posted by organizer: BenkaouzY || 2179 views || tracked by 7 users: [display]

BiDAS 2018 : The 2nd International Workshop on Big Data analytics, Security and Privacy

FacebookTwitterLinkedInGoogle

Link: http://www.bidas.net
 
When May 8, 2018 - May 8, 2018
Where Essaouira, Morocco
Submission Deadline Mar 2, 2018
Notification Due Apr 2, 2018
Final Version Due Mar 30, 2018
Categories    big data   analytics   security   privacy
 

Call For Papers

* Scope and Objectives *
Big Data systems are complex and heterogeneous, and their security must be fundamentally approached. Moreover, Big Data Systems lead to the integration of different technologies that introduce new security issues that must be properly addressed. In addition, the ongoing digitalization of the business world is putting companies and users at risk of cyberattacks more than ever before. Big data analysis has the potential to offer protection against these attacks. Therefore, the goal of the workshop is two-fold: First, it addresses security issues of big data systems while considering: the infrastructure security, the data privacy, the data management, and the integrity and reactive security. Second, the workshop will address the innovative techniques, metrics, and behavior analysis that can exploit big data analytics capabilities to address the cybersecurity challenges facing cyberspace resources and services.

Topics of interest of the workshop include, but are not limited to:

* Big Data Security
-- Infrastructure Security
- - - Security for Hadoop clusters
- - - Security for Big Data ecosystems
- - - Architecture security
- - - Availability
- - - Authentication
- - - Communication security
-- Data Privacy
- - - Cryptography
- - - Access control
- - - Confidentiality
- - -Privacy-preserving requests
- - - Privacy in social networks
- - - Anonymization
- - - Differential privacy
-- Data Management
- - - Security in collecting and storing data
- - - Sharing algorithms
- - - Policies, Laws, or Government
-- Integrity and Reactive Security
- - - Integrity
- - - Attack detection
- - - Recovery from a disaster
* Big Data Analytics for Cybersecurity
-- Cyber intelligence and attack detection
-- Cyber intelligence and cyber situational awareness
-- Platforms for cybersecurity and defense
-- Big Data cybersecurity computational models
-- Cyber threats in social networks
-- Parallel/distributed Algorithms and techniques
-- Data Streaming and Real time analysis
-- Data acquisition for web mining/opinion mining/sentiment analysis
-- Machine learning for cyber threat and security
-- Log management
-- New-generation intrusion detection/prevention systems
-- Real-time monitoring of computer and network systems
-- Visualization for cyber intelligence and security/defense
-- Visualization for web mining/opinion mining/sentiment analysis
-- Vulnerability analysis and modeling

* Submission Instructions *

BiDAS 2018 seeks submissions from diverse communities, including academic and corporate researchers, open-source projects, standardization institutes, and application domain professionals and experts. Regular papers should be at most 10 pages in the Springer’s LNCS template. Since a major goal of the workshop is to explore new directions and approaches, we especially encourage the submission of short Position papers and Works in progress . Such papers are limited to at most 5 pages, and must clearly state “Position Paper” or “Work in Progress” in the title section of the paper.

Submissions are to be made via the Easy Chair submission web site at: https://easychair.org/conferences/?conf=bidas2018

Publication: It is planned to publish the proceedings with Springer in their CCIS Series "Communications in Computer and Information Science series" (final approval pending).

Workshop Format: The workshop will include talks from accepted full papers, position papers, work in progress, invited talks and panels. Some position papers may be organized as a panel based on the nature of the topics.

Workshop Co-chairs
Yahya Benkaouz,FS, Mohammed V Univ., Morocco
Ahmed Khoumsi, Univ. Sherbrooke, Canada

Program Committee
Mohamed Alaggan, Antidot, France
Ayoub Ait Lahcen, IbnToufail Univ., Morocco
Yahya Benkaouz, FS, Mohammed V Univ., Morocco
Erik-Oliver Blass, Airbus Group Innovations, USA
Nizar Bouguila, CIISE, Concordia University, Canada
Antoine Boutet, INRIA Lyon, France
Anis Charfi, Carnegie Me llon Univ., Qatar
Fida Dankar, United Arab Emirates University, UAE
Katerina Doka, National Technical Univ. of Athens, Greece
Josep Domingo-Ferrer, Universitat Rovira i Virgili, Spain
Mohammed Erradi, ENSIAS, Mohammed V Univ., Morocco
Paolo Garza, Politecnico di Torino, Italy
Rachid Guerraoui, EPFL, Switzerland
Mohammed Jmaiel, University of Sfax, Tunisia
Ahmed Khoumsi, Univ. Sherbrooke, Canada
Ghita Mezzour, IUR, Morocco
Charaf My El Hassan, IbnToufail Univ., Morocco
Tarik Moataz, Brown Univ., USA
Mohamed Mosbah, LABRI, Univ. Bordeaux, France
Guevara Noubir, Northeastern Univ., Boston, USA
Zeeshan Pervez, Univ. of the West of Scotland, UK
Pierangela Samarati, Università degli Studi di Milano, Italy
Mohammed Serhani, United Arab Emirates University, UAE
Manuel A. Serrano, Universidad de Castilla - La Mancha, Spain
Ali Shoker, INESC TEC, Univ. do Minho, Portugal
Kurt Stockinger, Zhaw School of Engineering, Switzerland

Related Resources

FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
BDA4CID 2018   The 2nd International Workshop on Big Data Analytics for Cyber Intelligence and Defense, at IEEE Big Data 2018
IJOE 2018   International Journal on Organic Electronics
SICBS 2018   2nd International Conference on Security with Intelligent Computing and Big-data Services
IJAB 2018   International Journal of Advances in Biology
VIcbd 2018   11th Annual Cloud & Big Data Analytics 2018
NECO 2018   7thInternational Conference of Networks and Communications
BDCSIntell 2018   1st INTERNATIONAL CONFERENCE ON BIG DATA AND CYBER-SECURITY INTELLIGENCE
IJIS-IoTSec 2018   Springer IJIS Special Issue on IoT Security and Privacy
BDACCIP 2018   The 2nd International Workshop on Big Data Analytic for Cyber Crime Investigation and Prevention