The 11th International Conference on Computational Intelligence and Security (CIS2015)

CIS2015

Shenzhen, China
December 19-20, 2015

Call for Paper


CIS'15 Call for Papers (PDF Format)

The topics include but are not limited to:

Computational Intelligence Information Security Applications
聽鈥rtificial Immune Systems聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽 鈥ccess Control聽 鈥nti-Virus聽
聽鈥utonomy-Oriented Computing聽聽 鈥uthentication and Authorization 鈥iometrics
聽鈥rtificial Neural Systems聽聽聽聽聽聽聽聽聽聽聽聽聽 聽聽聽 鈥lock/Stream Ciphers 鈥ontent Security
聽鈥ayesian earning聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽 鈥ryptography and Coding聽 鈥ryptography and Applications聽
聽鈥iological Computing聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽 聽聽聽 鈥ryptographic Protocols聽聽 鈥ommunication Security聽
聽鈥ata聽Mining聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽 鈥ryptanalysis聽聽聽 鈥opyright Protection
聽鈥NA Computing聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽 聽聽 鈥omputer Forensics聽聽聽聽聽聽 鈥atabase Security聽
聽鈥volutionary Programming聽聽聽聽聽聽聽聽聽 鈥ash Functions 鈥igital Signatures聽
聽鈥volutionary Algorithms聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽 鈥nformation and System Integrity 鈥ata Privacy
聽鈥mage Understanding聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽 鈥ntrusion Detection 鈥istributed Systems Security聽
聽鈥ntelligent Systems聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽 聽聽 鈥nformation Hiding 鈥etection of Abnormality
聽鈥nowledge Discovery聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽 鈥nternet/Intranet Security 鈥lliptic Curve Cryptosystems
聽鈥earning Algorithms聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽 鈥nformation Security Management 鈥inancial Security
聽鈥achine Learning聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽 鈥ey/Identity Management 鈥lectronic Commerce Security
聽鈥ulti-Agent Systems聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽 鈥obile Communications Security 鈥nformation Discovery
聽鈥ulti-Objective EA聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽 鈥alicious Codes 鈥obile Device Security
聽鈥eural Networks聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽 鈥obile Code & Agent Security 鈥ultimedia Security
聽鈥article Swarm Optimization聽聽聽聽聽聽 鈥etwork & Wireless Security 鈥oftware Encryption聽
聽鈥robabilistic Reasoning聽聽聽聽聽聽聽聽聽聽聽聽聽 聽 鈥ublic Key Cryptosystems 鈥ystem Security
聽鈥einforcement Learning聽聽聽聽聽聽聽聽聽聽聽聽聽聽 鈥ublic Key Infrastructure 鈥tatistical Data Analysis聽
聽鈥upervised Learning聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽 鈥ecret Sharing 鈥eb Privacy and Trust
聽鈥warm Intelligence聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽 鈥ecurity Management 鈥eb Authentication
聽鈥robabilistic Learning聽 Steganography & Watermarking 鈥eb Security and Integrity聽

Sponsors

js无缝图片滚动代码 可鼠标滑动控制左右滚动 js文字特效制作js文字闪烁与文字变色效果 js文字滚动插件制作双行关联向上文字间隙滚动 js树形导航菜单制作垂直js导航条特效 js导航菜单左侧竖纵向二级导航菜单可点击展开与收缩子菜单
Copyright © By CIS2015