This special session is organised and supported by The World Islamic Sciences and Education University (WISE), Jordan in collaboration with The Faculty of Information Technology, Jordan.
Session Chairs:
Session Co-Chair:
Session Committee:
|
Synopsis
The quick growth of AI topics and systems has many consequences on extensive variety of fields. It can benefit disparate fields such as education, social life, global logistics, company’s analysis and transportation fields, etc. However, these systems will also bring forth far-reaching changes in economy, security and future careers. As AI systems are getting integrated more in our current lifestyle, and gets more commonly used, certain critical questions arise: What are the legal and security ramifications of the use of these new technologies? Who can use them, and under what circumstances? What is the safety of these systems? Should their commercialization be regulated? What are the privacy issues associated with the use of these technologies? What are the ethical considerations? Who has responsibility for the large amounts of data that is collected and manipulated by these systems? Could these systems fail? What is the recourse if there is a system failure? These are just a small subset of possible questions in this key emerging field. In this section, we focus on everything related to AI topics in terms of AI systems building and integration such as Robots and smart machines, and in terms of security, privacy, novel methods and techniques to prevent unauthorized access and control to systems in general, and especially to those systems where AI can be integrated into, and this includes and is not limited to digital signatures, firewalls, preventing spam and securing virtual environments.
Therefore, this section welcomes paper in the topics mentioned in the list below, and invites authors to submit high-quality research papers on the topics which include (but are not limited to) the following:
- AI integration
- AI Robots
- AI safety
- Anti-Hacking
- Anti-Virus
- Authentication – Encryption
- Digital Signatures
- Firewalls
- Public Key Infrastructure (PKI)
- Security Administration
- Security Applications
- Security Management
- Spyware
- Securing the Virtual Environment
- Virtualization Security
- Predicting Malicious Behavior
- Intelligence Techniques in User Identity Management
Paper Submission:
Prospective authors are invited to submit full-length papers (not exceeding 6 pages) conform to the IEEE format . All papers will be handled and processed electronically via the EDAS online submission system.
Submission implies the willingness of at least one of the authors to register and present their papers.