Welcome Message

Computational Intelligence constitutes an umbrella of techniques, has proven to be flexible in decision making in dynamic environment. These techniques typically include Fuzzy Logic, Evolutionary Computation, Intelligent Agent Systems, Neural Networks, Cellular Automata, Artificial Immune Systems and other similar computational models. The use of these techniques allowed building robust decision support modules, providing cross-linking solutions to different cyber security applications. In particular, to protect Internet users from Identity Theft, Phishing, Spam and other cyber infrastructure threats, we need flexible, adaptable and robust cyber defense systems, which can make intelligent decisions (in near real-time) in detecting wide variety of threats and attacks, including active and passive attacks, external attacks and internal misuses, known and unknown attacks, viruses and spam, etc. Computational Intelligent (CI) techniques appear to be promising to enhance cyber security measures, and have been increasingly applied in the area of information security and information assurance. Moreover, the multi-faceted CI approaches appear to provide a new security paradigm to deal with influx of new threats in a large network of computers.

The research papers presented in CICS symposium include Access Control for Wireless Networks, Hybrid-Network Intrusion Detection System (H-NIDS) in Cloud Computing,Database Audit over Cloud Environment Using Forensic Analysis Algorithm, Quantifying Encircling behavior in Complex Networks,Resilient Hybrid Overlay Model for Smart Grid, Malware Classification using Author Identification, Image Visualization based Malware Detection, Steganography, Audio encryption, Computational Intelligence for Static Software Checking Against Memory Corruption Vulnerabilities, etc.

Symposium Co-Chairs
Dipankar Dasgupta, The University of Memphis, USA
Justin Zhan, National Center of Infrastructure Protection, USA
Kumaraguru Ponnurangam, IIIT Delhi, India