posted by organizer: vasileim || 4369 views || tracked by 14 users: [display]

CyberHunt - 2018 2018 : International Workshop on Big Data Analytics for Cyber Threat Hunting

FacebookTwitterLinkedInGoogle

Link: https://securitylab.no/cyberhunt2018/
 
When Dec 10, 2018 - Dec 13, 2018
Where Seattle, WA, USA
Submission Deadline Oct 10, 2018
Notification Due Nov 1, 2018
Final Version Due Nov 15, 2018
Categories    big data   cyber security   information security   security
 

Call For Papers

**DEADLINE EXTENDED TO OCTOBER 27th**

The IEEE International Workshop on Big Data Analytics for Cyber Threat Hunting (CyberHunt 2018) is organised by the SecurityLab of University of Oslo (Norway) and West Virginia University (USA) in conjunction with the 2018 IEEE International Conference on Big Data (IEEE Big Data 2018). The workshop will be held during Dec 10-13, 2018 in Seattle, Washington, USA.

#Workshop Description#
As cyber-crimes against critical infrastructure and large organisations increase and evolve, automated systems to supplement human analysis are required. In addition, hunting for breaches is like looking for a needle in a haystack. Such organisations are so large, with so much information and data to sort for actionable intelligence, that just knowing where to begin seems impossible. Intelligence analysis of an attack is traditionally an iterative mainly manual process going through unlimited amounts of data trying to determine sophisticated patterns and behaviours of intruders. Furthermore, most detected intrusions will provide a limited set of attributes about a single phase of an attack. Knowing all the stages of an intrusion accurately and in a timely manner would allow us to aid our cyber detective and preventive capabilities, as well as enrich our cyber threat intelligence and facilitate immediate threat information sharing, since we put several pieces together. The workshop is expected to address the aforementioned issues and will aim at presenting novel research in the area of cyber-threat hunting, cyber-threat intelligence and big data analytics.

#Research Topics#
Data Science
1. Models for forecasting cyber-attacks and measuring impact
2. Models for attack-pattern recognition
3. Data representation and fusion
4. Applications of intelligent decision support
5. Models that take into consideration Deception and Uncertainty in cyber-attack attribution

Tools
1. Threat Hunting
2. Malware Analysis & Detection
3. Forensics Investigation
4. Cyber Threat Intelligence
5. Intrusion detection and Incident Response
6. Visualization techniques for intelligence analysis and investigation
7. Logs Analysis
8. Phishing and Spear-Phishing detection and Prevention

Decision Making and Interaction
1. Analytical reasoning systems
2. Resilience in intelligence analysis
3. Legal, privacy and ethical factors in intelligence analysis
4. Improved situational awareness
5. Decision making
6. Interactive and computational decision support
7. Investigative and analytic decision making

Data
1. Novel datasets
2. Data simulation
3. Anonymization techniques
4. Data collection, filtering and storage analysis
5. New formats and Taxonomies
6. Semantic Modeling and Data Representation

Special invitation:
- Modern Authentication (Mobile, Biometrics and Advanced Analytics)
- Physical Security and Insider Threats


#The Organizing Committee#
Vasileios Mavroeidis – University of Oslo, Norway (vasileim@ifi.uio.no)
Kamer Vishi – University of Oslo, Norway (kamerv@ifi.uio.no)
Audun Jøsang – University of Oslo, Norway (audun.josang@mn.uio.no)
Thirimachos Bourlai – West Virginia University, USA (Thirimachos.Bourlai@mail.wvu.edu)
Mary Dillon – West Virginia University, USA (Mary.Dillon@mail.wvu.edu)

#Paper Guidelines#
The authors are invited to submit a full-length paper (up to 10 pages) or short papers (up to 6 pages).
Papers should be formatted to IEEE Computer Society Proceedings Manuscript Formatting Guidelines.

#Publication#
Authors of accepted papers must guarantee that their paper will be presented at the conference. The IEEE reserves the right to exclude or remove a paper from from IEEE Xplore® if the paper is not presented at the conference.


Workshop Page: https://securitylab.no/cyberhunt2018/
Submission Page: https://wi-lab.com/cyberchair/2018/bigdata18/scripts/submit.php?subarea=S39

#Confirmed Keynote Speaker#
Simon Pope: Principal Security Group Program Manager, MSRC Incident Response - Microsoft

Related Resources

ISBDAI 2020   【Ei Compendex Scopus】2018 International Symposium on Big Data and Artificial Intelligence
CyberHunt 2019   International Workshop on Big Data Analytics for Cyber Threat Hunting (CyberHunt 2019)
SP 2020   IEEE Symposium on Security and Privacy
IEEE COINS 2020   Internet of Things IoT | Artificial Intelligence | Machine Learning | Big Data | Blockchain | Edge & Cloud Computing | Security | Embedded Systems | Circuit and Systems | WSN | 5G
LOPAL 2020   Second International Conference on Learning and Optimization Algorithms: Theory and Applications
ICISSP 2020   6th International Conference on Information Systems Security and Privacy
Call for a CRC Press book chapter 2020   Big Data Analytics in Supply Chain Management: Theory and Applications
Data Science 2020   3nd Annual International Great Lakes Data Science Symposium
SCAI 2019   8th International Conference On Soft Computing, Artificial Intelligence And Applications
DSIS 2020   2nd ISSAT International Conference on Data Science and Intelligent Systems