MLBDACP21: The Third International Symposium on Machine Learning and Big Data Analytics For Cybersecurity and Privacy Warsaw, Poland Warsaw, Poland, March 23-26, 2021 |
Conference website | http://mlbdcap21.smartinfo-conf.com/ |
Submission link | https://easychair.org/conferences/?conf=mlbdacp21 |
Submission deadline | December 30, 2020 |
Scope
As cyber-attacks against critical infrastructure increase and evolve, automated systems to complement human analysis are needed. Moreover, chasing the breaches is like looking for a needle in a haystack. Such organizations are so large, with so much information and data to sort through to obtain actionable information that it seems impossible to know where to start. The analysis of the intelligence of an attack is traditionally an iterative, mainly manual process, which involves an unlimited amount of data to try to determine the sophisticated patterns and behaviors of intruders. In addition, most of the detected intrusions provide a limited set of attributes on a single phase of an attack. Accurate and timely knowledge of all stages of an intrusion would allow us to support our cyber-detection and prevention capabilities, enhance our information on cyber-threats and facilitate the immediate sharing of information on threats, as we share several elements. The workshop is expected to address the above issues and will aim to present new research in the field of cyber threat hunting, information on cyber threats, and analysis of important data.
Therefore, cyber-attacks protection of computer systems is one of the most important cybersecurity tasks for single users and businesses, since even a single attack can result in compromised data and sufficient losses. Massive losses and frequent attacks dictate the need for accurate and timely detection methods. Current static and dynamic methods do not provide efficient detection, especially when dealing with zero-day attacks. For this reason, Big Data Analytics and machine learning-based techniques can be used.
This workshop aims to bring together researchers in the field of cybersecurity and key data to advance the missions of anticipating, prohibiting, preventing, preparing, and responding to internal security. We are soliciting submissions in areas related to knowledge extraction from key cybersecurity intelligence datasets, rapid analysis of security datasets to obtain relevant information and Machine learning techniques for cyber-attacks detection and prevention.
Important Dates
The book publication schedule is as follows:
Paper Submission: November 15, 2020
Authors notification: December 20, 2020
Final Manuscript Due: January 30, 2021
Symposium date: March 23 - 26, 2021
Submission Guidelines
All papers must be original and not simultaneously submitted to another journal or conference. The following paper categories are welcome:
- Paper Format
The submitted paper must be formatted according to the guidelines of Procedia Computer Science, MS Word Template, MS Word Template, Latex, Template Generic, Elsevier.
- Paper Length
Submitted technical papers must be no longer than 6 pages for full papers, 4 pages for short papers, including all figures, tables and references.
- Paper Submission
Authors are requested to submit their papers electronically using the online conference management system in PDF format before the deadline (see Important Dates).
The submission processes will be managed by easychair.org. If you have used this system before, you can use the same username and password. If this is your first time using EasyChair, you will need to register for an account by clicking "I have no EasyChair account" button. Upon completion of registration, you will get a notification email from the system and you are ready for submitting your paper. You can upload and re-upload the paper to the system by the submission due date.
List of Topics
- Big Data Analytics for cybersecurity
- Real-time situational awareness
- Artificial Intelligence Analytics Techniques
- Machine Learning techniques for Cybersecurity and Privacy
- Deep Learning techniques for Cybersecurity and Privacy
- Malware detection and prevention techniques
- Intrusion and cybersecurity threat detection and analysis
- Cyber-physical-social system security and incident management
- Mobile and cloud computing security
- IoT cybersecurity and privacy
- Big data analytics for cybersecurity
- Big data analytics for digital forensics
- Cybersecurity Applications
- Anomaly/threat detection techniques
- Malware detection and Prevention
Committees
General Chairs
-
Yassine Maleh, Sultan Moulay Slimane University, Morocco
-
Youssef Baddi, Chouaib Doukkali University, Morocco
-
Mamoun Alazab, Charles Darwin University, Australia
Program Chairs
-
Mohammed Boulmalf Université Internationale de Rabat, Morocco
-
Mustapha Belaissaoui, ENCG, Univ Hassan 1, Morocco
-
Loai Tawalbeh, Texas A&M University-San Antonio, USA
-
Hossain Shahriar, Kennesaw State University, USA
Program committees
-
Edgar Weippl, SBA Research, Austria
-
Patrick Siarry, Universit de Paris 12, France
-
Aswani Kumar Cherukuri, Vellore Institute of Technology, India
-
Xuping Huang, Meiji University, Japan
-
Sang-Bing Tsai, University of Electronic Science and Technology, China
-
K.P. Chow, University of Hong Kong, Hong Kong
-
Ben Alla Said, University Hassan 1st, Morocco
-
Alberto Cano, Virginia Commonwealth University, USA
-
Tzung-Pei Hong, National University of Kaohsiung, Taiwan
-
Yudi Prayudi, Center for Digital Forensics Studies, Indonesia
-
Farrokh Aminifar, Illinois Institute of Technology, USA
-
Wei Cai, University of California, Irvine, USA
-
Antonio J. Jara, University of Applied Sciences Western Switzerland, Switzerland
-
Rafigul Islam, Charles Sturt University, Australia
-
Kevin Curran, Ulster University, UK
-
Shareeful Islam, University of East London, UK
-
Chang-Tsun Li, University of Warwick, UK
-
Rajgopal Kannan, Louisiana State University, Las Angeles, USA
-
Imed Romdhani, Edinburgh Napier University, UK
-
Lo'ai A. Tawalbeh, Umm Al-Qura University, Saudi Arabia
-
Nilesh Uke, Pimpri Chinchwad College Of Engineering, India
-
Homero Toral Cruz, University of Quintana Roo, México
-
Mohamed Amine Ferrag, Guelma University, Algeria
-
Fanxin Kong, University of Pennsylvania, USA
Publication
All accepted papers will be scheduled for oral presentations and will be included in the conference proceedings published by Elsevier Science in the open-access Procedia Computer Science series on-line. At least one author of each accepted paper is required to register and attend the conference to present the work.
Venue
The symposium will be held in Warsaw, Poland. Warsaw is the capital and largest city of Poland. The metropolis stands on the Vistula River in east-central Poland and its population is officially estimated at 1.770 million residents within a greater metropolitan area of 3.1 million residents, which makes Warsaw the 8th most-populous capital city in the European Union. The city limits cover 516.9 square kilometers (199.6 sq mi), while the metropolitan area covers 6,100.43 square kilometers (2,355.39 sq mi). Warsaw is an alpha global city, a major international tourist destination, and a significant cultural, political and economic hub. Its historical Old Town was designated a UNESCO World Heritage Site.
Contact
All questions about submissions should be emailed to symposium chairs:
- Yassine Maleh, Sultan Moulay Slimane University: yassine.maleh@ieee.org
- Youssef Baddi, Chouaib Doukkali University, Morocco: youssef.baddi@ieee.org
- Mamoun Alazab, Charles Darwin University, Australia: alazab.m@ieee.org