News and Announcements
Welcome to the WCCI 2012 Special Session on Computational Intelligence for Security, Surveillance and Defence (CISSD)! This year, this special session is being run as an official one of the 2012 IEEE World Congress on Computational Intelligence (WCCI 2012) on June 10-15, 2012 in Brisbane, Australia. The 2012 version is being organized by the IEEE CIS Security, Surveillance and Defence Applications Task Force under the Intelligent Systems Applications Technical Committee (ISATC).
Also, please feel free to review the previous editions of this special session:
- CISDA 2009 website which was held in Ottawa, Canada on July 8-10, 2009.
- CISDA 2010 website which was held in Barcelona, Spain on July 18, 2010.
- CISDA 2011 website which was held in Paris, France on April 15, 2011.
- CISDA 2012 website which will be held inOttawa, Canada on July 11-13, 2012.
Given the current global security environment, there has been increased interest within the security and defense communities in novel techniques for solving challenging problems. The genesis of this interest lies in the fact that repeated attempts of using traditional techniques have left many important problems unsolved, and in some cases, not addressed. New problems have emerged within the broad areas of security and defense that are difficult to tackle with conventional methods, thus requiring new techniques for detecting and adapting to emerging threats.
The purpose of the workshop is to present current and ongoing efforts in computational intelligence (e.g., neural networks, fuzzy systems, evolutionary computation, swarm intelligence, and other emerging learning or optimization techniques) as applied to security and defense problems under (but not limited to) the following domains:
Advanced Architectures for Defense Operations
- Multi-Sensor Data Fusion
- Employment of Autonomous Vehicles
- Intelligence Gathering and Exploitation
- Mine Detection
- Situation Assessment
- Automatic Target Recognition
- Mission Weapon Pairing and Assignment
- Sensor Cueing and Tasking
Modeling and Simulation of Defense Operations
- Logistics Support
- Mission Planning and Execution
- Resource Management
- Course of Action Generation
- Models for War Games
- Multi-Agent Based Scenarios
- Strategic Planning
- Human Modeling: Behavior, Emotion, Motion
- Suspect Behavior Profiling
- Automated handling of dangerous situations or people in a security application
- Stationary or Mobile Object Detection, Recognition and Classification
For a comprehensive list of areas covered by the term computational intelligence please see IEEE CIS Technical Activities.