2014
Aims & Scope
With the constant appearance of new threats, research in the areas of defense, security and risk management has acquired an increasing importance over the past few years. These new challenges often require innovative solutions and Computational Intelligence techniques can play a significant role in finding them.
We seek both theoretical developments and applications of Genetic and Evolutionary Computation and their hybrids to the following (and other related) topics:
- Cyber crime and cyberdefense : anomaly detection systems, attack prevention and defense, threat forecasting systems, anti spam, antivirus systems, cyber warfare, cyber fraud
- IT Security: Intrusion detection, behavior monitoring, network traffic analysis
- Corporate security, with special focus on Bring Your Own Device (BYOD) policies and usability of security
- Risk management: identification, prevention, monitoring and handling of risks, risk impact and probability estimation systems, contingency plans, real time risk management
- Critical Infrastructure Protection (CIP)
- Advanced Persistent Threats (APTs)
- Design of military systems and sub-systems.
- Logistics and scheduling of military operations.
- Strategic planning and tactical decision making.
- Multiobjective techniques for examining tradeoffs in military, security, and counter-terrorism procedures.
- Automated discovery of tactics and procedures for site security, force protection, and consequence management.
- Other computational intelligence techniques for applications in the areas listed above.
The workshop invites completed or ongoing work, with the aim to encourage communication between active researchers and practitioners to better understand the current scope of efforts within this domain. The ultimate goal is to understand, discuss, and help set future directions for computational intelligence in security and defense problems.
Important dates
March 28:submission deadline EXTENDED April 7- April 15: notification of acceptance
- April 25: camera-ready submission
- July 13: Workshop (8:30 a.m.)
Paper submission
Each accepted submission will be presented orally at the workshop and distributed in the workshop proceedings to all GECCO attendees. Authors should follow the format of the GECCO manuscript style; further details are available here.
Manuscripts should not exceed 8 pages. Papers should be submitted in PostScript or PDF format here. Acceptance to the workshop will be based on peer review of submitted papers.
Accepted papers
- On the Role of Multi-Objective Optimization in Risk Mitigation for Critical Infrastructures with Robotic Sensor Networks by Jamieson McCausland, Rami Abielmona, Rafael Falcon (Larus Technologies Corp., Canada) Ana-Maria Cretu (Université du Quebec en Outaouais, Canada) and Emil Petriu (University of Ottawa, Canada)
- On Botnet Behaviour Analysis using GP and C4.5 by Fariba Haddadi, Dylan Runkel, Nur Zincir-Heywood, and Malcolm Heywood (Dalhousie University, Canada)
- Evolutionary Based Moving Target Cyber Defense by David John, Robert Smith, William Turkett, Daniel Canas, and Errin Fulp (Wake Forest University, USA)
- Enforcing Corporate Security Policies via Computational Intelligence Techniques by Antonio Mora, Paloma De las Cuevas, J.J. Merelo (University of Granada, Spain) Sergio Zamarripa, and Anna I. Esparcia-Alcázar (S2 Grupo, Spain)