<div dir="ltr"><div class="gmail_default" style="font-family:arial,sans-serif;font-size:small;color:#000000"><br></div><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div style="font-family:arial,sans-serif;font-size:small;color:#000000"><div><div>We are glad to consider your submissions to the <span class="gmail_default" style="font-family:arial,sans-serif;font-size:small;color:rgb(0,0,0)"></span>Second International Symposium on Advanced Intelligent Systems for Cybersecurity (AISC2022)</div><div><br>SEPTEMBER 5-7, 2022. SAN ANTONIO, TEXAS, USA<br><br>Colocated with<span class="gmail_default"> </span>The International Conference on Intelligent Data Science Technologies and Applications (IDSTA2022)</div><div><br></div><div><a href="http://intelligenttech.org/IDSTA2022/Workshops/AISC2022/" target="_blank">http://intelligenttech.org/IDSTA2022/Workshops/AISC2022/</a><br></div><div><br></div><div><div><br></div></div><div>CALL FOR PAPERS</div><div>--------------------------------<br>In today’s world, billions of connected systems created an ever ending flow of data, which is prone to cyberattacks, which needs a fast and accurate detection of cyber-attacks. Intelligent systems and Data analytics are important components when matters pertaining to effective security solutions become the subject of discussion. This is because there is an impending need for high volume and high velocity data from different sources to detect anomalies as soon as they arise. This will help reduce significantly the vulnerability of the systems as well as improve their resilience. The capability to process large volumes of information real time through utilization of tools for data analytics has many advantages vital for analysis of cybersecurity systems. Moreover, the data collected from advanced intelligent systems, cloud systems, networks, sensors, computers, intrusion detection systems could be used to identify vital information. This information could be used to detect how vulnerable the systems are to risk factors, and so an effective Cyber security solution can be developed. In addition to that, the utilization of data analytics tools in the cybersecurity field gives new insights through considering factors such as zero-day attack detection, real time analysis; resource constrained data processing among others.<br><div><br></div><br>The AISC 2022 symposium addresses the use of advanced intelligent systems in providing cybersecurity solutions in many fields, and the challenges, approaches, and future directions. We invite the submission of original papers on all topics related to Intelligent Systems for Cybersecurity, with special interest in but not limited to:<br><ul><li style="margin-left:15px">Intelligent systems for effective detection of cyber-attacks</li><li style="margin-left:15px">Advanced Intelligent systems and data analytics for Cloud/Edge systems security</li><li style="margin-left:15px">Malware detection using intelligent systems Vulnerability assessment</li><li style="margin-left:15px">Intelligent systems for intrusion detection in Internet of Things (IoT) systems</li><li style="margin-left:15px">Network forensics using intelligent systems and data analytics</li><li style="margin-left:15px">Data Analytics for privacy-by-design in smart health</li><li style="margin-left:15px">Datasets, benchmarks, and open-source packages</li><li style="margin-left:15px">Re<span class="gmail_default">s</span>our<span class="gmail_default">c</span>e efficient deep learning</li><li style="margin-left:15px"><span class="gmail_default">Adversarial Machine learning and Backdoor Attacks</span><br></li><li style="margin-left:15px"><span class="gmail_default">Blockchain Applications for Cyber Security</span></li></ul></div><div><div><br></div>ORGANIZATION COMMITTEE</div><div><font color="#000000" face="arial, sans-serif">------------------------------</font><font color="#000000" face="arial, sans-serif">------------</font><br><ul><li style="margin-left:15px">Ahmed Aleroud, Augusta University,<span class="gmail_default"> GA, </span>USA</li><li style="margin-left:15px">Lo’ai Tawalbeh, Texas A&M University-San Antonio, USA.</li><li style="margin-left:15px">Gokay Saldamli: San Jose State University, CA, USA.</li><li style="margin-left:15px">Yassine Maleh,. University Sultan Moulay Slimane, Morocco</li><li style="margin-left:15px">Lina Zhou, University of North Carolina, Charlotte</li><li style="margin-left:15px">Leigh Metcalf, co-Editor-in-Chief  ACM Digital Threats: Research and Practice</li><li style="margin-left:15px"><font color="#000000" face="arial, sans-serif">Samer Khamaiseh,  </font>Miami university, OH</li></ul><div><div><br></div><div>IMPORTANT DATES</div><div>----------------------------<br>Submission Due: June 25th, 2022<br>Notification: August 1st, 2022<br>Camera-ready submission: August 15th, 2022<br></div><div><br></div><div><div>Publication:</div><div>------------------<br><ul><li style="margin-left:15px">All accepted papers in AISC2022 and the workshops co-located with it will be submitted to IEEEXplore for possible publication.</li></ul></div></div><br></div><font color="#000000" face="arial, sans-serif">KEYNOTE SPEAKERS</font></div><div>----------------------------------<br><ul><li style="margin-left:15px">IDSTA2022 Keynote at <a href="http://intelligenttech.org/IDSTA2022/keynote.php" target="_blank">http://intelligenttech.org/IDSTA2022/keynote.php</a></li></ul><br>AUTHORS SUBMISSION GUIDELINES:<br>Submission Site:</div><div>--------------------------------------------------<br><ul><li style="margin-left:15px"><a href="https://easychair.org/conferences/?conf=idsta2022" target="_blank">https://easychair.org/conferences/?conf=idsta2022</a></li></ul><br>Paper format</div><div>-------------------<br><ul><li style="margin-left:15px">Submitted papers (.pdf format) must use the A4 IEEE Manuscript Templates for Conference Proceedings. Please remember to add Keywords to your submission</li><li style="margin-left:15px">Submitted papers may be 6 to 8 pages. Up to two additional pages may be added for references. The reference pages must only contain references. </li></ul></div><div><ul><li style="margin-left:15px">Papers submitted to AISC must be the original work of the authors. They may not be simultaneously under review elsewhere. Publications that have been peer-reviewed and have appeared at other conferences or workshops may not be submitted to AISC. Authors should be aware that IEEE has a strict policy with regard to plagiarism <a href="https://www.ieee.org/publications/rights/plagiarism/plagiarism-faq.html" target="_blank">https://www.ieee.org/publications/rights/plagiarism/plagiarism-faq.html</a> The authors' prior work must be cited appropriately.</li></ul><br>Author list</div><div>----------------<br><ul><li style="margin-left:15px">Please ensure that you submit your papers with the full and final list of authors in the correct order. The author list registered for each submission is not allowed to be changed in any way after the paper submission deadline.</li></ul>Proofreading:</div><div>-------------------<br><ul><li style="margin-left:15px">Please proofread your submission carefully. It is essential that the language used in the paper is clear and correct so that it is easily understandable. (Either US English or UK English spelling conventions are acceptable.)</li></ul></div><div><br>PROGRAM</div><div>----------------<br><ul><li style="margin-left:15px">The program will be announced with the IDSTA2022 program at <a href="http://intelligenttech.org/IDSTA2022/program.php" target="_blank">http://intelligenttech.org/IDSTA2022/program.php</a></li></ul><ul><li style="margin-left:15px">For venue and accommodation information, please visit <a href="http://intelligenttech.org/IDSTA2022/venue.php" target="_blank">http://intelligenttech.org/IDSTA2022/venue.php</a></li></ul><ul><li style="margin-left:15px">For registration information, please visit <a href="http://intelligenttech.org/IDSTA2022/registration.php" target="_blank">http://intelligenttech.org/IDSTA2022/registration.php</a></li></ul><ul><li style="margin-left:15px">For registration information, please visit <a href="http://intelligenttech.org/IDSTA2022/cameraready.php" target="_blank">http://intelligenttech.org/IDSTA2022/cameraready.php</a></li></ul></div></div><font color="#888888"><font style="color:rgb(0,0,0)"><div><br style="font-family:Arial,Helvetica,sans-serif"></div></font></font></div><div><br></div></div></div></div></div><div><br></div><p style="color:rgb(32,31,30);margin:0in 0in 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial"><b><span style="margin:0px;padding:0px;border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:14.5pt;line-height:inherit;font-family:inherit;vertical-align:baseline;color:rgb(31,73,125)">Ahmed AlEroud</span></b><span style="margin:0px;padding:0px;border:0px;font:inherit;vertical-align:baseline;color:rgb(31,73,125)"></span></p><p style="color:rgb(0,0,0);margin:0in 0in 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;line-height:12pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial"><font color="#1f497d">Associate Professor </font></p><p style="color:rgb(32,31,30);margin:0in 0in 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;line-height:12pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial"><span style="margin:0px;padding:0px;border:0px;font:inherit;vertical-align:baseline;color:rgb(31,73,125)">School of Computer and Cyber Sciences</span></p><p style="color:rgb(32,31,30);margin:0in 0in 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;line-height:12pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial"><span style="margin:0px;padding:0px;border:0px;font:inherit;vertical-align:baseline;color:rgb(31,73,125)">Augusta University</span><span style="margin:0px;padding:0px;border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:11pt;line-height:normal;vertical-align:baseline;color:rgb(31,73,125);background-color:rgba(0,0,0,0)">, </span><span style="margin:0px;padding:0px;border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:11pt;line-height:normal;vertical-align:baseline;color:rgb(31,73,125);background-color:rgba(0,0,0,0)">A Carnegie R2 Institution</span></p><p style="color:rgb(32,31,30);margin:0in 0in 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;line-height:12pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial"><span style="margin:0px;padding:0px;border:0px;font:inherit;vertical-align:baseline;color:rgb(5,99,193)"><a href="mailto:gagrawal@augusta.edu" target="_blank" rel="noopener noreferrer" style="margin:0px;padding:0px;border:0px;font:inherit;vertical-align:baseline"><span style="margin:0px;padding:0px;border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:11pt;line-height:normal;font-family:calibri,sans-serif;vertical-align:baseline;color:rgb(31,73,125);background-color:rgba(0,0,0,0)">aaleroud@augusta.edu</span></a></span></p><p style="color:rgb(32,31,30);margin:0in 0in 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif;line-height:12pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial"><span style="margin:0px;padding:0px;border:0px;font:inherit;vertical-align:baseline;color:rgb(31,73,125)"><a href="http://augusta.edu/ccs">augusta.edu/ccs</a></span></p><div dir="ltr" class="gmail_signature" data-smartmail="gmail_signature"><div dir="ltr"><div><div dir="ltr"><div><br></div></div></div></div></div></div>