News and Announcements

I would like to thank all IEEE CISDA 2009 attendees for making this second symposium on CI in security and defence application very successful. We had close to 80 people attending sessions over the three day period. There was a lot of cross-polination between the various fields at the symposium much of which was stimulated by outstanding invited talks from Kathleen Carley, Dale Reding, Hussein Abbass, Simon Haykin, Leonid Perlovsky, David Dunwoody, and Dipankar Dasgupta. I am pleased to say that we also had very few author no-shows (4 out of 48). Furthermore, for your interest, the acceptance rate for papers was 48/83 (~52%).

Please feel free to browse the CISDA 2010 website which will be held in Barcelona, Spain on July 18, 2010.

Thank you again for making IEEE CISDA 2009 a very successful event and I hope to see you again at IEEE CISDA 2010 or other event!

Best regards,
Slawo Wesolkowski


Call For Papers

Second IEEE Symposium on
Computational Intelligence for Security and Defense Applications

Detecting and Adapting to Emerging Threats

Ottawa, Canada, 8-10 July 2009

Sponsored by the IEEE Computational Intelligence Society


Given the current global security environment, there has been increased interest within the security and defense communities in novel techniques for solving challenging problems. The genesis of this interest lies in the fact that repeated attempts of using traditional techniques have left many important problems unsolved, and in some cases, not addressed.

New problems have emerged within the broad areas of security and defense that are difficult to tackle with conventional methods, thus requiring new techniques for detecting and adapting to emerging threats. The purpose of the symposium is to present current and ongoing efforts in computational intelligence (e.g., neural networks, fuzzy systems, evolutionary computation, swarm intelligence, and other emerging learning or optimization techniques) as applied to security and defense problems. The problem domains of interest for this symposium include, but are not limited to the following:

Advanced Architectures for Defense Operations Modeling and Simulation of Defense Operations Security Applications
  • Multi-Sensor Data Fusion
  • Employment of Autonomous Vehicles
  • Intelligence Gathering and Exploitation
  • Mine Detection
  • Situation Assessment
  • Automatic Target Recognition
  • Mission Weapon Pairing and Assignment
  • Sensor Cueing and Tasking
  • Logistics Support
  • Mission Planning and Execution
  • Resource Management
  • Course of Action Generation
  • Models for War Games
  • Multi-Agent Based Scenarios
  • Strategic Planning
  • Human Modeling: Behavior, Emotion, Motion
  • Surveillance
  • Suspect Behavior Profiling
  • Automated handling of dangerous situations or people in a security application
  • Stationary or Mobile Object Detection, Recognition and Classification
  • Air, Maritime & Land Security
  • Network Security, Biometrics Security and Authentication Technologies

For a comprehensive list of areas covered by the term computational intelligence please see IEEE CIS Technical Activities.