The International Conference on Expert Applications & Security (ICETEAS2018) is the premier conference for the presentation of new advances and research results in the fields of Computer Science Engineering Applications and Security, to be held in the lovely and highly vibrant city of Jaipur in Rajasthan, India.
ICETEAS 2018 aims to provide an opportunistic forum and vibrant platform for researchers and industry practitioners to exchange state-of-the-art knowledge gained from their original research work and practical developments on specific new challenges, applications and experiences, to establish business or research relations, and to find global partners for future collaboration on emerging issues.
The Expert Application concept of the conference will focus on current advances in research and use of Expert Systems with particular focus on the role in maintaining academic level while sharing novel research and cutting-edge developments in the fields of Computer System Security using cryptographic algorithms and other security schemes for system as well as for cloud.
Original unpublished manuscripts, and not currently under review in another journal or conference, are solicited in relevant areas. For more details, Please visit Conference webpage www.iceteas.in.
Venue: Jaipur Engineering College & Research Centre, Jaipur
Dates of Conference: February 17-18, 2018
We are pleased to invite you to submit original contributions to ICETEAS2018 via the official submission system for the conference https://easychair.org/conferences/?conf=iceteas2018. This can include, technical and experimental, theoretical, conceptual, or a survey in the form of Position Paper/ Fast Abstracts/ Poster Papers/Tool Demonstrations/ Industrial Contributions.
Articles submitted to the conference should report original, previously unpublished research results, experimental or theoretical offering novel research contributions in any aspect of Expert Applications & Security and must not be under consideration for publication elsewhere. Submissions will be double blind peer reviewed and evaluated based on originality, technical and/ or research content/depth, correctness, relevance to conference, contributions, and readability. The full paper submissions will be chosen based on technical merit, interest, applicability and how well they fit a coherent and balanced technical program.
Topics of interests should fall under one or more of the conference tracks:
|Track 1: Expert Applications and Artificial Intelligence||Expert Systems and Applications based on loT, BigData, and Cloud Computing Emerging Technologies, Robotics, Neural Networks, Fuzzy Logic, Genetic Algorithms, Agents and Multi-Agent Systems, Human-Computer Interaction, Augmented Reality, Natural language processing, Distributed Intelligent System, Machine Learning, Intelligent Surveillance, Computational Intelligence.|
|Track 2: Information and Application Security||Security Issues and Threats in Expert Applications, Intelligence & Analytics in Security, Human Behavior and Factors in Security Applications, Data Leakage, Cloud Security, Endpoint Security, Cyber Threats Trends.|
|Track 3: Advanced Computing||At & Machine Learning, Data Mining & Warehousing, Web Mining, Computational Intelligence, Big Data Analysis, IoT Architectures & Protocol, IoT's Impact on 5G, Cloud & Fog ComputingGrid & Cluster Computing, Embedded & Green Computing, Mobile & Ubiquitous Computing, High Performance Computing, Image & Pattern Recognition, Natural language Processing, Human Computer Interaction, Speech & Signal Processing, Bio-Informatics, Virtual & e-Learning.|
|Track 4: Multimedia Applications in Forensics, Security & Intelligence||Forgery detection and identification, Detection of stenography, Device characterization and identification, Media forensic applications and attack analysis, Video analytics, Multimodal analysis of surveillance data, Multimodal analysis of biometric traces, Authenticity of multimedia data, Digital/encrypted domain watermarking for multimedia, Signal processing in the encrypted domain, Digital rights management, Robust hashing and content fingerprinting, Cryptography for content protection, Image, video, and text linking, Visual analytics, Scalable multimedia search,|
|Track 5: Advances in Web Technologies||Implementation & Security Issues|