------------------------ Call for Papers -------------------------------
The 4th International Conference on Big Data Innovations and
Applications (Innovate-Data 2018)
(IEEE CS-TCI)
06-08 August 2018, Barcelona, Spain
http://www.ficloud.org/innovate-data-2018/
-----------------------------------------------------------------------------
Big data has become a key asset in modern societies, economies, and
governmental organizations. Big data encompasses various kinds of
complex and large scale information that are beyond the processing
capabilities of conventional software and databases. The increasing
volume and velocity of the data, captured by business organizations, web
repositories, social media, data centres, cloud and IoT, have resulted
in the exponential growth of big data. Big data provides a key basis for
innovations in various domains and applications. It can benefit data
managers, developers, companies and various kinds of organizations to
carry out useful analysis of data pattern and trends, make intelligent
decisions, and solve complex problems that can help societies and
economies and speed up innovations. The aim of the Innovate-Data
conference is to promote the state of the art in scientific and
practical research of big data and to bring together researchers and
practitioners from academia, industry, and public sector in an effort to
present their research work and share research and development ideas.
CONFERENCE TRACKS:
Track: Big Data Storage, Representation and Processing
Topics: Data storage; Data representation and structures; Data
management; Data processing; Data engineering and design; Storages and
network requirements
Track: Big Data Security, Privacy and Trust
Topics: Data Security; Data Privacy; Data Trust; Data protection and
integrity; Legal and ethical issues; Identity theft; Data loss and leakage
Track: Big Data Models, Infrastructure and Platforms
Topics: Data models; NoSQL databases; Data consistency and availability;
Fault tolerance and reliability; Network models and protocols;
Performance evaluation; Resource management; Transaction management;
RDBMS and big data; Memcached systems and techniques
Track: Visualisation of Big Data
Topics: Data visualisation, Visual representation; Usability and user
interaction; Graphs models and techniques for big data; Data acquisition
and cleaning
Track: Big Data Analytics and Metrics
Topics: Analytics models; Tools and technologies; Data patterns;
Business intelligence and decision making; Optimization of resources and
cost; Customer relations and satisfaction; Data economics; Metrics for
big data; Analysis of online reviews
Track: Big Data Science
Topics: Big data science models; Data searching and mining;
Methodologies and use cases; Machine learning and deep learning;
Algorithms and formal models; Mathematical and Statistical models for
big data; Interdisciplinary approaches and methods
Track: Big Data Applications and Innovations
Topics: Business applications; Social media and networks; Healthcare
applications; Government and public sector systems; Multimedia and data
streaming; Personal data logging and quantified-self; Context-aware
data; Big data in cloud and IoT; Personalisation of data; Open and
linked data
PUBLICATION:
All papers accepted for this conference are to be published in the
conference proceedings by the IEEE Computer Society Conference
Publishing Service (CPS) (approval pending). The proceedings will be
submitted to the IEEE-Xplore and the IEEE Computer Society (CSDL)
digital libraries. The proceedings are also submitted for indexing
through IEE INSPEC, EI (Compendex), Thomson ISI, and other indexing
services.
Authors of selected papers will be invited to submit an extended version
of their papers for a special issues in international journals (see
Journal Special Issues section).
Important Dates:
Submission Deadline (Extended): 27 March 2018
Authors Notification: 16 May 2018
Final Manuscript Due: 12 June 2018
Organising Committee
General Chair
Massimo Mecella, SAPIENZA Università di Roma, Italy
Program Co-Chairs
Indrakshi Ray, Colorado State University, USA
Irfan Awan, University of Bradford, UK
Local Organising Chair
Marisa Catalán Cid, i2Cat Foundation, Spain
Publication Chair
Muhammad Younas, Oxford Brookes University, UK
Workshop Coordinator
Mourad Ouziri, Universite Paris Descartes, France
Publicity Chair
Georgia M. Kapitsaki University of Cyprus Cyprus
Journal Special Issues Coordinator
Farookh Hussain, University of Technology Sydney, Australia
Track Chairs
Javier D. Fernández, Vienna University of Economics and Business, Austria
Pino Caballero-Gil, University of La Laguna, Spain
Yohei Saika, National Institute of Technology, Japan
Ahmet Soylu, Norwegian University of Science and Technology, Norway
Rachid belhamari, Lakehead University, Canada
Sherif Sakr, King Saud bin Abdulaziz University for Health Sciences ,
Saudi Arabia
Giuseppe Di Modica, University of Catania, Italy
------------------------ Call for Papers ---------------------------
The 15th International Conference on Mobile Web and Intelligent
Information Systems (MobiWis 2018)
(Springer, LNCS)
6-8 August 2018, Barcelona, Spain
http://www.mobiwis.org/2018/
-----------------------------------------------------------------------------
The areas of the Web, mobile technologies, and information systems have
been following a continuous and steady development over a number of
years through the innovative research and practices of researchers,
developers and practitioners from academia, industry, governmental and
scientific organizations. The International Conference on Mobile Web and
Intelligent Information Systems (MobiWis) aims to enable synergy between
these areas and provides the premier venue to present and discuss latest
research and developments related to research issues of the mobile web
and the engineering of intelligent and innovative mobile systems and
services.
The conference comprises a set of carefully selected tracks that focus
on the particular challenges regarding mobile Web and intelligent
information systems in research areas such as, among others, Web
Engineering, Service-Oriented Computing, Web of Things, Data and
Knowledge Management, Cloud Computing, Security and Human-Computer
Interaction.
Conference Tracks:
- Smart and Intelligent Systems
- Mobile Software Systems
- Adaptive Approaches for Mobile Computing
- Middleware/SOA for Mobile Systems
- Context- and Location-aware Services
- Pervasive and Ubiquitous Applications
- Data management in the Mobile Web
- Mobile Cloud Services
- Mobile Web of Things
- Mobile Web Security, Trust and Privacy
- Mobile Networks, Protocols and Applications
- Mobile Commerce and Business Services
- Socially Influencing Systems
- HCI in Mobile Applications
- Industry and Demos
Important Dates:
Submission Deadline (Extended): 27 March 2018
Authors Notification: 16 May 2018
Final Manuscript Due: 12 June 2018
Submission Instructions:
Full papers must be in English and must not exceed 12 pages. Short
papers should be limited to 8 pages. Papers should be formatted in
Springer's LNCS format. See submission instructions on the conference
website.
Publication:
All accepted papers will be included in the conference proceedings
published by Springer in the Lecture Notes in Computer Science (LNCS)
series. For each accepted paper, at least one author must register for
the conference and present the paper. Authors of selected papers will be
invited to submit an extended version of their papers for a special
issues in international journals (see conference website).
Lecture Notes in Computer Science (LNCS) series is indexed by the ISI
Conference Proceedings Citation Index - Science (CPCI-S), included in
ISI Web of Science, EI Engineering Index (Compendex and Inspec
databases), ACM Digital Library, dblp, Google Scholar, Scopus, etc. See
LNCS - Information on Abstracting and Indexing
(http://www.springer.com/computer/lncs?SGWID=0-164-6-1068921-0)
Organizing Committee:
General Chair
George Ghinea, Brunel University, UK
Program Chair
Muhammad Younas, Oxford Brookes University, UK
Local Organising Chair
Marisa Catalán Cid, i2Cat Foundation, Spain
Publication Chair
Irfan Awan, University of Bradford, UK
Workshop Coordinator
Aneta Poniszewska-Maranda, Lodz University of Technology, Poland
Publicity Chair
Barbara Masucci, University of Salerno, Italy
Journals Special Issues Chair
Farookh Hussain, University of Technology Sydney, Australia
----------------------Call for Papers -------------------
The IEEE 6th International Conference on Future Internet of Things and
Cloud (FiCloud 2018)
6-8 August 2018, Barcelona, Spain
http://www.ficloud.org/2018/
---------------------------------------------------------------------------------------
The Internet of Things (IoT) vision is to provide a dynamic and global
network infrastructure which is characterized by intelligent and self
configuring capabilities. IoT is considered as an integral part of the
future Internet. It is based on interoperable communication protocols in
order to enable the interaction and integration of virtual as well as
physical Things such as computers, smart devices, sensors, cars,
refrigerators, food packages, medicines, etc. Things can be seamlessly
integrated into the information network and interaction can be made
through the provision of intelligent interfaces. In not so distant
future, IoT will be forcing its way into every aspect of our lives and
technologies including smart homes, smart cities, environment and
nature, green energy, food, medicine, automotive, aerospace and
aviation, telecommunication, and so on.
IoT is generally characterized by real world and small Things, limited
capacity, constrained devices and the consequential issues such as less
reliability, security and privacy. Cloud computing on the other hand
deals mainly with virtual world and has unlimited capabilities in terms
of storage and processing power. Thus cloud and IoT are the main
complementary aspects of the future Internet. IoT can benefit from the
unlimited capabilities and resources of cloud computing. Similarly,
cloud can benefit from IoT by extending its scope to deal with real
world things in a more distributed and dynamic manner.
The theme of this conference is to promote the state of the art in
scientific and practical research of the IoT and cloud computing. It
provides a forum for bringing together researchers and practitioners
from academia, industry, and public sector in an effort to present their
research work and share research and development ideas in the area of
IoT and cloud computing.
CONFERENCE TRACKS:
- Cloud Models - SaaS, IaaS, PaaS
- Security, Privacy and Trust
- Software Systems, Models and Architectures
- Mobile Cloud Services
- Data and Knowledge Management
- Context-awareness and Location-awareness
- Software-defined Networking
- Performance Evaluation and Modelling
- Networking and Communication Protocols
- IoT Services and Applications
- Smart Environment
- Enterprise and Business Models
- Energy Efficiency
- Federation and Virtualization
- Fog and Edge Computing
- Industry Track
- General Track
Paper submission and Publication:
Authors are requested to submit papers reporting original research
results and experience. The page limit for full papers is 8 pages and
for short papers is 6 pages. Papers should be prepared using IEEE
two-column template. See instructions on the conference website
(http://www.ficloud.org/2018/).
All papers accepted for this conference will be published in the
conference proceedings by the IEEE Computer Society Conference
Publishing Service (CPS). The proceedings will be submitted to the
IEEE-Xplore and the IEEE Computer Society (CSDL) digital libraries. The
proceedings are also submitted for indexing through IEE INSPEC, EI
(Compendex), Thomson ISI, and other indexing services.
Authors of selected papers will be invited to submit extended versions
of their papers for special issues in international journals (see
conference website).
Important Dates:
Submission Deadline (Extended): 27 March 2018
Authors Notification: 16 May 2018
Final Manuscript Due: 12 June 2018
Organising Committee:
General Chairs
Bhavani Thuraisingham, The University of Texas at Dallas, USA
Muhammad Younas, Oxford Brookes University, UK
Program Chair
Jules Pagna Disso, Nettitude Group, UK
Local Organising Chair
Marisa Catalán Cid, i2Cat Foundation, Spain
Workshop Coordinator
Filipe Portela University of Minho Portugal
Journal Special Issues Coordinator
Farookh Hussain, University of Technology, Sydney, Australia
Publicity Chair
Joyce El Haddad, University of Paris Dauphine, France
Publication Chair
Irfan Awan, University of Bradford, UK
Track Chairs
David Chiu, University of Puget Sound, USA
Martine Bellache, École Polytechnique de Montréal, Canada
Fang-Fang Chua, Multimedia University, Malaysia
Stefan Bosse, Universität Bremen, Germany
Marwan Hassani, Technische Universiteit Eindhoven, The Netherlands
Xiaoying Bai, Tsinghua University, China
Daniel Camps, i2Cat Foundation, Spain
Helen Karatza, Aristotle University of Thessaloniki, Greece
Anjali Agrawal, Concordia University, Canada
Chunsheng Zhu, The University of British Columbia, Canada
Madihah Mohd Saudi, Universiti Sains Islam Malaysia, Malaysia
Joyce El Haddad, University of Paris Dauphine, France
Nadeem Javaid, COMSATS IIT, Pakistan
Antonio Celesti, University of Messina, Italy
Luiz Fernando Bittencourt, University of Campinas, Brazil
Edmundo Madeira, University of Campinas, Brazil
Marcin Bajer, ABB Corporate Research, Kraków, Poland
Natalia Kryvinska, University of Vienna, Austria
[Sorry if you get multiple copies of this message]
*Call for Papers and Participation*
*The 2018 High Performance Computing & Simulation Conference**
**(HPCS 2018)*
*July 16-20, 2018**
**Orléans, France*
http://hpcs2018.cisedu.info/
In Cooperation with the ACM, IEEE, IFIP
*(Main Track Paper Submission Deadline: _MARCH 24, 2018_ - Extended)**
**(Other Conference tracks have different submission deadlines - Please
check the specific track of interest.)**
*
HPCS Proceedings are to be published in IEEE XPLORE (pending) and
indexed by all major indexing services,
including SCOPUS, EI, Sci, dblp, etc.
You are cordially invited to participate in this international
conference through paper submission to main track, symposium, workshop
or special session, a tutorial, an invited speech, a demo, a poster, an
exhibit, a panel discussion, a doctoral dissertation, whichever sounds
more appropriate and convenient to you.
The conference will include invited presentations by experts from
academia, industry, and government as well as contributed paper
presentations describing original work on the current state of research
in high performance and large scale computing systems, their use in
modeling and simulation, their design, performance and use, and their
applications. There will also be tutorial sessions, workshops, special
sessions, demos, posters, panel discussions, doctoral colloquium, and
exhibits. Conference sponsorships are welcomed.
In addition to the main track, the conference will have the following
refereed archived symposia, workshops and special sessions:
*_Symposia_: (all refereed archival papers. Have different deadlines) *
*SYM01: Cloud Computing and Services for HPC Systems (InterClouds-HPC 2018)
SYM02: Big Data Principles, Architectures & Applications (BDAA 2018)
SYM03: High Performance Mobile Computing and Wireless Networks (MCWN 2018)
SYM04: Information Systems and Engineering (ISE 2018)
SYM05: Formal Approaches to Parallel and Distributed Systems (4PAD 2018)
*
*_Workshops_: (all refereed archival papers. Have different deadlines)*
* W01: Dependable and Resilient Many-Core Computing (DRMC 2018)**
**W02: Optimization of Energy Efficient High Performance and Distributed
Computing Systems (OPTIM 2018)**
**W03: Exploitation of Hardware Accelerators (WEHA 2018)**
**W04: High Performance Interconnection Networks and Interconnects
(HPINI 2018)**
**W05: High Performance Platform Management (HPPM 2018)**
**W06: New Algorithms and Programming Models for the Manycore Era (APMM
2018)**
**W07: Synergy of Parallel Computing, Optimization and Simulation (PaCOS
2018)**
**W08: Peer-to-Peer Architectures, Networks and Systems (PANS 2018)**
**W09: Autonomic High Performance Computing (AHPC 2018)**
**W10: Security and High Performance Computing Systems (SHPCS 2018)**
**W11: Security and Performance in Cloud Computing (SPCLOUD 2018)**
**W12: High-Performance and Distributed Computing for Business Analytics
and Financial Applications (HPC-BAFA 2018)**
**W13: Computational Intelligence and Parallel Evolutionary Computation
(CIPEC 2018)**
**W14: Machine Learning, Pattern Recognition and Applications (MLPRA 2018)**
**W15: High Performance Computing for Weather, Climate, and solid Earth
Sciences (HPC-WCES 2018)**
**W16: HPC Systems for Biomedical, Bioinformatics, and Life Sciences
(BILIS 2018)**
**W17: High Performance Dynamic Reconfigurable Systems and Networks
(DRSN 2018)**
**W18: Architecture-aware Simulation and Computing (AASC 2018)**
**W19: Modeling and Simulation of Parallel and Distributed Systems
(MSPDS 2018)**
**W20: Parallel Computations for Neural Networks (PCNN 2018)**
**W21: Cellular Automata Algorithms & Architectures (CAAA 2018)**
**W22: Location-based Services and Applications in Ubiquitous Computing
(LSAUC 2018)**
*
*_Special Sessions_: (all refereed archival papers. Have different
deadlines)*
***SS01: Virtualization in High Performance Computing and Simulation
(VIRT 2018)
SS02: Benchmarking and High Performance Computing for Applications and
Optimization (HPBench 2018)
SS03: Biologically Inspired Parallel and Distributed Computing,
Algorithms and Solutions (BICAS 2018)
SS04: Compiler Architecture, Design and Optimization (CADO 2018)
SS05: High Performance Services Computing and Internet Technologies
(SerCo 2018)
SS06: Trusted Ubiquitous Networks & Multimedia Contents Protection
(TUN-MM 2018)
SS07: Digital Home Networks & Ambient Intelligence (DHN-AmI 2018)
SS08: High Performance Parallel and Distributed Data Mining (PDDM 2018)
SS09: Internet of Things and HPC: Devices, Networks, and Applications
(IoT-HPC 2018)
SS10: High Performance Mission Critical System Development (HiPMiC 2018)
SS11: Advances in Computational Methods in Electromagnetics (ACME 2018)
SS12: Fuzzy-based Simulation Approaches in Science and Engineering
(FSASE 2018)
*
=================================================================
*Important Dates:**
Main Track Paper and Poster Paper Submission Deadline ——— March 24,
2018 - Extended
Tutorial/Demo/Panel/Poster Proposal Deadline ———————— April 15, 2018
Main Track Notification of Acceptance starts ——————--—— April 23, 2018
Registration & Camera-Ready Manuscripts Due ——————— May 11, 2018
Conference Dates ——————————————————-—— July 16 - 20, 2018
*
=================================================================
For further details and updates, please consult the conference web site
at URL: http://hpcs2018.cisedu.info or contact one of the organizers.
We look forward to your contributions and seeing you in Orléans in
July. Thank you very much.
Best Regards.
HPCS 2018 Organizers
[apologies for cross-posting]
======================================================================
CALL for WORKSHOP PROPOSALS: ESORICS 2018
23rd European Symposium on Research in Computer Security
Barcelona, Spain -- September 6-7, 2018
ESORICS Website: https://esorics2018.upc.edu/
======================================================================
Overview
------------------------------------
ESORICS is the annual European research event in Computer Security.
The Symposium started in 1990 and has been held in several European
countries, attracting a wide international audience from both the
academic and industrial communities.
Proposals are solicited for Workshops to be held in conjunction with
ESORICS 2018. A Workshop should aim at providing a forum on emerging
topics of high interest to the security and privacy community.
In the Workshop selection, particular consideration will be paid to:
* Its potential interest for the security and privacy community
* Its novelty with respect to other forums, especially with
respect to other ESORICS workshops.
* Its likely impact on the target community, including likely
high participation.
A workshop can be either one day or two days in length.
Important Dates
------------------------------------
* Workshop proposals due: March 23, 2018
* Notification of decision: April 02, 2018
Submitting a Workshop Proposal
------------------------------------
To submit a proposal send an email to the Workshop Chair with
with the information requested in the application form:
* Joaquin Garcia-Alfaro (jgalfaro(a)ieee.org)
The following application form should be used.
(Also available in Word format at
https://esorics2018.upc.edu/esorics2018-cfw)
======================================================================
ESORICS 2018 - WORKSHOP APPLICATION FORM:
- Title of the Workshop:
- Duration (maximum 2 days):
- Draft "Call for Papers", articulating the workshop's scope
and topics:
- Brief summary and justification for the workshop, including
anticipated benefits to the ESORICS community:
- Planned activities:
- Expected number of participants:
- Workshop organizers:
* PC Chair(s):
* General Chair(s):
- Workshop deadlines:
* Submission deadline:
* Notification to authors:
* Camera-ready versions:
- Planned publication of Workshop proceedings:
- Data of last three years for the workshop (if applicable):
* Number of submissions:
* Number of accepted papers:
* Number of participants:
* Publication of proceedings:
* Venue (co-location):
======================================================================
APOLOGIES FOR MULTIPLE POSTINGS
FINAL CALL FOR PAPERS
18th Annual International Workshop on
Computational Geometry and Applications CGSA'18
in conjunction with
The 2018 International Conference on Computational Science
and its Applications (ICCSA 2018)
http://www.iccsa.org/
July 2 - 5, 2018
Melbourne, Australia
Paper submission link: http://ess.iccsa.org/
SUBMISSION DEADLINE: March 31, Midnight GMT, 2018
============================================================
Important Dates
---------------
March 31, 2018: Deadline for FULL paper submission
April 8, 2018: Notification of Acceptance
May 6,2018: Camera-ready version and Pre-registration
July 2-5, 2018: CGSA'18 Workshop and ICCSA 2018
Workshop Description
--------------------
This year the Workshop on Computational Geometry and Applications and Security, held in conjunction with the International Conference on Computational Science and Applications, will take place in Melbourne, Australia. The workshop is intended as an international forum for researchers in computational geometry and related areas, with the goal of advancing the state of research in computational geometry and related disciplines. We invite submission of papers presenting high-quality original research in one of the three Workshop tracks:
- theoretical computational geometry
- applied computational geometry
- security and performance issues
Topics of interest include (but are not limited to):
-----------------------
- Design and analysis of geometric algorithms
- Geometric algorithms in path planning and robotics
- Computational geometry in biometrics
- Intelligent geometric computing
- Geometric algorithms in computer graphics and computer vision
- Geometric modeling
- Voronoi diagrams and generalizations
- Geometric data structures
- 3D Geometric modeling
- Geometric algorithms in Geographical Information Systems
- Algebraic geometry
- Discrete and combinatorial geometry
- Interpolation and surface reconstruction
- Implementation issues and numerical precision in geometric algorithms
- Applications in computational biology, physics, chemistry, geography, medicine, education, networks.
- Visualization of geometric algorithms
- Security applications
- Geometry in biometrics
- Big Data Analytics and Security
- Machine Learning and Security
Submissions in other related areas will also be considered.
Proceedings
-------------
Proceedings of the Workshop will be published by Springer/IEEE CS.
Proceedings of the previous Workshops on Computational Geometry and Applications appeared in LNCS Springer and IEEE_CS.
Papers from the previous CGA Workshops have appeared in the special issues of International Journal of Computational Geometry and Applications, Journal of CAD/CAM, Journal of Computational Methods in Sciences and Engineering (JCMSE), the Journal of Supercomputing and Transactions on Computational Science, Springer.
Location and Conference fees
------ ----------
This year CGSA'18 located in Melbourne, Australia. For all details with respect to the conference fees please consult the ICCSA 2018 web page. Special discount for students and session organizers is available. For more information, please visit the ICCSA 2018 web site.
Submission
-----------
The submission must be camera-ready and formatted according to the rules posted on ICCSA 2018 web site.
Electronic submissions in PS, PDF, or LaTex (please also submit all .eps, .dvi, and .ps files).
MS Word submissions will also be accepted.
Please submit your paper through the CyberChair electronic submission system, please follow instructions available at http://www.iccsa.org/.
During Step 1 of the abstract submission you will be asked to submit your abstract to the CyberChair:
please select CGSA workshop from the drop-down list of all workshops.
For additional references or enquiries, please send your e-mail directly to the Workshop Co-Chairs:
Asish Mukhopadhyay, Professor, University of Windsor Marina Gavrilova, Professor, University of Calgary
International Program Committee Members (to be confirmed):
Tetsuo Asano (Japan Advanced Institute of Science and Technology, Japan) Sergei Bereg (University of Texas at Dallas, USA) Karoly Bezdek (University of Calgary, Canada) Ovidiu Daescu (University of Texas at Dallas, USA) Tamal Dey (Ohio State University, USA) Marina L. Gavrilova (University of Calgary, Canada) Christopher Gold (University of Glamorgan, UK) Hisamoto Hiyoshi (Gunma University, Japan) Andres Iglesias (University de Cantabria, Spain) Deok-Soo Kim (Hanyang University, Korea) Ivana Kolingerova (Unversity of West Bohemia, Czech Republic) Nikolai Medvedev (Novosibirsk Russian Academy of Science, Russia) Asish Mukhopadhyay (University of Windsor, Canada) Dimitri Plemenos (Universite de Limoges, France) Val Pinciu (Southern Connecticut State University, USA) Jon Rokne (University of Calgary, Canada) Kokichi Sugihara (University of Tokyo, Japan) Vaclav Skala (University of West Bohemia, Czech Republic) Muhammad Sarfraz (KFUPM, Saudi Arabia) Alexei Sourin (Nanyang Technological University, Singapore) Chee Yap (New York University, USA)
Prof. Asish Mykhopadhyay
School of Computer Science
University of Windsor, Ontario, Canada
e-mail: asishm(a)uwindsor.ca
Marina L. Gavrilova
Professor, Department of Computer Science
University of Calgary,
Calgary, Alberta, Canada, T2N1N4
E-mail: marina(a)cpsc.ucalgary.ca
[Apologies if you receive multiple copies of this message]
* Machine
Learning for Computer and Cyber Security: Principles, Algorithms, and
Practices*
*CALL FOR CHAPTER PROPOSALS*
*Full paper Submission Deadline: March 31, 2018 (Final)*
*“Machine Learning for Computer and Cyber Security: Principles, Algorithms,
and Practices”*
*
Website: **https://sites.google.com/site/mlccs2018cfc/home
<https://sites.google.com/site/mlccs2018cfc/home>*
* Submission
Link: **https://easychair.org/conferences/?conf=mlccs2018
<https://easychair.org/conferences/?conf=mlccs2018>*
*Introduction:*
Computer security is the use of technology, policies, and education to
assure the confidentiality, integrity, and availability of data during its
storage, processing, and transmission. To secure data, we pursue three
activities: prevention, detection, and recovery. This book will be about
the use of machine learning and data mining methods to secure data, and
such methods are best suited for detection. Detection is simply the process
of identifying something’s true characteristic. For example, we might want
to detect if a program contains malicious logic. Informally, a detector is
a program that reports positively when it detects the characteristic of
interest; otherwise, it reports negatively or nothing at all. There are two
ways to build a detector: We can build or program a detector ourselves, or
we can let software build a detector from data. To build a detector
ourselves, it is not enough to know what we want to detect, for we must
also know how to detect what we want. The complexity of today’s networked
computers makes this a daunting task in all but the simplest cases. Researchers
may debate where the exact point lies, but starting somewhere on this
spectrum leading to the ideal are methods of machine learning.
This book will use a wealth of examples and illustrations to effectively
demonstrate the principles, algorithm, challenges and applications of
machine learning and data mining for Computer and Cyber Security. This
comprehensive book will be full of the valuable insight into machine
learning and data mining for computer and cyber security and will touch
every corner of the topic of computer and cyber security and will cover
most of important security aspects and current trends that are missed in
other books. In addition, it will be an excellent book to teach a
course on Machine
learning and data mining for Computer and security. The material will
prepare the students for exercising better protection and defense in terms
of understanding the motivation of the attackers and how to deal with and
mitigate the situation in a better manner.
This book will be an invaluable resource for students at all levels
interested in machine learning and data mining for computer and cyber
security. It will also serve as an excellent reference in cyber security
professionals in this fast-evolving and critical field. The contents of
this book will be very refreshing, informative, and easy to follow for
students ranging from novice to advanced levels. It will contain an
impressive collection of up-to-date computer and cyber security issues,
analysis and machine learning and data mining based solutions.
*Objective of the Book:*
The main objective of the book is to give an of principles, algorithm and
applications of machine learning based Computer and Cyber security as well
as the future research directions overview to students, researchers,
subject matter experts, and practitioners. This comprehensive book will be
full of the valuable insight into computer and cyber security and will
touch every corner of the topic of machine learning for computer and cyber
security and will covers most of important security aspects and current
trends that are missed in other books The book will help to identify the
interesting and exciting areas of future research to apply these
techniques.
In addition, it will be an excellent book to teach a course on machine
learning for computer and cyber security. The material will prepare the
students for exercising better protection in terms of understanding the
motivation of the attackers and how to deal with and mitigate the situation
in a better manner using machine learning based approaches. The chapter
proposals will be selected in the following categories to make a balance of
theory, future research directions and practical/use case i.e. Original
research article, Case studies, and Review articles in the aforementioned
domain.
*Target Audience:*
The target audience of this book will be composed of professionals,
researchers, faculty members, scientists, graduate students, research
scholars and software developers who are seeking to carry out research and
develop software in the field of information and cyber security using
Machine learning based approaches. The main objective of the book is to
give an overview of principles, algorithm and applications of machine
learning based Computer and Cyber security as well as the future research
directions. The proposed book is likely to have global reader since the
said subject is taught almost by every university worldwide by computer
science and engineering or other relevant departments.
*Recommended topics include, but are not limited to, the following:*
- Machine-Learning Paradigms for Data Mining and Cyber Security
- Supervised Learning for Signature Detection
- Machine Learning for Anomaly Detection
- Machine learning for Biometric security and privacy
- Machine learning for Security and privacy of Web service
- Machine learning for Security and privacy in cloud computing
- Machine learning for Security and privacy in e-services
- Machine learning for Security and privacy in cloud computing
- Machine learning for Security Policies and Access Control
- Machine Learning in Hybrid Intrusion Detection Systems
- Machine Learning for Scan Detection
- Machine Learning for Profiling Network Traffic
- Data-Mining and Machine-Learning Applications in Network Profiling
- Privacy-Preserving Data Mining
- Fundamentals, Overviews, and Machine Learning Trends for Computer and
Cyber Security
- Machine learning for Security and privacy in mobile systems
- Machine learning for Security and privacy in wireless sensor networks
- Cyber risk and vulnerability assessment cybercrime
- Machine learning for Visual analytics for cyber security
- Machine learning for Security and privacy in smart grid and
distributed generation systems
- Machine learning for Security and privacy in social applications and
networks
- Machine learning for Critical infrastructure protection
- Machine learning for Security and privacy in industrial systems
- Machine learning for Security and privacy in pervasive/ubiquitous
computing
- Machine learning for Intrusion detection and prevention
- Data-Mining and Machine-Learning Applications in PPDM
- Machine learning for Botnet detection and mitigation
- Machine learning for Security and privacy of Robotic systems
- Machine learning for Security and privacy in ambient intelligence
- Machine learning for Network security and management
- Machine learning for Wireless security
- Machine learning for Bluetooth, WiFi, WiMax security
- Machine learning for Cyber threats, implications and their defense
- Machine learning for Security Modelling
*Submission Procedure:*
Researchers and practitioners are invited to submit their full chapter of
8,000 to 12,000 words clearly explaining the mission and concerns of his or
her proposed chapter on or before *March 31, 2018* via
*https://easychair.org/conferences/?conf=mlccs2018
<https://easychair.org/conferences/?conf=mlccs2018>* or can also email to
Email id: bbgupta(a)nitkkr.ac.in. All submitted chapters will be reviewed on
a double-blind review basis. Contributors may also be requested to serve as
reviewers for this project. Authors will be notified by *April** 15, 2018*
about the decision of their chapter.
*Note:* There are no submission or acceptance fees for manuscripts
submitted to this book publication, *Machine Learning for Computer and
Cyber Security: Principles, Algorithms, and Practices*. All manuscripts are
accepted based on a double-blind peer review editorial process.
*Editor(s):*
Dr. Brij Gupta (National Institute of Technology Kurukshetra, Haryana,
India)
Dr. Michael Sheng (Macquarie University, Sydney, Australia)
*Publisher:*
This book is scheduled to be published by CRC press, USA. For additional
information regarding the publisher, please visit https://www.crcpress.com/.
This publication is anticipated to be released in 2018.
*Important Dates:*
*March 31, 2018* Full Chapter Submission
*April 15, 2018* Review Results Returned
* April 30, 2018* Final Acceptance Notification
*May 15, 2018* Final Chapter Submission
*Inquiries can be forwarded to:*
Dr. Brij B. Gupta, National Institute of Technology Kurukshetra, Haryana,
India.
E-mail: bbgupta(a)nitkkr.ac.in