Abbrevation
DACS
City
Limassol
Country
Cyprus
Deadline Paper
Start Date
End Date
Abstract

Cyberspace continues to be threatened by devastating and debilitating attacks, which often compromise and damage invaluable data and systems&#046; Cyber threats targeting evolving paradigms such as the Internet&#8211;of&#8211;Things (IoT) and Cyber&#8211;Physical Systems (CPS) are already introducing an evolving dimension of cyber&#8211;warfare&#046; Moreover, other specialized attacks such as Distributed Denial of Service (DDoS) continue to severely threaten both Internet and corporate networks&#046; Further, the recent trend of ransomware is also targeting a plethora of victims across various sectors, causing drastic consequences&#046; In this context, it is crucial to explore and devise diverse methodologies to infer, analyze, characterize, attribute and mitigate malicious activities&#046;<br>To this end, this workshop is focused on exploring theoretical and empirical data analytics to support the investigation of malicious activities, i&#046;e&#046;, data&#8211;driven tools, technologies, approaches and techniques&#046; The workshop is soliciting data&#8211;centric, original research and development contributions at any OSI layer for addressing evolving cyber security challenges&#046; Prospective authors are cordially invited to submit technical papers, up to 6 pages in length on topics including, but no limited to, the following:<br>&#8211; Data analytics for securing future home networks, IoT/CPS and body&#8211;area networks<br>&#8211; Data analytics for combating cyber&#8211;crime: anti&#8211;phishing, anti&#8211;spam, anti&#8211;fraud techniques<br>&#8211; Data analytics for cyber situational awareness<br>&#8211; Data analytics for securing emerging technologies: sensor/mobile/personal networks and systems<br>&#8211; Data analytics for securing cloud computing<br>&#8211; Data methods and tools to monitor and visualize security phenomena<br>&#8211; Data analytics for securing data storage and sharing for wireless and future 5G networks<br>&#8211; Collaborative data analytics in cyber security<br>&#8211; Analysis of encrypted network traffic: Fingerprinting, classification and exploration<br>&#8211; Novel systems and algorithms which leverage measurement&#8211;based findings<br>&#8211; Data&#8211;driven automated security analysis of source code and binaries<br>&#8211; Data&#8211;driven intrusion and anomaly detection and prevention<br>&#8211; Learning&#8211;based security data analytics: Models, applications and resiliency<br>&#8211; Streaming data analytics for security<br>&#8211; Predictive cyber security, cyber forensics and digital investigations<br>