This might be of interest to some of you.
Apologies for cross-posting.
Anna I. Exparcia-Alcazar, Gunes Kayacik, Frank W. Moore and Nur
Zincir-Heywood
SecDef 2017 Workshop Co-chairs
==========================================
The Fourth ACM Workshop on Genetic and Evolutionary Computation in Defense,
Security, and Risk Management (SecDef'2017)
In conjunction with the ACM Genetic and Evolutionary Computation Conference
(GECCO) in Berlin, Germany, July 15-19, 2017
https://projects.cs.dal.ca/projectx/secdef2017/index.html
(Submissions due: 24 March 2017)
==========================================
The Fourth ACM Workshop on Genetic and Evolutionary Computation in Defense,
Security, and Risk Management (SecDef'2017) will be held in conjunction
with the ACM Genetic and Evolutionary Computation Conference (GECCO) in
Berlin, Germany, July 15-19, 2017.
With the constant appearance of new threats, research in the areas of
defense, security and risk management has acquired an increasing importance
over the past few years. These new challenges often require innovative
solutions and computational intelligence techniques can play a significant
role in finding them.
We invite both completed and work in progress, with the aim to encourage
communication between active researchers and practitioners to better
understand the current scope of efforts within this domain. The ultimate
goal is to understand, discuss, and help set future directions for
computational intelligence in security and defense problems.
--------------------------------------------
Topics of Interest
--------------------------------------------
Authors are invited to submit papers that fall into or are related to one
or multiple topic areas listed below:
Security:
- Intrusion Detection
- Anomaly Detection
- Signature-Based Detection
- Behavior Monitoring
- Network Traffic Analysis
- System Data Analysis
- Application Data Analysis
- Attack Prevention and Defense Systems
- Threat Forecasting Systems
- Anti Spam and/or Antivirus Systems
- Bring Your Own Device
- Critical Infrastructure Protection
- Advanced Persistent Threats
Defense:
- Design of Military Systems and Sub-Systems
- Logistics and Scheduling of Military Operations
- Strategic Planning and Tactical Decision Making
- Logistics and Scheduling of Military Operations
- Examining Tradeoffs in Military and Counter-Terrorism Procedures
- Automated Discovery of Tactics and Procedures for Military and Defense
Systems
- Cyber Warfare
- Cyber Fraud
Risk:
- Identification, Prevention, Monitoring, and Handling of Risks
- Risk Impact and Probability Estimation Systems
- Contingency Plans,
- Real Time Risk Management
- Policy Management
--------------------------------------------
Paper Submission
--------------------------------------------
Paper submissions must present original, unpublished research or
experiences. Each submission must be written in English. There is a length
limitation of 8 pages (including title, abstract, all figures, tables, and
references) for regular papers. Submissions must be in the ACM GECCO
manuscript style.
Papers should be submitted in PDF format to secdefworkshop@gmail.com.
Acceptance to the workshop will be based on peer review of submitted
papers. Each accepted submission will be presented orally at the workshop.
Papers accepted for SecDef'2017 will be distributed in the GECCO Companion
Volume and ACM Digital Library.
--------------------------------------------
Important Dates
--------------------------------------------
Paper Submission Deadline: March 24, 2017
Acceptance Notification: April 15, 2017
Camera-Ready Papers: April 24, 2017
Workshop Date: July 15/16, 2017
--------------------------------------------
Workshop Co-Chairs
--------------------------------------------
Anna I. Exparcia-Alcazar, Gunes Kayacik, Frank W. Moore and Nur
Zincir-Heywood
Please contact us if you have any question about the ACM Workshop
SecDef'2017: secdefworkshop@gmail.com
**********************************************************
*
* Contributions to be spread via DMANET are submitted to
*
* DMANET@zpr.uni-koeln.de
*
* Replies to a message carried on DMANET should NOT be
* addressed to DMANET but to the original sender. The
* original sender, however, is invited to prepare an
* update of the replies received and to communicate it
* via DMANET.
*
* DISCRETE MATHEMATICS AND ALGORITHMS NETWORK (DMANET)
* http://www.zaik.uni-koeln.de/AFS/publications/dmanet/
*
**********************************************************