posted by organizer: ssamtani || 5534 views || tracked by 2 users: [display]

AI4Cyber 2021 : ACM KDD Workshop on Artificial Intelligence-enabled Cybersecurity Analytics

FacebookTwitterLinkedInGoogle

Link: http://ai4cyber-kdd.com/
 
When Aug 14, 2021 - Aug 18, 2021
Where Virtual
Submission Deadline May 10, 2021
Notification Due Jun 10, 2021
Categories    cybersecurity   AI   analytics
 

Call For Papers

ACM KDD Workshop on AI-enabled Cybersecurity Analytics (Virtual) Call for Papers:

The irreversible dependence on computing technology has paved the way for cybersecurity’s rapid emergence as one of modern society’s grand challenges. To combat the ever-evolving, highly-dynamic threat landscape numerous academics and industry professionals are systematically searching through billions of log files, social media platforms (e.g., Dark Web), malware files, and other data sources to preemptively identify, mitigate, and remediate emerging threats and key threat actors. Artificial Intelligence (AI)-enabled analytics has started to play a pivotal role in sifting through large quantities of these heterogeneous cybersecurity data to execute fundamental cybersecurity tasks such as asset management, vulnerability prioritization, threat forecasting, and controls allocations. However, the volume, variety, veracity, and variety of cybersecurity data sharply contrasts with conventional data sources. Moreover, industry and academic AI-enabled cybersecurity analytics are often siloed. To this end, this workshop aims to being to gather academic and practitioners to share, disseminate, and communicate completed research papers, work in progress, and review articles pertaining to AI-enabled cybersecurity analytics. Areas of interest include, but are not limited to:

• Static and/or dynamic malware analysis and evasion
• IP reputation services (e.g., blacklisting)
• Anomaly and outlier detection
• Phishing detection (e.g., email, website, etc.)
• Dark Web analytics (e.g., multi-lingual threat detection, key threat actor identification)
• Spam detection
• Large-scale and smart vulnerability assessment
• Real-time threat detection and categorization
• Real-time alert correlation for usable security
• Weakly supervised and continual learning for intrusion detection
• Adversarial attacks to automated cyber defense
• Automated vulnerability remediation
• Internet of Things (IoT) analysis (e.g., fingerprinting, measurements, network telescopes)
• Misinformation and disinformation
• Deep packet inspection
• Automated mapping of threats to cybersecurity risk management frameworks

Each manuscript must clearly articulate their data (e.g., key metadata, statistical properties, etc.), analytical procedures (e.g., representations, algorithm details, etc.), and evaluation set up and results (e.g., performance metrics, statistical tests, case studies, etc.). Providing these details will help reviewers better assess the novelty, technical quality, and potential impact. Making data, code, and processes publicly available to facilitate scientific reproducibility is not required. However, it is strongly encouraged, as it can help facilitate a culture of data/code sharing in this quickly developing discipline.

All submissions must be in PDF format and formatted according to the new Standard ACM Conference Proceedings Template. Submissions are limited to a 4-page initial submission, excluding references or supplementary materials. Upon acceptance, the authors are allowed to include an additional page (5-page total) for that camera ready version that accounts for reviewer comments. Authors should use supplementary material only for minor details that do not fit in the 4 pages, but enhance the scientific reproducibility of the work (e.g., model parameters). Since all reviews are double-blind, and author names and affiliations should NOT be listed. For accepted papers, at least one author must attend the workshop to present the work. Based on the reviews received, accepted papers will be designated as a contributed talk (four total, 15 minutes each), or as a poster. All accepted papers will be posted on the workshop website and will be indexed in the ACM Digital Library.

Submission Deadlines (All deadlines are at 11:59PM Pacific Daylight Time):
• Workshop paper submissions (firm deadline): May 10, 2021
• Workshop paper notification: June 10, 2021
• Conference Dates (virtual): August 14-18, 2021
• Workshop Dates (virtual): August 14-18, 2021

Submission Site:
• EasyChair website: https://easychair.org/cfp/ai4cyber-kdd

Submission Site:
• Workshop website: http://ai4cyber-kdd.com/

Workshop Organizers:
• Dr. Sagar Samtani (ssamtani@iu.edu): Assistant Professor and Grant Thornton Scholar, Operations and Decision Technologies, Indiana University
• Dr. Jay Yang (jay.yang@rit.edu): Professor, Computer Engineering, Rochester Institute of Technology
• Dr. Hsinchun Chen (hsinchun@ arizona.edu): Regents’ Professor, Department of Management Information Systems, University of Arizona

Related Resources

CFMAI 2022   2022 4th International Conference on Frontiers of Mathematics and Artificial Intelligence (CFMAI 2022)
AIAAT 2022   2022 6th International Conference on Artificial Intelligence Applications and Technologies (AIAAT 2022)
KDD 2022   28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining
IEEE Edge_AI Conn_Health 2022   The IEEE GLOBECOM 2022 Workshop on the Edge-AI and IoT for Connected Health
AI4Cyber/MLHat 2022   AI4Cyber/MLHat: AI-enabled Cybersecurity Analytics and Deployable Defense
ABDAI-Sanya 2022   2022 4th International Conference on Applications of Big Data and Artificial Intelligence(ABDAI 2022)
IMIP 2023   ACM--2023 5th International Conference on Intelligent Medicine and Image Processing (IMIP 2023)
NLPA 2022   3rd International Conference on Natural Language Processing and Applications
ISCAI 2022   2022 4th International Symposium on Computing and Artificial Intelligence (ISCAI 2022)
WSCIS 2022   2022 3rd International Workshop on Smart City and Intelligent Systems (WSCIS 2022)