<div dir="ltr"><div class="gmail_default" style="font-family:arial,sans-serif;font-size:small;color:#000000"><br></div><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div><div style="color:rgb(0,0,0);font-family:Calibri,Arial,Helvetica,sans-serif;font-size:12pt;border:0px;font-variant-numeric:inherit;font-variant-east-asian:inherit;font-stretch:inherit;line-height:inherit;margin:0px;padding:0px;vertical-align:baseline"><span style="border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:small;line-height:inherit;font-family:Arial,sans-serif;margin:0px;padding:0px;vertical-align:baseline;color:inherit">Second International Symposium on Advanced Intelligent Systems for Cybersecurity (AISC2022)</span></div><div style="border:0px;font-variant-numeric:inherit;font-variant-east-asian:inherit;font-stretch:inherit;line-height:inherit;margin:0px;padding:0px;vertical-align:baseline"><div style="border:0px;font-variant-numeric:inherit;font-variant-east-asian:inherit;font-stretch:inherit;line-height:inherit;margin:0px;padding:0px;vertical-align:baseline">Co-sponsored by IEEE and Un. of Texas  <br>SEPTEMBER 5-7, 2022. SAN ANTONIO, TEXAS, USA<br aria-hidden="true"><br aria-hidden="true"><span style="color:inherit;font-family:inherit;font-size:14px;font-style:inherit;font-variant:inherit;font-weight:inherit;border:0px;font-stretch:inherit;line-height:inherit;margin:0px;padding:0px;vertical-align:baseline">Co-located with The International Conference on Intelligent Data Science Technologies and Applications (IDSTA2022)</span><br aria-hidden="true"><br></div><div style="border:0px;font-variant-numeric:inherit;font-variant-east-asian:inherit;font-stretch:inherit;line-height:inherit;margin:0px;padding:0px;vertical-align:baseline"><div class="gmail_default" style="font-family:arial,sans-serif;font-size:small;color:rgb(0,0,0)">Website</div></div><div style="color:inherit;font-family:Arial,sans-serif;font-size:small;border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;line-height:inherit;margin:0px;padding:0px;vertical-align:baseline"><br aria-hidden="true"></div></div><div style="color:rgb(0,0,0);font-family:Calibri,Arial,Helvetica,sans-serif;font-size:12pt;border:0px;font-variant-numeric:inherit;font-variant-east-asian:inherit;font-stretch:inherit;line-height:inherit;margin:0px;padding:0px;vertical-align:baseline"><span style="border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:small;line-height:inherit;font-family:Arial,sans-serif;margin:0px;padding:0px;vertical-align:baseline;color:inherit"><a href="http://intelligenttech.org/IDSTA2022/Workshops/AISC2022/" rel="noopener noreferrer" id="m_1856995901170821017m_-4785698420778291636gmail-LPlnkOWALinkPreview" style="border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;line-height:inherit;margin:0px;padding:0px;vertical-align:baseline" target="_blank">http://intelligenttech.org/IDSTA2022/Workshops/AISC2022/</a></span><br aria-hidden="true"></div><div style="color:rgb(0,0,0);font-family:Calibri,Arial,Helvetica,sans-serif;font-size:12pt;border:0px;font-variant-numeric:inherit;font-variant-east-asian:inherit;font-stretch:inherit;line-height:inherit;margin:0px;padding:0px;vertical-align:baseline"><br aria-hidden="true"></div><div style="color:rgb(32,31,30);font-family:arial,sans-serif;font-size:15px;border:0px;font-variant-numeric:inherit;font-variant-east-asian:inherit;font-stretch:inherit;line-height:inherit;margin:0px;padding:0px;vertical-align:baseline"><div id="m_1856995901170821017m_-4785698420778291636gmail-LPBorder_GTaHR0cDovL2ludGVsbGlnZW50dGVjaC5vcmcvSURTVEEyMDIyL1dvcmtzaG9wcy9BSVNDMjAyMi8." style="border:0px;font:inherit;margin:16px 0px;padding:0px;vertical-align:baseline;color:inherit;width:800px;max-width:800px;min-width:424px"><table id="m_1856995901170821017m_-4785698420778291636gmail-LPContainer185030" role="presentation" style="font:inherit;width:800px;border-radius:2px;padding:12px 36px 12px 12px;border:1px solid rgb(200,200,200)"><tbody><tr valign="top" style="border-spacing:0px"><td style="width:744.364px"><div id="m_1856995901170821017m_-4785698420778291636gmail-LPTitle185030" style="border:0px;font-style:inherit;font-variant:inherit;font-stretch:inherit;font-size:21px;line-height:inherit;font-family:wf_segoe-ui_light,"Segoe UI Light","Segoe WP Light","Segoe UI","Segoe WP",Tahoma,Arial,sans-serif;margin:0px 8px 12px 0px;padding:0px;vertical-align:baseline;color:inherit"><a href="http://intelligenttech.org/IDSTA2022/Workshops/AISC2022/" rel="noopener noreferrer" id="m_1856995901170821017m_-4785698420778291636gmail-LPUrlAnchor185030" style="border:0px;font:inherit;margin:0px;padding:0px;vertical-align:baseline;text-decoration-line:none" target="_blank">AISC2022</a></div><div id="m_1856995901170821017m_-4785698420778291636gmail-LPDescription185030" style="border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:14px;line-height:inherit;font-family:wf_segoe-ui_normal,"Segoe UI","Segoe WP",Tahoma,Arial,sans-serif;margin:0px 8px 12px 0px;padding:0px;vertical-align:baseline;color:rgb(102,102,102);overflow:hidden;max-height:100px">The Second International Symposium on Advanced Intelligent Systems for Cybersecurity AISC2022, San Antonio, Texas, USA.</div><div id="m_1856995901170821017m_-4785698420778291636gmail-LPMetadata185030" style="border:0px;font-style:inherit;font-variant:inherit;font-stretch:inherit;font-size:14px;line-height:inherit;font-family:wf_segoe-ui_normal,"Segoe UI","Segoe WP",Tahoma,Arial,sans-serif;margin:0px;padding:0px;vertical-align:baseline;color:rgb(166,166,166)"><a href="http://intelligenttech.org" target="_blank">intelligenttech.org</a></div></td></tr></tbody></table></div></div><div style="color:rgb(0,0,0);font-family:Calibri,Arial,Helvetica,sans-serif;font-size:12pt;border:0px;font-variant-numeric:inherit;font-variant-east-asian:inherit;font-stretch:inherit;line-height:inherit;margin:0px;padding:0px;vertical-align:baseline"><br><div style="border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:small;line-height:inherit;font-family:Arial,Helvetica,sans-serif;margin:0px;padding:0px;vertical-align:baseline;color:rgb(34,34,34)"><span style="border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:14px;line-height:inherit;font-family:inherit;margin:0px;padding:0px;vertical-align:baseline;color:black"> </span><br aria-hidden="true"><span style="border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:14px;line-height:inherit;font-family:inherit;margin:0px;padding:0px;vertical-align:baseline;color:black">CALL FOR PAPERS</span><br aria-hidden="true"><span style="border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:14px;line-height:inherit;font-family:inherit;margin:0px;padding:0px;vertical-align:baseline;color:black">--------------------------------</span><br aria-hidden="true"><span style="border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:14px;line-height:inherit;font-family:inherit;margin:0px;padding:0px;vertical-align:baseline;color:black">The AISC 2022 symposium addresses the use of advanced intelligent systems in providing cybersecurity solutions in many fields, and the challenges, approaches, and future directions. We invite the submission of original papers on all topics related to Intelligent Systems for Cybersecurity, with special interest in but not limited to:</span><br aria-hidden="true"><span style="border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:14px;line-height:inherit;font-family:inherit;margin:0px;padding:0px;vertical-align:baseline;color:black">·  Intelligent systems for effective detection of cyber-attacks</span><br aria-hidden="true"><span style="border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:14px;line-height:inherit;font-family:inherit;margin:0px;padding:0px;vertical-align:baseline;color:black">·  Advanced Intelligent systems and data analytics for Cloud/Edge systems security</span><br aria-hidden="true"><span style="border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:14px;line-height:inherit;font-family:inherit;margin:0px;padding:0px;vertical-align:baseline;color:black">·  Malware detection using intelligent systems Vulnerability assessment</span><br aria-hidden="true"><span style="border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:14px;line-height:inherit;font-family:inherit;margin:0px;padding:0px;vertical-align:baseline;color:black">·  Intelligent systems for intrusion detection in Internet of Things (IoT) systems</span><br aria-hidden="true"><span style="border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:14px;line-height:inherit;font-family:inherit;margin:0px;padding:0px;vertical-align:baseline;color:black">·  Network forensics using intelligent systems and data analytics</span><br aria-hidden="true"><span style="border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:14px;line-height:inherit;font-family:inherit;margin:0px;padding:0px;vertical-align:baseline;color:black">·  Data Analytics for privacy-by-design in smart health</span><br aria-hidden="true"><span style="border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:14px;line-height:inherit;font-family:inherit;margin:0px;padding:0px;vertical-align:baseline;color:black">·  Datasets, benchmarks, and open-source packages</span><br aria-hidden="true"><span style="border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:14px;line-height:inherit;font-family:inherit;margin:0px;padding:0px;vertical-align:baseline;color:black">·  Resource efficient deep learning</span><br aria-hidden="true"><span style="border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:14px;line-height:inherit;font-family:inherit;margin:0px;padding:0px;vertical-align:baseline;color:black">·  Adversarial Machine learning and Backdoor Attacks</span><br aria-hidden="true"><span style="border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:14px;line-height:inherit;font-family:inherit;margin:0px;padding:0px;vertical-align:baseline;color:black">·  Blockchain Systems for Cyber Security</span><br aria-hidden="true"><span style="border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:14px;line-height:inherit;font-family:inherit;margin:0px;padding:0px;vertical-align:baseline;color:black">·  Trustworthy AI Systems</span><br aria-hidden="true"><span style="border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:14px;line-height:inherit;font-family:inherit;margin:0px;padding:0px;vertical-align:baseline;color:black">·   Intelligent Systems for Misinformation Detection</span><br aria-hidden="true"><span style="border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:14px;line-height:inherit;font-family:inherit;margin:0px;padding:0px;vertical-align:baseline;color:black"> </span><br aria-hidden="true"><span style="border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:14px;line-height:inherit;font-family:inherit;margin:0px;padding:0px;vertical-align:baseline;color:black">ORGANIZATION COMMITTEE</span><br aria-hidden="true"><span style="border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:14px;line-height:inherit;font-family:inherit;margin:0px;padding:0px;vertical-align:baseline;color:black">------------------------------------------</span><br aria-hidden="true"><span style="border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:14px;line-height:inherit;font-family:inherit;margin:0px;padding:0px;vertical-align:baseline;color:black">·  Ahmed Aleroud, Augusta University, GA, USA</span><br aria-hidden="true"><span style="border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:14px;line-height:inherit;font-family:inherit;margin:0px;padding:0px;vertical-align:baseline;color:black">·  Lo’ai Tawalbeh, Texas A&M University-San Antonio, USA.</span><br aria-hidden="true"><span style="border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:14px;line-height:inherit;font-family:inherit;margin:0px;padding:0px;vertical-align:baseline;color:black">·  Gokay Saldamli: San Jose State University, CA, USA.</span><br aria-hidden="true"><span style="border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:14px;line-height:inherit;font-family:inherit;margin:0px;padding:0px;vertical-align:baseline;color:black">·  Yassine Maleh,. University Sultan Moulay Slimane, Morocco</span><br aria-hidden="true"><span style="border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:14px;line-height:inherit;font-family:inherit;margin:0px;padding:0px;vertical-align:baseline;color:black">·  Lina Zhou, University of North Carolina, Charlotte</span><br aria-hidden="true"><span style="border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:14px;line-height:inherit;font-family:inherit;margin:0px;padding:0px;vertical-align:baseline;color:black">·  Leigh Metcalf, co-Editor-in-Chief ACM Digital Threats: Research and Practice</span><br aria-hidden="true"><span style="border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:14px;line-height:inherit;font-family:inherit;margin:0px;padding:0px;vertical-align:baseline;color:black">·  Samer Khamaiseh,  Miami university, OH</span><br aria-hidden="true"><span style="border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:14px;line-height:inherit;font-family:inherit;margin:0px;padding:0px;vertical-align:baseline;color:black">·  Izzat Alsmadi, Texas A&M University-San Antonio, USA.</span><br aria-hidden="true"><span style="border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:14px;line-height:inherit;font-family:inherit;margin:0px;padding:0px;vertical-align:baseline;color:black"> </span><br aria-hidden="true"><span style="border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:14px;line-height:inherit;font-family:inherit;margin:0px;padding:0px;vertical-align:baseline;color:black">IMPORTANT DATES</span><br aria-hidden="true"><span style="border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:14px;line-height:inherit;font-family:inherit;margin:0px;padding:0px;vertical-align:baseline;color:black">----------------------------</span><br aria-hidden="true"><span style="border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:14px;line-height:inherit;font-family:inherit;margin:0px;padding:0px;vertical-align:baseline;color:black">Submission Due: July 15th, 2022</span><br aria-hidden="true"><span style="border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:14px;line-height:inherit;font-family:inherit;margin:0px;padding:0px;vertical-align:baseline;color:black">Notification: August 10th, 2022</span><br aria-hidden="true"><span style="border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:14px;line-height:inherit;font-family:inherit;margin:0px;padding:0px;vertical-align:baseline;color:black">Camera-ready submission: August 20th, 2022</span><br aria-hidden="true"><br aria-hidden="true"><span style="border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:14px;line-height:inherit;font-family:inherit;margin:0px;padding:0px;vertical-align:baseline;color:black"> </span><br aria-hidden="true"><span style="border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:14px;line-height:inherit;font-family:inherit;margin:0px;padding:0px;vertical-align:baseline;color:black">Publication:</span><br aria-hidden="true"><span style="border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:14px;line-height:inherit;font-family:inherit;margin:0px;padding:0px;vertical-align:baseline;color:black">------------------</span><br aria-hidden="true"><span style="border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:14px;line-height:inherit;font-family:inherit;margin:0px;padding:0px;vertical-align:baseline;color:black">All accepted papers in AISC2022 and the workshops co-located with it will be submitted to IEEEXplore for publication.</span><br aria-hidden="true"><span style="border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:14px;line-height:inherit;font-family:inherit;margin:0px;padding:0px;vertical-align:baseline;color:black"> </span><br aria-hidden="true"><br aria-hidden="true"><span style="border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:14px;line-height:inherit;font-family:inherit;margin:0px;padding:0px;vertical-align:baseline;color:black">Submission Site:</span><br aria-hidden="true"><span style="border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:14px;line-height:inherit;font-family:inherit;margin:0px;padding:0px;vertical-align:baseline;color:black">--------------------------------------------------</span><br aria-hidden="true"></div><div style="border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:small;line-height:inherit;font-family:Arial,Helvetica,sans-serif;margin:0px;padding:0px;vertical-align:baseline;color:rgb(34,34,34)"><span style="border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:14px;line-height:inherit;font-family:inherit;margin:0px;padding:0px;vertical-align:baseline;color:black">·  </span><a href="https://easychair.org/conferences/?conf=idsta2022" rel="noopener noreferrer" style="border:0px;font:inherit;margin:0px;padding:0px;vertical-align:baseline" target="_blank">https://easychair.org/conferences/?conf=idsta2022</a><br aria-hidden="true"></div><div style="border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:small;line-height:inherit;font-family:Arial,Helvetica,sans-serif;margin:0px;padding:0px;vertical-align:baseline;color:rgb(34,34,34)"><span style="border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:14px;line-height:inherit;font-family:inherit;margin:0px;padding:0px;vertical-align:baseline;color:black">Please select AISC2022 to submit</span><br aria-hidden="true"><br aria-hidden="true"><span style="border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:14px;line-height:inherit;font-family:inherit;margin:0px;padding:0px;vertical-align:baseline;color:black">Paper format</span><br aria-hidden="true"><span style="border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:14px;line-height:inherit;font-family:inherit;margin:0px;padding:0px;vertical-align:baseline;color:black">-------------------</span><br aria-hidden="true"><span style="border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:14px;line-height:inherit;font-family:inherit;margin:0px;padding:0px;vertical-align:baseline;color:black">·  Submitted papers (.pdf format) must use the A4 IEEE Manuscript Templates for Conference Proceedings.</span><br aria-hidden="true"><span style="border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:14px;line-height:inherit;font-family:inherit;margin:0px;padding:0px;vertical-align:baseline;color:black">·  Submitted papers may be 6 to 8 pages. Up to two additional pages may be added for references.</span><br aria-hidden="true"></div><div style="border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:small;line-height:inherit;font-family:Arial,Helvetica,sans-serif;margin:0px;padding:0px;vertical-align:baseline;color:rgb(34,34,34)"><span style="border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:14px;line-height:inherit;font-family:inherit;margin:0px;padding:0px;vertical-align:baseline;color:black">Authors should be aware that IEEE has a strict policy with regard to plagiarism </span><a href="https://www.ieee.org/publications/rights/plagiarism/plagiarism-faq.html" rel="noopener noreferrer" id="m_1856995901170821017m_-4785698420778291636gmail-LPlnkOWALinkPreview_1" style="border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;line-height:inherit;font-family:Arial,sans-serif;margin:0px;padding:0px;vertical-align:baseline" target="_blank">https://www.ieee.org/publications/rights/plagiarism/plagiarism-faq.html</a><span style="border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:14px;line-height:inherit;font-family:inherit;margin:0px;padding:0px;vertical-align:baseline;color:black"></span><br aria-hidden="true"></div><div style="border:0px;font:inherit;margin:0px;padding:0px;vertical-align:baseline;color:inherit"><div id="m_1856995901170821017m_-4785698420778291636gmail-LPBorder_GTaHR0cHM6Ly93d3cuaWVlZS5vcmcvcHVibGljYXRpb25zL3JpZ2h0cy9wbGFnaWFyaXNtL3BsYWdpYXJpc20tZmFxLmh0bWw." style="border:0px;font:inherit;margin:16px 0px;padding:0px;vertical-align:baseline;color:inherit;width:800px;max-width:800px;min-width:424px"><table id="m_1856995901170821017m_-4785698420778291636gmail-LPContainer511698" role="presentation" style="font:inherit;width:800px;border-radius:2px;padding:12px 36px 12px 12px;border:1px solid rgb(200,200,200)"><tbody><tr valign="top" style="border-spacing:0px"><td style="width:744.364px"><div id="m_1856995901170821017m_-4785698420778291636gmail-LPTitle511698" style="border:0px;font-style:inherit;font-variant:inherit;font-stretch:inherit;font-size:21px;line-height:inherit;font-family:wf_segoe-ui_light,"Segoe UI Light","Segoe WP Light","Segoe UI","Segoe WP",Tahoma,Arial,sans-serif;margin:0px 8px 12px 0px;padding:0px;vertical-align:baseline;color:inherit"><a href="https://www.ieee.org/publications/rights/plagiarism/plagiarism-faq.html" rel="noopener noreferrer" id="m_1856995901170821017m_-4785698420778291636gmail-LPUrlAnchor511698" style="border:0px;font:inherit;margin:0px;padding:0px;vertical-align:baseline;text-decoration-line:none" target="_blank">Introduction to the Guidelines for Handling Plagiarism Complaints</a></div><div id="m_1856995901170821017m_-4785698420778291636gmail-LPDescription511698" style="border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:14px;line-height:inherit;font-family:wf_segoe-ui_normal,"Segoe UI","Segoe WP",Tahoma,Arial,sans-serif;margin:0px 8px 12px 0px;padding:0px;vertical-align:baseline;color:rgb(102,102,102);overflow:hidden;max-height:100px">Information on IEEE policy for handling plagiarism complaints</div><div id="m_1856995901170821017m_-4785698420778291636gmail-LPMetadata511698" style="border:0px;font-style:inherit;font-variant:inherit;font-stretch:inherit;font-size:14px;line-height:inherit;font-family:wf_segoe-ui_normal,"Segoe UI","Segoe WP",Tahoma,Arial,sans-serif;margin:0px;padding:0px;vertical-align:baseline;color:rgb(166,166,166)"><a href="http://www.ieee.org" target="_blank">www.ieee.org</a></div></td></tr></tbody></table></div></div></div><br></div><div><br></div><span class="gmail_default" style="font-family:arial,sans-serif;font-size:small;color:rgb(0,0,0)"></span><b style="font-size:11pt;font-family:Calibri,sans-serif;color:rgb(32,31,30)"><span style="border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:14.5pt;line-height:inherit;font-family:inherit;margin:0px;padding:0px;vertical-align:baseline;color:rgb(31,73,125)">Ahmed AlEroud</span></b><span style="color:rgb(0,0,0);font-family:Calibri,Arial,Helvetica,sans-serif;font-size:16px"></span><p style="font-size:11pt;font-family:Calibri,sans-serif;margin:0px;color:rgb(32,31,30)"><span style="border:0px;font:inherit;margin:0px;padding:0px;vertical-align:baseline;color:rgb(31,73,125)"></span></p><p style="color:rgb(0,0,0);font-size:11pt;font-family:Calibri,sans-serif;margin:0px;line-height:12pt"><font color="#1F497D">Associate Professor </font></p><p style="font-size:11pt;font-family:Calibri,sans-serif;margin:0px;line-height:12pt;color:rgb(32,31,30)"><span style="border:0px;font:inherit;margin:0px;padding:0px;vertical-align:baseline;color:rgb(31,73,125)">School of Computer and Cyber Sciences</span></p><p style="font-size:11pt;font-family:Calibri,sans-serif;margin:0px;line-height:12pt;color:rgb(32,31,30)"><span style="border:0px;font:inherit;margin:0px;padding:0px;vertical-align:baseline;color:rgb(31,73,125)">Augusta University</span><span style="border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:inherit;line-height:normal;font-family:inherit;margin:0px;padding:0px;vertical-align:baseline;color:rgb(31,73,125);background-color:transparent">, </span><span style="border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:inherit;line-height:normal;font-family:inherit;margin:0px;padding:0px;vertical-align:baseline;color:rgb(31,73,125);background-color:transparent">A Carnegie R2 Institution</span></p><p style="font-size:11pt;font-family:Calibri,sans-serif;margin:0px;line-height:12pt;color:rgb(32,31,30)"><span style="border:0px;font:inherit;margin:0px;padding:0px;vertical-align:baseline;color:rgb(5,99,193)"><a href="mailto:gagrawal@augusta.edu" rel="noopener noreferrer" style="border:0px;font:inherit;margin:0px;padding:0px;vertical-align:baseline" target="_blank"><span style="border:0px;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;font-size:inherit;line-height:normal;margin:0px;padding:0px;vertical-align:baseline;color:rgb(31,73,125);background-color:transparent">aaleroud@augusta.edu</span></a></span></p><p style="font-size:11pt;font-family:Calibri,sans-serif;margin:0px;line-height:12pt;color:rgb(32,31,30)"><span style="border:0px;font:inherit;margin:0px;padding:0px;vertical-align:baseline;color:rgb(31,73,125)"><a href="http://augusta.edu/ccs" rel="noopener noreferrer" style="border:0px;font:inherit;margin:0px;padding:0px;vertical-align:baseline" target="_blank">augusta.edu/ccs</a></span></p><div dir="ltr" data-smartmail="gmail_signature"><div dir="ltr"><div><div dir="ltr"><div><br></div></div></div></div></div></div>
</div><br clear="all"><div><br></div>-- <br><div dir="ltr" data-smartmail="gmail_signature"><div dir="ltr"><div><div dir="ltr"><div>Ahmed AlEroud, PhD</div><div><br></div></div></div></div></div></div>
</div><div dir="ltr" class="gmail_signature" data-smartmail="gmail_signature"><div dir="ltr"><div><div dir="ltr"><div><br></div></div></div></div></div></div>