WCTI 2018 - 2018 International Workshop on Cyber Threat Intelligence
Topics/Call fo Papers
In order to effectively defend a system against malicious activities, information about the nature of the adversaries, their available skills and resources is essential. Without this information, we run the risk that the portfolio of countermeasures does not turn out to be adequate to thwart off cyber threats, or that the defender deploys unnecessary resources.
Cyber Threat Intelligence is an emerging new discipline, which aims to develop methods and techniques to assemble information about compromises, extract information about the infrastructure and tools used, investigate adversarial techniques and practices and their evolution, structure and share this information and thus help detect and prevent future incidents.
WCTI aims to bring together experts from academia, industry, government and law enforcement who are interested to advance the state of the art in cyber threat intelligence. The aim of the workshop is to present mature and early stage ideas, promote discussion and exchange, and build a community of researchers and practitioners in cyber threat intelligence.
TOPICS OF INTEREST INCLUDE, BUT ARE NOT LIMITED TO:
Techniques for attribution and tracing of actor evolution
Methods of expose attack infrastructure and derive TTPs
Methods and results in campaign analysis
Mining of Open Source Intelligence (OSINT) and Social Media Intelligence (SOCMINT)
Strategies for secure threat intelligence sharing and interchange of CTI information
Evaluation of CTI information and integration of CTI sources
Application of CTI in context and TI life cycle
Cyber Threat Intelligence is an emerging new discipline, which aims to develop methods and techniques to assemble information about compromises, extract information about the infrastructure and tools used, investigate adversarial techniques and practices and their evolution, structure and share this information and thus help detect and prevent future incidents.
WCTI aims to bring together experts from academia, industry, government and law enforcement who are interested to advance the state of the art in cyber threat intelligence. The aim of the workshop is to present mature and early stage ideas, promote discussion and exchange, and build a community of researchers and practitioners in cyber threat intelligence.
TOPICS OF INTEREST INCLUDE, BUT ARE NOT LIMITED TO:
Techniques for attribution and tracing of actor evolution
Methods of expose attack infrastructure and derive TTPs
Methods and results in campaign analysis
Mining of Open Source Intelligence (OSINT) and Social Media Intelligence (SOCMINT)
Strategies for secure threat intelligence sharing and interchange of CTI information
Evaluation of CTI information and integration of CTI sources
Application of CTI in context and TI life cycle
Other CFPs
- Third Workshop On Performance and Scalability of Storage Systems
- 2018 International Workshop on Entrepreneurship on Electronic and Mobile Business
- 2018 IEEE Conference on Dependable and Secure Computing
- 25th IEEE International Conference on Mechatronics and Machine Vision in Practice
- International Conference on Advances & Practices in Electrical Engineering (ICAPE 2018)
Last modified: 2018-02-17 17:23:03