Please forward this to your connections and relevant mailing lists
1st International Workshop on A.I. in Security (IWAISe)

http://iwaise.it.nuigalway.ie
Call for Posters

Paper submission deadline:  June 10, 2017



Submissions are sought for posters. We welcome original posters that
present summaries of recently published work, as well those that present
preliminary ideas. To be considered for a poster, submit a 2 page extended
abstract at the submission site: https://easychair.org/
conferences/?conf=iwaise17


Paper submission deadline is June 10, 2017. Posters will be included in the
proceedings. Researchers who wish to submit an extended abstract, but do
not want it in the proceedings are invited to contact
iwa...@it.nuigalway.ie, before submitting.


 Submissions are sought for the following areas:

Security Analytics    Machine Learning; Security Threat Detection and
Visualization; Future Threat Inference; Situational Awareness Monitoring;
Automated Message Monitoring; Security Decision Support; Network Event
Detection

Finance    Applications of AI to: Digital Currencies; Secure Payments;
Detection of Tax Evasion or Money Laundering; etc

Forensics Automated Physical Evidence Gathering; Data and Network Analysis;
Digital Forensic Tools; Decision Support for Rare Events

Images, Text & Networks   Automated Crowd Scanning; Video Analytics; Damage
Assessment; Automatic Detection of Hate Speech and Radicalisation on Social
Media; Security Sentiment Analysis

Physical Security   Automated Monitoring of Secure Locations; Automated
Threat Detection; Crisis Management; Sensor Data Analytics; Spatio-Temporal
Reasoning; Reasoning from Distributed, Dissimilar and Noisy Data Stream

Digital Security AI for Detection and Mitigation of Threats Such as: Spear
Phishing; Social Engineering; Botnets; Intrusion, as well as AI methods for
improving Penetration Testing

Software Engineering  AI Applied to: Design for Security; Program Analysis;
Fault Detection; Compiler and Language Design; Veriļ¬cation of Privacy and
Security Compliance; Adaptive Security/Privacy

Robotics   Securing Remote or Restricted Locations; Operations in Remote or
Dangerous locations; Roboguards; Search and Rescue

Privacy and Identity Biometrics; Face Recognition; Innovative Cryptography;
Anonymization and De-anonymization; Ethics of AI for Security
-- 
Regards Brett
_______________________________________________
uai mailing list
uai@ENGR.ORST.EDU
https://secure.engr.oregonstate.edu/mailman/listinfo/uai

Reply via email to