ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

RaSIEM 2015 - 3rd International Workshop on Recent Advances in Security Information and Event Management

Date2015-08-24 - 2015-08-28

Deadline2015-04-10

VenueToulouse, France France

Keywords

Websitehttps://www.ares-conference.eu/conferenc...

Topics/Call fo Papers

Unfortunately we did not get enough paper submissions for the RaSIEM workshop this year. So the workshop will be cancelled. Some papers related to SIEM, however, are presented in the ARES main conference as well as in other workshops. For example, “No Smurfs: Revealing Fraud Chains in Mobile Money Transfers” in the ARES I best paper session, and “Fighting Botnets with Cyber-Security Analytics” in the ARES-IND II session.
Looking forward to meet you at ARES to discuss RaSIEM topics
Roland Rieke
??????
Management of events and incidents is one of the cornerstones for any service.
The SIEM (Security Information and Event Management) approach enables near-real time event management as well as proactive management of security incidents and events for IT infrastructures. This workshop addresses research topics in SIEM and related methods and technologies.
The first two RaSIEM workshops in 2012 and 2013 have been successfully organized by the project MASSIF (http://www.massif-project.eu).
This year’s workshop will be supported by the project ACCEPT (http://accept-projekt.de/) which considers in particular the special threats for SIEM in virtualized computer systems.
Topics of interest comprise but are not limited to:
Recognition, analysis and treatment of safety-relevant anomalies in virtualized computer systems
Adequate sensors in the hypervisor, VMs and in run-time environments for applications
Case study of SIEM in operational scenarios
Protection of critical infrastructures against (targeted) cyber attacks
Recognizing real threats in the multitude of daily alerts
Predictive security analysis
Ensuring data source reliability
Managing data from heterogeneous devices and networks
Correlation of highly heterogeneous data to identify threats
SIEM for distributed computing
Fault tolerance and resilience for SIEM architectures
Real-time security analysis for SIEM
SIEM for process monitoring and control
Decision systems in SIEM
Event translation and complex event processing for SIEM
Big data approaches of mapping and reducing problem sets with regard to security information to help create meaning and structure from myriad data sources
Visualization of security events

Last modified: 2014-12-24 16:59:37