posted by user: Clive || 1904 views || tracked by 7 users: [display]

CyberPatterns 2014 : CyberPatterns 2014: The 3rd International Workshop on Cyberpatterns: From Big Data to Reusable Knowledge

FacebookTwitterLinkedInGoogle

Link: http://tech.brookes.ac.uk/CyberPatterns2014
 
When Apr 7, 2014 - Apr 11, 2014
Where Oxford United Kingdom
Submission Deadline Jan 3, 2014
Notification Due Jan 17, 2014
Final Version Due Feb 7, 2014
Categories    design patterns   cyber security   big data   digital forensics
 

Call For Papers

CyberPatterns 2014
The 3rd International Workshop on Cyberpatterns: From Big Data to Reusable Knowledge
(http://tech.brookes.ac.uk/CyberPatterns2014/)
at The 8th IEEE International Symposium on Service-Oriented System Engineering (SOSE 2014)(http://sose2014.com)
Oxford, UK. April 7 – 11, 2014

IMPORTANT DATES
• Paper submissions:
Jan. 3, 2014
• Notification:
Jan. 17, 2014
• Camera-ready copies:
Feb. 7, 2014

Email: Clive Blackwell cblackwell@brookes.ac.uk

WORKSHOP WEBSITE
http://tech.brookes.ac.uk/CyberPatterns2014/
SUBMISSION WEBSITE
https://www.easychair.org/conferences/?conf=cyberpatterns2014
PROGRAM COMMITTEE
Please see workshop website.
SPONSORS:
• IEEE Computer Society
• BCS Information Security Specialist Group
• BCS Formal Aspects of Computing Science Specialist Group
• BCS Cybercrime Forensics Specialist Group

THEME AND GOAL
A pattern represents a discernible regularity in the
world or in manmade designs. In the prescriptive
view, a pattern is a template from which instances can
be created; while in the descriptive view, the elements
of a pattern that repeat in a predictable manner can be
observed and recognised. Similar to theories in
sciences, patterns explain and predict regularities in a
subject domain. In a complicated subject domain like
cyberspace, there are usually a large number of
patterns that each describes and predicts a subset of
recurring phenomena, yet these patterns can interact
and interfere with each other and be coordinated and
composed together. The pattern-oriented research
method studies a subject domain by identifying the
patterns, classifying and categorising them, organising
them into pattern languages, scoping their boundaries,
investigating the interactions between them, devising
mechanisms and operations for detecting and
predicting their occurrences, and facilitating their
instantiation or simulation.

The workshop is the successor to the two
Cyberpatterns workshops run in Abingdon, Oxford in
2012 and 2013. Cyberpatterns 2014 workshop will
continue with an expanded scope beyond the previous
focus on security. The theme of the workshop is
cyberpatterns, i.e. patterns in cyberspace. Typical
examples of such cyberpatterns include user
behaviour patterns, server workload patterns, network
traffic patterns, social network patterns (such as Small
World and Power Law of scale-free networks),
recommendation and system usage patterns, Web
usability patterns, attack patterns, security patterns,
patterns of vulnerabilities, etc.

With the availability of large volumes of data that
are observed and recorded in cyberspace, and the rapid
development of big data processing techniques and
facilities, a key scientific and engineering research
question is how to discover patterns from big data.
The goal of the workshop is to provide an
international forum for researchers and practitioners to
exchange research results, identify practical and
research problems, and envision research directions
that address this problem.

TOPICS
The topics cover all aspects of cyberpatterns,
including, but not limited to, the following:
1) Scientific foundation of pattern-oriented research
methods for systematic analysis of big data in order to
discover the reusable knowledge.
2) Engineering practice in the development of
platforms, algorithms and tools for analysis of big data
for pattern discovery and applications.
3) Construction of infrastructure for a sharable
knowledge-base of cyberpatterns, e.g. in aiding system
design for practitioners and teaching students, with
possible tool support to guide usage by developers.
4) Experiments and case studies in developing and
using cyberpatterns, as well as experience reports.
5) Identification of research problems and
understanding issues that hamper wider adoption of
cyberpatterns and suggesting remediation measures.
6) Future vision of the use of cyberpatterns in novel
cyber domains, such as the cloud or cyberphysical
systems, and innovative uses of design patterns such
as in pattern recognition.

Some indicative topics include, but are not
restricted to:
• Security, attack, advanced cyber threat and forensic
patterns
• Design patterns, dependable and trustworthy patterns
• Enterprise and architectural patterns
• User behavior, system usage, network traffic
patterns
• Patterns in social network, cyberphysical and cloud
systems
• Big data, data mining, machine learning, statistical
data analysis
• Pattern visualization, simulation, anomaly detection

SUBMISSION
The submissions must in IEEE Conference
Proceedings Format. The page limit is 6 pages for full
papers and 2 pages for position papers.
Submissions must be in PDF format and uploaded
to the submission website at the following URL:
https://www.easychair.org/conferences/?conf=cyberpatterns2014

Each submission will be reviewed independently
by three PC members and selected according to its
technical quality, relevance, originality, significance
and clarity.

PUBLICATION OF THE PROCEEDINGS
The proceedings of the workshop will be
published as a part of SOSE 2014 conference
proceedings and included in the IEEE Digital Library.
Each accepted paper must have an author registered
for the conference and present the paper at the
workshop for it to be included in the proceedings.

WORKSHOP ORGANIZERS
Clive Blackwell,
Dept of Computing and
Communication Technologies,
Oxford Brookes University,
Oxford OX33 1HX, UK.
Tel: +44 1784 255871.
Email:
cblackwell@brookes.ac.uk

Dr. Daniel Rodriguez,
Dept of Computer Science,
University of Alcalá,
Ctra. Barcelona Km 33.6,
28871 - Alcalá de Henares,
Madrid, Spain.
Tel: +34 91 885 6933.
Email:
daniel.rodriguezg@uah.es

Prof. Hong Zhu,
Dept of Computing and
Communication Technologies,
Oxford Brookes University,
Oxford OX33 1HX, UK.
Tel: +44 1865 484580.
Email: hzhu@brookes.ac.uk

Related Resources

IEEE Big Data 2017   2017 IEEE International Conference on Big Data
IoMT Big Data 2017   Towards Smarter Cities: Learning from Internet of Multimedia Things-Generated Big Data
ICCBDC - ACM 2017   International Conference on Cloud and Big Data Computing (ICCBDC 2017)--Ei Compendex and Scopus
IEEE - ICCC 2017   3rd IEEE International Conference on Computer and Communications
CTI 2017   Cyber Threat Intelligence - Springer Book Chapter
COMPLEX NETWORKS 2017   6th International Conference on Complex Networks and Their Applications
ACM--ICCIP 2017   ACM--2017 the 3rd International Conference on Communication and Information Processing (ICCIP 2017)--Ei Compendex, ISI Web of Science and Scopus
BDCAT 2017   The 4th IEEE/ACM International Conference on Big Data Computing, Applications and Technologies
SoICT 2017   The Eighth International Symposium on Information and Communication Technology
ACSAC 2017   Annual Computer Security Applications Conference