posted by organizer: vasileim || 7090 views || tracked by 15 users: [display]

CyberHunt - 2018 2018 : International Workshop on Big Data Analytics for Cyber Threat Hunting

FacebookTwitterLinkedInGoogle

Link: https://securitylab.no/cyberhunt2018/
 
When Dec 10, 2018 - Dec 13, 2018
Where Seattle, WA, USA
Submission Deadline Oct 10, 2018
Notification Due Nov 1, 2018
Final Version Due Nov 15, 2018
Categories    big data   cyber security   information security   security
 

Call For Papers

**DEADLINE EXTENDED TO OCTOBER 27th**

The IEEE International Workshop on Big Data Analytics for Cyber Threat Hunting (CyberHunt 2018) is organised by the SecurityLab of University of Oslo (Norway) and West Virginia University (USA) in conjunction with the 2018 IEEE International Conference on Big Data (IEEE Big Data 2018). The workshop will be held during Dec 10-13, 2018 in Seattle, Washington, USA.

#Workshop Description#
As cyber-crimes against critical infrastructure and large organisations increase and evolve, automated systems to supplement human analysis are required. In addition, hunting for breaches is like looking for a needle in a haystack. Such organisations are so large, with so much information and data to sort for actionable intelligence, that just knowing where to begin seems impossible. Intelligence analysis of an attack is traditionally an iterative mainly manual process going through unlimited amounts of data trying to determine sophisticated patterns and behaviours of intruders. Furthermore, most detected intrusions will provide a limited set of attributes about a single phase of an attack. Knowing all the stages of an intrusion accurately and in a timely manner would allow us to aid our cyber detective and preventive capabilities, as well as enrich our cyber threat intelligence and facilitate immediate threat information sharing, since we put several pieces together. The workshop is expected to address the aforementioned issues and will aim at presenting novel research in the area of cyber-threat hunting, cyber-threat intelligence and big data analytics.

#Research Topics#
Data Science
1. Models for forecasting cyber-attacks and measuring impact
2. Models for attack-pattern recognition
3. Data representation and fusion
4. Applications of intelligent decision support
5. Models that take into consideration Deception and Uncertainty in cyber-attack attribution

Tools
1. Threat Hunting
2. Malware Analysis & Detection
3. Forensics Investigation
4. Cyber Threat Intelligence
5. Intrusion detection and Incident Response
6. Visualization techniques for intelligence analysis and investigation
7. Logs Analysis
8. Phishing and Spear-Phishing detection and Prevention

Decision Making and Interaction
1. Analytical reasoning systems
2. Resilience in intelligence analysis
3. Legal, privacy and ethical factors in intelligence analysis
4. Improved situational awareness
5. Decision making
6. Interactive and computational decision support
7. Investigative and analytic decision making

Data
1. Novel datasets
2. Data simulation
3. Anonymization techniques
4. Data collection, filtering and storage analysis
5. New formats and Taxonomies
6. Semantic Modeling and Data Representation

Special invitation:
- Modern Authentication (Mobile, Biometrics and Advanced Analytics)
- Physical Security and Insider Threats


#The Organizing Committee#
Vasileios Mavroeidis – University of Oslo, Norway (vasileim@ifi.uio.no)
Kamer Vishi – University of Oslo, Norway (kamerv@ifi.uio.no)
Audun Jøsang – University of Oslo, Norway (audun.josang@mn.uio.no)
Thirimachos Bourlai – West Virginia University, USA (Thirimachos.Bourlai@mail.wvu.edu)
Mary Dillon – West Virginia University, USA (Mary.Dillon@mail.wvu.edu)

#Paper Guidelines#
The authors are invited to submit a full-length paper (up to 10 pages) or short papers (up to 6 pages).
Papers should be formatted to IEEE Computer Society Proceedings Manuscript Formatting Guidelines.

#Publication#
Authors of accepted papers must guarantee that their paper will be presented at the conference. The IEEE reserves the right to exclude or remove a paper from from IEEE Xplore® if the paper is not presented at the conference.


Workshop Page: https://securitylab.no/cyberhunt2018/
Submission Page: https://wi-lab.com/cyberchair/2018/bigdata18/scripts/submit.php?subarea=S39

#Confirmed Keynote Speaker#
Simon Pope: Principal Security Group Program Manager, MSRC Incident Response - Microsoft

Related Resources

CDMA 2024   8th International Conference on Data Science and Machine Learning
IEEE COINS 2024   IEEE COINS 2024 - London, UK - July 29-31 - Hybrid (In-Person & Virtual)
ICBICC 2024   2024 International Conference on Big Data, IoT, and Cloud Computing (ICBICC 2024)
ACM-Ei/Scopus-CCISS 2024   2024 International Conference on Computing, Information Science and System (CCISS 2024)
DSIT 2024   2024 7th International Conference on Data Science and Information Technology (DSIT 2024)
CSW 2024   2024 3rd International Conference on Cyber Security
BDCAT 2024   IEEE/ACM Int’l Conf. on Big Data Computing, Applications, and Technologies
ICoSR 2024   2024 3rd International Conference on Service Robotics
IEEE BigData 2024   2024 IEEE International Conference on Big Data
SoCAV 2024   2024 International Symposium on Connected and Autonomous Vehicles (SoCAV 2024)