posted by organizer: sannair || 6122 views || tracked by 8 users: [display]

BigCyber 2018 : Workshop on Big Data for CyberSecurity (Colocated with IEEE BigData 2018)

FacebookTwitterLinkedInGoogle

Link: https://bigcyber2018.umbc.edu/
 
When Dec 10, 2018 - Dec 13, 2018
Where Seatle, WA, USA
Submission Deadline Oct 10, 2018
Notification Due Nov 1, 2018
Final Version Due Nov 15, 2018
Categories    security   BIGDATA   security datasets   forencis
 

Call For Papers

BigCyber 2018 - Colocated with "IEEE BigData 2018"


Security analysts need to process high velocity and veracious data for early, ideally left of an exploit, detection of cybersecurity events, such as attacks, data-theft, etc. The problem is challenging given the constantly evolving threat landscape. Even with advanced monitoring, sophisticated persistent attackers can spend as many as 146 days in a system before being detected. Existing systems’ lack of unified organizational view causes information flooding and overwhelms a security analyst with false alarms. We need techniques that reduces an analyst’s cognitive load.

Big data crossing the organizational boundary even in mid-sized environments, need to be mined, examined, analyzed to create ‘Analyst Augmentation Systems’ which will aid security analysts in their day to day operations.

This workshop aims to bring together researchers from Cybersecurity and Big Data to help further homeland security’s missions of anticipation, interdiction, prevention, preparedness, and response. We invite submissions in areas (but not limited to) related to knowledge extraction from cybersecurity intelligence big datasets, fast analysis of security datasets for relevant information, and using this knowledge for various cybersecurity activities like early attack detection, mitigation, remediation, and forensics.

Workshop will include, but is not limited to, the following topics:

BigCyber Informatics
IoT Security Informatics
Intelligence Acquisition
Knowledge representation for cybersecurity
Information & Knowledge mining from big datasets

CyberSecurity Big Data Analytics
Real-time situational awareness
Artificial Intelligence Analytics Techniques
Intrusion and cybersecurity threat detection and analysis
Cyber-physical-social system security and incident management
Mobile and cloud computing security
IoT security
Big data analytics for cybersecurity
Machine learning for cybersecurity
Artificial Intelligence for cybersecurity
Big data analytics for digital forensics

CyberSecurity Applications
Anomaly/threat detection techniques
Automated security aids for Analysts
Criminal/intelligence information extraction
intelligence monitoring and analysis
Financial and accounting fraud analysis
Authorship analysis and identification
Spatial-temporal data analysis for crime analysis and security informatics
Formal reasoning, with focus on human element, in cyber systems
Best practices in counter-terrorism or security protection
Information sharing policy and governance
Privacy, security, and civil liberties issues
Forecasting threats and measuring the impact of threats
Surveillance and intelligence through unconventional means

Related Resources

IEEE BDS 2026   IEEE BigDataService 2026: The 12th IEEE International Conference on Big Data Computing Service and Machine Learning Applications
EI/Scopus-PCDI 2026   2026 International Conference on Perception, Control and Decision Intelligence-EI/Scopus
DATA 2026   15th International Conference on Data Science, Technology and Applications
CRBL 2026   6th International Conference on Cryptography and Blockchain
WISE 2026   27th International Web Information Systems Engineering conference
EI/Scopus-ICMLM 2026   2026 International Conference on Machine Learning and Large Models-EI/Scopus
IN4PL 2026   7th International Conference on Innovative Intelligent Industrial Production and Logistics
IJAIT 2026   International Journal of Advanced Information Technology
BDBS 2026   7th International Conference on Big Data, Blockchain and Security
IJDKP 2026   International Journal of Data Mining & Knowledge Management Process