posted by user: mhabib || 1530 views || tracked by 3 users: [display]

CyberTIM 2018 : International Workshop on Cyber Threat Intelligence Management

FacebookTwitterLinkedInGoogle

Link: https://www.ares-conference.eu/workshops/cybertim-2018/
 
When Aug 27, 2018 - Aug 30, 2018
Where Hamburg, Germany
Submission Deadline May 25, 2018
Notification Due Jun 10, 2018
Final Version Due Jun 29, 2018
Categories    cyber threats   intrusion detection   botnets   cyber risk management
 

Call For Papers

CyberTIM 2018: 1st International Workshop on Cyber Threat Intelligence Management
(CyberTIM 2018) to be held in conjunction with the ARES EU Project Symposium, held at ARES 2018 (http://www.ares-conference.eu)

August 27 – August 30, 2018, Hamburg, Germany

Projects:
CyberTIM workshop is jointly organized by three H2020 projects that are funded by the European Commission:
PROTECTIVE (https://protective-h2020.eu/)
C3ISP (c3isp.eu/ )
SHIELD (https://www.shield-h2020.eu/)

Workshop Description:
The increased sophistication of cyber-attacks have created a technology arm race between attackers and defenders. However, this arm race is not fought in equal terms. Defenders are falling behind due to lack of manpower coupled with an overwhelming number of sophisticated attacks, e.g. advanced persistent threats, making cyber defense extremely difficult. This is also due to lack of collaboration among the network security solutions, e.g., intrusion detection systems and honeypots, which are in possession of different organizations across the globe.
In the recent years, organizations like CERTs, NRENs, as well as industry organizations slowly move towards proactive detection capabilities leveraging Cyber Threat Intelligence (CTI) platforms. These platforms aim at advanced alert aggregation, correlation, and prioritization considering the asset criticality of organizations as well as the quality of shared threat intelligence. The goal of this workshop is to bring the industry practitioners, researchers, engineers, and academic researchers together from the domain of network security, network measurements, cyber incident monitoring, trust & risk management, cyber situational awareness, security analytics, and security visualization.

Topics of interest include, but are not limited to:
Network Intrusions
Cyber threat detection
Threat Intelligence sharing
Collaborative Intrusion Detection
Cyber situational awareness
Cyber threat analytics
Cyber threat sharing community
Trust management in/for Cyber Threat Intelligence
Cyber threat visualization
Cyber threat monitoring
Botnet monitoring
Cyber threat correlation techniques
Cyber threat prioritization techniques
Cyber threat sharing platforms
Alert exchange formats
Alert exchange protocols
Cyber-crime forensics
Cyber-crime risk management

Important Dates

Submission Deadline: May 25, 2018
Author Notification: June 10, 2018
Proceedings Version: June 29, 2018
ARES EU Symposium: August 27, 2018
Conference: August 27 – August 30, 2018

Workshop Chairs
Brian Lee
Athlone Institute of Technology, Ireland

Emmanouil Vasilomanolakis
TU Darmstadt, Germany

Fabio Martinelli
IIT, C.N.R, Italy

Georgios Gardikis
SPACE Hellas S. A., Greece

Sheikh Mahbub Habib
TU Darmstadt, Germany

Program Committee
Hamza Attak, Hewlett Packard Enterprise, United Kingdom
Enda Barrett, National University of Ireland, Galway, Ireland
David Chadwick, University of Kent, United Kingdom
Michal Choras, ITTI Ltd., Poland
Francesco Di Cerbo, SAP Research Sophia-Antipolis, France
Theo Dimitrakos, European Security Competence Center, Huawei Technologies, Germany
Bernat Gaston, Fundació Privada I2CAT, Spain
Jassim Happa, University of Oxford, United Kingdom
Dimitris Katsianis, Incites Consulting, Luxembourg
Antonis Litke, Infili Technologies, Greece
Maciej Miłostan, PSNC, Poznań University of Technology, Poland
Paolo Mori, IIT-CNR, Italy
Jason Nurse, University of Oxford, United Kingdom
Dimitris Papadopoulos, Infili Technologies, Greece
Marcin Przybyszewski, ITTI Sp. z o.o., Poznań, Poland
Olga Segou, Orion Innovations PC, Greece
George Xylouris, ORION Innovations PC, Greece

Submission Guidelines
The submission guidelines valid for the CyberTIM workshop is the same as for the ARES conference. They can be found under the following link: https://www.ares-conference.eu/conference/submission/. Please note that all papers submitted to EasyChair are anonymized (no names or affiliations of authors should be visible in the paper).

Related Resources

SI on AdCTI 2022   Special Issue on Advances in Cyber Threat Intelligence 2022, Security and Communication Networks, Wiley & Hindawi
CyberHunt 2022   IEEE BigData Workshop on Cyber Threat Intelligence and Hunting
EvoCompAISecurity&Privacy 2022   Evolutionary Computing for AI-Driven Security and Privacy: Advancing the state-of-the-art applications
CyberTIM 2022   International Workshop on Cyber Threat Intelligence Management
CFMAI 2022   2022 4th International Conference on Frontiers of Mathematics and Artificial Intelligence (CFMAI 2022)
ISCAI 2022   2022 4th International Symposium on Computing and Artificial Intelligence (ISCAI 2022)
EI-CFAIS 2022   2022 International Conference on Frontiers of Artificial Intelligence and Statistics (CFAIS 2022)
IEEE SSCI 2023   2023 IEEE Symposium Series on Computational Intelligence
CPSIOT 2022   2022 International Conference on Cyber Physical Systems and IoT(CPSIOT 2022)
AI-DH 2022   MDPI Big Data and Cognitive Computing - Special Issue on Artificial Intelligence in Digital Humanities