Given the current
global security environment, there has been increased interest within
the security and defense communities in novel techniques for solving
challenging problems. The genesis of this interest lies in the fact
that repeated attempts of using traditional techniques have left many
important problems unsolved, and in some cases, not addressed. New
problems have emerged within the broad areas of security and defense
that are difficult to tackle with conventional methods, thus requiring
new techniques for detecting and adapting to emerging threats.
Web-Link: Click Here to know mode about the symposiums
The manuscripts should be submitted in PDF format. Click Here to know further guidelines for submission.
The purpose of the symposium is to present current and ongoing efforts in computational intelligence (e.g., neural networks, fuzzy systems, evolutionary computation, swarm intelligence, and other emerging learning or optimization techniques) as applied to security and defense problems.Web-Link: Click Here to know mode about the symposiums
Topics
ADVANCED ARCHITECTURES
FOR DEFENSE OPERATIONS
Multi-Sensor Data Fusion
Hard-Soft Data Fusion
Context-Aware Data Fusion
Employment of Autonomous Vehicles
Intelligence Gathering and Exploitation
Mine Detection
Situational Assessment
Impact Assessment
Process and User Refinement
Automatic Target Recognition
Mission Weapon Pairing and Assignment
Sensor Cueing and Tasking
Self-Healing Systems
MODELING AND SIMULATION
OF DEFENSE OPERATIONS
Logistics Support
Mission Planning
and Execution
Resource
Management
Red Teaming
Computational Red
Teaming
Course of Action
Generation and Recommendation
Models for War
Games
Risk-Aware
Decision Support
Multi-Agent Based
Simulation
Critical
Infrastructure Protection
Strategic Planning
Counterterrorism
and Counterinsurgency
Behavioral or
Cognitive Learning
Human Modeling:
Behavior, Emotion, Motion
SECURITY APPLICATIONS
Surveillance
Suspect Behavior Profiling
Anomaly Detection
Automated Handling of Dangerous Situations or People
Stationary or Mobile Object Detection, Recognition and Classification
Intrusion Detection Systems
Cyber-Security
Air, Maritime and Land Security
Network Security
Biometrics Security
Forensics Security
Authentication Technologies
Symposium Chairs

Marco Cococcioni
University of Pisa, Italy
Email: [email protected]
Symposium Co-Chairs

James M. Keller
University of Missouri, USA
Email: [email protected]

Suresh Sundaram
Nanyang Technological University
Email: [email protected]
Program
Committee
(To be announced)