2nd IFIP International Workshop on

Security and Cognitive Informatics for Homeland Defense

(SeCIHD'12)

 

August 20-24, 2012, University of Economics in Prague, Czech Republic

In conjunction with ARES 2012

 

[Overview][CFP][Topics][Important Dates][Special Sessions][Organization][Program]

[Author Instruction][Proceedings & SIs][Previous Workshop][Contact]

## News

(1) The SeCIHD 2012 program is available at here

(2) The proceedings of SeCIHD'12 will be published in LNCS Vol. 7465.

 

## Overview

Security subjects are becoming hugely important in the light of the development and deployment of new Homeland Defense solutions. Such solutions require the design of new computer systems and techniques allowing security procedures to be executed on many different planes, from system, communication and organization security to the security of the state and ensuring its defense capabilities. Advanced IT technologies based on intelligent algorithms that can analyze group behavior and interpret complex patterns or situations are increasingly frequently becoming the building blocks of the above solutions. In this context, it is worth noting research that combines security and defense aspects with achievements in designing advanced systems for the acquisition and sophisticated semantic analysis of complex image patterns and group behaviors. Such systems use cognitive models of semantic interpretation and can be applied to develop e.g. algorithms and protocols used for the security of computer systems themselves, but also to ensure the confidentiality and security of communication networks. They can also be employed to develop globally understood safe solutions connected with activities to strengthen national defense capability.

 

[top]

 

## Topics (included, but are not limited to)

- Homeland Security and Information Processing

- Personal Security and Biometric

- Intelligent Robots and Unmanned Vehicles

- Target and Pattern Recognition

- Sensor and Data Analysis

- Semantic Image and Data Processing

- Information Fusion

- Advanced Vision Algorithms

- Security in Ambient Intelligence

- Context- and Location-aware Computing

- Embedded systems in Security

- Knowledge-based Systems for Internet Security

- Security issues and protocols for Internet services

- Privacy and trust for Internet services

- Artificial Intelligence and Computational intelligence

- Cognitive informatics

- Cognitive models of the brain

- Mathematical foundations of computing and cryptography

- Biologically inspired information systems and secret data management

- Cognitive image and scene understanding

- Intelligent Health Technologies

 

[top]

 

## Important Dates

- Submission Deadline: April 30, 2012 (Extended)

- Author Notification: May 31, 2012 (Extended)

- Author Registration: June 15th, 2012

- Proceedings Version: June 15th, 2012

 

[top]

 

## Special Sessions

SeCIHD’12 will be with the following special sessions:

 

1) Collaborative Infrastructure Protection

Critical infrastructure normally consists of a system of interdependent systems operated by separate authorities, e.g. transport infrastructures normally depend on power (electricity- and fuel companies), communication (telecommunication companies) etc. This session will focus on collaboration models and mechanisms to support collaboration among critical infrastructure providers to ensure adequate levels of protection of the overall infrastructure.

 

- Session Organizers:

Christian Damsgaard Jensen (Technical University of Denmark, Denmark)

Nicola Dragoni (Technical University of Denmark, Denmark)

 

- Submission:

For submission, please follow the Author Instruction of SeCIHD’12 given below
while making sure of checking the group “Collaborative Infrastructure Protection”.

 

 

[top]

 

 

## Organization

 

**** General Chair

Ilsun You (Korean Bible University, Republic of Korea)

 

**** General Vice Chair

Hyun Sook Cho (ETRI, Republic of Korea)

 

**** Program Co-Chairs

Aniello Castiglione (University of Salerno, Italy)

Kangbin Yim (Soonchunhyang University, Republic of Korea)

 

*** Publicity Chair

Sang-Woong Lee (Chosun University, Republic of Korea)

 

*** Program Committee
Francesca Bosco (United Nations Interregional Crime and Justice Research Institute, Italy)

Pascal Bouvry (Luxembourg University, Luxembourg)

Jörg Cassens (Norwegian University of Science and Technology, Norway)

Antonio Colella (Italian Army, Italy)

Christian Czosseck (NATO Cooperative Cyber Defense Centre of Excellence, Tallinn, Estonia)

Stefania Ducci (Research Institute for European and American Studies, Greece)

Joseph Fitsanakis (Security and Intelligence Studies Program, King College, USA)

Alessandro Gigante (European Space Agency, ESRIN Health, Safety, and Security Officer, Italy)

Tomasz Hachaj (Pedagogical University in Krakow, Poland)
Leonardo Impagliazzo (Vice President, Engineering Signalling Busines Unit, AnsaldoSTS, Italy)

Shinsaku Kiyomoto (KDDI R&D Laboratories Inc., Japan)

Fang-Yie Leu (Tunghai University, Taiwan)

Masahiro Mambo (Kanazawa University, Japan)
Walter Matta (Research & Development, Vitrociset, Italy)

Nikos Nikolaidis (Aristotle University of Thessaloniki, Greece)

Marek R. Ogiela (AGH University of Sci. and Tech., Poland)

Rainer Poisel (St. Poelten University of Applied Sciences, Austria)

Masakazu Soshi (Hiroshima City University, Japan)

Chul Sur (Pukyong National University, Republic of Korea)

Cristina Alcaraz Tello (National Institute of Standards and Technology, USA)

Simon Tjoa (St. Poelten University of Applied Sciences, Austria)

Miroslaw Trzupek (AGH University of Science and Technology, Poland)

Toshihiro Yamauchi (Okayama University, Japan)

[Additional members still being invited]

 

[top]

 

 

## Author Instruction

Authors are invited to submit original papers: they must not substantially duplicate work that any of the authors have published elsewhere or have submitted in parallel to any other conferences that have proceedings.

 

Submissions must be in English and conform to the "Springer LNCS Series" format.

Please use the LNCS templates and style files available from

http://www.springer.com/computer/lncs?SGWID=0-164-7-72376-0

for templates (MS Word or Latex only).

 

The proceedings of the workshop will be published by Springer LNCS.

 

lncs.gif

 

 

Submissions must not exceed more than 16 pages, including tables and figures, and must be in PDF only. Submission of a paper implies that should the paper be accepted, at least one of the authors will register and present the paper at the workshop.

 

Each paper needs to be submitted to the workshop via the easychair:

https://www.easychair.org/conferences/?conf=secihd2012

When you will submit your paper at the system,

please make sure of checking the group “Regular Session”.

 

[top]

 

## Proceedings & Special Issue

Proceedings of the workshop will be published by Springer Lecture Notes in Computer Science (LNCS) with IFIP logo (indexed by EI). The proceedings will be available at the workshop. At least one author of an accepted paper must register at the ARES 2012 site and present the paper at the workshop.

 

[top]

 

## Previous Workshop

- SeCHID 2011 (in conjunction with ARES 2011), Vienna, Austria, August 2011

 

## Contact

For further information regarding the workshop and paper submission,

please contact Prof. Ilsun You at ilsunu@gmail.com

 

[top]

 

 

In Cooperation With

Innovative Information Science & Technology Research Group (ISYOU)

International Federation for Information Processing (IFIP)

 

ISYOU.jpgifip.jpg