DMCS - Data Mining for Cyber Security
A workshop organized in association with ICDM’2016
December 12, 2016 Barcelona
Call for papers
Workshop Description
Computer and communication systems are subject to repeated
security attacks. Given the variety of new vulnerabilities discovered every
day, the introduction of new attack schemes, and the ever-expanding use of the
Internet, it is not surprising that the field of computer and network security
has grown and evolved significantly in recent years. Attacks are so pervasive
nowadays that many firms, especially large financial institutions, spend over 10% of their total information and communication technology (ICT) budget directly on computer
and network security. Changes in the type of attacks, such as the use of
Advanced Persistent Threat (APT) and the identification of new vulnerabilities
have resulted in a highly dynamic threat landscape that is unamenable to
traditional security approaches.
Data mining techniques that explore data in order to discover hidden patterns and develop predictive models,
have proven to be effective in tackling the aforementioned information security
challenges. In recent years classification,
associations rules, and clustering mechanisms, have all been used to discover
and generalize attack patterns in order to develop powerful solutions for
coping with the latest threats such as: APTs, Ransomware, data leakage, and
malicious code (Trojan, Worms and computer viruses).
Focusing on the theoretical and practical aspects
of data mining for enhancing information security, this workshop provides an
opportunity to present and discuss the latest theoretical advances and real-world
applications in this research field. Manuscripts are solicited to address
a wide range of topics in this area, including but not limited to:
- Data mining for intrusion detection and prevention
- Data mining for fraud detection and prevention
- Monitoring Network Security
- One-class based anomaly detection
- Data Stream Mining for Security
- Deep Learning for cyber security
- Big Data architectures for network security
- Identify theft detection and prevention
- Evaluating data mining approaches to security
- Adversarial Machine Learning
- Detecting data and information leakage using data mining techniques
- Detecting malicious code using data mining techniques
Key
dates:
·
August 12, 2016: Due date for full workshop papers
·
September 13, 2016: Notification of workshop papers acceptance to
authors
·
September 20, 2016: Camera-ready deadline for accepted papers
·
December 12, 2016: Workshop date
Submission
Instructions:
Submissions will be
managed through the IEEE ICDM CyberChair system.
Please submit your papers at the following website: https://wi-lab.com/cyberchair/2016/icdm16/index.php
Our workshop is
Workshop 7, entitled: Data Mining for Cyber Security (DMCS)
The page limit of
workshop papers is 8 pages in the standard IEEE 2-column format
http://www.ieee.org/conferences_events/conferences/publishing/templates.html,
including the bibliography and any possible appendices.
·
All papers must be formatted according to the IEEE Computer Society
proceedings manuscript style, following IEEE ICDM 2016 submission guidelines
available at http://icdm2016.eurecat.org/.
·
Papers should be submitted in PDF format, electronically, using the CyberChair submission system.
Publication:
Accepted papers will be
included in the IEEE ICDM 2016 Workshops Proceedings volume published by IEEE
Computer Society Press, and will also be included in the IEEE Xplore Digital Library. The workshop proceedings will be in
a CD separated from the CD of the main conference. The CD is produced by IEEE
Conference Publishing Services (CPS). Every workshop paper must have at least
one paid registration in order to be published.
Organizing Committee:
Program Co-Chairs:
Nathalie Japkowicz, University of Ottawa
Yuval Elovici, Ben Gurion University
\
Preliminary
Program Committee:
Rami Abielmona,
Larus Technologies
David Bissessar,
Canada Border Services Agency
Philippe Chan,
Florida Institute of Technology
Ben Edwards,
University of New Mexico
Rafael Falcon, Larus Technologies
Sylvain Leblanc,
Royal Military College of Canada
Qiang Ma,
Yahoo!
Robert Moskovitch, Ben Gurion University
and Columbia University
Alina Oprea, RSA
Lior Rokach, Ben Gurion University
Reginald Sawilla, NATO
Anil W. Somayaji, Carleton University
William W. Streilein, MIT
Nan Zhang, George Washington University
Nur Zincir-Heywood, Dalhousie University