The Second International Symposium on Advanced Intelligent Systems for Cybersecurity (AISC2022)

SEPTEMBER 5-7, 2022. SAN ANTONIO, TEXAS, USA

Colocated with

The International Conference on Intelligent Data Science Technologies and Applications (IDSTA2022)

The Second International Symposium on Advanced Intelligent Systems for Cybersecurity (AISC2022)

Call for Papers

In today’s world, connected systems, social networks, and mobile communications create a massive flow of data, which is prone to cyberattacks. This needs fast and accurate detection of cyber-attacks. Intelligent systems and Data analytics are important components when issues pertaining to effective security solutions become the subject of discussion. This is because there is an impending need for high volume and high velocity data from different sources to detect anomalies as soon as they are discovered. This will help reduce significantly the vulnerability of the systems as well as improve their resilience to cyber Attacks. The capability to process large volumes of information at real time through utilization of tools for data analytics has many advantages vital for analysis of cybersecurity systems. Moreover, the data collected from sophisticated intelligent systems, cloud systems, networks, sensors, computers, intrusion detection systems could be used to identify vital information. This information could be used to detect how vulnerable the systems are to risk factors, and so effective cyber security solutions can be developed. In addition to that, the utilization of data analytics tools in the cybersecurity field gives new insights through considering factors such as zero-day attack detection, real time analysis, resource constrained data processing among others.

The AISC 2022 symposium addresses the use of advanced intelligent systems in providing cybersecurity solutions in many fields, and the challenges, approaches, and future directions. We invite the submission of original papers on all topics related to Intelligent Systems for Cybersecurity, with special interest in but not limited to:

  • Intelligent systems for effective detection of cyber-attacks
  • Advanced Intelligent systems and data analytics for Cloud/Edge systems security
  • Malware detection using intelligent systems Vulnerability assessment
  • Intelligent systems for intrusion detection in Internet of Things (IoT) systems
  • Network forensics using intelligent systems and data analytics
  • Data Analytics for privacy-by-design in smart health
  • Datasets, benchmarks, and open-source packages
  • Recourse efficient deep learning
  • Adversarial Machine learning and Backdoor Attacks
  • Blockchain Systems for Cyber Security
  • Trustworthy AI Systems
  • Intelligent Systems for Misinformation Detection

Organization Committee

  • Ahmed Aleroud, Augusta University, USA
  • Lina Zhou, University of North Carolina, Charlotte
  • Leigh Metcalf, co-Editor-in-Chief ACM Digital Threats: Research and Practice
  • Samer Khamaiseh, Miami university, OH
  • Izzat Alsmadi, Texas A&M University-San Antonio, USA.
  • Lo’ai Tawalbeh, Texas A&M University-San Antonio, USA.
  • Gokay Saldamli: San Jose State University, CA, USA.
  • Yassine Maleh,. University Sultan Moulay Slimane, Morocco

KEYNOTE SPEAKERS

IDSTA2022 Keynote at http://intelligenttech.org/IDSTA2022/keynote.php

Authors Submission Guidelines:

Submission Site:

https://easychair.org/conferences/?conf=idsta2022

Paper format

Submitted papers (.pdf format) must use the A4 IEEE Manuscript Templates for Conference Proceedings. Please remember to add Keywords to your submission.

Length

Submitted papers may be 6 to 8 pages. Up to two additional pages may be added for references. The reference pages must only contain references. Overlength papers will be rejected without review.

Originality

Papers submitted to AISC must be the original work of the authors. The may not be simultaneously under review elsewhere. Publications that have been peer-reviewed and have appeared at other conferences or workshops may not be submitted to AISC. Authors should be aware that IEEE has a strict policy with regard to plagiarism https://www.ieee.org/publications/rights/plagiarism/plagiarism-faq.html The authors' prior work must be cited appropriately.

Author list

Please ensure that you submit your papers with the full and final list of authors in the correct order. The author list registered for each submission is not allowed to be changed in any way after the paper submission deadline.

Proofreading:

Please proofread your submission carefully. It is essential that the language use in the paper is clear and correct so that it is easily understandable. (Either US English or UK English spelling conventions are acceptable.)

Publication:

All accepted papers in AISC2022 and the workshops colocated with it will be submitted to IEEEXplore for possible publication.

Program

The program will be announced with the IDSTA2022 program at http://intelligenttech.org/IDSTA2022/program.php

Venue

For venue and acomodoation information, please visit http://intelligenttech.org/IDSTA2022/venue.php

Registration

For registration information, please visit http://intelligenttech.org/IDSTA2022/registration.php

Camera Ready

For registration information, please visit http://intelligenttech.org/IDSTA2022/cameraready.php