ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

BiDAS 2018 - 2nd International Workshop on Big Data analytics, Security and Privacy

Date2018-05-08

Deadline2018-01-14

VenueEssaouira, Morocco Morocco

Keywords

Websitehttp://netys.net/bidas2018

Topics/Call fo Papers

Big Data systems are complex and heterogeneous, and their security must be fundamentally approached. Moreover, Big Data Systems lead to the integration of different technologies that introduce new security issues that must be properly addressed. In addition, the ongoing digitalization of the business world is putting companies and users at risk of cyberattacks more than ever before. Big data analysis has the potential to offer protection against these attacks. Therefore, the goal of the workshop is two-fold: First, it addresses security issues of big data systems while considering: the infrastructure security, the data privacy, the data management, and the integrity and reactive security. Second, the workshop will address the innovative techniques, metrics, and behavior analysis that can exploit big data analytics capabilities to address the cybersecurity challenges facing cyberspace resources and services.
Topics of interest of the workshop include, but are not limited to:
Big Data Security
Infrastructure Security
Security for Hadoop clusters
Security for Big Data ecosystems
Architecture security
Availability
Authentication
Communication security
Data Privacy
Cryptography
Access control
Confidentiality
Privacy-preserving requests
Privacy in social networks
Anonymization
Differential privacy
Data Management
Security in collecting and storing data
Sharing algorithms
Policies, Laws, or Government
Integrity and Reactive Security
Integrity
Attack detection
Recovery from a disaster
Big Data Analytics for Cybersecurity
Cyber intelligence and attack detection
Cyber intelligence and cyber situational awareness
Platforms for cybersecurity and defense
Big Data cybersecurity computational models
Cyber threats in social networks
Parallel/distributed Algorithms and techniques
Data Streaming and Real time analysis
Data acquisition for web mining/opinion mining/sentiment analysis
Machine learning for cyber threat and security
Log management
New-generation intrusion detection/prevention systems
Real-time monitoring of computer and network systems
Visualization for cyber intelligence and security/defense
Visualization for web mining/opinion mining/sentiment analysis
Vulnerability analysis and modeling

Last modified: 2017-11-22 22:04:11