The Scientific World Journal

Selected Papers from International Conference on Computational Intelligence and Security (CIS)

Publishing date
10 May 2013
Submission deadline
01 Mar 2013

Lead Editor

1School of Computer Science and Technology, Xidian University, Xi'an 710071, China

2School of Computer Science and Information Technology, RMIT University, Melbourne, VIC, Australia

Selected Papers from International Conference on Computational Intelligence and Security (CIS)


With the fast development of computer science and technology, more and more web-based applications of computational intelligence are faced with security and trusted problems, and more and more security and trusted problems need computational intelligent techniques to solve. It has been a necessary and urgent task to cross-fertilize ideas and integrate the techniques of these two important fields: computational intelligence (CI) and information security (IS).

International Conference on Computational Intelligence and Security (CIS) is a major annual international conference to bring together researchers, engineers, developers, and practitioners from academia and industry working in all areas of two crucial fields in information processing: computational intelligence (CI) and information security (IS), to share the experience and exchange and cross-fertilize ideas. In particular, the series of CIS conference provides an ideal platform to explore the potential applications of CI models, algorithms, and technologies to IS. The 8th International Conference on Computational Intelligence and Security (CIS'2012) will be held in Guangzhou, China, on November 17-18, 2012. Details can be found at . Potential topics include, but are not limited to

  • Evolutionary algorithms
  • Evolutionary programming
  • Multiobjective evolutionary algorithms
  • Particle swarm optimization
  • Swarm intelligence
  • Quantum computing
  • DNA computing
  • Biological computing
  • Autonomy-oriented computing
  • Artificial immune systems
  • Artificial neural systems
  • Machine learning
  • Reinforcement learning
  • Data mining
  • Knowledge discovery
  • Fuzzy systems
  • Neural networks
  • Neural-fuzzy systems
  • Multiagent systems
  • Trusted computing
  • Information security management
  • Information hiding
  • Intrusion detection
  • Internet/intranet security
  • Security analysis methodologies
  • Pattern recognition

Before submission authors should carefully read over the journal's Author Guidelines, which are located at Prospective authors should submit an electronic copy of their complete manuscript through the journal Manuscript Tracking System at according to the following timetable:

The Scientific World Journal
 Journal metrics
Acceptance rate24%
Submission to final decision68 days
Acceptance to publication29 days
Impact Factor-

We are committed to sharing findings related to COVID-19 as quickly as possible. We will be providing unlimited waivers of publication charges for accepted research articles as well as case reports and case series related to COVID-19. Review articles are excluded from this waiver policy. Sign up here as a reviewer to help fast-track new submissions.