CIS'2020 Call for Papers (PDF Format)
The topics include but are not limited to:
Computational Intelligence | Information Security | Applications |
•Artificial Immune Systems | •Access Control | •Anti-Virus |
•Autonomy-Oriented Computing | •Authentication and Authorization | •Biometrics |
•Artificial Neural Systems | •Block/Stream Ciphers | •Content Security |
•Bayesian Learning | •Cryptography and Coding | •Cryptography and Applications |
•Biological Computing | •Cryptographic Protocols | •Communication Security |
•Data Mining | •Crypt analysis | •Copyright Protection |
•DNA Computing | •Computer Forensics | •Database Security |
•Evolutionary Programming | •Hash Functions | •Digital Signatures |
•Evolutionary Algorithms | •Information and System Integrity | •Data Privacy |
•Image Understanding | •Intrusion Detection | •Distributed Systems Security |
•Intelligent Systems | •Information Hiding | •Detection of Abnormality |
•Knowledge Discovery | •Internet/Intranet Security | •Elliptic Curve Cryptosystems |
•Learning Algorithms | •Information Security Management | •Financial Security |
•Machine Learning | •Key/Identity Management | •Electronic Commerce Security |
•Multi-Agent Systems | •Mobile Communications Security | •Information Discovery |
•Multi-Objective EA | •Malicious Codes | •Mobile Device Security |
•Neural Networks | •Mobile Code & Agent Security | •Multimedia Security |
•Particle Swarm Optimization | •Network & Wireless Security | •Software Encryption |
•Probabilistic Reasoning | •Public Key Cryptosystems | •System Security |
•Reinforcement Learning | •Public Key Infrastructure | •Statistical Data Analysis |
•Supervised Learning | •Secret Sharing | •Web Privacy and Trust |
•Swarm Intelligence | •Security Management  Steganography & Watermarking | •Web Authentication |
•Probabilistic Learning | •Web Security and Integrity |