A Workshop at 2019 IEEE International Conference on Big Data (IEEE Big Data 2018)
December 9, 2019, Los Angeles, CA, USA
1:30 - 6pm Monday 9th December 2019
Tentative workshop programme
|1:30 – 1:40 pm||Arrivals and welcome||Stephen McGough|
|1:40 – 2:10pm||A Location Independent Machine Learning Approach for Early Fake News Detection||Haohui Liu|
|2:10 – 2:40pm||IoCMiner: Automatic Extraction of Indicators of Compromise from Twitter||Amirreza Niakanlahiji, Lida Safarnejad, Reginald Harper and Bei-Tseng Chu|
|2:40 – 3:10 pm||Online Hate: A Study on the Feasibility to Detect Hate Speech in Swedish||Johan Fernquist, Oskar Lindholm, Lisa Kaati and Nazar Akrami|
|3:10 – 3:40pm||PRAT - a Tool for Assessing Risk in Written Communication||Amendra Shrestha, Lisa Kaati and Nazar Akrami|
|3:40 – 4:00 pm||Coffee Break|
|4:00 – 4:30pm||Modeling and Forecasting Armed Conflict: AutoML with Human-Guided Machine Learning||Vito D’Orazio, James Honaker, Raman Prasad, Michael Shoemate|
|4:30 – 5:00pm||Class Balancing for Fraud Detection in Point of Sale Systems||Christine Hines and Abdou Youssef|
|5:00 – 5:30pm||Identifying Android Malware Families Using Android-Oriented Metrics||William Blanc, Lina G. Hashem, Karim O. Elish, and Hussain M. J. Almohri|
|5:30 – 6:00pm||Volenti non fit injuria: Ransomware and its Victims||Amir Atapour-Abarghouei, Stephen Bonner and Andrew Stephen McGough|
|6:00 – 6:00pm||BigData Cup Challenge Papers|
|6:00 – 6:30pm||Anuj@IEEE BigData2019: A Novel Code-Switching Behavior Analysis in Social Media Discussions Natural Language Processing||Anuj/Anuj Saini, Publicis Sapient|
|6:30 - 7:00pm||Language Identification and Context-based Analysis of Code-switching Behaviors in Social Media Discussions||Yashvardhan/Akankshya Mishra & Yashvardhan Sharma|
|7:00 - 7:00pm||Closing Remarks|
Cyber-attacks have posed real and wide-ranging threats for the information society. Detecting cyber-attacks becomes a challenge, not only because of the sophistication of attacks, but also because of the large scale and complex nature of today’s IT infrastructures.
When significant amounts of data is collected from computer systems operations and monitoring, data science and intelligent advanced analytics are necessary to correlate, learn and mine, interpret and visualize such data. To mitigate existing cyber threats, it is important that cyber-attack detection and security analysis take advantage of data science and advanced analytics. Big data provides a systemic approach, from capturing of IT operation data, through data processing and event correlation, to anomaly detection and response decision.
This Workshop will focus on the cutting-edge developments from both academia and industry, with a particular emphasis on novel techniques to capture, store and process the big-data from a wide range of sources in monitoring IT infrastructures, and in particular on the methodologies and technologies which can be applied to correlate, learn and mine, interpret and visualize the cyber security data.
This workshop is timely and interesting for researchers, academics and practitioners in big data processing and analytics, cyber security, cyber defense, security analytics, data mining and machine learning of security data, security information and event management, along with anomaly detection. The workshop is very relevant to the big data community, especially data mining, machine learning, cycler physical systems, computational intelligence, and will bring forth a lively forum on this exciting and challenging area at the conference.
The workshop only considers well-written manuscripts that describe original, unpublished, state-of-the-art research and practical work. Indicative topics for the workshop are as follows.
Cyber security analytics
- Big data analytics (e.g., text/graph/pattern mining) for cyber intelligence
- Big data analytics (e.g., text/graph/pattern mining) for cyber security
- Big data intelligence for combating advanced persistent threats (APT)
- Big data for cyber intelligence and cyber situational awareness
- Big data processing platforms for cyber security and defense
- Cyber security analytics for cloud computing
- Cyber security visualization
- Cyber threat intelligence and modeling
- Cyber defense/security operations centers
- Log management for cyber security analytics
- Machine learning / deep learning for cyber threat and security
- Next-generation Security Information and Event Management (SIEM)
- Next-generation intrusion detection/prevention systems (IDS/IPS)
- Real-time event correlation for cyber security analytics
- Real-time monitoring of computer and network systems
- Security incident management for cyber security analytics
- Stream mining / analytics for cyber intelligence and r security
- Vulnerability analysis and modelling
Social media analytics
- Fake news detection in social media networks
- Natural language processing for social media data analysis
- Opinion mining in social media networks
- Sentiment analysis in social media networks
- Security and privacy issues in social media networks
- Social media data mining
- Text mining / machine learning for social media data analysis
- Web bots and big data processing for social media networks
To contribute towards advances of knowledge, the workshop solicits original manuscripts from researchers and practitioners who are actively working in Big Data Analytics for Cyber Intelligence and Defense.
Papers should be formatted using the two column IEEE CS template and can be up to 10 pages in length using page size of 8.5” x 11”.
Please submit your paper through the paper submission portal.
Each submission will be peer reviewed by at least 2 peers.
Please note that the authors of each submitted paper will be expected to review one other paper.
|Nov 10, 2019||Due date for full workshop papers submission|
|Nov 1, 2019||Notification of paper acceptance to authors|
|Nov 20, 2019||Camera-ready of accepted papers|
|Dec 9 PM 2019||Workshop - half day afternoon|
Workshop Program Co-Chairs
Dr Stephen McGough
School of Computing Science
E-mail : email@example.com
International Technical Committee
|Amir Atapour-Abarghouei||Newcastle University, UK|
|William Blanc||Florida Polytechnic University, USA|
|Stephen Bonner||Newcastle University, UK|
|Johan Fernquist||Swedish Defence Research Agency, Sweden|
|Matthew Forshaw||Newcastle University, UK|
|Phil Jackson||Newcastle University, UK|
|Amirreza Niakanlahiji||University of Illinois at Springfield, USA|
|Nik Khadijah Nik Aznan||Durham University, UK|