DASec 2014 - First International Workshop on Big Data Analytics for Security (DASec)
Topics/Call fo Papers
In the last 10 years we have witnessed a strong integration of several human activities with computers and digital networks. This has led to an interconnected economy, where interactions occur through the mediation of networked devices. The openness of this scenario was instrumental in creating new business opportunities. However, it has also paved the way to new forms of criminal activities that, while happening in the cyber domain, have strong implications in the real world. The current trend towards an Internet of Things will possibly worsen this scenario.
In this context, private companies and public bodies struggle to defend their businesses against a deluge of attacks spanning from complex online frauds to malicious scanning activities of their IT infrastructures. As attacks continue to grow in complexity, classic "border-control" approaches to system security quickly prove to be ineffective, calling for an investigation into new methodologies and solutions. At the same time, ongoing research efforts on "Big Data" systems are devising new and innovative methodologies to manage and analyze large amounts of data with the aim of recognizing specific patterns and behaviors.
The First International Workshop on Big Data Analytics for Security aims to bring together people from both academia and industry to present their most recent work related to trust, security and privacy issues in big data analytics, together with application of big data technologies in the field of security. The purpose is to establish if and how large-scale data analytics technologies can help in creating new security solutions for today's complex IT infrastructures.
Topics of interest include, but are not limited to:
Distributed data analysis platforms
Scalable solutions for pattern recognition
Stream processing and parallel batch processing technologies
Real-time processing of intense data flows
Trusted platform implementation technologies for Big Data Analytics
Information quality/trustworthiness for Big Data
Provenance of content for Big Data
Visualizing large scale security data
Privacy in Big Data mining and analytics
Threat detection using Big Data analytics
High Performance and Efficient Data Cryptography
Researchers are encouraged to submit papers describing original, previously unpublished, complete research, not currently under review by another conference or journal, addressing state-of-the-art research and development in all areas of data analytics and system security. The final workshop program will include both talks presenting novel contributions and a keynote presentation.
Author Instructions
Papers must be submitted electronically through EasyChair. All paper submissions should follow the IEEE 8.5" x 11" Two-Column Format and must be submitted as PDF documents. The maximum size of papers should be 6 pages including tables and figures. The cover page must contain an abstract (up to a 150 words), 3-5 keywords, name and affiliation of author(s) as well as the corresponding author's e-mail and postal address. English is the only language allowed for submissions. All submissions will be reviewed by members of the workshop program committee or by renewed experts in the workshop's areas of interest. At least one of the authors of every accepted paper must register to the ICDCS conference and present their work at the workshop. Accepted papers will be published in the combined ICDCS 2014 workshop proceedings and will be available through IEEE Xplore (pending confirmation).
In this context, private companies and public bodies struggle to defend their businesses against a deluge of attacks spanning from complex online frauds to malicious scanning activities of their IT infrastructures. As attacks continue to grow in complexity, classic "border-control" approaches to system security quickly prove to be ineffective, calling for an investigation into new methodologies and solutions. At the same time, ongoing research efforts on "Big Data" systems are devising new and innovative methodologies to manage and analyze large amounts of data with the aim of recognizing specific patterns and behaviors.
The First International Workshop on Big Data Analytics for Security aims to bring together people from both academia and industry to present their most recent work related to trust, security and privacy issues in big data analytics, together with application of big data technologies in the field of security. The purpose is to establish if and how large-scale data analytics technologies can help in creating new security solutions for today's complex IT infrastructures.
Topics of interest include, but are not limited to:
Distributed data analysis platforms
Scalable solutions for pattern recognition
Stream processing and parallel batch processing technologies
Real-time processing of intense data flows
Trusted platform implementation technologies for Big Data Analytics
Information quality/trustworthiness for Big Data
Provenance of content for Big Data
Visualizing large scale security data
Privacy in Big Data mining and analytics
Threat detection using Big Data analytics
High Performance and Efficient Data Cryptography
Researchers are encouraged to submit papers describing original, previously unpublished, complete research, not currently under review by another conference or journal, addressing state-of-the-art research and development in all areas of data analytics and system security. The final workshop program will include both talks presenting novel contributions and a keynote presentation.
Author Instructions
Papers must be submitted electronically through EasyChair. All paper submissions should follow the IEEE 8.5" x 11" Two-Column Format and must be submitted as PDF documents. The maximum size of papers should be 6 pages including tables and figures. The cover page must contain an abstract (up to a 150 words), 3-5 keywords, name and affiliation of author(s) as well as the corresponding author's e-mail and postal address. English is the only language allowed for submissions. All submissions will be reviewed by members of the workshop program committee or by renewed experts in the workshop's areas of interest. At least one of the authors of every accepted paper must register to the ICDCS conference and present their work at the workshop. Accepted papers will be published in the combined ICDCS 2014 workshop proceedings and will be available through IEEE Xplore (pending confirmation).
Other CFPs
- 1st Symposium on Information Management and Big Data
- Fourth International Symposium on Data-driven Process Discovery and Analysis
- First IEEE International Workshop on Big Data Security and Privacy
- 1st IEEE International Workshop on Multimedia and Sensory Environment Services
- Third International Conference on Competence Based Strategic Management
Last modified: 2014-05-13 23:04:33