bootstrap template

International Workshop on Big Data Analytics for Cyber Threat Hunting (CyberHunt 2018)

In conjunction with the IEEE International Conference on Big Data 2018
(IEEE BigData 2018)


Event: Dec 10-13, 2018, Seattle, WA, USA

About the CyberHunt 2018


As cyber-crimes against critical infrastructure and large organizations increase and evolve, automated systems to supplement human analysis are required. In addition, hunting for breaches is like looking for a needle in a haystack. Such organizations are so large, with so much information and data to sort for actionable intelligence, that just knowing where to begin seems impossible. Intelligence analysis of an attack is traditionally an iterative mainly manual process going through unlimited amounts of data trying to determine sophisticated patterns and behaviors of intruders. Furthermore, most detected intrusions will provide a limited set of attributes about a single phase of an attack. Knowing all the stages of an intrusion accurately and in a timely manner would allow us to aid our cyber detective and preventive capabilities, as well as enrich our cyber threat intelligence and facilitate immediate threat information sharing, since we put several pieces together. The workshop is expected to address the aforementioned issues and will aim at presenting novel research in the area of cyber-threat hunting and cyber-threat intelligence.

CALL FOR PAPERS

CyberHunt 2018 welcomes contributions within, but not limited to, the following areas:

o Data Science 
    1. Models for forecasting cyber-attacks and measuring impact
    2. Models for attack-pattern recognition
    3. Data representation and fusion
    4. Applications of intelligent decision support
    5. Models that take into consideration Deception and Uncertainty in cyber-attack         attribution

o Tools
    1. Threat Hunting
    2. Malware Analysis & Detection
    3. Forensics Investigation
    4. Cyber Threat Intelligence
    5. Intrusion detection and Incident Response
    6. Visualization techniques for intelligence analysis and investigation
    7. Logs Analysis
    8. Phishing and Spear-Phishing detection and Prevention

o Decision Making and Interaction
    1. Analytical reasoning systems
    2. Resilience in intelligence analysis
    3. Legal, privacy and ethical factors in intelligence analysis
    4. Improved situational awareness
    5. Decision making
    6. Interactive and computational decision support
    7. Investigative and analytic decision making

o Data
    1. Novel datasets
    2. Data simulation
    3. Anonymisation techniques
    4. Data collection, filtering and storage analysis
    5. New formats and Taxonomies
    6. Semantic Modeling and Data Representation

Special invitation:
- Modern Authentication (Mobile, Biometrics and Advanced Analytics)
- Physical Security and Insider Threats

Accepted papers will be published by the IEEE Computer Society Press.

Before submitting your paper please make sure that the paper meets formatting requirements by IEEE.

SUBMISSION DETAILS

Paper Submission

Full Research Papers

Research papers submitted to CyberHunt 2018 should present original and interesting work in the areas listed in the call for papers.
The authors are invited to submit a full-length paper (up to 10 pages) or short papers (up to 6 pages).

Papers should be formatted to IEEE Computer Society Proceedings Manuscript Formatting Guidelines (see "formatting instructions" below). 

Formatting Instructions

Word Template
8.5" x 11" (DOC, PDF

Latex Template
LaTex Formatting Macros

Poster Submission

The poster exhibition gives Master's and PhD students the opportunity to expose and discuss their security research with other IEEE BigData 2018 participants. Please submit an extended abstract of your poster topic. If you abstract is accepted, you are expected to create the full poster, print it yourself and present it at the conference's poster exhibition.

Submit the paper at

Web Intelligence™️ Lab

ORGANIZING COMMITTEE

Vasileios Mavroeidis

Chair, University of Oslo (Norway)

Kamer Vishi

Co-chair, University of Oslo (Norway)

Thirimachos Bourlai

Co-chair, West Virginia University (USA)

Audun Jøsang

PC chair, University of Oslo (Norway)

Mary Dillon

Publicity chair, West Virginia University (USA)

Program Committee


- Andrii Shalaginov, Norwegian University of Science and Technology, Norway   
- Bill Buchanan, Edinburgh Napier University, UK
- Blerim Rexha, University of Prishtina, Kosovo
- Fabio Massimo Zennaro, University of Oslo, Norway
- Henning Maagerud, Research Council of Norway, Norway    
- Jassim Happa, University of Oxford, UK
- Keith Martin, Royal Holloway University of London, UK
- Laszlo Erdodi, University of Oslo, Norway
- Martin Aastrup Olsen, Fingerprint Cards, Denmark
- Nils Gruschka, University of Oslo, Norway
- Panagiotis Karampelas, Hellenic Air Force Academy, Greece
- Siri Bromander, Mnemonic, Norway
- Sule Yildirim Yayilgan, Norwegian University of Science and Technology, Norway

KEYNOTE SPEAKERS

IMPORTANT DATES

Oct 10, 2018

Due date for full workshop papers submission

Nov 1, 2018

Notification of paper acceptance to authors

Nov 15, 2018

Camera-ready of accepted papers (Firm deadline)

Dec 10-13, 2018

Workshop

PROGRAM

TBA.

Workshop Sponsors

The list is not completed yet

© Copyright 2018 SecurityLab (University of Oslo) - All Rights Reserved. Powered and Developed by CyberHunt webteam