Abbrevation
BiDAS
City
Essaouira
Country
Morocco
Deadline Paper
Start Date
End Date
Abstract

Big Data systems are complex and heterogeneous, and their security must be fundamentally approached&#046; Moreover, Big Data Systems lead to the integration of different technologies that introduce new security issues that must be properly addressed&#046; In addition, the ongoing digitalization of the business world is putting companies and users at risk of cyberattacks more than ever before&#046; Big data analysis has the potential to offer protection against these attacks&#046; Therefore, the goal of the workshop is two&#8211;fold: First, it addresses security issues of big data systems while considering: the infrastructure security, the data privacy, the data management, and the integrity and reactive security&#046; Second, the workshop will address the innovative techniques, metrics, and behavior analysis that can exploit big data analytics capabilities to address the cybersecurity challenges facing cyberspace resources and services&#046;<br>Topics of interest of the workshop include, but are not limited to:<br>* Big Data Security<br>&#8211;&#8211; Infrastructure Security<br>&#8211; &#8211; &#8211; Security for Hadoop clusters<br>&#8211; &#8211; &#8211; Security for Big Data ecosystems<br>&#8211; &#8211; &#8211; Architecture security<br>&#8211; &#8211; &#8211; Availability<br>&#8211; &#8211; &#8211; Authentication<br>&#8211; &#8211; &#8211; Communication security<br>&#8211;&#8211; Data Privacy<br>&#8211; &#8211; &#8211; Cryptography<br>&#8211; &#8211; &#8211; Access control<br>&#8211; &#8211; &#8211; Confidentiality<br>&#8211; &#8211; &#8211;Privacy&#8211;preserving requests<br>&#8211; &#8211; &#8211; Privacy in social networks<br>&#8211; &#8211; &#8211; Anonymization<br>&#8211; &#8211; &#8211; Differential privacy<br>&#8211;&#8211; Data Management<br>&#8211; &#8211; &#8211; Security in collecting and storing data<br>&#8211; &#8211; &#8211; Sharing algorithms<br>&#8211; &#8211; &#8211; Policies, Laws, or Government<br>&#8211;&#8211; Integrity and Reactive Security<br>&#8211; &#8211; &#8211; Integrity<br>&#8211; &#8211; &#8211; Attack detection<br>&#8211; &#8211; &#8211; Recovery from a disaster<br>* Big Data Analytics for Cybersecurity<br>&#8211;&#8211; Cyber intelligence and attack detection<br>&#8211;&#8211; Cyber intelligence and cyber situational awareness<br>&#8211;&#8211; Platforms for cybersecurity and defense<br>&#8211;&#8211; Big Data cybersecurity computational models<br>&#8211;&#8211; Cyber threats in social networks<br>&#8211;&#8211; Parallel/distributed Algorithms and techniques<br>&#8211;&#8211; Data Streaming and Real time analysis<br>&#8211;&#8211; Data acquisition for web mining/opinion mining/sentiment analysis<br>&#8211;&#8211; Machine learning for cyber threat and security<br>&#8211;&#8211; Log management<br>&#8211;&#8211; New&#8211;generation intrusion detection/prevention systems<br>&#8211;&#8211; Real&#8211;time monitoring of computer and network systems<br>&#8211;&#8211; Visualization for cyber intelligence and security/defense<br>&#8211;&#8211; Visualization for web mining/opinion mining/sentiment analysis<br>&#8211;&#8211; Vulnerability analysis and modeling<br>