posted by system || 1057 views || tracked by 1 users: [display]

Data Science in Cybersecurity 2019 : Data Science in Cybersecurity and Cyberthreat Intelligence

FacebookTwitterLinkedInGoogle

Link: https://www.lesliesikos.com/call-for-chapters/data-science-in-cybersecurity-and-cyberthreat-intelligence/
 
When N/A
Where N/A
Submission Deadline Jan 7, 2019
 

Call For Papers

The forthcoming volume "Data Science in Cybersecurity and Cyberthreat Intelligence" of the Springer book series "Intelligent Systems Reference Library" now invites chapters.

Aim and Scope

With the rapid increase of cyberattacks, accurate security information is becoming more and more difficult to obtain, for example due to inabilities to deal with the increasing data volume, data complexity, data variety, data veracity, and (in)scalability of data processing algorithms. To manipulate security data efficiently, one has to deal with the heterogeneity and inconsistency of data sources used to fuse security information, which come with different data structures, file formats, and serializations, and may constitute unstructured, semi-structured, and structured data. The quality and trustworthiness of data depend on how certain the represented knowledge is, which can be backed by data provenance.

Data scientists of organizations often do not work in security; instead they focus on business outcomes. However, data science can actually be a viable component of security strategies to gain cyber-situational awareness via advanced data processing techniques, fuse technical data from diverse sources, and ensure data quality and unambiguity. By using data science techniques, security professionals can manipulate and analyze network and security data efficiently, and uncover valuable insights from data-driven risk assessment and security performance management. Data science can be well utilized in cybersecurity in terms of data preparation, anomaly detection, exploratory data analysis, data visualization, modeling, and optimization. It is useful in preprocessing raw security data for machine learning, detecting anomalous behavior and malicious content, and creating machine learning algorithms to identify potential cyberthreats. The enormous datasets used in security applications require big data analytics and parallel computing frameworks, which can also be provided by data scientists to make security-related information meaningful.

Submission Guidelines

Submissions are expected from, but are not limited to, the following topics:

Introduction to Data Science in Cybersecurity and Cyberthreat Intelligence
Information fusion of communication network data for cyberthreat intelligence
Big data analysis to identify suspicious activities
Deep data mining to find hidden, potential threats
Minimize false alarms using data analytics
Demystifying security data to minimize misleading and ambiguous data
Adversarial machine learning

Proposal

Chapter proposals should be 100–150 words and should be submitted to volume editor Leslie Sikos (firstname.lastname at unisa.edu.au).

Related Resources

MLDM 2023   18th International Conference on Machine Learning and Data Mining
CoMSE 2023   2023 International Conference on Materials Science and Engineering (CoMSE 2023)
SI PMABD 2023   Special Issue on Programming Models and Algorithms for Big Data
SI on ATD&IS II 2023   Special Issue on Advanced Technologies in Data and Information Security II, Applied Sciences, MDPI
ICCDA 2023   2023 The 7th International Conference on Compute and Data Analysis (ICCDA 2023)
DIS 2023   6th International Conference on the Dynamics of Information Systems
DIS 2023   6th International Conference on the Dynamics of Information Systems
ICISPP 2023   IEEE--2023 4th International Conference on Information Security and Privacy Protection (ICISPP 2023)
ICCSN 2023   IEEE--2023 15th International Conference on Communication Software and Networks (ICCSN 2023)
SDM 2023   SDM 2023 : SIAM International Conference on Data Mining