posted by user: husakm || 3868 views || tracked by 6 users: [display]

GRASEC 2023 : The 4th International Workshop on Graph-based Approaches for CyberSecurity

FacebookTwitterLinkedInGoogle

Link: https://www.ares-conference.eu/workshops/grasec-2023/
 
When Aug 29, 2023 - Sep 1, 2023
Where Benevento, Italy
Submission Deadline May 25, 2023
Notification Due Jun 14, 2023
Final Version Due Jun 28, 2023
Categories    cybersecurity   security   graph theory   communications
 

Call For Papers

The complexity of today’s systems and the data they produce has made it more difficult to ensure their security due to the data overload, the need to store and handle massive amounts of data, and efficient analysis. Using graphs and knowledge graphs to analyze and interpret the data is a very intriguing strategy that is gaining more and more attention these days. It is becoming more and more usual to employ graph databases, graph mining and learning algorithms, and tools for processing massive volumes of data using graphs.

Graphs, including complex networks and knowledge graphs, offer the advantage of capturing complex and heterogeneous systems and activities. Moreover, the visualization of graph-based data is straightforward and comprehensible for human analysts, which makes it very powerful in practice. For example, Botnet activity can be observed as a plethora of observables, and there is a need to correlate the particular observations into a big picture, such as using a graph to represent particular events and observations and relations between them. The attack graphs are popular tools for representing cyber attacks, calculating their impact, and even projecting them and predicting the next step of an adversary.

This workshop aims at bringing together people from industry and academia, including researchers, developers, and practitioners from a variety of fields working on graphs and knowledge graphs, network management, and cybersecurity. The workshop will allow attendees to share and discuss their latest findings from both theoretical and practical perspectives, namely in terms of graph-based security data representation, analysis, processing and visualization. The workshop attendees may benefit from sharing experience on graph-based data analysis regardless of the specific application. Moreover, researchers and practitioners will have an opportunity to familiarize themselves with recent advances in graph analysis, mining and learning, and other approaches that could be used in their work. The workshop aims to highlight the latest research and experience in graph-based approaches in cybersecurity. The workshop also seeks papers describing new datasets with real attack scenarios, graph modeling tools evaluated on existing and proposed datasets, and systematization of knowledge (SoK) papers.

Topics of interest include, but are not limited to

Knowledge graphs and ontologies of cyberspaces and digital twins
Attack graphs modeling and application, graph-based threat assessment
Graph-based models for network modeling and cyber situational awareness
Graph-based approaches to network traffic analysis and forensics
Intrusion, anomaly, and botnet activity detection using graph data
Graph-based anomaly detection for network security and management
Graph application in access controls, security policies
Autoencoders and representation learning for graphs and knowledge graphs
Graph embedding techniques for network security and management problems
Graph databases and graph-based tools for security data analysis
Visualization and analysis of dynamic large-scale graphs and graph streams
Novel applications of static/dynamic and large graphs in network security and management


Workshop Chairs

Martin Husak
Masaryk University, Czech Republic
husakm@ics.muni.cz

Mohamed-Lamine Messai
University Lyon 2, France
mohamed-lamine.messai@univ-lyon2.fr

Hamida Seba
University Claude Bernard Lyon 1, France
hamida.seba@univ-lyon1.fr

Related Resources

SI - AI&Cyber - Applied Sciences (MDPI) 2025   Special Issue on Artificial Intelligence and Cybersecurity: Challenges and Opportunities
IEEE-Ei/Scopus-ITCC 2025   2025 5th International Conference on Information Technology and Cloud Computing (ITCC 2025)-EI Compendex
Intelligent Computing-Based Time Series 2025   Intelligent Computing: Special Issue: Intelligent Computing-Based Time Series Analysis for Cybersecurity
CCS 2025   ACM Conference on Computer and Communications Security 2024 (round 2)
GreeNet Symposium - SGNC 2025   16th Symposium on Green Networking and Computing (SGNC 2025)
ESORICS 2025   European Symposium on Research in Computer Security (round 2)
GbR 2025   14th IAPR-TC15 Workshop on Graph-based Representations in Pattern Recognition
IEEE CSR 2025 GAIA-SEC 2025   2025 IEEE CSR Workshop on Generative AI Applications to Security of Cyber-Physical Assets (GAIA-SEC)
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
Ei/Scopus-CCISS 2025   2025 2nd International Conference on Computing, Information Science and System (CCISS 2025)