posted by system || 766 views || tracked by 1 users: [display]

Data Science in Cybersecurity 2019 : Data Science in Cybersecurity and Cyberthreat Intelligence


When N/A
Where N/A
Submission Deadline Jan 7, 2019

Call For Papers

The forthcoming volume "Data Science in Cybersecurity and Cyberthreat Intelligence" of the Springer book series "Intelligent Systems Reference Library" now invites chapters.

Aim and Scope

With the rapid increase of cyberattacks, accurate security information is becoming more and more difficult to obtain, for example due to inabilities to deal with the increasing data volume, data complexity, data variety, data veracity, and (in)scalability of data processing algorithms. To manipulate security data efficiently, one has to deal with the heterogeneity and inconsistency of data sources used to fuse security information, which come with different data structures, file formats, and serializations, and may constitute unstructured, semi-structured, and structured data. The quality and trustworthiness of data depend on how certain the represented knowledge is, which can be backed by data provenance.

Data scientists of organizations often do not work in security; instead they focus on business outcomes. However, data science can actually be a viable component of security strategies to gain cyber-situational awareness via advanced data processing techniques, fuse technical data from diverse sources, and ensure data quality and unambiguity. By using data science techniques, security professionals can manipulate and analyze network and security data efficiently, and uncover valuable insights from data-driven risk assessment and security performance management. Data science can be well utilized in cybersecurity in terms of data preparation, anomaly detection, exploratory data analysis, data visualization, modeling, and optimization. It is useful in preprocessing raw security data for machine learning, detecting anomalous behavior and malicious content, and creating machine learning algorithms to identify potential cyberthreats. The enormous datasets used in security applications require big data analytics and parallel computing frameworks, which can also be provided by data scientists to make security-related information meaningful.

Submission Guidelines

Submissions are expected from, but are not limited to, the following topics:

Introduction to Data Science in Cybersecurity and Cyberthreat Intelligence
Information fusion of communication network data for cyberthreat intelligence
Big data analysis to identify suspicious activities
Deep data mining to find hidden, potential threats
Minimize false alarms using data analytics
Demystifying security data to minimize misleading and ambiguous data
Adversarial machine learning


Chapter proposals should be 100–150 words and should be submitted to volume editor Leslie Sikos (firstname.lastname at

Related Resources

MDPI-SI-BDHA 2021   Call for Papers: Special Issue “Big Data for eHealth Applications” (MDPI Applied Sciences, IF 2.474 – Indexed on Scopus, Web of Science)
Virtual Environments for Cybersecurity 2021   SIMULATION MODELLING PRACTICE AND THEORY - Special Issue on ''Virtual Environments for Cybersecurity''
ICDM 2021   21st IEEE International Conference on Data Mining
ECCSIT 2021   2021 European Conference on Computer Science and Information Technology (ECCSIT 2021)
DATA ANALYTICS 2021   The Tenth International Conference on Data Analytics
EI-CFAIS 2021   2021 International Conference on Frontiers of Artificial Intelligence and Statistics (CFAIS 2021)
4th Rome ICSSH 2021   4th Rome – International Conference on Social Science & Humanities (ICSSH), 07-08 September 2021
6th London ICSSH September 2021   6th London – International Conference on Social Science & Humanities (ICSSH), 07-08 September 2021
ML_BDA 2021   Special Issue on Machine Learning Technologies for Big Data Analytics
MobiSPC 2021   The 18th International Conference on Mobile Systems and Pervasive Computing August 9-12, 2021, Leuven, Belgium