2nd IFIP International
Workshop on
Security and Cognitive Informatics for Homeland Defense
(SeCIHD'12)
August 20-24, 2012, University of Economics in
Prague, Czech Republic
In conjunction with ARES 2012
[Overview][CFP][Topics][Important
Dates][Special Sessions][Organization][Program]
[Author Instruction][Proceedings & SIs][Previous Workshop][Contact]
## News
(1) The SeCIHD 2012 program is available at here
(2) The proceedings of SeCIHD'12 will be published in LNCS Vol. 7465.
## Overview
Security subjects are becoming hugely important in the light of the development and
deployment of new Homeland Defense solutions. Such solutions require the design
of new computer systems and techniques allowing security procedures to be
executed on many different planes, from system, communication and organization
security to the security of the state and ensuring its defense capabilities.
Advanced IT technologies based on intelligent algorithms that can analyze group
behavior and interpret complex patterns or situations are increasingly
frequently becoming the building blocks of the above solutions. In this
context, it is worth noting research that combines security and defense aspects
with achievements in designing advanced systems for the acquisition and
sophisticated semantic analysis of complex image patterns and group behaviors.
Such systems use cognitive models of semantic interpretation and can be applied
to develop e.g. algorithms and protocols used for the security of computer
systems themselves, but also to ensure the confidentiality and security of
communication networks. They can also be employed to develop globally
understood safe solutions connected with activities to strengthen national
defense capability.
[top]
## Topics (included,
but are not limited to)
-
Homeland Security and Information Processing
-
Personal Security and Biometric
-
Intelligent Robots and Unmanned Vehicles
-
Target and Pattern Recognition
-
Sensor and Data Analysis
-
Semantic Image and Data Processing
-
Information Fusion
-
Advanced Vision Algorithms
-
Security in Ambient Intelligence
-
Context- and Location-aware Computing
-
Embedded systems in Security
-
Knowledge-based Systems for Internet Security
-
Security issues and protocols for Internet services
-
Privacy and trust for Internet services
-
Artificial Intelligence and Computational intelligence
-
Cognitive informatics
-
Cognitive models of the brain
-
Mathematical foundations of computing and cryptography
-
Biologically inspired information systems and secret data management
-
Cognitive image and scene understanding
-
Intelligent Health Technologies
[top]
-
Submission Deadline: April 30, 2012 (Extended)
-
Author Notification: May 31, 2012 (Extended)
-
Author Registration: June 15th, 2012
-
Proceedings Version: June 15th, 2012
[top]
SeCIHD’12
will be with the following special sessions:
1) Collaborative
Infrastructure Protection
Critical
infrastructure normally consists of a system of interdependent systems operated
by separate authorities, e.g. transport infrastructures normally depend on
power (electricity- and fuel companies), communication (telecommunication
companies) etc. This session will focus on collaboration models and mechanisms
to support collaboration among critical infrastructure providers to ensure
adequate levels of protection of the overall infrastructure.
-
Session Organizers:
Christian
Damsgaard Jensen (Technical University of Denmark, Denmark)
Nicola
Dragoni (Technical University of Denmark, Denmark)
-
Submission:
For
submission, please follow the Author Instruction
of SeCIHD’12 given below
while making sure of checking the group “Collaborative Infrastructure
Protection”.
[top]
## Organization
****
General Chair
Ilsun
You (Korean Bible University, Republic of Korea)
****
General Vice Chair
Hyun
Sook Cho (ETRI, Republic of Korea)
****
Program Co-Chairs
Aniello
Castiglione (University of Salerno, Italy)
Kangbin
Yim (Soonchunhyang University, Republic of Korea)
***
Publicity Chair
Sang-Woong
Lee (Chosun University, Republic of Korea)
***
Program Committee
Francesca Bosco (United Nations Interregional Crime and Justice Research
Institute, Italy)
Pascal
Bouvry (Luxembourg University, Luxembourg)
Jörg
Cassens (Norwegian University of Science and Technology, Norway)
Antonio
Colella (Italian Army, Italy)
Christian
Czosseck (NATO Cooperative Cyber Defense Centre of Excellence, Tallinn,
Estonia)
Stefania
Ducci (Research Institute for European and American Studies, Greece)
Joseph
Fitsanakis (Security and Intelligence Studies Program, King College, USA)
Alessandro
Gigante (European Space Agency, ESRIN Health, Safety, and Security Officer,
Italy)
Tomasz
Hachaj (Pedagogical University in Krakow, Poland)
Leonardo Impagliazzo (Vice President, Engineering Signalling Busines Unit,
AnsaldoSTS, Italy)
Shinsaku
Kiyomoto (KDDI R&D Laboratories Inc., Japan)
Fang-Yie
Leu (Tunghai University, Taiwan)
Masahiro
Mambo (Kanazawa University, Japan)
Walter Matta (Research & Development, Vitrociset, Italy)
Nikos
Nikolaidis (Aristotle University of Thessaloniki, Greece)
Marek
R. Ogiela (AGH University of Sci. and Tech., Poland)
Rainer
Poisel (St. Poelten University of Applied Sciences, Austria)
Masakazu
Soshi (Hiroshima City University, Japan)
Chul
Sur (Pukyong National University, Republic of Korea)
Cristina
Alcaraz Tello (National Institute of Standards and Technology, USA)
Simon
Tjoa (St. Poelten University of Applied Sciences, Austria)
Miroslaw
Trzupek (AGH University of Science and Technology, Poland)
Toshihiro
Yamauchi (Okayama University, Japan)
[Additional
members still being invited]
[top]
Authors
are invited to submit original papers: they must not substantially duplicate
work that any of the authors have published elsewhere or have submitted in
parallel to any other conferences that have proceedings.
Submissions
must be in English and conform to the "Springer LNCS Series" format.
Please
use the LNCS templates and style files available from
http://www.springer.com/computer/lncs?SGWID=0-164-7-72376-0
for
templates (MS Word or Latex only).
The
proceedings of the workshop will be published by Springer LNCS.
Submissions
must not exceed more than 16 pages, including tables and figures, and must be
in PDF only. Submission of a paper implies that should the paper be accepted,
at least one of the authors will register and present the paper at the
workshop.
Each
paper needs to be submitted to the workshop via the easychair:
https://www.easychair.org/conferences/?conf=secihd2012
When
you will submit your paper at the system,
please
make sure of checking the group “Regular Session”.
[top]
## Proceedings
& Special Issue
Proceedings
of the workshop will be published by Springer Lecture Notes in Computer Science
(LNCS) with IFIP logo (indexed by EI). The proceedings will be available at the
workshop. At least one author of an accepted paper must register at the ARES
2012 site and present the paper at the workshop.
[top]
- SeCHID 2011 (in conjunction
with ARES 2011), Vienna, Austria, August 2011
## Contact
For
further information regarding the workshop and paper submission,
please
contact Prof. Ilsun You at ilsunu@gmail.com
[top]
In
Cooperation With
Innovative Information Science &
Technology Research Group (ISYOU)
International Federation for Information Processing
(IFIP)