posted by organizer: sannair || 392 views || tracked by 4 users: [display]

BigCyber 2018 : Workshop on Big Data for CyberSecurity (Colocated with IEEE BigData 2018)

FacebookTwitterLinkedInGoogle

Link: https://bigcyber2018.umbc.edu/
 
When Dec 10, 2018 - Dec 13, 2018
Where Seatle, WA, USA
Submission Deadline Oct 10, 2018
Notification Due Nov 1, 2018
Final Version Due Nov 15, 2018
Categories    security   BIGDATA   security datasets   forencis
 

Call For Papers

BigCyber 2018 - Colocated with "IEEE BigData 2018"


Security analysts need to process high velocity and veracious data for early, ideally left of an exploit, detection of cybersecurity events, such as attacks, data-theft, etc. The problem is challenging given the constantly evolving threat landscape. Even with advanced monitoring, sophisticated persistent attackers can spend as many as 146 days in a system before being detected. Existing systems’ lack of unified organizational view causes information flooding and overwhelms a security analyst with false alarms. We need techniques that reduces an analyst’s cognitive load.

Big data crossing the organizational boundary even in mid-sized environments, need to be mined, examined, analyzed to create ‘Analyst Augmentation Systems’ which will aid security analysts in their day to day operations.

This workshop aims to bring together researchers from Cybersecurity and Big Data to help further homeland security’s missions of anticipation, interdiction, prevention, preparedness, and response. We invite submissions in areas (but not limited to) related to knowledge extraction from cybersecurity intelligence big datasets, fast analysis of security datasets for relevant information, and using this knowledge for various cybersecurity activities like early attack detection, mitigation, remediation, and forensics.

Workshop will include, but is not limited to, the following topics:

BigCyber Informatics
IoT Security Informatics
Intelligence Acquisition
Knowledge representation for cybersecurity
Information & Knowledge mining from big datasets

CyberSecurity Big Data Analytics
Real-time situational awareness
Artificial Intelligence Analytics Techniques
Intrusion and cybersecurity threat detection and analysis
Cyber-physical-social system security and incident management
Mobile and cloud computing security
IoT security
Big data analytics for cybersecurity
Machine learning for cybersecurity
Artificial Intelligence for cybersecurity
Big data analytics for digital forensics

CyberSecurity Applications
Anomaly/threat detection techniques
Automated security aids for Analysts
Criminal/intelligence information extraction
intelligence monitoring and analysis
Financial and accounting fraud analysis
Authorship analysis and identification
Spatial-temporal data analysis for crime analysis and security informatics
Formal reasoning, with focus on human element, in cyber systems
Best practices in counter-terrorism or security protection
Information sharing policy and governance
Privacy, security, and civil liberties issues
Forecasting threats and measuring the impact of threats
Surveillance and intelligence through unconventional means

Related Resources

FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
ChatbotML 2018   International Workshop on Conversational Agents and Chatbots with Machine Learning, at IEEE Big Data 2018
SECITC 2018   11th International Conference on Security for Information Technology and Communications
TNSM-BDM 2019   IEEE TNSM Special Issue on Big Data Analytics for Management
NDSS 2019   Network and Distributed System Security Symposium
ICBDA--IEEE, Ei Compendex and Scopus 2019   2019 IEEE 4th International Conference on Big Data Analysis (ICBDA 2019)--Ei Compendex and Scopus
IJGTT 2018   International Journal of Game Theory and Technology
IEEE--ICBDA--Ei Compendex and Scopus 2019   2019 IEEE 4th International Conference on Big Data Analysis (ICBDA 2019)--Ei Compendex and Scopus
ISBDAI 2018   2018 International Symposium on Big Data and Artificial Intelligence
IJIS-IoTSec 2018   Springer IJIS Special Issue on IoT Security and Privacy