![]() |
| |||||||||||||||
CyberHunt - IEEE Big Data 2025 : 8th Annual Workshop on Cyber Threat Intelligence and Hunting in conjunction with the IEEE Big Data Conference | |||||||||||||||
Link: https://cyberhunt2025.cyberhunt.no/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
The CyberHunt workshop is a hybrid event, meaning remote participation is also encouraged.
SCOPE: The Workshop on Cyber Threat Intelligence and Hunting (CyberHunt 2025) provides a dedicated forum for researchers, practitioners, and policymakers from academia, industry, and government to present and discuss advances in Cyber Threat Intelligence (CTI) and its applications across the broader cybersecurity landscape, with a particular emphasis on AI-driven approaches. CyberHunt 2025 will be held in conjunction with the IEEE International Conference on Big Data (IEEE Big Data 2025) in Macau, China, December 8–11, 2025. TOPICS: We invite authors to submit original, previously unpublished research on Cyber Threat Intelligence (CTI) and its applications, with particular emphasis on the use of AI and ML to advance the broader cybersecurity landscape. Focus areas include, but are not limited to: -Adversary and defense tradecraft and TTPs -Attribution (identifying, associating, or tracing malicious activity) -Big data and datasets for CTI -Collecting and processing data/information to produce CTI -Generating (revelation) and utilizing IOCs, including detection engineering -Intelligence (knowledge) representation, management, and dissemination (symbolic-AI/ontologies/templating approaches) -Intelligence-driven incident response -Intelligence-driven red teaming -Intelligence-driven threat hunting -Legal implications, accountability, privacy, and ethics for AI and CTI -The use of Large Language Models - and agentic approaches in CTI -Machine-readable-based CTI (including relevant standards) -Open-source tools (associated with the scientific method) for CTI and threat hunting -Political (cyber politics) and geopolitical aspects, and decision-making -Threat-informed security automation -Visualization techniques for CTI Additional special topic of interest this year: -AI-based threat detection in Mobile Networks IMPORTANT DATES: November 2, 2025: Due date for full workshop papers submission November 12, 2025: Notification of paper acceptance to authors November 22, 2025: Camera-ready of accepted papers Dec 8-11, 2025: Workshop & main conference ORGANIZING COMMITTEE: Workshop Chair Prof. Vasileios Mavroeidis, University of Oslo (UiO), Norway Program Committee Chair Dr. Tamas Bisztray, University of Oslo (UiO), Norway Publicity Chair Mateusz Zych, PhD Researcher, University of Oslo (UiO), Norway Program Committee Bertalan Borsos, ELTE Robert Chetwyn, University of Oslo Maria Christopoulou, Demokritos William Corrias, Sapienza University of Rome Denis Donadel, University of Verona Richard A. Dubniczky, Eötvös Loránd Tudományegyetem Charles Frick, JHUAPL Gudmund Grov, Norwegian Defence Research Establishment (FFI) Nils Gruschka, University of Oslo Sokratis Katsikas, Norwegian University of Science and Technology (NTNU) Alexios Lekidis, University of Thessaly Ryan Marinelli, University of Oslo Fabio Martinelli, Institute for Informatics and Telematics, National Research Council of Italy (CNR) Vasileios Mavroeidis, University of Oslo Boubakr Nour, Ericsson Security Research Dimitra Papatsaroucha, Hellenic Mediterranean University Konstantinos Rantos, International Hellenic University Simone Soderi, IMT School for Advanced Studies Lucca Norbert Tihanyi, Technology Innovation Institute Rebeka Toth, University of Oslo Magnus Wiik Eckhoff, University of Oslo Christos Xenakis, University of Piraeus Mateusz Zych, University of Oslo |
|