-------- Forwarded Message --------
HICSS-55 Call for Participation: Machine Learning and Cyber Threat
Intelligence and Analytics Minitrack
<https://hicss.hawaii.edu/tracks-55/software-technology/#machine-learning-and-cyber-threat-intelligence-and-analytics-minitrack>
https://hicss.hawaii.edu/tracks-55/software-technology/#machine-learning-and-cyber-threat-intelligence-and-analytics-minitrack
With the digitalization of things, a significant amount of data is
collected from different security monitoring solutions as well as
systems
that were compromised or have been used to facilitate an attack
(e.g. a
cloud server). Thus, advanced cyber threat intelligence and
analytical
techniques (e.g. threat intelligence, big data and machine
learning
techniques) are key to real-time detection and mitigation of cyber
security
incidents, and to the collection and analysis of cyber security
incident
related information. For example, one emerging research focus is
cyber
threat intelligence and analytics, which seeks to integrate and
deploy
different computing techniques such as big data analytics,
sentiment
analysis, artificial intelligence and machine learning to
perceive, reason,
learn and defend against advanced cyber attacks or advanced
persistent
threats, as well as facilitating the collection, preservation and
analysis
of evidence that may then be used to identify and prosecute the
perpetrators.
This minitrack will focus on cutting-edge research from both
academia and
industry, with a particular emphasis on novel techniques and tools
to
perceive, reason, learn and act on a wide range of data collected
from
different attack (or attempts), sophisticated advanced persistent
threat
campaigns, etc. Only theoretical and technical papers describing
previously
unpublished, original, state-of-the-art research, and not
currently under
review by a conference or a journal will be considered.
Topics of interest include but not limited to:
- Blockchain and its application in cyber security
- Detection and analysis of advanced threat actors tactics,
techniques
and procedures
- Application of machine learning tools and techniques in cyber
threat
intelligence
- Theories and models for detection and analysis of advanced
persistent
threats
- Automated and smart tools for collection, preservation and
analysis of
digital evidences
- Threat intelligence techniques for constructing, detecting, and
reacting to advanced intrusion campaigns
- Applying machines learning tools and techniques for malware
analysis
and fighting against cyber crimes
- Intelligent incident response tools, techniques and procedures
for
contemporary technologies, such as cloud and cyber-physical
systems
- Intelligent analysis of different types of data collected from
different layers of network security solutions
- Threat intelligence in cyber security domain utilising big data
solutions such as Hadoop
- Intelligent methods to manage, share, and receive logs and data
relevant to variety of adversary groups
- Interpretation of cyber threat and forensic data utilising
intelligent
data analysis techniques
- Infer intelligence of existing cyber security data generated by
different monitoring and defence solutions
- Automated and intelligent methods for adversary profiling
- Automated integration of analysed data within incident response
and
cyber forensics capabilities
Minitrack Co-Chairs:
*Kim-Kwang Raymond Choo* (Primary Contact)
University of Texas at San Antonio
raymond.choo@utsa.edu
*Ali Dehghantanha*
University of Guelph
adehghan@uoguelph.ca
*Glenn Dietrich*
University of Texas at San Antonio
Glenn.Dietrich@utsa.edu
Important Dates
April 15 Paper submission system reopened for HICSS-55
June 15 Papers due
August 17 Notification of Acceptance/Rejection
September 22 Deadline for Authors to Submit Final Manuscript for
Publication
October 1 Deadline for at least one author of each paper to
register for HICSS-55
HICSS papers emphasize advances in research and development
activities in
several areas of the system sciences. Papers may be theoretical,
conceptual, tutorial, or descriptive in nature.
- All papers must be submitted to a minitrack. Minitracks are part
of our*
12 larger tracks and an invited track
<https://hicss.hawaii.edu/tracks-and-minitracks/>*. Make
sure you
understand the focus of a minitrack before submitting your paper
to ensure
you are submitting to the best possible fit for your research.
- HICSS papers must contain original material. They may not be
previously published, nor currently submitted elsewhere. You may
contact
the Minitrack Chair(s) or Track Chair for guidance or verification
of
content. If you are not sure of the appropriate Minitrack, submit
a
preliminary abstract to the Minitrack Chair(s) or Track Chair via
email for
determination.
- Submit a paper to only one Minitrack. Submissions to more than
one
minitrack may result in rejection by either minitrack without
consultation
with author.
- HICSS prohibits the addition of authors after initial
submission/review, except in convincingly justified and
extenuating
circumstances. The Conference Chair must approve any additional
names
added. To seek approval, please send a written request to
hicss@hawaii.edu.
- Do not author or co-author more than 5 papers.
Acceptance is based on a strict peer review in a double-blind
process from
June through August of each year. After a careful review by a
special
committee in each track, Best Paper Awards are presented to the
selected
paper from each track in recognition of their superior research
performance.
For further information, please refer to
https://hicss.hawaii.edu/authors/
_______________________________________________
AISWorld mailing list
AISWorld@lists.aisnet.org