News and Announcements
Welcome to the WCCI 2014 Special Session on Computational Intelligence for Security, Surveillance and Defence (CISSD)! This year, the special session (coded EC39) is colocated with the 2014 IEEE World Congress on Computational Intelligence (WCCI 2014) on July 6-11, 2014 in Beijing, China. The 2014 version is being organized by the IEEE CIS Security, Surveillance and Defence Applications Task Force under the Intelligent Systems Applications Technical Committee (ISATC).
The paper submission deadline has been extended to January 20, 2014!Also, please feel free to check the previous editions of this special session:
- CISDA 2009 website which was held in Ottawa, Canada on July 8-10, 2009.
- CISDA 2010 website which was held in Barcelona, Spain on July 18, 2010.
- CISDA 2011 website which was held in Paris, France on April 15, 2011.
- WCCI 2012 website which was held in Brisbane, Australia on June 10-15, 2012.
- CISDA 2012 website which was held in Ottawa, Canada on July 11-13, 2012.
Best regards,
Rami Abielmona
Slawo Wesolkowski
Rafael Falcon
Overview
Given the rapidly changing and
increasingly complex nature of global security, we continue to witness
a
remarkable interest within the security and defense communities in
novel,
adaptive and resilient techniques that can cope with the challenging
problems
arising in this domain. These challenges are brought forth not only by
the
overwhelming amount of data reported by a plethora of sensing and
tracking
modalities, but by the emergence of innovative classes of
decentralized,
mass-scale communication protocols and connectivity frameworks such as
cloud
computing, vehicular networks and the Internet of Things. Realizing
that
traditional techniques have left many important problems unsolved, and
in some
cases, not addressed, further efforts have to be undertaken in the
quest for
algorithms and methodologies that can detect and easily adapt to
emerging
threats.
Advanced Architectures for Defense Operations
- Multi-Sensor Data Fusion
- Employment of Autonomous Vehicles
- Intelligence Gathering and Exploitation
- Mine Detection
- Situation Assessment
- Automatic Target Recognition
- Mission Weapon Pairing and Assignment
- Sensor Cueing and Tasking
Modeling and Simulation of Defense Operations
- Logistics Support
- Mission Planning and Execution
- Resource Management
- Course of Action Generation
- Models for War Games
- Multi-Agent Based Simulation
- Strategic Planning
Security Applications
- Human Modeling: Behavior, Emotion, Motion
- Surveillance
- Suspect Behavior Profiling
- Automated Handling of Dangerous Situations or People
- Stationary or Mobile Object Detection, Recognition and Classification
- Intrusion Detection Systems
- Cyber-Security
- Air, Maritime and Land Security
- Network Security, Biometrics Security and Authentication
Technologies
For a comprehensive list of areas covered by the term computational intelligence please see IEEE CIS Technical Activities.