posted by user: Clive || 3707 views || tracked by 10 users: [display]

CyberPatterns 2014 : CyberPatterns 2014: The 3rd International Workshop on Cyberpatterns: From Big Data to Reusable Knowledge

FacebookTwitterLinkedInGoogle

Link: http://tech.brookes.ac.uk/CyberPatterns2014
 
When Apr 7, 2014 - Apr 11, 2014
Where Oxford United Kingdom
Submission Deadline Jan 3, 2014
Notification Due Jan 17, 2014
Final Version Due Feb 7, 2014
Categories    design patterns   cyber security   big data   digital forensics
 

Call For Papers

CyberPatterns 2014
The 3rd International Workshop on Cyberpatterns: From Big Data to Reusable Knowledge
(http://tech.brookes.ac.uk/CyberPatterns2014/)
at The 8th IEEE International Symposium on Service-Oriented System Engineering (SOSE 2014)(http://sose2014.com)
Oxford, UK. April 7 – 11, 2014

IMPORTANT DATES
• Paper submissions:
Jan. 3, 2014
• Notification:
Jan. 17, 2014
• Camera-ready copies:
Feb. 7, 2014

Email: Clive Blackwell cblackwell@brookes.ac.uk

WORKSHOP WEBSITE
http://tech.brookes.ac.uk/CyberPatterns2014/
SUBMISSION WEBSITE
https://www.easychair.org/conferences/?conf=cyberpatterns2014
PROGRAM COMMITTEE
Please see workshop website.
SPONSORS:
• IEEE Computer Society
• BCS Information Security Specialist Group
• BCS Formal Aspects of Computing Science Specialist Group
• BCS Cybercrime Forensics Specialist Group

THEME AND GOAL
A pattern represents a discernible regularity in the
world or in manmade designs. In the prescriptive
view, a pattern is a template from which instances can
be created; while in the descriptive view, the elements
of a pattern that repeat in a predictable manner can be
observed and recognised. Similar to theories in
sciences, patterns explain and predict regularities in a
subject domain. In a complicated subject domain like
cyberspace, there are usually a large number of
patterns that each describes and predicts a subset of
recurring phenomena, yet these patterns can interact
and interfere with each other and be coordinated and
composed together. The pattern-oriented research
method studies a subject domain by identifying the
patterns, classifying and categorising them, organising
them into pattern languages, scoping their boundaries,
investigating the interactions between them, devising
mechanisms and operations for detecting and
predicting their occurrences, and facilitating their
instantiation or simulation.

The workshop is the successor to the two
Cyberpatterns workshops run in Abingdon, Oxford in
2012 and 2013. Cyberpatterns 2014 workshop will
continue with an expanded scope beyond the previous
focus on security. The theme of the workshop is
cyberpatterns, i.e. patterns in cyberspace. Typical
examples of such cyberpatterns include user
behaviour patterns, server workload patterns, network
traffic patterns, social network patterns (such as Small
World and Power Law of scale-free networks),
recommendation and system usage patterns, Web
usability patterns, attack patterns, security patterns,
patterns of vulnerabilities, etc.

With the availability of large volumes of data that
are observed and recorded in cyberspace, and the rapid
development of big data processing techniques and
facilities, a key scientific and engineering research
question is how to discover patterns from big data.
The goal of the workshop is to provide an
international forum for researchers and practitioners to
exchange research results, identify practical and
research problems, and envision research directions
that address this problem.

TOPICS
The topics cover all aspects of cyberpatterns,
including, but not limited to, the following:
1) Scientific foundation of pattern-oriented research
methods for systematic analysis of big data in order to
discover the reusable knowledge.
2) Engineering practice in the development of
platforms, algorithms and tools for analysis of big data
for pattern discovery and applications.
3) Construction of infrastructure for a sharable
knowledge-base of cyberpatterns, e.g. in aiding system
design for practitioners and teaching students, with
possible tool support to guide usage by developers.
4) Experiments and case studies in developing and
using cyberpatterns, as well as experience reports.
5) Identification of research problems and
understanding issues that hamper wider adoption of
cyberpatterns and suggesting remediation measures.
6) Future vision of the use of cyberpatterns in novel
cyber domains, such as the cloud or cyberphysical
systems, and innovative uses of design patterns such
as in pattern recognition.

Some indicative topics include, but are not
restricted to:
• Security, attack, advanced cyber threat and forensic
patterns
• Design patterns, dependable and trustworthy patterns
• Enterprise and architectural patterns
• User behavior, system usage, network traffic
patterns
• Patterns in social network, cyberphysical and cloud
systems
• Big data, data mining, machine learning, statistical
data analysis
• Pattern visualization, simulation, anomaly detection

SUBMISSION
The submissions must in IEEE Conference
Proceedings Format. The page limit is 6 pages for full
papers and 2 pages for position papers.
Submissions must be in PDF format and uploaded
to the submission website at the following URL:
https://www.easychair.org/conferences/?conf=cyberpatterns2014

Each submission will be reviewed independently
by three PC members and selected according to its
technical quality, relevance, originality, significance
and clarity.

PUBLICATION OF THE PROCEEDINGS
The proceedings of the workshop will be
published as a part of SOSE 2014 conference
proceedings and included in the IEEE Digital Library.
Each accepted paper must have an author registered
for the conference and present the paper at the
workshop for it to be included in the proceedings.

WORKSHOP ORGANIZERS
Clive Blackwell,
Dept of Computing and
Communication Technologies,
Oxford Brookes University,
Oxford OX33 1HX, UK.
Tel: +44 1784 255871.
Email:
cblackwell@brookes.ac.uk

Dr. Daniel Rodriguez,
Dept of Computer Science,
University of Alcalá,
Ctra. Barcelona Km 33.6,
28871 - Alcalá de Henares,
Madrid, Spain.
Tel: +34 91 885 6933.
Email:
daniel.rodriguezg@uah.es

Prof. Hong Zhu,
Dept of Computing and
Communication Technologies,
Oxford Brookes University,
Oxford OX33 1HX, UK.
Tel: +44 1865 484580.
Email: hzhu@brookes.ac.uk

Related Resources

ICoSR 2025   2025 4th International Conference on Service Robotics
IEEE-Ei/Scopus-ITCC 2025   2025 5th International Conference on Information Technology and Cloud Computing (ITCC 2025)-EI Compendex
IEEE-Ei/Scopus-CNIOT 2025   2025 IEEE 6th International Conference on Computing, Networks and Internet of Things (CNIOT 2025) -EI Compendex
PAKDD 2025   29th Pacific-Asia Conference on Knowledge Discovery and Data Mining
CETA--EI 2025   2025 4th International Conference on Computer Engineering, Technologies and Applications (CETA 2025)
BDPC 2025   IEEE--2025 3rd International Conference on Big Data and Privacy Computing (BDPC 2025)
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
IEEE BDPC 2025   IEEE--2025 3rd International Conference on Big Data and Privacy Computing (BDPC 2025)
MLSC 2025   6th International Conference on Machine Learning and Soft Computing
IEEE-Ei/Scopus-CWCBD 2025   2025 6th International Conference on Wireless Communications and Big Data (CWCBD 2025) -EI Compendex