posted by user: Cyber || 222 views || tracked by 2 users: [display]

Data Science in Cybersecurity 2019 : Data Science in Cybersecurity and Cyberthreat Intelligence

FacebookTwitterLinkedInGoogle

Link: https://www.lesliesikos.com/call-for-chapters/data-science-in-cybersecurity-and-cyberthreat-intelligence/
 
When N/A
Where N/A
Submission Deadline Jan 7, 2019
Categories    cybersecurity   cyberthreat intelligence
 

Call For Papers

The forthcoming volume "Data Science in Cybersecurity and Cyberthreat Intelligence" of the Springer book series "Intelligent Systems Reference Library" now invites chapters.

Aim and Scope

With the rapid increase of cyberattacks, accurate security information is becoming more and more difficult to obtain, for example due to inabilities to deal with the increasing data volume, data complexity, data variety, data veracity, and (in)scalability of data processing algorithms. To manipulate security data efficiently, one has to deal with the heterogeneity and inconsistency of data sources used to fuse security information, which come with different data structures, file formats, and serializations, and may constitute unstructured, semi-structured, and structured data. The quality and trustworthiness of data depend on how certain the represented knowledge is, which can be backed by data provenance.

Data scientists of organizations often do not work in security; instead they focus on business outcomes. However, data science can actually be a viable component of security strategies to gain cyber-situational awareness via advanced data processing techniques, fuse technical data from diverse sources, and ensure data quality and unambiguity. By using data science techniques, security professionals can manipulate and analyze network and security data efficiently, and uncover valuable insights from data-driven risk assessment and security performance management. Data science can be well utilized in cybersecurity in terms of data preparation, anomaly detection, exploratory data analysis, data visualization, modeling, and optimization. It is useful in preprocessing raw security data for machine learning, detecting anomalous behavior and malicious content, and creating machine learning algorithms to identify potential cyberthreats. The enormous datasets used in security applications require big data analytics and parallel computing frameworks, which can also be provided by data scientists to make security-related information meaningful.

Submission Guidelines

Submissions are expected from, but are not limited to, the following topics:

Introduction to Data Science in Cybersecurity and Cyberthreat Intelligence
Information fusion of communication network data for cyberthreat intelligence
Big data analysis to identify suspicious activities
Deep data mining to find hidden, potential threats
Minimize false alarms using data analytics
Demystifying security data to minimize misleading and ambiguous data
Adversarial machine learning

Proposal

Chapter proposals should be 100–150 words and should be submitted to volume editor Leslie Sikos (firstname.lastname at unisa.edu.au).

Related Resources

IEEE BigData 2019   IEEE International Conference on Big Data
IWSEC 2019   The 14th International Workshop on Security
COMPLEX NETWORKS 2019   The 8th International Conference on Complex Networks and their Applications
CECC 2019   Central European Cybersecurity Conference
CDKE 2019   Conversational Data and Knowledge Engineering
SpaCCS 2019   The 12th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage
AICCC--EI Compendex, Scopus 2019   2019 2nd Artificial Intelligence and Cloud Computing Conference (AICCC 2019)--EI Compendex, Scopus
MaL2CSec 2019   Workshop on Machine Learning for Cybersecurity
ICMLA 2019   18th IEEE International Conference on Machine Learning and Applications
VizSec 2019   16th IEEE Symposium on Visualization for Cyber Security