Aims & Scope
With the constant appearance of new threats, research in the areas of defense, security and risk management has acquired an increasing importance over the past few years. These new challenges often require innovative solutions and Computational Intelligence techniques can play a significant role in finding them.
We seek both theoretical developments and applications of Genetic and Evolutionary Computation and their hybrids to the following (and other related) topics:
- Cyber crime and cyberdefense : anomaly detection systems, attack prevention and defense, threat forecasting systems, anti spam, antivirus systems, cyber warfare, cyber fraud
- IT Security: Intrusion detection, behavior monitoring, network traffic analysis
- Corporate security, with special focus on Bring Your Own Device (BYOD) policies and usability of security
- Risk management: identification, prevention, monitoring and handling of risks, risk impact and probability estimation systems, contingency plans, real time risk management
- Critical Infrastructure Protection (CIP)
- Advanced Persistent Threats (APTs)
- Design of military systems and sub-systems.
- Logistics and scheduling of military operations.
- Strategic planning and tactical decision making.
- Multiobjective techniques for examining tradeoffs in military, security, and counter-terrorism procedures.
- Automated discovery of tactics and procedures for site security, force protection, and consequence management.
- Other computational intelligence techniques for applications in the areas listed above.
The workshop invites completed or ongoing work, with the aim to encourage communication between active researchers and practitioners to better understand the current scope of efforts within this domain. The ultimate goal is to understand, discuss, and help set future directions for computational intelligence in security and defense problems.
Workshop Schedule
- SecDef'2015 Date: Saturday, July 11th, 2015
- Time: 11:10 AM - 1:00 PM
- Venue: Melia Castilla hotel, Madrid
- Room: Hidalgo
Workshop Schedule:
- Coevolutionary Agent-based Network Defense Lightweight Event System (CANDLES); G. Rush, D. R. Tauritz, A. D. Kent
- Using Genetic Algorithms for Deadline-Constrained Monitor Selection in Dynamic Computer Networks; R. Mueller-Bady, R. Gad, M. Kappes,
- A Hybrid Matheuristic Approach for Designing Reliable Wireless Multimedia Sensor Networks; O. Ozkan, M. Ermis, I. Bekmezci
- On The Identification of Specific Peer to Peer Network Applications; C. Bozdogan, Y. Gokcen, I. Zincir
- Evolutionary Dynamic Optimization Techniques for Marine Contamination Problem; L. Altin, H. R. Topcuoglu, M. Ermis
- Botnet detection system analysis on effect of botnet evolution and feature representation; F. Haddadi, N. Zincir-Heywood
Important Dates
- Submission Deadline:
April 3, 2015EXTENDED April 8 - Authors Notification:
April 25, 2015EXTENDED April 30 - Camera-ready submissions: May 5, 2015
- Conference: July 11-15, 2015
Paper Submission
Each accepted submission will be presented orally at the workshop and distributed in the GECCO companion volume to all GECCO attendees. Authors should follow the format of the GECCO manuscript style; further details are available here.
Manuscripts should not exceed 8 pages. Papers should be submitted in PostScript or PDF format to secdef2015@gmail.com. Acceptance to the workshop will be based on peer review of submitted papers.
Contacts
- Nur Zincir-Heywood, zincir@cs.dal.ca
- Frank W. Moore, fwmoore@uaa.alaska.edu