posted by organizer: mvasiloma2 || 3155 views || tracked by 3 users: [display]

CyberTIM 2019 : International Workshop on Cyber Threat Intelligence Management

FacebookTwitterLinkedInGoogle

Link: https://www.ares-conference.eu/workshops/cybertim-2019/
 
When Aug 26, 2019 - Aug 29, 2019
Where Canterbury, UK
Submission Deadline May 10, 2019
Notification Due Jun 10, 2019
Final Version Due Jun 23, 2019
Categories    cyber security   threat intelligence   intrusion detection   network security
 

Call For Papers

The increased sophistication of cyber-attacks has created a technology arm race between attackers and defenders. However, this arm race is not fought in equal terms. Defenders are falling behind due to lack of manpower coupled with an overwhelming number of sophisticated attacks, e.g. advanced persistent threats, making cyber defense extremely difficult. This is also due to lack of collaboration among the network security solutions, e.g., intrusion detection systems and honeypots, which are in possession of different organizations across the globe.

In the recent years, organizations like CERTs, NRENs, as well as industry organizations are moving towards proactive detection capabilities leveraging Cyber Threat Intelligence (CTI) platforms. These platforms aim at advanced alert aggregation, correlation, and prioritization considering the asset criticality of organizations as well as the quality of shared threat intelligence. The goal of CyberTIM is to bring the industry practitioners, researchers, engineers, and academic researchers together from the domain of network security, network measurements, cyber incident monitoring, trust & risk management, cyber situational awareness, security analytics, and security visualization.

TOPICS OF INTEREST INCLUDE, BUT ARE NOT LIMITED TO

Network Intrusions
Cyber threat detection
Cyber threat prediction
End-to-End threat intelligence
Threat Intelligence sharing
Collaborative Intrusion Detection
Blockchain-based TI sharing
Cyber situational awareness
Cyber threat analytics
Cyber threat sharing community
Trust management in/for Cyber Threat Intelligence
Cyber threat visualization
Cyber threat monitoring
Botnet monitoring
Cyber threat correlation techniques
Cyber threat prioritization techniques
Cyber threat sharing platforms
Alert exchange formats
Alert exchange protocols
Cyber-crime forensics
Cyber-crime risk management
Incident response
Automotive threat intelligence (backend and on-board)

Related Resources

EBIMCS 2019   【ACM ICPS EI SCOPUS】2019 2nd International Conference on E-Business, Information Management and Computer Science
SPT-SN-IoT 2019   Special Issue Security, Privacy, and Trustworthiness of Sensor Networks and Internet of Things
ACITY 2019   9th International Conference on Advances in Computing and Information Technology
BFNDMA 2019   Big Food and Nutrition Data Management and Analysis
CSITS 2018   International Workshop on Cyber Security for Intelligent Transportation Systems
iCMLDE 2019   International Conference on Machine Learning and Data Engineering
ICCMB--Ei and Scopus 2020   2020 3rd International Conference on Computers in Management and Business (ICCMB 2020)--Ei Compendex, Scopus
ECAI 2020   24th European Conference on Artificial Intelligence
ICAIML 2019   【Atlantis CPCI Web of Science】2019 1st International Conference on Artificial Intelligence and Machine Learning
JARES 2019   International Journal of Advance Robotics & Expert Systems