征稿已开启

查看我的稿件

注册已开启

查看我的门票

已截止
活动简介

In the last years, significant work has been undertaken by Governments and local agencies with respect to the protection of critical infrastructures and public-private sector coordination in the event of a cyber-attack. Threats to cities and their social infrastructures, e.g. from crime, and terrorism, endanger human life directly and indirectly. Resilience of critical infrastructures is gaining importance as a core concept to cope with such threats. In general, this means strengthening social infrastructures to prevent or mitigate such threats and to consistently deliver the intended services in a trustworthy and "normal" way even in changing situations.

Information and communication infrastructure (ICT) is a primary part of the social infrastructure and therefore one of the central objects of these attacks. As a consequence, effective response capabilities must be properly organized and closely coordinated because, at the time of a cyber-attack, it is not possible to immediately determine whether the attacker is a script kiddie, an insider, a rogue actor (organized crime, terrorist organization, or radical), or a nation state. Unlike traditional Defense categories (i.e., land, air, and sea), the capabilities required to respond to an attack on critical infrastructures will necessarily involve infrastructure owned and operated by both the public and the private sector.

Exercising for effective digital systems security becomes thus a crucial task in order to strengthen the resilience of IT systems against arising threats. Advanced information technologies that are able to analyze and interpret complex patterns or situations and take the proper decisions in terms on countermeasures the basic building blocks of the above solutions. In this context, it is worth noting research that combines security and defense aspects with achievements in designing advanced systems for the acquisition and sophisticated semantic analysis of complex image patterns and group behaviors. Such systems use cognitive models of semantic interpretation and can be applied to develop e.g., algorithms and protocols used for the security of computer systems themselves, but also to ensure the confidentiality and security of communication networks.

征稿信息

重要日期

2016-09-21
初稿截稿日期
2016-10-31
终稿截稿日期

征稿范围

 Preferred topics in this workshop include (but are not limited to): 

 • Homeland Security and Information Processing
 • Personal Security and Biometric
 • Intelligent Robots and Unmanned Vehicles
 • Target and Pattern Recognition
 • Sensor and Data Analysis
 • Semantic Image and Data Processing
 • Information Fusion
 • Advanced Vision Algorithms
 • Security in Ambient Intelligence
 • Context- and Location-aware Computing
 • Embedded systems in Security
 • Knowledge-based Systems for Internet Security
 • Security issues and protocols for Internet services
 • Privacy and trust for Internet services
 • Artificial Intelligence and Computational intelligence
 • Cognitive informatics
 • Cognitive models of the brain
 • Mathematical foundations of computing and cryptography
 • Cognitive image and scene understanding
 • Intelligent Health Technologies

留言
验证码 看不清楚,更换一张
全部留言
重要日期
  • 01月08日

    2017

    会议日期

  • 09月21日 2016

    初稿截稿日期

  • 10月31日 2016

    终稿截稿日期

  • 01月08日 2017

    注册截止日期

移动端
在手机上打开
小程序
打开微信小程序
客服
扫码或点此咨询