BiDAS 2018 - 2nd International Workshop on Big Data analytics, Security and Privacy
Topics/Call fo Papers
Big Data systems are complex and heterogeneous, and their security must be fundamentally approached. Moreover, Big Data Systems lead to the integration of different technologies that introduce new security issues that must be properly addressed. In addition, the ongoing digitalization of the business world is putting companies and users at risk of cyberattacks more than ever before. Big data analysis has the potential to offer protection against these attacks. Therefore, the goal of the workshop is two-fold: First, it addresses security issues of big data systems while considering: the infrastructure security, the data privacy, the data management, and the integrity and reactive security. Second, the workshop will address the innovative techniques, metrics, and behavior analysis that can exploit big data analytics capabilities to address the cybersecurity challenges facing cyberspace resources and services.
Topics of interest of the workshop include, but are not limited to:
Big Data Security
Infrastructure Security
Security for Hadoop clusters
Security for Big Data ecosystems
Architecture security
Availability
Authentication
Communication security
Data Privacy
Cryptography
Access control
Confidentiality
Privacy-preserving requests
Privacy in social networks
Anonymization
Differential privacy
Data Management
Security in collecting and storing data
Sharing algorithms
Policies, Laws, or Government
Integrity and Reactive Security
Integrity
Attack detection
Recovery from a disaster
Big Data Analytics for Cybersecurity
Cyber intelligence and attack detection
Cyber intelligence and cyber situational awareness
Platforms for cybersecurity and defense
Big Data cybersecurity computational models
Cyber threats in social networks
Parallel/distributed Algorithms and techniques
Data Streaming and Real time analysis
Data acquisition for web mining/opinion mining/sentiment analysis
Machine learning for cyber threat and security
Log management
New-generation intrusion detection/prevention systems
Real-time monitoring of computer and network systems
Visualization for cyber intelligence and security/defense
Visualization for web mining/opinion mining/sentiment analysis
Vulnerability analysis and modeling
Topics of interest of the workshop include, but are not limited to:
Big Data Security
Infrastructure Security
Security for Hadoop clusters
Security for Big Data ecosystems
Architecture security
Availability
Authentication
Communication security
Data Privacy
Cryptography
Access control
Confidentiality
Privacy-preserving requests
Privacy in social networks
Anonymization
Differential privacy
Data Management
Security in collecting and storing data
Sharing algorithms
Policies, Laws, or Government
Integrity and Reactive Security
Integrity
Attack detection
Recovery from a disaster
Big Data Analytics for Cybersecurity
Cyber intelligence and attack detection
Cyber intelligence and cyber situational awareness
Platforms for cybersecurity and defense
Big Data cybersecurity computational models
Cyber threats in social networks
Parallel/distributed Algorithms and techniques
Data Streaming and Real time analysis
Data acquisition for web mining/opinion mining/sentiment analysis
Machine learning for cyber threat and security
Log management
New-generation intrusion detection/prevention systems
Real-time monitoring of computer and network systems
Visualization for cyber intelligence and security/defense
Visualization for web mining/opinion mining/sentiment analysis
Vulnerability analysis and modeling
Other CFPs
- First International Workshop on Narrative Extraction from Texts
- 7th World Congress on Mass Spectrometry
- Computer System Validation and Part 11 Compliance
- The 14th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM 2018)
- The 11th International Symposium on Photonics and Optoelectronics (SOPO 2018)
Last modified: 2017-11-22 22:04:11