Skip to the content.

BDA4CID 2019

A Workshop at 2019 IEEE International Conference on Big Data (IEEE Big Data 2018)

December 9, 2019, Los Angeles, CA, USA

1:30 - 6pm Monday 9th December 2019

Tentative workshop programme

Time Title Presenter/Author
1:30 – 1:40 pm Arrivals and welcome Stephen McGough
1:40 – 2:10pm A Location Independent Machine Learning Approach for Early Fake News Detection Haohui Liu
2:10 – 2:40pm IoCMiner: Automatic Extraction of Indicators of Compromise from Twitter Amirreza Niakanlahiji, Lida Safarnejad, Reginald Harper and Bei-Tseng Chu
2:40 – 3:10 pm Online Hate: A Study on the Feasibility to Detect Hate Speech in Swedish Johan Fernquist, Oskar Lindholm, Lisa Kaati and Nazar Akrami
3:10 – 3:40pm PRAT - a Tool for Assessing Risk in Written Communication Amendra Shrestha, Lisa Kaati and Nazar Akrami
3:40 – 4:00 pm Coffee Break  
4:00 – 4:30pm Modeling and Forecasting Armed Conflict: AutoML with Human-Guided Machine Learning Vito D’Orazio, James Honaker, Raman Prasad, Michael Shoemate
4:30 – 5:00pm Class Balancing for Fraud Detection in Point of Sale Systems Christine Hines and Abdou Youssef
5:00 – 5:30pm Identifying Android Malware Families Using Android-Oriented Metrics William Blanc, Lina G. Hashem, Karim O. Elish, and Hussain M. J. Almohri
5:30 – 6:00pm Volenti non fit injuria: Ransomware and its Victims Amir Atapour-Abarghouei, Stephen Bonner and Andrew Stephen McGough
6:00 – 6:00pm BigData Cup Challenge Papers  
6:00 – 6:30pm Anuj@IEEE BigData2019: A Novel Code-Switching Behavior Analysis in Social Media Discussions Natural Language Processing Anuj/Anuj Saini, Publicis Sapient
6:30 - 7:00pm Language Identification and Context-based Analysis of Code-switching Behaviors in Social Media Discussions Yashvardhan/Akankshya Mishra & Yashvardhan Sharma
7:00 - 7:00pm Closing Remarks  


Cyber-attacks have posed real and wide-ranging threats for the information society. Detecting cyber-attacks becomes a challenge, not only because of the sophistication of attacks, but also because of the large scale and complex nature of today’s IT infrastructures.

When significant amounts of data is collected from computer systems operations and monitoring, data science and intelligent advanced analytics are necessary to correlate, learn and mine, interpret and visualize such data. To mitigate existing cyber threats, it is important that cyber-attack detection and security analysis take advantage of data science and advanced analytics. Big data provides a systemic approach, from capturing of IT operation data, through data processing and event correlation, to anomaly detection and response decision.

This Workshop will focus on the cutting-edge developments from both academia and industry, with a particular emphasis on novel techniques to capture, store and process the big-data from a wide range of sources in monitoring IT infrastructures, and in particular on the methodologies and technologies which can be applied to correlate, learn and mine, interpret and visualize the cyber security data.

This workshop is timely and interesting for researchers, academics and practitioners in big data processing and analytics, cyber security, cyber defense, security analytics, data mining and machine learning of security data, security information and event management, along with anomaly detection. The workshop is very relevant to the big data community, especially data mining, machine learning, cycler physical systems, computational intelligence, and will bring forth a lively forum on this exciting and challenging area at the conference.

Previous workshops

Research Topics

The workshop only considers well-written manuscripts that describe original, unpublished, state-of-the-art research and practical work. Indicative topics for the workshop are as follows.

Cyber security analytics

Social media analytics

To contribute towards advances of knowledge, the workshop solicits original manuscripts from researchers and practitioners who are actively working in Big Data Analytics for Cyber Intelligence and Defense.

Paper Format

Papers should be formatted using the two column IEEE CS template and can be up to 10 pages in length using page size of 8.5” x 11”.

Formatting templates:

Submission webpage

Please submit your paper through the paper submission portal.

Review Process

Each submission will be peer reviewed by at least 2 peers.

Please note that the authors of each submitted paper will be expected to review one other paper.

Important Dates

Nov 10, 2019 Due date for full workshop papers submission
Nov 1, 2019 Notification of paper acceptance to authors
Nov 20, 2019 Camera-ready of accepted papers
Dec 9 PM 2019 Workshop - half day afternoon

Workshop Program Co-Chairs

Dr Stephen McGough
Senior Lecturer
School of Computing Science
Newcastle University
United Kingdom
E-mail :

International Technical Committee

Amir Atapour-Abarghouei Newcastle University, UK
William Blanc Florida Polytechnic University, USA
Stephen Bonner Newcastle University, UK
Johan Fernquist Swedish Defence Research Agency, Sweden
Matthew Forshaw Newcastle University, UK
Phil Jackson Newcastle University, UK
Amirreza Niakanlahiji University of Illinois at Springfield, USA
Nik Khadijah Nik Aznan Durham University, UK