CFP:Special Session on Evolutionary Computation in Computer Security and Cryptology at the CEC2003

From: Julio Cesar Hernandez Castro (jcesar@inf.uc3m.es)
Date: 04/24/03


From: jcesar@inf.uc3m.es (Julio Cesar Hernandez Castro)
Date: 23 Apr 2003 15:01:17 -0700

SPECIAL SESSION ON
EVOLUTIONARY COMPUTATION
IN COMPUTER SECURITY
AND CRYPTOLOGY

 http://tracer.uc3m.es/CFP-SS-CEC2003.html
 
 http://vlab.ee.nus.edu.sg/~kctan/sscec2003.htm

 CONGRESS ON EVOLUTIONARY COMPUTATION CEC-2003
 http://www.cs.adfa.edu.au/cec_2003/home.html
 December 8-12, 2003. Canberra, Australia

 =======================================
 Deadline for Paper Submissions
 July 7th, 2003
 =======================================

 Important dates:
 Deadline for submissions: July 7th, 2003
 Notification of acceptance: August 1th, 2003
 Camera-ready copy of papers: September 2th, 2003
 Conference venue: December 8-12th, 2003

=================
 MOTIVATION
=================

 The Congress
=================

The Congress on Evolutionary Computation, one of the leading
international conferences in the field, will be held in Canberra,
Australia, 8th - 12th December 2003. It covers all topics in
evolutionary computation: from combinatorial to numerical
optimization, from supervised to unsupervised learning, from
co-evolution to collective behaviors, from evolutionary design to
evolvable hardware, from molecular to quantum computing, from ant
colony to artificial ecology, etc.

 
The Special Session
====================

Techniques taken from the field of Evolutionary Computation (specially
Genetic Algorithms and Genetic Programming, but also others) are
steadily becoming more and more present in the area of computer
security, both in network/host security and in the very demanding area
of cryptology. In recent years, algorithms which take advantage of
approaches based on Evolutionary Computation have been proposed, for
example, in the design and analysis of a number of new cryptographic
primitives, ranging from pseudo-random number generators to block
ciphers, in the cryptanalysis of state-of-the-art cryptosystems, and
in the detection of network attacking patterns, to name a few.

There is a growing interest from the computer security community
toward Evolutionary Computation techniques, as a result of these
recent successes, but there still are a number of open problems in the
field that should be addressed. This special session will try to do it
by asking for submissions in all areas of evolutionary computation
dealing with applications to computer security, and by giving the
interested researchers an opportunity to review the current
state-of-art of the topic, exchange recent ideas, and explore
promising new directions. We would like to invite your participation
in the special session Evolutionary Computation in Computer Security
at the CEC-2003, an opportunity to meet leading researchers in the
field, exchange ideas and initiate collaborations.

==================
 PROPOSED TOPICS
==================

This special session will explore issues related to new researches and
applications of modern Artificial Intelligence techniques in computer
security, mainly focused in the field of Evolutionary Computation.

Relevant topics include, but are not limited to:

ˇ Cellular automata, Genetic Algorithms, Genetic Programming,
Classifier Systems, Simulated Annealing, Evolutionary Strategies,
Tabu Search, Bio-inspired systems, etc. in:

o Design of cryptographic primitives, including: pseudo-random
number generators, block ciphers, stream ciphers, hash functions,
S-Boxes, etc...

o Analysis and/or cryptoanalysis of cryptographic primitives

o Cryptography

o Improvement of cryptographic primitives

o Network security

o Intrusion detection systems

o Host security

 
==========================
 FORMATTING INSTRUCTIONS
==========================

All the paper formatting information can be found at:
http://www.cs.adfa.edu.au/%7Erim/CEC2003/CEC_2003_Paper_Submission.html

==========================
 SUBMISSION PROCEDURE
==========================
 
Preferably, the submission should be sent either in PostScript format
or in PDF format by email to both jcesar@inf.uc3m.es and
isasi@ia.uc3m.es.

The deadline for receipt of submissions is July 7th, 2003. Papers
received after this date will not be reviewed.

You will receive an acknowledgment, and after review (see the
timetable) you will receive an acceptance notification. If your paper
is accepted, it will appear in the proceedings so long as you fulfill
two further conditions by the final submission date, 2th September,
2003:
    

ˇ Supply the final camera-ready copy

ˇ At least one author must have submitted a paid registration
for the conference

All submissions must include the author's name(s), affiliation,
complete mailing address, phone number, fax number and email address.
Please submit an abstract within your submission email. All accepted
submissions will be published in the conference proceedings.

========================================================
 Organizers: Pedro Isasi and Julio César Hernández

   Dr Pedro Isasi
   Artificial Intelligence Group
   Carlos III University
   Avda. Universidad, 30
   28911 Leganés, Madrid, Spain
   e-mail: isasi@ia.uc3m.es
   Tel: +34 91 624 94 55
   Fax: +34 91 624 91 29

   Dr. Julio César Hernández
   Computer Security Group
   Carlos III University
   Avda. Universidad, 30
   28911 Leganés, Madrid, Spain
   e-mail: jcesar@inf.uc3m.es
   Tel: +34 91 624 94 99
   Fax: +34 91 624 91 29
========================================================



Relevant Pages