| |||||||||
CyberTIM 2022 : International Workshop on Cyber Threat Intelligence Management | |||||||||
| |||||||||
Call For Papers | |||||||||
CyberTIM 2022 5th International Workshop on Cyber Threat Intelligence Management (CyberTIM 2022) https://www.ares-conference.eu/workshops/cybertim-2022/ to be held in conjunction with ARES 2022 (http://www.ares-conference.eu) August 23 – August 26, 2022 The increased sophistication of cyber-attacks has created a technology arms race between attackers and defenders. However, this arm race is not fought in equal terms. Defenders are falling behind due to lack of resources coupled with an overwhelming number of sophisticated attacks, e.g. advanced persistent threats, making cyber defense extremely difficult. This is also due to the lack of collaboration among the network security solutions, e.g., intrusion detection systems and honeypots, which are in possession of different organizations across the globe. In recent years, organizations like CERTs, NRENs, as well as industry organizations are moving towards proactive detection capabilities leveraging Cyber Threat Intelligence (CTI) platforms. These platforms aim at advanced alert aggregation, correlation, and prioritization considering the asset criticality of organizations as well as the quality of shared threat intelligence. The goal of CyberTIM is to bring the industry practitioners, researchers, engineers, and academic researchers together from the domain of network security, network measurements, cyber incident monitoring, trust & risk management, cyber situational awareness, security analytics, and security visualization. Topics of interest include, but are not limited to Network Intrusions Cyber threat detection Cyber threat prediction End-to-End threat intelligence Threat Intelligence sharing Collaborative Intrusion Detection Blockchain-based TI sharing Cyber situational awareness Cyber threat analytics Cyber threat sharing community Trust management in/for Cyber Threat Intelligence Cyber threat visualization Cyber threat monitoring Botnet monitoring Cyber threat correlation techniques Cyber threat prioritization techniques Cyber threat sharing platforms Alert exchange formats Alert exchange protocols Cyber-crime forensics Cyber-crime risk management Incident response Automotive threat intelligence (backend and on-board) Automotive threat detection Automotive threat sharing platforms Automotive threat response IMPORTANT DATES Submission Deadline April 25, 2022 Author Notification May 14, 2022 Proceedings Version June 19, 2022 ARES EU Symposium August 23, 2022 Conference August 23 – August 26, 2022 |
|