Cyber Security is an interdisciplinary area that focuses on
maintaining and reducing risks to the confidentiality,
integrity, and availability of information and resources in
computer and network systems.
This track will focus on both the use of artificial intelligence
and machine learning to develop methods and technologies that
address cyber security issues (e.g. intrusion detection
systems), and on security issues associated with developing
general purpose AI systems (e.g. client privacy, defense in
In today’s computing environment, many technologies such as
embedded systems in healthcare devices and wearable computer
devices, large physical systems, and power grids are connected
and continuously collecting and processing data to support
decision making. The near future includes automated systems and
robots that can make intelligent decisions autonomously. These
smart systems will rely heavily on AI algorithms, theories and
implementations. Providing security for these smart systems and
devices, preventing malicious and incidental attacks and
equipping these systems to respect the privacy of their users by
understanding the consequences of revealing sensitive data are
challenging issues for a smart, connected computerized society.
This special track calls on the AI community to rethink existing
security and privacy approaches and to propose innovative
solutions for the security, privacy and trust issues in
Furthermore, the complexity of modern systems and the diversity
of threat vectors both socially and technically, require
intelligent, adaptive, multimodal solutions for which artificial
intelligence (AI) approaches are well suited. This track also
seeks innovative AI-based solutions to monitoring, detecting,
responding, and preventing cyber security threats.
Solutions and innovative ideas in all AI application areas such
as business, government, science, medicine, health, education,
etc., are welcome.
What is the GOAL of the track?
This track is intended to generate innovative ideas and unique
AI solutions to address information and systems-related
security, privacy and trust issues. The track will provide
insights and help in advancing AI theories and practices related
to cyber security.
Who might be interested?
This track will be of interest to AI researchers; security and
privacy researchers; and practitioners, government officials,
security and privacy educators, and students concerned with
computer and network security.
What kind of studies will be of interest?
Original high quality papers are sought for leading edge
research and applications relating to AI and Cyber Security.
Topics of interest include but are not limited to:
· AI & Biometrics
· AI & SCADA systems security
· AI & Network Systems security
· AI & Embedded Systems security
· AI & Internet of Things
· AI in Forensic Analysis
· AI & Cloud Computing security
· Machine Learning for Intrusion Detection Systems
· NLP for text analysis in Cyber Security
· Video and CCTV semantic analysis for terrorist or criminal
· Semantic models and knowledge engineering for security and
· Security/privacy/trust ontology
· Security and privacy behavior modeling for autonomous
· Security and privacy intelligence and analytics of big data
· Security and privacy-aware decision support
· Security and privacy reasoning and inference
· Cyber security and privacy education and training
· Security and privacy studies in Applied AI systems (e.g.
health, science, business, government, robotics, embedded
systems, grid systems, education, multimedia content sharing,
cloud-based systems, mobile security, location privacy, social
media, entity tracking, authentication, biometrics, cyber
physical systems security, forensics, intrusion detection, etc.)
Publication and Paper Submission
Interested authors should format their papers according to
AAAI formatting guidelines. The papers should be original
work (i.e., not submitted, in submission, or submitted to
another conference while in review). Papers should not exceed 6
pages (4 pages for a poster) and are due by November 17,
2014. For FLAIRS-28, the 2015 conference, the reviewing
is a double blind process. Please do not disclose your name and
affiliation in the paper. Papers must be submitted as PDF
EasyChair conference system, which can also be accessed
through the main conference
web site. Note: do not use a fake name for your EasyChair
login - your EasyChair account information is hidden from
reviewers. Authors should indicate the Intelligent Autonomous
Systems special track for submissions. The proceedings of FLAIRS
will be published by the AAAI. Authors of accepted papers will
be required to sign a form transferring copyright of their
contribution to AAAI. FLAIRS requires that there be at least one
full author registration per paper.
Paper submission deadline: 17th November 2014
Notification of paper decisions: 19th January 2015
Final version of papers due: 23th February 2015
Track organizers :
- Soon Ae Chun, City University of New York, College
of Staten Island
- Ricardo A. Calix, Purdue University Calumet
- David Bisant, Central Security Svcs.
- Gerald M. Knapp, Louisiana State University
- Brian Auslander, Nexus Research Corp.
- Steve Jilcott, Raytheon BBN
- Benjamin Priest, MIT Lincoln Laboratory
- Sven Dietrich, CUNY John Jay College of Criminal Justice
- Anirban Basu, KDDI R&D Laboratories
- James Geller, New Jersey Institute of Technology
- Alfredo Cuzzocrea, ICAR-CNR & University of Calabria
- Wendy Hui Wang, Stevens Institute of Technology
- Basit Shafiq, Lahore University of Management Sciences
- Reza Curtmola, New Jersey Institute of Technology
- Jean-Marc Seigneur, University of Geneva
- Jaideep Vaidya, Rutgers University