CFP extended: Int’l Symposium on Cyber Warfare, Cyber Defense, & Cyber Security

The International Symposium on Cyber Warfare, Cyber Defense,
& Cyber Security (CSCI-ISCW)

https://americancse.org/events/csci2018/Symposiums/csci_iscw
December 13-15, 2018, Las Vegas, USA

Most Recent IEEE Xplore entry:
https://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7879541

All accepted papers will be published in the proceedings of the 2018
International Conference on Computational Science and Computational
Intelligence (CSCI: https://americancse.org/events/csci2018 )

PUBLISHER: CPS: https://www.computer.org/web/cs-cps/

INVITATION:

You are invited to submit a paper for consideration. All accepted papers
will be published by IEEE CPS (refer to ieeexplore.ieee.org for previous
years’ IEEE Xplore inclusion) in the proceedings of The 2018 International
Conference on Computational Science and Computational Intelligence (CSCI).
Extended versions of selected papers of the conference will also appear
in journals and edited research books (Springer, Elsevier, BMC, …) The
published proceedings can be accessed via IEEE CPS and other Digital
libraries.

SCOPE AND LIST OF TOPICS:

Prologue:
Cyber Warfare adds an additional dimension to warfare. Generally, it
involves the battlespace use and targeting of computers and networks in
warfare. Cyber Warfare strategies include both offensive and defensive
operations pertaining to the threat of cyberattacks, espionage, sabotage,
disruptions to infrastructures, theft of critical information, and
publishing deliberate misinformation (fake news and fabricated news)
spread via traditional media and online social media with the intend to
mislead in order to disrupt the political processes of nations. The
methods and technologies utilized in Cyber Warfare can be countered
using Cyber Defense strategies. Cyber Defense strategies involve the
heavy and targeted use of Cyber Security. Topics of interest include:

– Cyber Warfare Technologies and Strategies
– Cyber Defense Technologies and Strategies
– Authorization Infrastructures
– Autonomous Security Methods
– Novel Biometric Methods
– Cloud Security
– Forensic Technologies
– Cryptography and Formal Methods
– Trapping Technologies
– Data Protection Methods
– Security and Reverse Engineering
– Vulnerability Analysis
– Steganography and Steganalysis
– Identity Management
– Security Policies
– Legislation and Regulatory Approaches for Enhancing Security
– Safe Computing
– Identification and Prevention of Online Scams
– Mobile Protection Techniques
– Security Risk Analysis, Management and Trade-offs
– Identity, Privacy and Trust Management
– Security by Design
– Incident Response Methods
– Cybercrime and Underground Economy – Identification and Prevention
– Detection of Malicious Software
– Novel Security Tools
– Lifecycle Security Management and Identification of the Weakest Links
– Internet Security
– Network Security
– Computer Security
– Prevention of Cyber Attacks on Critical Infrastructures
– Methodologies in Reducing National Vulnerability to Cyber Attacks
– Methods for Minimizing Damage and Recovery Time from Cyber Attacks
– Prevention of Fake and Fabricated News – Media Trust Management
– Cyber Warfare and Attack Prevention during Elections
– Secure Voting Systems
– Securing Electric Power Grids + Smart Grids
– Securing Communication Systems
– Cyber Counter-intelligence
– Tools in Cyber Warfare and Cyber Defense Arsenal
– Innovative Tools for Cyber Defense Technologies
– Cyber Weapons
– Cyber Space and Security
– Threats from Social Media
– Crime and Terrorism
– IT and Countering Violent Extremism
– Global Security
– Data Analytics and Cyber Warfare
– Prevention of Bad Data Injection
– Advanced Persistent Threat (APT) and Prevention
– Data Exfiltration
– Tools for Countering Attacks by Viruses, Worms, Malware, Phishing,
SQL Injection Attack, Cross-Site Scripting, Session Hijacking,
Trojan Horses, Rootkits, Botnets, …
– Security and Social Engineering
– Tools for Countering Logic Bomb, Time Bomb, Distributed
Denial-of-Service Attack, …
– Methodologies to Address System and Data Vulnerabilities
– Novel Patching Techniques
– Next Generation Firewalls
– Intrusion Detection Techniques
– Terrorism Databases and Resources
– Terrorist Networks
– Threat Assessment
– Cyber Vandalism and Defense
– Cyber Security and Terrorism
– Counter-terrorism
– Cyber Tools and Identification of Propaganda
– Security Education and Training

INSTRUCTIONS FOR SUBMISSION OF PAPERS FOR EVALUATION:

All accepted papers will be published by IEEE CPS:
https://www.computer.org/web/cs-cps/
in the proceedings of The 2018 International Conference on
Computational Science and Computational Intelligence (CSCI’18).

Past CSCI proceedings are indexed into IEEE Xplore Digital Library
and can be accessed via:
Volume I (2014):  https://ieeexplore.ieee.org/xpl/tocresult.jsp?isnumber=6822065
Volume II (2014): https://ieeexplore.ieee.org/xpl/tocresult.jsp?isnumber=6822285
Volume (2015):    https://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7420813
Volume (2016):    https://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7879541
Volume (2017):    Pending (end of September 2018 according to IEEE Xplore management)

Papers should be typeset by using the general typesetting
instructions available at:
https://www.ieee.org/conferences_events/conferences/publishing/templates.html
(i.e., use of regular Times New Roman, font size of 10, single line
spacing, 2-column format). Authors of accepted papers will later
receive more specific typesetting instructions. All submissions must
be original (papers must not have been previously published or
currently being considered by others for publication). 161115

Submissions must be in either MS doc or pdf formats (6 pages for
Regular Research Papers; 4 pages for Short Papers; 2 pages for
Poster Papers – the number of pages include all figures, tables, and
references). The first page should include:

– Title of the paper.
– Name, affiliation, city, country, and email address of each author
(identify the name of the Contact Author).
– Abstract (about 100 words).
– A maximum of 5 topical keywords that would best represent the work
described in the paper (see the list of topics).
– Write the type of the submission as “Full/Regular Research Papers”,
“Short Papers”, or “Poster Papers”.
– Write “CSCI-ISCW”

The actual paper can start from the first page (space permitting).
Submissions are to be uploaded to the submission/evaluation web site
portal at: https://american-cse.org/

TYPE OF SUBMISSIONS/PAPERS:

– Full/Regular Research Papers (maximum of 6 pages):
Regular Research Papers should provide detail original research
contributions. They must report new research results that represent
a contribution to the field; sufficient details and support for
the results and conclusions should also be provided. The work
presented in regular papers are expected to be at a stage of
maturity that with some additional work can be published as journal
papers.

– Short Papers (maximum of 4 pages):
Short papers report on ongoing research projects. They should provide
overall research methodologies with some results. The work presented
in short papers are expected to be at a stage of maturity that with
some additional work can be published as regular papers.

– Poster Papers (maximum of 2 pages):
Poster papers report on ongoing research projects that are still in
their infancy (i.e., at very early stages). Such papers tend to
provide research methodologies without yet concrete results.

REVIEW PROCESS

Each paper will be peer-reviewed by 2 to 4 peers (except for papers that
are philosophical in nature – such papers would be considered for panel
discussions.) Confidentiality of submitted material will be maintained.
Papers will be evaluated on the basis of originality, impact, significance,
quality of research, quality of writing, and contribution to conference
program and diversity. Papers whose authors include one or more members
of the program committee will be evaluated using the double-blinded
review process. Authors whose papers are not selected for publication
can submit a rebuttal letter; rebuttals will be evaluated by 4 members
of the Program Committee.

DEADLINES – DATES:

October 24, 2018:     Extended Submission of Papers
(11:59pm US Eastern Time Zone)
Paper submission portal (for evaluation):
https://american-cse.org/
Note that authors who have submitted papers in response
to the earlier “Call For Papers” will receive decisions
and status reports by the original announced date.
November 1, 2018:     Notification of acceptance (+/- 2 days)
November 8, 2018:     Final papers & Author Registrations
December 13-15, 2018: The International Symposium on Cyber Warfare, Cyber
Defense, & Cyber Security (CSCI-ISCW)
https://americancse.org/events/csci2018/Symposiums/csci_iscw
CSCI-ISCW will be held in conjunction with other
affiliated research events; for more information, see
https://americancse.org/events/csci2018

DEMOGRAPHY HISTORY (based on 2014 through 2017 participation data):

In the past, about 40% of the attendees have been from outside
USA; from 58 nations. 51% of registrants have been from academia,
31% from industry; 17% from government agencies and research labs;
and 1% unknown. The conference has had participants, speakers,
authors affiliated with over 142 different universities; including
many from the top 40 ranked institutions; major IT corporations,
including, Microsoft, Accenture, Google, Apple, Facebook, Oracle,
Amazon, Samsung Electronics, IBM, GE, BAE Systems, Hitachi, NTT,
Intel Corp, BTS Software Solutions, NetApp, Algorkorea Co.,
Paris Saclay, ElderSafe Technologies Inc., METRON (France),
Fraunhofer IKTS (Germany), Wipro Technologies, VNIIEF (Russia),
BTU Cottbus-Senftenberg (Germany), Synchrone Technologies (France),
Bosch Software Systems (Germany), Tata Consultancy Services, …;
major corporations, including, Exxon Mobil, JPMorgan Chase,
Raytheon, PetroChina, GlaxoSmithKline, BCL Technologies, CERENA
Petroleum Group, Aerospace Electronic Technology (China), Max
Planck – Genetics (Germany), Tigard Research Institute, ENGIE
(France), Forschungszentrum Juelich (Germany), Secured Smart
Electric Vehicle (Korea), …; government research agencies and
national laboratories, including, NSF, NIH National Institutes of
Health, US Air Force (multiple research labs), NSA National Security
Agency, Pacific Northwest National Lab, NASA, LLNL, Lawrence
Berkeley National Lab, Los Alamos National Lab, Cold Spring Harbor
Lab, US National Cancer Institute, Swedish Defence Research Agency,
NIST US National Institute of Standards and Technology, U.S.
Geological Survey, US National Library of Medicine, US Air Force
(multiple research labs), SPAWAR Systems Center Pacific, China NSF,
Russian Academy of Sciences, US Navy, Hasso Plattner Institute, US
Army, Korea Internet & Security Agency, Suez Canal Research Center,
Okinawa Bureau (Japan), Canadian Medical Protective Association,
Osong Medical Innovation Foundation (Korea), National Institute of
Informatics (Japan), …; and three Venture Capitalists and nine
Intellectual Property attorneys.

CONTACT:

Questions and inquiries should be sent to:
Conference Secretariat: cs@american-cse.org

Advertisements

LearnTechLib Table of Contents: IJEL 17:4

The latest issue of International Journal on E-Learning is now available on LearnTechLib, the Learning & Technology Library.

International Journal on E-Learning Vol. 17, No. 4 (October 2018)
https://www.learntechlib.org/j/IJEL/v/17/n/4/

Table of Contents

Adoption of Information Communication Technology (ICT) in Distance Education: A Retrospective Analysis
Samuel Owusu-Ansah, University of Ghana, Legon,
Abstract: https://www.learntechlib.org/p/171259/

The Effect of Faculty Perceptions and Leadership Support on Social Media Utilization in Higher Education
Mariyam Al Obaidli, Zayed University, ; Lydia Barza, Zayed University, ; Laura Matherly, Zayed University,
Abstract: https://www.learntechlib.org/p/172882/

Exploring participatory learning through wiki: A review of literature
Liping Deng, Hong Kong Baptist University,
Abstract: https://www.learntechlib.org/p/173641/

Parallel online, on-campus, and blended programme delivery:  Challenges and strategies
Yvonne Cleary, University of Limerick, ; Darina Slattery, University of Limerick, ; Ann Marcus-Quinn, University of Limerick,
Abstract: https://www.learntechlib.org/p/174358/

Assessing the Virtual Collaborative needs of Capstone Project Teams
Charles Lesko, East Carolina University,
Abstract: https://www.learntechlib.org/p/178180/

Reexamining digital-learning readiness in higher education: Positioning digital competencies as key factors and a profile application as a readiness tool
Todd Blayone, EILAB, University of Ontario Institute of Technology,
Abstract: https://www.learntechlib.org/p/178285/

Table of contents for this issue: https://www.learntechlib.org/j/IJEL/v/17/n/4/

Call for papers: CSCI’18 Int’l Conference; Artificial Intelligence (Dec. 13-15, 2018, Las Vegas)

Paper Submission Deadline: October 10, 2018
(11:59pm US Eastern Time Zone)

The International Symposium on Artificial Intelligence
(CSCI-ISAI)

https://americancse.org/events/csci2018/Symposiums/csci_isai
December 13-15, 2018, Las Vegas, USA

Most Recent IEEE Xplore entry:
https://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7879541

All accepted papers will be published in the proceedings of the 2018
International Conference on Computational Science and Computational
Intelligence (CSCI: https://americancse.org/events/csci2018 )

SCOPE AND LIST OF TOPICS:

Prologue:
Artificial Intelligence (AI) is the science and engineering of making
intelligent machines and systems. This is an important multi-disciplinary
field which is now an essential part of technology industry, providing
the heavy lifting for many of the most challenging problems in
computational science. Since Machine Learning has strong ties with AI,
this symposium also covers the field of Machine Learning. The list of
topics below is by no means meant to be exhaustive.

Artificial Intelligence:
Brain models, Brain mapping, Cognitive science; Natural language
processing; Fuzzy logic and soft computing; Software tools for AI; Expert
systems; Decision support systems; Automated problem solving; Knowledge
discovery; Knowledge representation; Knowledge acquisition; Knowledge-
intensive problem solving techniques; Knowledge networks and management;
Intelligent information systems; Intelligent data mining and farming;
Intelligent web-based business; Intelligent agents; Intelligent networks;
Intelligent databases; Intelligent user interface; AI and evolutionary
algorithms; Intelligent tutoring systems; Reasoning strategies;
Distributed AI algorithms and techniques; Distributed AI systems and
architectures; Neural networks and applications; Heuristic searching
methods; Languages and programming techniques for AI; Constraint-based
reasoning and constraint programming; Intelligent information fusion;
Learning and adaptive sensor fusion; Search and meta-heuristics; Multi-
sensor data fusion using neural and fuzzy techniques; Integration of
AI with other technologies; Evaluation of AI tools; Social intelligence
(markets and computational societies); Social impact of AI; Emerging
technologies; and Applications (including: computer vision, signal
processing, military, surveillance, robotics, medicine, pattern
recognition, face recognition, finger print recognition, finance and
marketing, stock market, education, emerging applications, …).

Machine Learning:
Statistical learning theory; Unsupervised and Supervised Learning;
Multivariate analysis; Hierarchical learning models; Relational
learning models; Bayesian methods; Meta learning; Stochastic
optimization; Simulated annealing; Heuristic optimization techniques;
Neural networks; Reinforcement learning; Multi-criteria reinforcement
learning; General Learning models; Multiple hypothesis testing;
Decision making; Markov chain Monte Carlo (MCMC) methods; Non-
parametric methods; Graphical models; Gaussian graphical models;
Bayesian networks; Particle filter; Cross-Entropy method; Ant colony
optimization; Time series prediction; Fuzzy logic and learning;
Inductive learning and applications; Grammatical inference; Graph
kernel and graph distance methods; Graph-based semi-supervised
learning; Graph clustering; Graph learning based on graph
transformations; Graph learning based on graph grammars; Graph
learning based on graph matching; Information-theoretical approaches
to graphs; Motif search; Network inference; Aspects of knowledge
structures; Computational Intelligence; Knowledge acquisition and
discovery techniques; Induction of document grammars; General
Structure-based approaches in information retrieval, web authoring,
information extraction, and web content mining; Latent semantic
analysis; Aspects of natural language processing; Intelligent
linguistic; Aspects of text technology; Biostatistics; High-
throughput data analysis; Computational Neuroscience; and
Computational Statistics.

DEMOGRAPHY HISTORY (based on 2014 through 2017 participation data):

In the past, about 40% of the attendees have been from outside
USA; from 58 nations. 51% of registrants have been from academia,
31% from industry; 17% from government agencies and research labs;
and 1% unknown. The conference has had participants, speakers,
authors affiliated with over 142 different universities; including
many from the top 40 ranked institutions; major IT corporations,
including, Microsoft, Accenture, Google, Apple, Facebook, Oracle,
Amazon, Samsung Electronics, IBM, GE, BAE Systems, Hitachi, NTT,
Intel Corp, BTS Software Solutions, NetApp, Algorkorea Co.,
Paris Saclay, ElderSafe Technologies Inc., METRON (France),
Fraunhofer IKTS (Germany), Wipro Technologies, VNIIEF (Russia),
BTU Cottbus-Senftenberg (Germany), Synchrone Technologies (France),
Bosch Software Systems (Germany), Tata Consultancy Services, …;
major corporations, including, Exxon Mobil, JPMorgan Chase,
Raytheon, PetroChina, GlaxoSmithKline, BCL Technologies, CERENA
Petroleum Group, Aerospace Electronic Technology (China), Max
Planck – Genetics (Germany), Tigard Research Institute, ENGIE
(France), Forschungszentrum Juelich (Germany), Secured Smart
Electric Vehicle (Korea), …; government research agencies and
national laboratories, including, NSF, NIH National Institutes of
Health, US Air Force (multiple research labs), NSA National Security
Agency, Pacific Northwest National Lab, NASA, LLNL, Lawrence
Berkeley National Lab, Los Alamos National Lab, Cold Spring Harbor
Lab, US National Cancer Institute, Swedish Defence Research Agency,
NIST US National Institute of Standards and Technology, U.S.
Geological Survey, US National Library of Medicine, US Air Force
(multiple research labs), SPAWAR Systems Center Pacific, China NSF,
Russian Academy of Sciences, US Navy, Hasso Plattner Institute, US
Army, Korea Internet & Security Agency, Suez Canal Research Center,
Okinawa Bureau (Japan), Canadian Medical Protective Association,
Osong Medical Innovation Foundation (Korea), National Institute of
Informatics (Japan), …; and three Venture Capitalists and nine
Intellectual Property attorneys.

INVITATION:

You are invited to submit a paper for consideration. All accepted papers
will be published by IEEE CPS (refer to ieeexplore.ieee.org for previous
years’ IEEE Xplore inclusion) in the proceedings of The 2018 International
Conference on Computational Science and Computational Intelligence (CSCI).
Extended versions of selected papers of the conference will also appear
in journals and edited research books (Springer, Elsevier, BMC, …) The
published proceedings can be accessed via IEEE CPS and other Digital
libraries.

INSTRUCTIONS FOR SUBMISSION OF PAPERS FOR EVALUATION:

All accepted papers will be published by IEEE CPS:
https://www.computer.org/web/cs-cps/
in the proceedings of The 2018 International Conference on
Computational Science and Computational Intelligence (CSCI’18).

Past CSCI proceedings are indexed into IEEE Xplore Digital Library
and can be accessed via:
Volume I (2014):  https://ieeexplore.ieee.org/xpl/tocresult.jsp?isnumber=6822065
Volume II (2014): https://ieeexplore.ieee.org/xpl/tocresult.jsp?isnumber=6822285
Volume (2015):    https://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7420813
Volume (2016):    https://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7879541
Volume (2017):    Pending/soon (within days)

Papers should be typeset by using the general typesetting
instructions available at:
https://www.ieee.org/conferences_events/conferences/publishing/templates.html
(i.e., use of regular Times New Roman, font size of 10, single line
spacing, 2-column format). Authors of accepted papers will later
receive more specific typesetting instructions. All submissions must
be original (papers must not have been previously published or
currently being considered by others for publication). 161115

Submissions must be in either MS doc or pdf formats (6 pages for
Regular Research Papers; 4 pages for Short Papers; 2 pages for
Poster Papers – the number of pages include all figures, tables, and
references). The first page should include:

– Title of the paper.
– Name, affiliation, city, country, and email address of each author
(identify the name of the Contact Author).
– Abstract (about 100 words).
– A maximum of 5 topical keywords that would best represent the work
described in the paper.
– Write the type of the submission as “Full/Regular Research Papers”,
“Short Papers”, or “Poster Papers”.
– Write “CSCI-ISAI”

The actual paper can start from the first page (space permitting).
Submissions are to be uploaded to the submission/evaluation web site
portal at: https://american-cse.org/

TYPE OF SUBMISSIONS/PAPERS:

– Full/Regular Research Papers (maximum of 6 pages):
Regular Research Papers should provide detail original research
contributions. They must report new research results that represent
a contribution to the field; sufficient details and support for
the results and conclusions should also be provided. The work
presented in regular papers are expected to be at a stage of
maturity that with some additional work can be published as journal
papers.

– Short Papers (maximum of 4 pages):
Short papers report on ongoing research projects. They should provide
overall research methodologies with some results. The work presented
in short papers are expected to be at a stage of maturity that with
some additional work can be published as regular papers.

– Poster Papers (maximum of 2 pages):
Poster papers report on ongoing research projects that are still in
their infancy (i.e., at very early stages). Such papers tend to
provide research methodologies without yet concrete results.

REVIEW PROCESS

Each paper will be peer-reviewed by 2 to 4 peers (except for papers that
are philosophical in nature – such papers would be considered for panel
discussions.) Confidentiality of submitted material will be maintained.
Papers will be evaluated on the basis of originality, impact, significance,
quality of research, quality of writing, and contribution to conference
program and diversity. Papers whose authors include one or more members
of the program committee will be evaluated using the double-blinded
review process. Authors whose papers are not selected for publication
can submit a rebuttal letter; rebuttals will be evaluated by 4 members
of the Program Committee.

DEADLINES – DATES:

October 10, 2018:     (11:59pm US Eastern Time Zone) Submission of Papers
https://american-cse.org/
October 23, 2018:     Notification of acceptance (+/- 2 days)
November 05, 2018:    Final papers & Author Registrations
December 13-15, 2018: International Symposium on Artificial Intelligence
(CSCI-ISAI)
https://americancse.org/events/csci2018/Symposiums/csci_isai
CSCI-ISAI will be held in conjunction with other
affiliated research events; for more information, see
https://americancse.org/events/csci2018

CONTACT:

Questions and inquiries should be sent to:
Conference Secretariat: cs@american-cse.org