A Workshop at 2020 IEEE International Conference on Big Data (IEEE Big Data 2020)
December 10-13 TBC, 2020, Atlanta, GA, USA
Cyber-attacks have posed real and wide-ranging threats for the information society. Detecting cyber-attacks becomes a challenge, not only because of the sophistication of attacks, but also because of the large scale and complex nature of today’s IT infrastructures.
When significant amounts of data is collected from computer systems operations and monitoring, data science and intelligent advanced analytics are necessary to correlate, learn and mine, interpret and visualize such data. To mitigate existing cyber threats, it is important that cyber-attack detection and security analysis take advantage of data science and advanced analytics. Big data provides a systemic approach, from capturing of IT operation data, through data processing and event correlation, to anomaly detection and response decision.
This Workshop will focus on the cutting-edge developments from both academia and industry, with a particular emphasis on novel techniques to capture, store and process the big-data from a wide range of sources in monitoring IT infrastructures, and in particular on the methodologies and technologies which can be applied to correlate, learn and mine, interpret and visualize the cyber security data.
This workshop is timely and interesting for researchers, academics and practitioners in big data processing and analytics, cyber security, cyber defense, security analytics, data mining and machine learning of security data, security information and event management, along with anomaly detection. The workshop is very relevant to the big data community, especially data mining, machine learning, cycler physical systems, computational intelligence, and will bring forth a lively forum on this exciting and challenging area at the conference.
The workshop only considers well-written manuscripts that describe original, unpublished, state-of-the-art research and practical work. Indicative topics for the workshop are as follows.
Cyber security analytics
- Big data analytics (e.g., text/graph/pattern mining) for cyber intelligence
- Big data analytics (e.g., text/graph/pattern mining) for cyber security
- Big data intelligence for combating advanced persistent threats (APT)
- Big data for cyber intelligence and cyber situational awareness
- Big data processing platforms for cyber security and defense
- Cyber security analytics for cloud computing
- Cyber security visualization
- Cyber threat intelligence and modeling
- Cyber defense/security operations centers
- Log management for cyber security analytics
- Machine learning / deep learning for cyber threat and security
- Next-generation Security Information and Event Management (SIEM)
- Next-generation intrusion detection/prevention systems (IDS/IPS)
- Real-time event correlation for cyber security analytics
- Real-time monitoring of computer and network systems
- Security incident management for cyber security analytics
- Stream mining / analytics for cyber intelligence and r security
- Vulnerability analysis and modelling
Social media analytics
- Fake news detection in social media networks
- Natural language processing for social media data analysis
- Opinion mining in social media networks
- Sentiment analysis in social media networks
- Security and privacy issues in social media networks
- Social media data mining
- Text mining / machine learning for social media data analysis
- Web bots and big data processing for social media networks
To contribute towards advances of knowledge, the workshop solicits original manuscripts from researchers and practitioners who are actively working in Big Data Analytics for Cyber Intelligence and Defense.
Papers should be formatted using the two column IEEE CS template and can be up to 10 pages (including references) in length using page size of 8.5” x 11”.
Please submit your paper through the paper submission portal TBA.
Each submission will be peer reviewed by at least 2 peers.
Please note that the authors of each submitted paper will be expected to review one other paper.
Important Dates (TBC)
|Oct 1, 2020||Due date for full workshop papers submission|
|Nov 1, 2020||Notification of paper acceptance to authors|
|Nov 15,2020||Camera-ready of accepted papers|
|Dec 10-13 2020||Workshop|
Workshop Program Co-Chairs
Dr Stephen McGough
School of Computing Science
E-mail : email@example.com
Dr Amir Atapour-Abarghouei
Researcher School of Computing Science
E-mail : Amir.Atapour-Abarghouei@newcastle.ac.uk
Researcher School of Computing Science
E-mail : firstname.lastname@example.org
International Technical Committee
|William Blanc||Florida Polytechnic University, USA|
|Johan Fernquist||Swedish Defence Research Agency, Sweden|
|Matthew Forshaw||Newcastle University, UK|
|Phil Jackson||Newcastle University, UK|
|Amirreza Niakanlahiji||University of Illinois at Springfield, USA|
|Nik Khadijah Nik Aznan||Durham University, UK|