Call for Paper
CIS'15 Call for Papers (PDF Format)
The topics include but are not limited to:聽
Computational Intelligence | Information Security | 聽Applications |
聽鈥rtificial Immune Systems聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽 | 鈥ccess Control聽 | 鈥nti-Virus聽 |
聽鈥utonomy-Oriented Computing聽聽 | 鈥uthentication and Authorization | 鈥iometrics |
聽鈥rtificial Neural Systems聽聽聽聽聽聽聽聽聽聽聽聽聽 聽聽聽 | 鈥lock/Stream Ciphers | 鈥ontent Security |
聽鈥ayesian earning聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽 | 鈥ryptography and Coding聽 | 鈥ryptography and Applications聽 |
聽鈥iological Computing聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽 聽聽聽 | 鈥ryptographic Protocols聽聽 | 鈥ommunication Security聽 |
聽鈥ata聽Mining聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽 | 鈥ryptanalysis聽聽聽 | 鈥opyright Protection |
聽鈥NA Computing聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽 聽聽 | 鈥omputer Forensics聽聽聽聽聽聽 | 鈥atabase Security聽 |
聽鈥volutionary Programming聽聽聽聽聽聽聽聽聽 | 鈥ash Functions | 鈥igital Signatures聽 |
聽鈥volutionary Algorithms聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽 | 鈥nformation and System Integrity | 鈥ata Privacy |
聽鈥mage Understanding聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽 | 鈥ntrusion Detection | 鈥istributed Systems Security聽 |
聽鈥ntelligent Systems聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽 聽聽 | 鈥nformation Hiding | 鈥etection of Abnormality |
聽鈥nowledge Discovery聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽 | 鈥nternet/Intranet Security | 鈥lliptic Curve Cryptosystems |
聽鈥earning Algorithms聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽 | 鈥nformation Security Management | 鈥inancial Security |
聽鈥achine Learning聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽 | 鈥ey/Identity Management | 鈥lectronic Commerce Security |
聽鈥ulti-Agent Systems聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽 | 鈥obile Communications Security | 鈥nformation Discovery |
聽鈥ulti-Objective EA聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽 | 鈥alicious Codes | 鈥obile Device Security |
聽鈥eural Networks聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽 | 鈥obile Code & Agent Security | 鈥ultimedia Security |
聽鈥article Swarm Optimization聽聽聽聽聽聽 | 鈥etwork & Wireless Security | 鈥oftware Encryption聽 |
聽鈥robabilistic Reasoning聽聽聽聽聽聽聽聽聽聽聽聽聽 聽 | 鈥ublic Key Cryptosystems | 鈥ystem Security |
聽鈥einforcement Learning聽聽聽聽聽聽聽聽聽聽聽聽聽聽 | 鈥ublic Key Infrastructure | 鈥tatistical Data Analysis聽 |
聽鈥upervised Learning聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽 | 鈥ecret Sharing | 鈥eb Privacy and Trust |
聽鈥warm Intelligence聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽 | 鈥ecurity Management | 鈥eb Authentication |
聽鈥robabilistic Learning聽 | Steganography & Watermarking | 鈥eb Security and Integrity聽 |