CALL FOR ABSTRACT

International Conference on Defence Safety

    • Machine Learning for Data Mining
    • Data Mining Methods for Security
    • Agent and Multi-Agent Systems
    • Hybrid Systems
    • Unsupervised Learning
    • Classification Methods
    • Novelty Detection
    • Intrusion Detection Systems
    • Log Correlation Methods
    • Adaptive Defense of Network Infrastructure
    • Adaptive Reasoning
    • Information Forensics
    • Document Classification and Processing
    • Ontologies and Conceptual Information Processing
    • Semantic Information Representation
    • Natural Language Acquisition
    • Web Semantics in Intelligence and Law-Enforcement
    • Industrial and Commercial Applications of Intelligent Methods for Security
    • Intelligent Control and Monitoring of Critical Systems
    • Dynamic Adaptive Railway Operation
    • Centralized Control Systems
    • Adaptive Planning for Strategic Reasoning
    • Intelligent Methods in Energy and Transportation
    • Planning and Automated Reasoning in Large System Control
    • Biometric Identification and Recognition
    • Biometric Surveillance
    • Biometric Access Control
    • Extraction of Biometric Features (fingerprint, iris, face, voice, palm, gait)
    • Cryptography
    • Applied Cryptography and provably-secure cryptographic protocols
    • Design and analysis of efficient cryptographic primitives:
    • public-key and symmetric-key cryptosystems, block ciphers, and hash functions
    • Economic fraud on the Internet: phishing, pharming, spam, and click fraud
    • Email and web security
    • Intellectual property protection:
    • metering, watermarking, and digital rights management.
    • Computer Science, namely on HPC and Grid computing issues
    • Computational Sciences, with requirements in HPC and Grid
    • Computational Engineering with a similar focus.
    • Grid Middleware, Grid Computing, Data and Networking Infrastructures
    • Distributed and Large-Scale Data Access and Management
    • Data Repositories, Distributed Resource Management and Scheduling
    • Supercomputer/cluster/grid integration issues
    • Grid Performance Evaluation, QoS and SLA Negotiation
    • Grid and HPC Applications, including e-Science in general and also Science Gateways, Nanomaterials, High Energy Physics, e-Health, e-Business, e-Administration, Life Sciences, Earth Sciences, Civil Protection, Computational Sciences and Engineering, ...
    • User Development Environments and Programming Tools for Grid Computing.
    • Infrastructure as a service (IaaS)
    • Virtualization in data centers
    • Virtualization for resource management and QoS assurance
    • Security aspects of using virtualization in a distributed environment
    • Virtual networks
    • Virtual data, storage as a service
    • Fault tolerance in virtualized environments
    • Virtualization in P2P systems
    • Virtualization-based adaptive/autonomic systems
    • The creation and management of environments/appliances
    • Virtualization technologies
    • Performance modeling (applications and systems)
    • Virtualization techniques for energy/thermal management
    • Case studies of applications on IaaS platforms
    • Deployment studies of virtualization technologies
    • Tools relevant to virtualization



Conference Date

16th - 17th June 2025

Submission Date

Early Bird Fee: 17th May 2025

Last Date for Paper Submission:1st June,2025

Last Date for Registration:1st June,2025


Downloads