IAS 2012: November 21-23, Sao Carlos, Brazil -> http://www.mirlabs.net/ias12 
Undesirable Data Detection --- UDD 2012
Special session title: UDD 2012, Undesirable Data Detection
Rationale of the need and objective of the session:
In recent years, research in the area of ICT security grows rapidly, mainly thanks to growing number of security threats arising internally or externally. Undesirable behavior comprising any intentionally or unintentionally misuse of resources in information systems produces growing quantity of new undesirable data every day. Undesirable Data Detection Special Session aims at presenting novel approaches for evaluating or detecting potentially malicious activity threatening the security of ICT.
he special session seeks contributions about foundations of undesirable data detection as well as case studies, empirical, and other methodological works. It will provide an opportunity to disseminate latest results in this important field.
This section is focused on mining or detection of the undesirable data (such as spam emails and other unsolicited message in any communication system) and on its optimization for all possible aspects of security. Moreover, the session focuses on engines for ntrusion Detection Systems  detection based on rules and on data elaboration , with special care of solution able to support data parallelization and GPU computing.  Last but no least the special session aims at collecting case studies and real applciation of Undesiderable data detection.

Specific topics of interest
To address the aforementioned aspects of evolution of social networks, the preferred topics for this special session are (but not limited to):

  1. Detection techniques and Methodologies
    1. Spam detection
    2. Intrusion detection
    3. Similarity detection
    4. Plagiarism detection
    5.  Dangerous patterns in data streams
    6. Steganography detection,
  2. Detection Techniques Application
    1. Scalalble IDs architecture
    2. GPU and parallel Computing for Undesiderable Data and Intrusion Detection
  3. Intrusion and Undesiderable Data Detection Case Studies
    1. Detection in network systems
    2. Intrusion Detection in Cloud systems
    3. Industrial and real case studies

Session Chair/Cochairs

  1. Vaclav Snášel, Department of Computer Science, VSB - Technical University of Ostrava, vaclav.snasel@vsb.cz
  2. Eliška Ochodková, Department of Computer Science, VSB - Technical University of Ostrava, eliska.ochodkova@vsb.cz

Short bio of the chair/cochairs
Vaclav Snášel is Professor of Computer Science. He works as researcher and university teacher. He is Dean Faculty of Electrical Engineering and Computer Science. Vaclav Snášel's research and development experience includes over 30 years in the Industry and Academia. He works in a multi-disciplinary environment involving artificial intelligence, social network, conceptual lattice, information retrieval, semantic web, knowledge management, data compression, machine intelligence, neural network, web intelligence, nature and Bio-inspired computing, data mining, and applied to various real world problems. He has given more than 15 plenary lectures and conference tutorials in these areas. He has authored/co-authored several refereed journal/conference papers, books and book chapters. He has published more than 400 papers (191 papers are recorded at Web of Science, 256 papers are recorded at Scopus) and 1317 citations in Google Scholar Citations.
Vaclav Snášel has served as a PC member to many international conferences, and she has been  general chair and organizer of the INCoS 2009 -- IEEE, Barcelona, Spain, General Chair, NWeSP 2009 -- IEEE, Prague, Czech Republic, General Chair, AWIC 2009 -- Springer, Prague, Czech Republic, General Chair, NDT 2009 -- IEEE, Ostrava, Czech Republic, General Chair, CASoN 2009 -- IEEE, Fontainebleau, France, International
Eliška Ochodková works as a researcher and a university teacher at VSB -Technical University of Ostrava. She is an assistant professor at CS Dept. of Faculty of Electrical Engineering and Computer Science. She received Ph.D. degree in Computer Science and Applied Mathematics in 2010. She works in multi-disciplinary environment involving ICT security, cryptography, data mining, and social network analysis.
Pavel Krömer has received the M.Sc. in computer science from the VSB - Technical University of Ostrava in 2006 and PhD in Applied Mathematics from the same institute in 2010. Pavel’s areas of interest include computational intelligence, information retrieval, World Wide Web, data mining, and parallel programming. He coauthored more than 100 papers published in conference proceedings and journals. He also presented award winning papers at international computer science conferences in 2007, 2008, and 2011. Before joining the academia full time, he worked for more than 5 years as an analyst and developer in a major European software house. Pavel has served in Program Committees of a number of conferences including IEEE CEC 2012, IEEE SMC 2012, SEAL 2012, WICT 2011, ISDA 2011, ISDA 2010, SEAL 2010, CICN 2010 and others.

Contacts:
Pavel Krömer, pavel.kromer@vsb.cz 
Eliška Ochodková, eliska.ochodkova@vsb.cz

Program committee (tentative)
Vaclav Snasel, VSB-Technical University of Ostrava, Czech Republic
Milos Kudelka, VSB-Technical University of Ostrava, Czech Republic
Pavel Kromer, VSB-Technical University of Ostrava, Czech Republic
Jan Platos, VSB-Technical University of Ostrava, Czech Republic
Pavel Moravec, VSB-Technical University of Ostrava, Czech Republic
Petr Gajdos, VSB-Technical University of Ostrava, Czech Republic
Eliska Ochodkova, VSB-Technical University of Ostrava, Czech Republic
Jan Martinovic, VSB-Technical University of Ostrava, Czech Republic
Dusan Husek, Institute of Computer Science, Academy of Science, Czech Republic
Ivan Zelinka, VSB-Technical University of Ostrava, Czech Republic
Petr Musilek, University of Alberta, Canada
Suhail S. Owais, AL-Balaqa University, Jordan
Eyas El-Quwashme, Jordan University of Science and Technology, Jordan
Hideyasu Sasaki, University of Hong Kong, Hong Kong
Juan D. Velasquez, University of Chile, Santiago, Chile
Michal Wozniak, Wroclaw University of Technology, Poland
Milos Besta, Google, New York
Miroslav Voznak, VSB-Technical University of Ostrava, Czech Republic
Nashwa Mamdouh El-Bendary, Arab Academy for Science, Technology, and Maritime Transport, Egypt