The second iteration of this Symposium seeks to allow practitioners and academics to present emerging cybersecurity Big Data research and challenges in domains including data analytics, machine learning, and visualization; as well as to present and discuss potential cybersecurity big data research topics and methodologies of interest to the cybersecurity community.

Analytics topics include, but are not limited to, methodologies, techniques, and impacts of real-time processing for incident detection and/or prevention, data review for incident and anomaly detection, post incident response analytics, and IT audit related analytics. Visualization will look at all aspects of research related to data visualization such as temporal, geographical, threat, actor, event based, and other data types. Automated machine covers all forms that leverage or require big data for support, including defensive measures and potential threat applications.


The Symposium is offered as a part of the HICSS 51th Conference.


Papers will also be fast-tracked for the Security Informatics journal.


Call for Papers flyer for distribution.

 REVIEW PROCESS

SUBMISSION FORMAT

Submission deadline:  October 27, 2017!

 SYMPOSIUM FORMAT

CALL FOR PAPERS

 

HICSS Symposium on Cybersecurity Big Data Analytics

  • Submissions Due: October 27, 2017
  • Acceptance Notification: November 12, 2017
  • HICSS Symposium, January 4, 2018

 SYMPOSIUM OBJECTIVE

Papers should be emailed to AZSecure-HICSS@list.arizona.edu.


All papers will undergo a peer-review process.


Author notifications will be sent via email.

IMPORTANT DATES

The Symposium will include paper presentations and a panel discussion.  At least one author from each paper must be registered and present. Authors of accepted papers will present their work during the Symposium: 15 minutes for short papers and 20 minutes for long papers. 


Poster presenters must register and be present to discuss their posters during the mid-symposium coffee break.


Authors may submit long papers (up to 8 pages) or short papers (up to 4 pages) for presentation. A limited number of Posters (up to 2 page abstract) will be accepted which will be displayed in the back of the room and the poster author must be present to discuss during the mid-symposium coffee break. Submission should follow the IEEE double-column format: for information and instructions, see the IEEE publications page at http://www.ieee.org/conferences_events/conferences/publishing/templates.html for information on formatting (link opens in new window).  Submission format is PDF.


​Papers must meet Security Informatics publication requirements, https://security-informatics.springeropen.com/