LACI 2016 - 1st IEEE International Workshop on Log Analytics For Cyber Intelligence
Topics/Call fo Papers
This workshop will bring researchers from academia and industry to discuss platforms, tools, and techniques to store, process and analyze large amount of log data with the intent to gather meaningful information for practical purposes such as monitoring of data security breaches, conducting of forensic investigation, auditing of policies for compliance, and debugging and testing of application. This workshop will focus on challenges, experiences and lessons learned on various aspects of log data analysis-based intelligence gathering for systems including but not limited to web, mobile, cloud and applied to various disciplines such as healthcare, embedded, and distributed systems.
Theme of the Workshop
Log data is a remarkable piece of evidence to identify responsible applications, processes, hosts, users for events of interests. Gathering intelligence by analyzing log data brings several challenges such as being able to query large volume of log data and combine results meaningfully from multiple log data sources. Log data analysis has shown some success to mitigate cybersecurity breaches, better
application development, enforcing policies and regulations. However, many challenges are still there for analyzing logs to gather intelligence. These include analyzing anonymous and obfuscated log data, combining log data from multiple platforms having dissimilar formats and timestamps, addressing data velocity, volume, and variety, and complying with federal laws, regulations, and standards. The related stakeholders need to address these challenges to store sufficient information in log data, process them, and conclude specific events of interests in real or near real-time. In this workshop, we welcome papers on all aspects of intelligence gathering from log data analysis.
Scope of the Workshop
Topics of interest include, but are not limited to, the following:
* Platforms, tools, language supports for storing, processing, and querying log
data to gather intelligence
* Log analytics and intelligence gathering for various types of applications (web,
mobile, cloud, IoT) and environments (wired network, wireless network)
* Information visualization support for log analytics
* Requirement and design of software and applications to store adequate log
data to support analytics and gathering of intelligence
* Analysis and gathering of intelligence from log data under anonymized,
obfuscated, and encrypted state
* Analysis and gathering of intelligence from log data obtained from firewall,
intrusion detection systems, operating systems, embedded systems, hand held
devices, and cyber physical systems
* Analyzing multiple and dissimilar log data sources to gather intelligence
* Disaster recovery through offline log analytics and intelligence gathering
* Integration of log analytics-based intelligence gathering research into
classroom teaching and hands on labs
* Application of log data analysis to provide intelligence support for forensics
and criminal investigation
* Impact or need for laws and policies to support intelligence gathering through
log analytics
* Experience and lessons learned from log data analytics-based intelligence
gathering
* Standardization of new log data format for intelligence gathering
The length of a camera ready paper will be limited to 6 pages (IEEE Proceedings style) with up to 2 additional pages (with charges for each additional page) printed on 10-12 point fonts. Authors must follow IEEE CS Press Proceedings Author Guidelines to prepare papers. At least one of the authors of each accepted paper is required to pay full registration fee and present the paper at the workshop in person.
Program Committee
Ambareen Siraj, Tennessee Technological University, USA
Haroon Malik, Marshall University, USA
Biju Issac, Teesside University, UK
Xinli Wang, Michigan Technological University, USA
Nataranjan Meghanathan, Jackson State University, USA
Tetsuji Takada, The University of Electro-Communications, Japan
Li Yang, University of Tennessee at Chattanooga, USA
Theme of the Workshop
Log data is a remarkable piece of evidence to identify responsible applications, processes, hosts, users for events of interests. Gathering intelligence by analyzing log data brings several challenges such as being able to query large volume of log data and combine results meaningfully from multiple log data sources. Log data analysis has shown some success to mitigate cybersecurity breaches, better
application development, enforcing policies and regulations. However, many challenges are still there for analyzing logs to gather intelligence. These include analyzing anonymous and obfuscated log data, combining log data from multiple platforms having dissimilar formats and timestamps, addressing data velocity, volume, and variety, and complying with federal laws, regulations, and standards. The related stakeholders need to address these challenges to store sufficient information in log data, process them, and conclude specific events of interests in real or near real-time. In this workshop, we welcome papers on all aspects of intelligence gathering from log data analysis.
Scope of the Workshop
Topics of interest include, but are not limited to, the following:
* Platforms, tools, language supports for storing, processing, and querying log
data to gather intelligence
* Log analytics and intelligence gathering for various types of applications (web,
mobile, cloud, IoT) and environments (wired network, wireless network)
* Information visualization support for log analytics
* Requirement and design of software and applications to store adequate log
data to support analytics and gathering of intelligence
* Analysis and gathering of intelligence from log data under anonymized,
obfuscated, and encrypted state
* Analysis and gathering of intelligence from log data obtained from firewall,
intrusion detection systems, operating systems, embedded systems, hand held
devices, and cyber physical systems
* Analyzing multiple and dissimilar log data sources to gather intelligence
* Disaster recovery through offline log analytics and intelligence gathering
* Integration of log analytics-based intelligence gathering research into
classroom teaching and hands on labs
* Application of log data analysis to provide intelligence support for forensics
and criminal investigation
* Impact or need for laws and policies to support intelligence gathering through
log analytics
* Experience and lessons learned from log data analytics-based intelligence
gathering
* Standardization of new log data format for intelligence gathering
The length of a camera ready paper will be limited to 6 pages (IEEE Proceedings style) with up to 2 additional pages (with charges for each additional page) printed on 10-12 point fonts. Authors must follow IEEE CS Press Proceedings Author Guidelines to prepare papers. At least one of the authors of each accepted paper is required to pay full registration fee and present the paper at the workshop in person.
Program Committee
Ambareen Siraj, Tennessee Technological University, USA
Haroon Malik, Marshall University, USA
Biju Issac, Teesside University, UK
Xinli Wang, Michigan Technological University, USA
Nataranjan Meghanathan, Jackson State University, USA
Tetsuji Takada, The University of Electro-Communications, Japan
Li Yang, University of Tennessee at Chattanooga, USA
Other CFPs
- 1st IEEE International Workshop on mHealth Technology for Individuals, Groups, and Communities
- 11th IEEE International Workshop on Security, Trust, and Privacy for Software Applications
- 1st IEEE International Workshop on Digital and Connected Health
- 9th IEEE International Workshop on Service Science Systems
- 3rd IEEE International Workshop on Medical Computing
Last modified: 2015-12-27 22:11:05