征稿已开启

查看我的稿件

注册已开启

查看我的门票

已截止
活动简介

Computer and communication systems are subject to repeated security attacks. Given the variety of new vulnerabilities discovered every day, the introduction of new attack schemes, and the ever-expanding use of the Internet, it is not surprising that the field of computer and network security has grown and evolved significantly in recent years. Attacks are so pervasive nowadays that many firms, especially large financial institutions, spend over 10% of their total information and communication technology (ICT) budget directly on computer and network security. Changes in the type of attacks, such as the use of Advanced Persistent Threat (APT) and the identification of new vulnerabilities have resulted in a highly dynamic threat landscape that is unamenable to traditional security approaches.

Data mining techniques that explore data in order to discover hidden patterns and develop predictive models, have proven to be effective in tackling the aforementioned information security challenges. In recent years classification, associations rules, and clustering mechanisms, have all been used to discover and generalize attack patterns in order to develop powerful solutions for coping with the latest threats such as: APTs, Ransomware, data leakage, and malicious code (Trojan, Worms and computer viruses).

征稿信息

重要日期

2016-08-12
初稿截稿日期
2016-09-20
终稿截稿日期

征稿范围

Focusing on the theoretical and practical aspects of data mining for enhancing information security, this workshop provides an opportunity to present and discuss the latest theoretical advances and real-world applications in this research field. Manuscripts are solicited to address a wide range of topics in this area, including but not limited to:

  • Data mining for intrusion detection and prevention

  • Data mining for fraud detection and prevention

  • Monitoring Network Security

  • One-class based anomaly detection 

  • Data Stream Mining for Security

  • Deep Learning for cyber security

  • Big Data architectures for network security

  • Identify theft detection and prevention

  • Evaluating data mining approaches to security

  • Adversarial Machine Learning

  • Detecting data and information leakage using data mining techniques

  • Detecting malicious code using data mining techniques

留言
验证码 看不清楚,更换一张
全部留言
重要日期
  • 12月12日

    2016

    会议日期

  • 08月12日 2016

    初稿截稿日期

  • 09月20日 2016

    终稿截稿日期

  • 12月12日 2016

    注册截止日期

移动端
在手机上打开
小程序
打开微信小程序
客服
扫码或点此咨询