Abbrevation
ICCIIS
City
Tamilnadu
Country
India
Deadline Paper
Start Date
End Date
Abstract

ICCIIS &#8242;07 aims at creating a national forum for the discussion and interchange among researchers and practitioners of all areas related to Computational Intelligence and Information Security&#046; Multidisciplinary Research Groups including members from areas such as Computer Science, Information Technology, Artificial Intelligence, and general specialist and practitioners of information are welcomed&#046;<br>The Conference also seeks to bring together developers, users, academicians and researchers from academia and industry community for sharing and exploring new vistas of research and development and to present new research results and demonstration of new systems and techniques in these areas&#046; While presenting research findings and state&#8211;of&#8211;art solutions, you are especially invited to share experiences on new research challenges&#046; Original papers exploring research challenges will receive especially careful interest from reviewers&#046;<br>ICCIIS 2007 invites original contributions from individuals active in the broad theme of the conference&#046; <b>Keywords:</b> Computational Intelligence<br>&#8211; Artificial Immune Systems &#8211; Autonomy&#8211;Oriented Computing &#8211; Biological Computing &#8211; Evolutionary Computation &#8211; Fuzzy Systems &#8211; Intelligent Agents and Systems &#8211; Machine Learning &#8211; Molecular Computing &#8211; Neural Computing &#8211; Probabilistic Reasoning &#8211; Swarm Intelligence &#8211; Support Vector Machine<br>Information Security<br>&#8211; Cryptography and Coding &#8211; Cryptographic Protocols &#8211; Detection of Abnormality &#8211; Electronic Commerce Security &#8211; Intrusion Detection &#8211; Information, Data and System Integrity &#8211; Information Security Management &#8211; Information Storage and Retrieval System &#8211; Mobile Code & Agent Security &#8211; Media Data Authentication &#8211; Security Models and Architectures &#8211; Security Analysis Methodologies &#8211; Steganography and Watermarking &#8211; Web and Wireless Security<br>Applications<br>&#8211; Bioinformatics and Medical Diagnosis &#8211; Biometrics &#8211; Copyright Protection &#8211; Cryptography and Its Applications &#8211; Data Mining &#8211; Data Privacy &#8211; Digital Signatures &#8211; Electronic Commerce Security &#8211; Identity Recognition &#8211; Intelligent Information Retrieval &#8211; Pattern Recognition &#8211; Web and Network Applications &#8211; Other Applications