[DL] Submission Deadline of CIS'2011 Extended

do-not-reply post09 at cis-lab.org
Sun Jul 24 08:48:13 CEST 2011

Dear Author,

*******Our apologies if you receive multiple copies of this announcement


   The 7th International Conference on Computational Intelligence and
Security (CIS'2011)


                3-4, December, 2011, Sanya, China

                 *** Important Dates of CIS2011***

            ●  *Submission of Papers: July 30, 2011 (Extended Due Date)*

            ●  Notification of Acceptance: August 10, 2011

            ●  Final Camera-Ready Papers: August 30, 2011


                  Conference Website: http://www.cis-lab.org/


   International Conference on Computational Intelligence and Security (CIS)
is a major annual international conference to bring together researchers,
engineers, developers and practitioners from academia and industry working
in all areas of two crucial fields in information processing: computational
intelligence (CI) and information security (IS), to share the experience,
and exchange and cross-fertilize ideas. In particular, the series of CIS
conference provides an ideal platform to explore the potential applications
of CI models, algorithms and technologies to IS.

   Following the great success of CIS'2005-2010, the seventh conference
CIS'2011 serves as a forum for the dissemination of state-of-the-art
research, development, and implementations of systems, technologies and
applications in these two broad fields. CIS'2011 is co-organized by Hainan
Association of Computing Machinery and Guangdong University of Technology.
Also, it is co-sponsored by Xidian University and Beijing Nomal University.
CIS'2011 will be held in Sanya, Hainan Province, China on December 3-4,

   Prospective authors are invited to submit high-quality manuscripts
written in English. The submission of a paper implies that the paper is
original and has not been submitted to elsewhere for possible publication.
All submissions will be blindly reviewed by experts in the field based on
originality, significance, quality and clarity. Authors must not reveal any
author information in the submitted paper(s), otherwise the paper(s) will be
rejected immediately without going through the reviewing process. Authors
should use the Latex style files or MS-Word templates provided by the CPS to
format their papers. The length of a submitted paper should not exceed 5
pages in two-column format. The accepted papers will be included in the
conference proceedings published by the Conference Publishing Services
(CPS), and be further submitted to the indexing companies for possible
indexing, including EI and ISTP. Nevertheless, all past CIS'2005-CIS'2010
proceedings have been successfully indexed in EI, and it is expected that
the publication and indexing process of CIS'11 remain the same as in the

The accepted papers will be further selected based on its originality and
technical quality, and significantly expanded and included in several
Special Issues of the International Journals (EI or SCI indexed).

The main topics (research interests) of the conference include but are not
limited to:

l  Computational Intelligence (Models, Theories and Algorithms)

n  Artificial Immune Systems

n  Autonomy-Oriented Computing

n  Artificial Neural Systems

n  Bayesian Learning

n  Biological Computing

n  Data Mining

n  DNA Computing

n  Evolutionary Programming

n  Evolutionary Algorithms

n  Image Understanding

n  Intelligent Systems

n  Knowledge Discovery

n  Learning Algorithms

n  Machine Learning

n  Multi-Agent Systems

n  Multi-Objective EA

n  Neural Networks

n  Particle Swarm Optimization

n  Probabilistic Reasoning

n  Reinforcement Learning

n  Supervised Learning

n  Swarm Intelligence

n  Probabilistic Learning

l  Information Security

n  Access Control

n  Authentication and Authorization

n  Block/Stream Ciphers

n  Cryptography and Coding

n  Cryptographic Protocols

n  Cryptanalysis

n  Computer Forensics

n  Hash Functions

n  Information and System Integrity

n  Intrusion Detection

n  Information Hiding

n  Internet/Intranet Security

n  Information Security Management

n  Key/Identity Management

n  Mobile Communications Security

n  Malicious Codes

n  Mobile Code & Agent Security

n  Network & Wireless Security

n  Public Key Cryptosystems

n  Public Key Infrastructure

n  Secret Sharing

n  Security Management

n  Steganography & Watermarking

l  Applications

n  Anti-Virus

n  Biometrics

n  Content Security

n  Cryptography and Applications

n  Communication Security

n  Copyright Protection

n  Database Security

n  Digital Signatures

n  Data Privacy

n  Distributed Systems Security

n  Detection of Abnormality

n  Elliptic Curve Cryptosystems

n  Financial Security

n  Electronic Commerce Security

n  Information Discovery

n  Mobile Device Security

n  Multimedia Security

n  Software Encryption

n  System Security

n  Statistical Data Analysis

n  Web Privacy and Trust

n  Web Authentication

n  Web Security and Integrity

For more details, please visit the conference web site at:

Thank you very much for your great support.

Best regards,

CIS2011 Secretariat

(E-mail: cis_conf at xidian.edu.cn, cis.lab.conf at gmail.com )
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://mailman.informatik.uni-bremen.de/pipermail/dl/attachments/20110724/f23e9d59/attachment.html>

More information about the dl mailing list