Location: Home > Call for Paper

Call for Paper

   CIS'12 Call for Papers (PDF Format, 689 KB)

    International Conference on Computational Intelligence and Security (CIS) is a major annual international conference to bring together researchers, engineers, developers and practitioners from academia and industry working in all areas of two crucial fields in information processing: computational intelligence (CI) and information security(IS), to share the experience, exchange and cross-fertilize ideas. In particular,the series of CIS conference provides an ideal platform to explore the otential applications of CI models, algorithms and technologies to IS.

    Following the great success of CIS'2005-2011, the eighth conference CIS'2012 serves as a forum for the dissemination of the state-of-the-art research, development, and implementations of systems, technologies and applications in these two broad fields. CIS'2012 is organized by Guangdong University of Technology. Also, it is co-sponsored by Xidian University and  and Beijing Normal University. CIS'2012 will be held at Guangzhou, GuangDong Province, China on November 17-18, 2012.

   Prospective authors are invited to submit high-quality manuscripts written in English.

The topics include but are not limited to: 

Computational Intelligence Information Security  Applications
 •Artificial Immune Systems                •Access Control  •Anti-Virus 
 •Autonomy-Oriented Computing   •Authentication and Authorization •Biometrics
 •Artificial Neural Systems                  •Block/Stream Ciphers •Content Security
 •Bayesian earning                           •Cryptography and Coding  •Cryptography and Applications 
 •Biological Computing                       •Cryptographic Protocols   •Communication Security 
 •Data Mining                                      •Cryptanalysis    •Copyright Protection
 •DNA Computing                               •Computer Forensics       •Database Security 
 •Evolutionary Programming          •Hash Functions •Digital Signatures 
 •Evolutionary Algorithms                  •Information and System Integrity •Data Privacy
 •Image Understanding                    •Intrusion Detection •Distributed Systems Security 
 •Intelligent Systems                           •Information Hiding •Detection of Abnormality
 •Knowledge Discovery                      •Internet/Intranet Security •Elliptic Curve Cryptosystems
 •Learning Algorithms                        •Information Security Management •Financial Security
 •Machine Learning                            •Key/Identity Management •Electronic Commerce Security
 •Multi-Agent Systems                     •Mobile Communications Security •Information Discovery
 •Multi-Objective EA                          •Malicious Codes •Mobile Device Security
 •Neural Networks                            •Mobile Code & Agent Security •Multimedia Security
 •Particle Swarm Optimization       •Network & Wireless Security •Software Encryption 
 •Probabilistic Reasoning                •Public Key Cryptosystems •System Security
 •Reinforcement Learning               •Public Key Infrastructure •Statistical Data Analysis 
 •Supervised Learning                     •Secret Sharing •Web Privacy and Trust
 •Swarm Intelligence                       •Security Management •Web Authentication
 •Probabilistic Learning  Steganography & Watermarking •Web Security and Integrity 


Copyright © By CIS2012 and CMSimple-Styles