ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

BigData 2016 - Special Issue on Big Data Analytics for Cyber-Security Intelligence

Date2016-04-20

Deadline2015-12-31

VenueOnline, Online Online

Keywords

Websitehttp://www.public.asu.edu/~sshutte/globa...

Topics/Call fo Papers

Special Issue on Big Data Analytics for Cyber-Security Intelligence
Computational Intelligence, Wiley
http://onlinelibrary.wiley.com/journal/10.1111/%28...
In response to the ever-increasing security challenge, organizations have a growing need to identify and protect against threats by building insights from broader and larger datasets. Many research projects around the globe were dedicated to developing big data analytic systems for monitoring and analyzing network behaviors in order to detect known and unknown cyber-threats in enterprises, and gain in-depth understanding of the critical symptoms of potential outbreaks of new cyber attacks. In-stream data processing is important because it can analyze large volumes of data immediately as it is being produced. Also, the combination of computational intelligence methods with advanced networking engineering technologies is crucial for handling a big amount of network data of various types and origins (e.g., web traffic, DNS, port & protocol usage, and netflows etc.).
This special issue aims at providing a forum to present recent advancements in computational intelligence for cyber security. Challenges include real-time data stream analytics, recognition of ever-changing cyber-attack symptom, early detection/awareness of the infection. To address these challenges, we invite original research papers that report on state-of-the-art and recent advancements in securing our critical infrastructure and cyberspace, with a particular emphasis on novel techniques to build and apply in-stream big volume data analytic systems for Cybersecurity.
Potential topics include, but are not limited to:
? Incremental learning of cyber attack streams data analytics
? Cyber attack variation and concepts drift
? In-stream data analytics for network monitoring
? Infection log analytics
? Distributed intrusion detection system
? Analysis of new attack behaviors and development of protection model
? Darknet analysis with consideration of regional/time difference
? Multi-agent network monitoring and collaborative intrusion detection
? Multi-stream correlation analysis for cyber security
? Malware and botnet analysis, detection, and mitigation
? Spam email analysis and real time data filtering
? Data streams visualization for Cyber-Security understanding
? Enterprise Cyber-Security big data construction
Associated Conference/workshops:
The special issue will be associated, but not limited, to the following conference/workshops:
The 8th international workshop on Data Mining and Cybersecurity (DMC2015) http://www.csmining.org/cdmc2015/
The 22nd International Conference on Neural Information Processing (ICONIP2015) http://www.iconip2015.org/ , which will be held in Istanbul Turkey November 9-12 2015
Submission and Review:
Authors can submit their manuscripts via the Manuscript Tracking System at https://mc.manuscriptcentral.com/coin
For papers published in associated conferences, it is required that the special issue versions be substantially different from their already published forms. There should be at least 30% new research results in the journal version compared to a prior conference or workshop version.
Reviewing will be double-blind, meaning the authors' identities will be hidden from the reviewers. We will follow policies for plagiarism, submission confidentiality, reviewer anonymity, and prior and concurrent paper submission that mirror those of the ACM
Manuscript Due 31 December 2015
First Round of Reviews 25 March 2016
Publication Date 20 April 2016
Lead Guest Editor:
Prof. Paul S. Pang,
Email: ppang-AT-unitec.ac.nz
Center of Computational Intelligence for Cyber-Security,
Department of Computing,
Unitec Institute of Technology
New Zealand
Guest Editors:
Prof. Seiichi Oazawa
Email: ozawasei-AT-kobe-u.ac.jp
Graduate School of Engineering, Kobe University
Faculty of Engineering, Kobe University
Japan
Prof. Theodore B. Trafalis,
Email: ttrafalis-AT-ou.edu
School of Industrial Engineering
University of Oklahoma
USA
Prof. Jiankun Hu
Email: J.Hu-AT-adfa.edu.au
Cyber Security Lab,
School of Engineering and Information Technology
University of New South Wales
Australia.
Prof. Abdolhossein Sarrafzadeh
Email: hsarrafzadeh-AT-unitec.ac.nz
Department of Computing
Unitec Institute of Technology
New Zealand

Last modified: 2015-05-26 22:31:03