posted by organizer: sjbae7 || 2707 views || tracked by 13 users: [display]

ETRIJ Cyber Security & AI 2019 : ETRI Journal Special issue on Cyber Security and AI

FacebookTwitterLinkedInGoogle

Link: https://onlinelibrary.wiley.com/page/journal/22337326/homepage/call_for_papers.htm
 
When N/A
Where N/A
Submission Deadline Mar 28, 2019
Notification Due May 27, 2019
Final Version Due Jul 22, 2019
Categories    artificial intelligence   cyber security   security   computer science
 

Call For Papers

ETRI Journal Special issue on Cyber Security and AI

We are facing a big data world, where IoT devices are embedded, connected, and generate a big volume of data. They give a challenge to the security academia and industry: A variety of malware variants and threats are newly emerging at a faster pace, but we cannot deal with them within due golden time with existing approach depending on known attack signature. Recently, the power of computing machines made a big advance particularly in the AI area. Advanced technologies of machine learning, particularly deep learning, are being applied in the security area, and new results and issues have been reported. With AI, we could significantly increase the degrees of accuracy and robustness in detection of attacks and operate detection systems without requiring deep security expert knowledge as before. However, machine learning-based security approaches are likely vulnerable to poisoned datasets which can be caused by a legitimate defender’s misclassification or attackers aiming to evade detection by contaminating the training data set. There also exist obvious gaps between the lab environment and the real world. Therefore, it is critical to check the potentials and limitations of AI-based security technologies in terms of metrics such as security, performance, cost, time, and consider how to incorporate them into the real world by addressing the gaps appropriately. This special issue is focused on state-of-the-art research from both academia and industry in big data security relevant sciences, technologies and applications. Topics of interest include but not limited to:

• Intelligent methods for profiling threat and adversary
• Detection of anomaly in network traffics
• Intelligent methods for analyzing and correlating logs
• Applying machine learning techniques and tools for malware analysis
• Deploying big data solutions in security domain
• Intelligence inference by interoperating data from different solutions
• Analysis of real use cases

Important Dates (tentative)
Paper submission due: March 28, 2019
First decision: May 27, 2019
Revised submission due: July 1, 2019 (Final decision: July 8, 2019)
Final paper due: July 22, 2019
Tentative Publication Date: October 7, 2019

Paper Submission
Papers should be submitted at https://mc.manuscriptcentral.com/etrij, and should adhere to the journal’s Author Guidelines.

Section Editors
Dr. DaeHun Nyang, Inha University, Korea, nyang@inha.ac.kr

Guest Editors
Dr. Seong Oun Hwang (Managing GE), Hongik University, Korea, sohwang@hongik.ac.kr
Dr. Taekyoung Kwon, Yonsei University, Korea, taekyoung@yonsei.ac.kr
Dr. Yau Wei Chuen, Xiamen University, Malaysia, wcyau@xmu.edu.my

The Editorial Office can be contacted at etrij@etri.re.kr.

Related Resources

AAAI 2019   National Conference on Artificial Intelligence
CSITS 2018   International Workshop on Cyber Security for Intelligent Transportation Systems
IJCAI 2019   International Joint Conference on Artificial Intelligence
SECITC 2018   11th International Conference on Security for Information Technology and Communications
ECCWS 2019   18th European Conference on Cyber Warfare and Security
ACIIDS 2018   10th Asian Conference on Intelligent Information and Database Systems
ETRIJ IoMT 2019   ETRI Journal Special issue on Internet of Medical Things for Healthcare Applications
ICDMML 2019   2019 International Conference on Data Mining and Machine Learning
Cyber Security Attacks and Defenses 2018   Workshop of Cyber Security Attacks and Defenses
CyberHunt - 2018   International Workshop on Big Data Analytics for Cyber Threat Hunting