posted by organizer: vasileim || 2646 views || tracked by 14 users: [display]

CyberHunt - 2018 2018 : International Workshop on Big Data Analytics for Cyber Threat Hunting

FacebookTwitterLinkedInGoogle

Link: https://securitylab.no/cyberhunt2018/
 
When Dec 10, 2018 - Dec 13, 2018
Where Seattle, WA, USA
Submission Deadline Oct 27, 2018
Notification Due Nov 7, 2018
Final Version Due Nov 15, 2018
Categories    big data   cyber security   information security   security
 

Call For Papers

**DEADLINE EXTENDED TO OCTOBER 27th**

The IEEE International Workshop on Big Data Analytics for Cyber Threat Hunting (CyberHunt 2018) is organised by the SecurityLab of University of Oslo (Norway) and West Virginia University (USA) in conjunction with the 2018 IEEE International Conference on Big Data (IEEE Big Data 2018). The workshop will be held during Dec 10-13, 2018 in Seattle, Washington, USA.

#Workshop Description#
As cyber-crimes against critical infrastructure and large organisations increase and evolve, automated systems to supplement human analysis are required. In addition, hunting for breaches is like looking for a needle in a haystack. Such organisations are so large, with so much information and data to sort for actionable intelligence, that just knowing where to begin seems impossible. Intelligence analysis of an attack is traditionally an iterative mainly manual process going through unlimited amounts of data trying to determine sophisticated patterns and behaviours of intruders. Furthermore, most detected intrusions will provide a limited set of attributes about a single phase of an attack. Knowing all the stages of an intrusion accurately and in a timely manner would allow us to aid our cyber detective and preventive capabilities, as well as enrich our cyber threat intelligence and facilitate immediate threat information sharing, since we put several pieces together. The workshop is expected to address the aforementioned issues and will aim at presenting novel research in the area of cyber-threat hunting, cyber-threat intelligence and big data analytics.

#Research Topics#
Data Science
1. Models for forecasting cyber-attacks and measuring impact
2. Models for attack-pattern recognition
3. Data representation and fusion
4. Applications of intelligent decision support
5. Models that take into consideration Deception and Uncertainty in cyber-attack attribution

Tools
1. Threat Hunting
2. Malware Analysis & Detection
3. Forensics Investigation
4. Cyber Threat Intelligence
5. Intrusion detection and Incident Response
6. Visualization techniques for intelligence analysis and investigation
7. Logs Analysis
8. Phishing and Spear-Phishing detection and Prevention

Decision Making and Interaction
1. Analytical reasoning systems
2. Resilience in intelligence analysis
3. Legal, privacy and ethical factors in intelligence analysis
4. Improved situational awareness
5. Decision making
6. Interactive and computational decision support
7. Investigative and analytic decision making

Data
1. Novel datasets
2. Data simulation
3. Anonymization techniques
4. Data collection, filtering and storage analysis
5. New formats and Taxonomies
6. Semantic Modeling and Data Representation

Special invitation:
- Modern Authentication (Mobile, Biometrics and Advanced Analytics)
- Physical Security and Insider Threats


#The Organizing Committee#
Vasileios Mavroeidis – University of Oslo, Norway (vasileim@ifi.uio.no)
Kamer Vishi – University of Oslo, Norway (kamerv@ifi.uio.no)
Audun Jøsang – University of Oslo, Norway (audun.josang@mn.uio.no)
Thirimachos Bourlai – West Virginia University, USA (Thirimachos.Bourlai@mail.wvu.edu)
Mary Dillon – West Virginia University, USA (Mary.Dillon@mail.wvu.edu)

#Paper Guidelines#
The authors are invited to submit a full-length paper (up to 10 pages) or short papers (up to 6 pages).
Papers should be formatted to IEEE Computer Society Proceedings Manuscript Formatting Guidelines.

#Publication#
Authors of accepted papers must guarantee that their paper will be presented at the conference. The IEEE reserves the right to exclude or remove a paper from from IEEE Xplore® if the paper is not presented at the conference.


Workshop Page: https://securitylab.no/cyberhunt2018/
Submission Page: https://wi-lab.com/cyberchair/2018/bigdata18/scripts/submit.php?subarea=S39

#Confirmed Keynote Speaker#
Simon Pope: Principal Security Group Program Manager, MSRC Incident Response - Microsoft

Related Resources

ICDM 2019   19th Industrial Conference on Data Mining ICDM 2019
KomIS@ACM-SAC 2019   ACM SAC 2019 - KomIS track: Application of AI and Big Data Analytics
NECO 2018   7th International Conference of Networks and Communications
Bled: Big Data/Data Science Track 2019   32nd Bled eConference : Humanizing Technology for a Sustainable Society (Big Data/Data Science Track)
ACISP 2019   The 24th Australasian Conference on Information Security and Privacy
ETRIJ Cyber Security & AI 2019   ETRI Journal Special issue on Cyber Security and AI
ICDMML 2019   【ACM ICPS EI SCOPUS】2019 International Conference on Data Mining and Machine Learning
DSTAA 2019   Taylor and Francis - DSTAA 2019 : Call for Book Chapters - Data Science: Theory, Analysis, and Applications
DSN 2019   Dependable Systems and Networks
PerFoT 2019   2019 International Workshop on Pervasive Flow of Things (Co-located with IEEE PerCom 2019)