted on Friday, October 18th 2019, approved by Charles Villanueva

June 24th, 2020 - June 26th, 2020
Spain » 
Event Website

 Our Review

This event is for academic researchers who are focused on topics related to Computational Intelligence, Information Security, and Data Mining. They have a wide range of topics so if you have a research paper hidden somewhere, now is the time to get it and submit to this event.

Event Summary

The description below was submitted by the Conference Organizer on Friday, October 18th 2019.

favouriteLoadingAdd this conference to your favourites

The aim of CISIS is to provide a meeting place for industry-related and academic researchers belonging to the different, vast communities of Computational Intelligence, Information Security, and Data Mining.

The need for intelligent, flexible behaviour by large, complex systems, especially in mission-critical domains, is intended to be the catalyst and the aggregation stimulus for the overall event. In conjunction with: 11th International Conference on European Transnational Educational ICEUTE 2020 and 15th International Conference on Soft Computing Models in Industrial and Environmental Applications SOCO 2020.

The topics of interest include, but are not limited to (related to Security for Information Systems):

  • Machine Learning for Data Mining
  • Data Mining Methods for Security
  • Agent and Multi-Agent Systems
  • Hybrid Systems
  • Unsupervised Learning
  • Classification Methods
  • Novelty Detection
  • Intrusion Detection Systems
  • Log Correlation Methods
  • Adaptive Defense of Network Infrastucture
  • Adaptive Reasoning
  • Information Forensics
  • Document Classification and Processing
  • Ontologies and Conceptual Information Processing
  • Semantic Information Representation
  • Natural Language Acquisition
  • Web Semantics in Intelligence and Law-Enforcement
  • Industrial and Commercial Applications of Intelligent Methods for Security
  • Intelligent Control and Monitoring of Critical Systems
  • Dynamic Adaptive Railway Operation
  • Centralized Control Systems
  • Adaptive Planning for Strategic Reasoning
  • Intelligent Methods in Energy and Transportation
  • Planning and Automated Reasoning in Large System Control
  • Biometric Identification and Recognition
  • Biometric Surveillance
  • Biometric Access Control
  • Extraction of Biometric Features (fingerprint, iris, face, voice, palm, gait)
  • Cryptography
  • Applied Cryptography and provably-secure cryptographic protocols
  • Design and analysis of efficient cryptographic primitives:
  • public-key and symmetric-key cryptosystems, block ciphers, and hash functions
  • Economic fraud on the Internet: phishing, pharming, spam, and click fraud
  • Email and web security
  • Intellectual property protection:
  • metering, watermarking, and digital rights management.
  • Computer Science, namely on HPC and Grid computing issues
  • Computational Sciences, with requirements in HPC and Grid
  • Computational Engineering with a similar focus.
  • Grid Middleware, Grid Computing, Data and Networking Infrastructures
  • Distributed and Large-Scale Data Access and Management
  • Data Repositories, Distributed Resource Management and Scheduling
  • Supercomputer/cluster/grid integration issues
  • Grid Performance Evaluation, QoS and SLA Negotiation
  • Grid and HPC Applications, including e-Science in general and also Science Gateways, Nanomaterials, High Energy Physics, e-Health, e-Business, e-Administration, Life Sciences, Earth
  • Sciences, Civil Protection, Computational Sciences and Engineering, …
  • User Development Environments and Programming Tools for Grid Computing.
  • Infrastructure as a service (IaaS)
  • Virtualization in data centers
  • Virtualization for resource management and QoS assurance
  • Security aspects of using virtualization in a distributed environment
  • Virtual networks
  • Virtual data, storage as a service
  • Fault tolerance in virtualized environments
  • Virtualization in P2P systems
  • Virtualization-based adaptive/autonomic systems
  • The creation and management of environments/appliances
  • Virtualization technologies
  • Performance modeling (applications and systems)
  • Virtualization techniques for energy/thermal management
  • Case studies of applications on IaaS platforms
  • Deployment studies of virtualization technologies
  • Tools relevant to virtualization

Submit a review for this event.

Did you attend International Conference on Computational Intelligence in Security for Information Systems (CISIS)? Let us know how it was and share your experience with the greater community.