News and Announcements

Welcome to CISDA 2010! This year, the workshop is being run as an official workshop of the 2010 IEEE World Congress on Computational Intelligence (WCCI 2010) on July 18, 2010 in Barcelona, Spain. This year's version is being organized by the newly formed IEEE CIS Security, Surveillance and Defence Applications Task Force under the Intelligent Systems Applications Technical Committee (ISATC).

Note that the workshop is organized as part of the WCCI 2010 workshops and will thus not result in a proceedings available on IEEEXplore. We regret any confusion our initial CFP may have caused.

We are working on a book proposal with IEEE/Wiley under the Series on Computational Intelligence. The focus of the book will be on defense applications as well as security applications important for defense. The proposed editors of the book are Slawo Wesolkowski, DRDC, Axel Bender, DSTO and Leonid Perlovsky, AFRL. Authors interested in contributing to the book are invited to submit chapter proposals. Authors of accepted proposals will be able to present their work at the workshop to obtain feedback in order to improve their contributions. Presentations will be given in either oral or poster form.

Please indicate your interest in submitting a proposal by emailing Slawo Wesolkowski.

Also, please feel free to review the CISDA 2009 website which was held in Ottawa, Canada on July 8-10, 2009.

Best regards,
Slawo Wesolkowski

Call For Papers

Third IEEE Workshop on
Computational Intelligence for Security and Defense Applications

Transforming Data into Actionable Intelligence

Barcelona, Spain, 18 July 2010

Sponsored by the IEEE Computational Intelligence Society


Given the current global security environment, there has been increased interest within the security and defense communities in novel techniques for solving challenging problems. The genesis of this interest lies in the fact that repeated attempts of using traditional techniques have left many important problems unsolved, and in some cases, not addressed. New problems have emerged within the broad areas of security and defense that are difficult to tackle with conventional methods, thus requiring new techniques for detecting and adapting to emerging threats.

The purpose of the workshop is to present current and ongoing efforts in computational intelligence (e.g., neural networks, fuzzy systems, evolutionary computation, swarm intelligence, and other emerging learning or optimization techniques) as applied to security and defense problems.


The problem domains of interest for this workshop include, but are not limited to the following:

Advanced Architectures for Defense Operations Modeling and Simulation of Defense Operations Security Applications
  • Multi-Sensor Data Fusion
  • Employment of Autonomous Vehicles
  • Intelligence Gathering and Exploitation
  • Mine Detection
  • Situation Assessment
  • Automatic Target Recognition
  • Mission Weapon Pairing and Assignment
  • Sensor Cueing and Tasking
  • Logistics Support
  • Mission Planning and Execution
  • Resource Management
  • Course of Action Generation
  • Models for War Games
  • Multi-Agent Based Scenarios
  • Strategic Planning
  • Human Modeling: Behavior, Emotion, Motion
  • Surveillance
  • Suspect Behavior Profiling
  • Automated handling of dangerous situations or people in a security application
  • Stationary or Mobile Object Detection, Recognition and Classification
  • Air, Maritime & Land Security
  • Network Security, Biometrics Security and Authentication Technologies


For a comprehensive list of areas covered by the term computational intelligence please see IEEE CIS Technical Activities.