posted by user: hshahria || 5468 views || tracked by 6 users: [display]

LACI 2016 : 1st IEEE International Workshop on Log Analytics For Cyber Intelligence

FacebookTwitterLinkedInGoogle

Link: http://www.computer.org/web/compsac2016/laci
 
When Jun 10, 2016 - Jun 14, 2016
Where Atlanta, USA
Submission Deadline Mar 7, 2016
Notification Due Mar 28, 2016
Final Version Due Apr 7, 2016
Categories    computer science   security   log analysis
 

Call For Papers

-------------------------------------------------------------------------
LACI 2016: The 1st IEEE International Workshop on Log Analytics For Cyber Intelligence
(http://www.computer.org/web/compsac2016/laci)

Held in conjunction with COMPSAC, the IEEE Signature Conference on Computers, Software, & Applications.
COMPSAC 2016 will be held in Atlanta, Georgia, USA - June 10-14, 2016
....................................................................................

Goal of the workshop
--------------------
This workshop will bring researchers from academia and industry to discuss platforms, tools, and techniques to store, process and analyze large amount of log data with the intent to gather meaningful information for practical purposes such as monitoring of data security breaches, conducting of forensic investigation, auditing of policies for compliance, and debugging and testing of applications. This workshop will focus on challenges, experiences and lessons learned on various aspects of log data analysis-based intelligence gathering for various embedded, decentralized, and distributed systems, including but not limited to web, mobile, cloud, and Internet of Things (IoT).

Scope of the Workshop
---------------------
Topics of interest include, but are not limited to, the following:

- Platforms, tools, language supports for storing, processing, and querying log data to gather intelligence
- Log analytics and intelligence gathering for various types of applications (web, mobile, cloud, IoT) and environments (wired network, wireless network)
- Information visualization support for log analytics
- Requirement and design of software and applications to store adequate log data to support analytics and gathering of intelligence
- Analysis and gathering of intelligence from log data under anonymized, obfuscated, and encrypted state
- Analysis and gathering of intelligence from log data obtained from firewall, intrusion detection systems, operating systems, embedded systems, hand held devices, and cyber physical systems
- Threat intelligence from large volumes of cyber threat log data like STIX and CybOX feeds
- Analyzing multiple and dissimilar log data sources to gather intelligence
- Disaster recovery through offline log analytics and intelligence gathering
- Integration of log analytics-based intelligence gathering research into classroom teaching and hands on labs
- Application of log data analysis to provide intelligence support for forensics and criminal investigation
- Impact or need for laws and policies to support intelligence gathering through log analytics
- Experience and lessons learned from log data analytics-based intelligence gathering
- Standardization of new log data format for intelligence gathering

Paper Submission
----------------
The length of a camera ready paper will be limited to 6 pages (IEEE Proceedings style) with up to 2 additional pages (with charges for each additional page) printed on 10 point fonts. Authors must follow IEEE CS Press Proceedings Author Guidelines to prepare papers. All submitted papers will be reviewed by at least three reviewers and accepted papers will be published in the electronic conference proceedings by the IEEE Computer Society, indexed through INSPEC and EI Index (Elsevier's Eng. Inf. Index), and automatically included in the IEEE Digital Library. At least one of the authors of each accepted paper is required to pay full registration fee and present the paper at the workshop in person.

Submission link: http://laci.compsac.info/

Workshops Program Deadlines
---------------------------
• March 6, 2016: Deadline for paper submission
• March 28, 2016: Decision notification (electronic)
• April 7, 2016: Camera-ready due

Organizer
----------
Hossain Shahriar
Dept. of Information Technology
Kennesaw State University, USA
Email: hshahria@kennesaw.edu

Mohammad A. Rahman
Dept. of Computer Science
Tennessee Tech University, USA
Email: marahman@tntech.edu

Program Committee
------------------
Carol Fung, Virginia Commonwealth University, USA
Christopher Oehmen, Pacific Northwest National Laboratory, USA
Haroon Malik, Marshall University, USA
Jingyu Zhou, Shanghai Jiao Tong University, China
Mohammad Rahman, Tennessee Tech University, USA
Xinli Wang, Michigan Technological University, USA
Salimur Chowdhury, Algoma University, Canada
Nataranjan Meghanathan, Jackson State University, USA
Md Zakirul Alam Bhuiyan, Temple University, USA
Hanna Hacimi, Ibn Tofael University, Morocco

------------------------------------------
For questions or inquiries, please contact

Hossain Shahriar
Department of Information Technology
Kennesaw State University
1100 South Marietta Parkway
Marietta, GA, 30060
Email: hshahria@kennesaw.edu

Related Resources

IEEE-ICECCS 2026   2025 IEEE International Conference on Electronics, Communications and Computer Science (ICECCS 2026)
Ei/Scopus-ITCC 2026   2026 6th International Conference on Information Technology and Cloud Computing (ITCC 2026)
Cyber-AI 2026   The 2nd IEEE 2026 International Conference on Cybersecurity and AI-Based Systems (Scopus)
Ei/Scopus-CEICE 2026   2026 3rd International Conference on Electrical, Information and Communication Engineering (CEICE 2026)
Ei/Scopus-CMLDS 2026   2026 3rd International Conference on Computing, Machine Learning and Data Science (CMLDS 2026)
IEEE AIxVR 2026   8th International Conference on Artificial Intelligence & extended and Virtual Reality
CNCIT 2026   2026 5th International Conference on Networks, Communications and Information Technology
Cyber Science 2026   International Conference on Cybersecurity, Situational Awareness and Social Media
CYBER 2026   The Eleventh International Conference on Cyber-Technologies and Cyber-Systems
CRBL 2026   6th International Conference on Cryptography and Blockchain