![]() |
| |||||||||||||||
CyberHunt - IEEE Big Data 2025 : 8th Annual Workshop on Cyber Threat Intelligence and Hunting in conjunction with the IEEE Big Data Conference | |||||||||||||||
Link: https://cyberhunt2025.cyberhunt.no/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
SCOPE:
The Workshop on Cyber Threat Intelligence and Hunting (CyberHunt 2025) provides a dedicated forum for researchers, practitioners, and policymakers from academia, industry, and government to present and discuss advances in Cyber Threat Intelligence (CTI) and its applications across the broader cybersecurity landscape, with a particular emphasis on AI-driven approaches. CyberHunt 2025 will be held in conjunction with the IEEE International Conference on Big Data (IEEE Big Data 2025) in Macau, China, December 8–11, 2025. Important Note: This is an in-person only event. To be included in the conference proceedings, at least one author of each accepted paper must attend and present on site. TOPICS: We invite authors to submit original, previously unpublished research on Cyber Threat Intelligence (CTI) and its applications, with particular emphasis on the use of AI and ML to advance the broader cybersecurity landscape. Focus areas include, but are not limited to: -Adversary and defense tradecraft and TTPs -Attribution (identifying, associating, or tracing malicious activity) -Big data and datasets for CTI -Collecting and processing data/information to produce CTI -Generating (revelation) and utilizing IOCs, including detection engineering -Intelligence (knowledge) representation, management, and dissemination (symbolic-AI/ontologies/templating approaches) -Intelligence-driven incident response -Intelligence-driven red teaming -Intelligence-driven threat hunting -Legal implications, accountability, privacy, and ethics for AI and CTI -The use of Large Language Models - and agentic approaches in CTI -Machine-readable-based CTI (including relevant standards) -Open-source tools (associated with the scientific method) for CTI and threat hunting -Political (cyber politics) and geopolitical aspects, and decision-making -Threat-informed security automation -Visualization techniques for CTI Additional special topic of interest this year: -AI-based threat detection in Mobile Networks IMPORTANT DATES: Oct 5, 2025: Due date for full workshop papers submission November 1, 2025: Notification of paper acceptance to authors Nov 17, 2025: Camera-ready of accepted papers Dec 8-11, 2025: Workshop & main conference ORGANIZING COMMITTEE: Workshop Chairs Prof. Vasileios Mavroeidis, University of Oslo (UiO), Norway Program Committee Chairs Dr. Tamas Bisztray, University of Oslo (UiO), Norway PhD Researcher Mateusz Zych, University of Oslo (UiO), Norway Program Committee TBA |
|