Topics
The topics of interest include, but are not limited to (related to Security for Information Systems):
- Machine Learning for Data Mining
- Data Mining Methods for Security
- Agent and Multi-Agent Systems
- Hybrid Systems
- Unsupervised Learning
- Classification Methods
- Novelty Detection
- Intrusion Detection Systems
- Log Correlation Methods
- Adaptive Defense of Network Infrastucture
- Adaptive Reasoning
- Information Forensics
- Document Classification and Processing
- Ontologies and Conceptual Information Processing
- Semantic Information Representation
- Natural Language Acquisition
- Web Semantics in Intelligence and Law-Enforcement
- Industrial and Commercial Applications of Intelligent Methods for Security
- Intelligent Control and Monitoring of Critical Systems
- Dynamic Adaptive Railway Operation
- Centralized Control Systems
- Adaptive Planning for Strategic Reasoning
- Intelligent Methods in Energy and Transportation
- Planning and Automated Reasoning in Large System Control
- Biometric Identification and Recognition
- Biometric Surveillance
- Biometric Access Control
- Extraction of Biometric Features (fingerprint, iris, face, voice, palm, gait)
- Cryptography
- Applied Cryptography and provably-secure cryptographic protocols
- Design and analysis of efficient cryptographic primitives:
public-key and symmetric-key cryptosystems, block ciphers, and hash functions - Economic fraud on the Internet: phishing, pharming, spam, and click fraud
- Email and web security
- Intellectual property protection:
metering, watermarking, and digital rights management. - Computer Science, namely on HPC and Grid computing issues
- Computational Sciences, with requirements in HPC and Grid
- Computational Engineering with a similar focus.
- Grid Middleware, Grid Computing, Data and Networking Infrastructures
- Distributed and Large-Scale Data Access and Management
- Data Repositories, Distributed Resource Management and Scheduling
- Supercomputer/cluster/grid integration issues
- Grid Performance Evaluation, QoS and SLA Negotiation
- Grid and HPC Applications, including e-Science in general and also Science Gateways, Nanomaterials, High Energy Physics, e-Health, e-Business, e-Administration, Life Sciences, Earth Sciences, Civil Protection, Computational Sciences and Engineering, …
- User Development Environments and Programming Tools for Grid Computing.
- Infrastructure as a service (IaaS)
- Virtualization in data centers
- Virtualization for resource management and QoS assurance
- Security aspects of using virtualization in a distributed environment
- Virtual networks
- Virtual data, storage as a service
- Fault tolerance in virtualized environments
- Virtualization in P2P systems
- Virtualization-based adaptive/autonomic systems
- The creation and management of environments/appliances
- Virtualization technologies
- Performance modeling (applications and systems)
- Virtualization techniques for energy/thermal management
- Case studies of applications on IaaS platforms
- Deployment studies of virtualization technologies
- Tools relevant to virtualization