HICSS Symposium on Cybersecurity Big Data Analytics
January 4, 2018
- Submissions Due: October 27, 2017
- Acceptance Notification: November 12, 2017
- HICSS Symposium: January 4, 2018
The second iteration of this Symposium seeks to allow practitioners and academics to present emerging cybersecurity Big Data research and challenges in domains including data analytics, machine learning, and visualization; as well as to present and discuss potential cybersecurity big data research topics and methodologies of interest to the cybersecurity community.
Analytics topics include, but are not limited to, methodologies, techniques, and impacts of real-time processing for incident detection and/or prevention, data review for incident and anomaly detection, post incident response analytics, and IT audit related analytics. Visualization will look at all aspects of research related to data visualization such as temporal, geographical, threat, actor, event based, and other data types. Automated machine covers all forms that leverage or require big data for support, including defensive measures and potential threat applications.
The Symposium will include paper presentations, speakers, and a panel discussion.
SUBMISSION, REVIEW, AND ACCEPTANCE PROCESS
Papers should be emailed to AZSecure-HICSS@list.arizona.edu. Authors of accepted papers will present their work during the Symposium and one author or representative must be present in order to present. Papers will also be fast-tracked for the Security Informatics journal. Due to time constraints, short papers will have 15 minutes to present and long papers 20 minutes. Papers must meet Security Informatics publication requirements, https://security-informatics.springeropen.com/.
Authors may submit long papers (up to 8 pages) or short papers (up to 4 pages) for presentation. A limited number of posters (up to 2 page abstract) will be accepted. Posters will be displayed in the back of the Symposium room and the poster author must be present to discuss their work during the mid-symposium coffee break.
Submission should follow the IEEE double-column format: for information and instructions, see the IEEE publications page at http://www.ieee.org/conferences_events/conferences/publishing/templates..... Submission format for review is PDF.
For more information, see the Symposium website at http://www.azsecure-hicss.org/
Questions can be directed to Mark Patton, at AZSecure-HICSS@list.arizona.edu
The Symposium will be part of HICSS-51 at the Hilton Waikoloa Village Resort on the Big Island.
Dr. Mark Patton and Dr. Hsinchun Chen, MIS Department, University of Arizona.
Flyers of this call for papers are available for download on the website http://www.azsecure-hicss.org/