posted by organizer: mvasiloma2 || 3139 views || tracked by 3 users: [display]

CyberTIM 2020 : International Workshop on Cyber Threat Intelligence Management

FacebookTwitterLinkedInGoogle

Link: https://www.ares-conference.eu/workshops/cybertim-2020/
 
When Sep 25, 2020 - Sep 28, 2020
Where Dublin, Ireland
Submission Deadline Jun 1, 2020
Categories    security   cybersecurity   threat intelligence
 

Call For Papers

The increased sophistication of cyber-attacks has created a technology arms race between attackers and defenders. However, this arm race is not fought in equal terms. Defenders are falling behind due to lack of resources coupled with an overwhelming number of sophisticated attacks, e.g. advanced persistent threats, making cyber defense extremely difficult. This is also due to the lack of collaboration among the network security solutions, e.g., intrusion detection systems and honeypots, which are in possession of different organizations across the globe.
In recent years, organizations like CERTs, NRENs, as well as industry organizations are moving towards proactive detection capabilities leveraging Cyber Threat Intelligence (CTI) platforms. These platforms aim at advanced alert aggregation, correlation, and prioritization considering the asset criticality of organizations as well as the quality of shared threat intelligence. The goal of CyberTIM is to bring the industry practitioners, researchers, engineers, and academic researchers together from the domain of network security, network measurements, cyber incident monitoring, trust & risk management, cyber situational awareness, security analytics, and security visualization.
TOPICS OF INTEREST INCLUDE, BUT ARE NOT LIMITED TO

Network Intrusions
Cyber threat detection
Cyber threat prediction
End-to-End threat intelligence
Threat Intelligence sharing
Collaborative Intrusion Detection
Blockchain-based TI sharing
Cyber situational awareness
Cyber threat analytics
Cyber threat sharing community
Trust management in/for Cyber Threat Intelligence
Cyber threat visualization
Cyber threat monitoring
Botnet monitoring
Cyber threat correlation techniques
Cyber threat prioritization techniques
Cyber threat sharing platforms
Alert exchange formats
Alert exchange protocols
Cyber-crime forensics
Cyber-crime risk management
Incident response
Automotive threat intelligence (backend and on-board)
Automotive threat detection
Automotive threat sharing platforms
Automotive threat response

Related Resources

IJCAI 2021   30th International Joint Conference on Artificial Intelligence
JISA-CYBER-SEC 2020   Special Issue on Trends in Cybersecurity, Journal of Information Security and Applications, Elsevier
CyberHunt 2020   IEEE International Workshop on Big Data Analytics for Cyber Threat Hunting
Spec.Issue on Social Informatics: Scopus 2021   Journal of Social and Business Informatics - Acta Informatica Pragensia
ITE 2021   2nd International Conference on Integrating Technology in Education
IEEE TDSC - XAI-CTI 2020   IEEE Transactions on Dependable and Secure Computing Special Issue on Explainable AI for Cyber Threat Intelligence (XAI-CTI) Applications
CiVEJ 2020   Civil Engineering and Urban Planning: An International Journal
ICENT--EI, Scopus 2021   2021 3rd International Conference on Emerging Networks Technologies (ICENT 2021)--Ei Compendex, Scopus
AICDSP 2020   Special Issue on Artificial Intelligence for Cyber Defence and Smart Policing
SPPR 2020   9th International Conference on Signal, Image Processing and Pattern Recognition