posted by organizer: tdargahi || 9256 views || tracked by 17 users: [display]

CTI 2017 : Cyber Threat Intelligence - Springer Book Chapter

FacebookTwitterLinkedInGoogle

Link: http://www.alid.info/call-for-paper-threat-intelligence/
 
When N/A
Where N/A
Submission Deadline Jun 1, 2017
Notification Due Jul 1, 2017
Final Version Due Oct 1, 2017
Categories    computer science   cyber security   forensics   big data
 

Call For Papers

CALL FOR BOOK CHAPTERS
----------------------------------------
Book Title: Cyber Threat Intelligence

To be published by Springer - Advanced in Information Security series (http://www.springer.com/series/5576)


IMPORTANT DATES:
--------------------------
Submission deadline: 1 June 2017
Authors’ notification: 1 Jul 2017 (or 2-month after submission)
Revisions due: 15 Sep 2017
Camera ready version due: 01 Oct 2017
Tentative publication date: Late 2017


INTRODUCTION:
-----------------------
These days cyber security and forensics specialists are supposed to detect, analyze and defend against many cyber threats in almost real-time conditions. Timely dealing with such a huge number of attacks is not possible without employment of artificial intelligence and machine learning techniques. When a significant amount of data is collected from or generated by different security monitoring solutions; intelligent big-data analytical techniques are necessary to mine, interpret and extract knowledge of those data. The emerging field of cyber threat intelligence is investigating applications of artificial intelligence and machine learning techniques to perceive, reason, learn and act intelligently against advanced cyber attacks.

This book will focus on cutting-edge research from both academia and industry, with a particular emphasis on providing wider knowledge of the field, novelty of approaches, combination of tools and so forth to perceive, reason, learn and act on a wide range of data collected from different cyber security and forensics solutions.


TOPICS OF INTEREST:
------------------------------
This book welcomes two categories of papers: (1) invited articles from qualified experts; and (2) contributed papers from open call with list of addressed topics. Topics of interest include but not limited to:

- Detection and analysis of advanced threat actors tactics, techniques and procedures
- Application of machine learning tools and techniques in cyber threat intelligence
- Theories and models for detection and analysis of advanced persistent threats
- Automated and smart tools for collection, preservation and analysis of digital evidences
- Threat intelligence techniques for constructing, detecting, and reacting to advanced intrusion campaigns
- Applying machines learning tools and techniques for malware analysis and fighting against cyber crimes
- Intelligent forensics tools, techniques and procedures for cloud, mobile and data-centre forensics
- Intelligent analysis of different types of data collected from different layers of network security solutions
- Threat intelligence in cyber security domain utilising big data solutions such as Hadoop
- Intelligent methods to manage, share, and receive logs and data relevant to variety of adversary groups
- Interpretation of cyber threat and forensic data utilising intelligent data analysis techniques
- Infer intelligence of existing cyber security data generated by different monitoring and defense solutions
- Automated and intelligent methods for adversary profiling
- Automated integration of analysed data within incident response and cyber forensics capabilities



EDITORS:
--------------
Prof. Mauro Conti, University of Padua, Italy.
Dr. Ali Dehghantanha, University of Salford, UK.
Dr. Tooska Dargahi, University of Rome Tor Vergata, Italy.



SUBMISSION:
-------------------
All book chapters need to be formatted according to Springer’s Book Manuscript instruction (https://www.springer.com/gp/authors-editors/book-authors-editors/manuscript-preparation/5636)
All book chapters need to be submitted through EasyChair (https://easychair.org/conferences/?conf=cti2017)

Note: Papers are gradually reviewed and accepted from 1st Oct 2016 until submission deadline or when we reach to maximum number of pages agreed with Springer.
Authors are suggested to submit their papers as early as possible and consult with one of the editors prior to the paper submission to validate relevance and suitability of their papers.

The call for book chapter is available at:
http://www.alid.info/call-for-paper-threat-intelligence/
For any enquires regarding your submission or suitability of your paper, please feel free to contact book editors.

Related Resources

Call for Book Chapter 2024   Call for Chapters for Four Books of the Springer Edited Book Series “Decision Sciences and Data Analytics for Operations and Business Excellence”
ACM-Ei/Scopus-CCISS 2024   2024 International Conference on Computing, Information Science and System (CCISS 2024)
IGI Global Book Chapter 2024   Future of Digital Technology and AI in Social Sectors
IEEE COINS 2024   IEEE COINS 2024 - London, UK - July 29-31 - Hybrid (In-Person & Virtual)
InCIT 2024   The 8th International Conference on Information Technology
CTISC 2024   2024 6th International Conference on Advances in Computer Technology, Information Science and Communications (CTISC 2024) -EI Compendex
Call for Abstracts Springer Book 2024   Optimization and Nature-Inspired Computing for Solutions in Contemporary Engineering Challenges
GreeNet Symposium - SGNC 2024   15th Symposium on Green Networking and Computing (SGNC 2024)
Call for Chapters - Wiley-IEEE Press 2025   Internet of Things A to Z: Technologies and Applications - Second Edition
CVIV 2024   2024 6th International Conference on Advances in Computer Vision, Image and Virtualization (CVIV 2024) -EI Compendex