| |||||||||||||||
CyberTIM 2018 : International Workshop on Cyber Threat Intelligence Management | |||||||||||||||
Link: https://www.ares-conference.eu/workshops/cybertim-2018/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
CyberTIM 2018: 1st International Workshop on Cyber Threat Intelligence Management
(CyberTIM 2018) to be held in conjunction with the ARES EU Project Symposium, held at ARES 2018 (http://www.ares-conference.eu) August 27 – August 30, 2018, Hamburg, Germany Projects: CyberTIM workshop is jointly organized by three H2020 projects that are funded by the European Commission: PROTECTIVE (https://protective-h2020.eu/) C3ISP (c3isp.eu/ ) SHIELD (https://www.shield-h2020.eu/) Workshop Description: The increased sophistication of cyber-attacks have created a technology arm race between attackers and defenders. However, this arm race is not fought in equal terms. Defenders are falling behind due to lack of manpower coupled with an overwhelming number of sophisticated attacks, e.g. advanced persistent threats, making cyber defense extremely difficult. This is also due to lack of collaboration among the network security solutions, e.g., intrusion detection systems and honeypots, which are in possession of different organizations across the globe. In the recent years, organizations like CERTs, NRENs, as well as industry organizations slowly move towards proactive detection capabilities leveraging Cyber Threat Intelligence (CTI) platforms. These platforms aim at advanced alert aggregation, correlation, and prioritization considering the asset criticality of organizations as well as the quality of shared threat intelligence. The goal of this workshop is to bring the industry practitioners, researchers, engineers, and academic researchers together from the domain of network security, network measurements, cyber incident monitoring, trust & risk management, cyber situational awareness, security analytics, and security visualization. Topics of interest include, but are not limited to: Network Intrusions Cyber threat detection Threat Intelligence sharing Collaborative Intrusion Detection Cyber situational awareness Cyber threat analytics Cyber threat sharing community Trust management in/for Cyber Threat Intelligence Cyber threat visualization Cyber threat monitoring Botnet monitoring Cyber threat correlation techniques Cyber threat prioritization techniques Cyber threat sharing platforms Alert exchange formats Alert exchange protocols Cyber-crime forensics Cyber-crime risk management Important Dates Submission Deadline: May 25, 2018 Author Notification: June 10, 2018 Proceedings Version: June 29, 2018 ARES EU Symposium: August 27, 2018 Conference: August 27 – August 30, 2018 Workshop Chairs Brian Lee Athlone Institute of Technology, Ireland Emmanouil Vasilomanolakis TU Darmstadt, Germany Fabio Martinelli IIT, C.N.R, Italy Georgios Gardikis SPACE Hellas S. A., Greece Sheikh Mahbub Habib TU Darmstadt, Germany Program Committee Hamza Attak, Hewlett Packard Enterprise, United Kingdom Enda Barrett, National University of Ireland, Galway, Ireland David Chadwick, University of Kent, United Kingdom Michal Choras, ITTI Ltd., Poland Francesco Di Cerbo, SAP Research Sophia-Antipolis, France Theo Dimitrakos, European Security Competence Center, Huawei Technologies, Germany Bernat Gaston, Fundació Privada I2CAT, Spain Jassim Happa, University of Oxford, United Kingdom Dimitris Katsianis, Incites Consulting, Luxembourg Antonis Litke, Infili Technologies, Greece Maciej Miłostan, PSNC, Poznań University of Technology, Poland Paolo Mori, IIT-CNR, Italy Jason Nurse, University of Oxford, United Kingdom Dimitris Papadopoulos, Infili Technologies, Greece Marcin Przybyszewski, ITTI Sp. z o.o., Poznań, Poland Olga Segou, Orion Innovations PC, Greece George Xylouris, ORION Innovations PC, Greece Submission Guidelines The submission guidelines valid for the CyberTIM workshop is the same as for the ARES conference. They can be found under the following link: https://www.ares-conference.eu/conference/submission/. Please note that all papers submitted to EasyChair are anonymized (no names or affiliations of authors should be visible in the paper). |
|