The technical areas include, but are not limited to:
Computational Intelligence |
• | Artificial Immune Systems |
• | Autonomy-Oriented Computing |
• | Biological Computing |
• | Coevolutionary Algorithms |
• | Evolutionary Computation |
• | Fuzzy Systems |
• | Intelligent Agents and Systems |
• | Machine Learning |
• | Molecular Computing |
• | Neural Computing |
• | Probabilistic Reasoning |
• | Reinforcement Learning |
• | Swarm Intelligence |
• | Support Vector Machine |
• | Unsupervised Learning |
• | Cryptography and Coding |
• | Cryptographic Protocols |
• | Detection of Abnormality |
• | Electronic Commerce Security |
• | Intrusion Detection |
• | Information, Data and System Integrity |
• | Information Hiding |
• | Information Security Management |
• | Information Storage and Retrieval System |
• | Mobile Code & Agent Security |
• | Media Data Authentication |
• | Security Models and Architectures |
• | Security Analysis Methodologies |
• | Steganography and Watermarking |
• | Web and Wireless Security |
• | Bioinformatics and Medical Diagnosis |
• | Copyright Protection |
• | Cryptography and Its Applications |
• | Data Mining |
• | Data Privacy |
• | Detection of Hidden Communication Channels |
• | Digital Signatures |
• | Electronic Commerce Security |
• | Identity Recognition |
• | Image and Signal Processing |
• | Intelligent Information Retrieval |
• | Pattern Recognition |
• | Web and Network Applications |
• | Other Applications |