ACM KDD Workshop on AI-enabled Cybersecurity Analytics (Virtual) – CFP

http://ai4cyber-kdd.com/
Key Dates (All deadlines are at 11:59PM Pacific Daylight Time)

  *   Workshop paper submissions: May 10, 2021
  *   Workshop paper notification: June 10, 2021
  *   Conference Dates: August 14-18, 2021
  *   Workshop Dates: August 14-18, 2021

Submission Site:

  *   EasyChair website: https://easychair.org/cfp/ai4cyber-kdd



The irreversible dependence on computing technology has paved the way for 
cybersecurity’s rapid emergence as one of modern society’s grand challenges. To 
combat the ever-evolving, highly-dynamic threat landscape numerous academics 
and industry professionals are systematically searching through billions of log 
files, social media platforms (e.g., Dark Web), malware files, and other data 
sources to preemptively identify, mitigate, and remediate emerging threats and 
key threat actors. Artificial Intelligence (AI)-enabled analytics has started 
to play a pivotal role in sifting through large quantities of these 
heterogeneous cybersecurity data to execute fundamental cybersecurity tasks 
such as asset management, vulnerability prioritization, threat forecasting, and 
controls allocations. However, the volume, variety, and veracity of 
cybersecurity data sharply contrasts with conventional data sources. Moreover, 
industry and academic AI-enabled cybersecurity analytics are often siloed. To 
this end, this workshop aims to being to gather academic and practitioners to 
share, disseminate, and communicate completed research papers, work in 
progress, and review articles pertaining to AI-enabled cybersecurity analytics. 
Areas of interest include, but are not limited to:

•              Static and/or dynamic malware analysis and evasion

•              IP reputation services (e.g., blacklisting)

•              Anomaly and outlier detection

•              Phishing detection (e.g., email, website, etc.)

•              Dark Web analytics (e.g., multi-lingual threat detection, key 
threat actor identification)

•              Spam detection

•              Large-scale and smart vulnerability assessment

•              Real-time threat detection and categorization

•              Real-time alert correlation for usable security

•              Weakly supervised and continual learning for intrusion detection

•              Adversarial attacks to automated cyber defense

•              Automated vulnerability remediation

•              Internet of Things (IoT) analysis (e.g., fingerprinting, 
measurements, network telescopes)

•              Misinformation and disinformation

•              Deep packet inspection

•              Automated mapping of threats to cybersecurity risk management 
frameworks

Each manuscript must clearly articulate their data (e.g., key metadata, 
statistical properties, etc.), analytical procedures (e.g., representations, 
algorithm details, etc.), and evaluation set up and results (e.g., performance 
metrics, statistical tests, case studies, etc.). Providing these details will 
help reviewers better assess the novelty, technical quality, and potential 
impact. Making data, code, and processes publicly available to facilitate 
scientific reproducibility is not required. However, it is strongly encouraged, 
as it can help facilitate a culture of data/code sharing in this quickly 
developing discipline.

All submissions must be in PDF format and formatted according to the new 
Standard ACM Conference Proceedings Template. Submissions are limited to a 
4-page initial submission, excluding references or supplementary materials. 
Upon acceptance, the authors are allowed to include an additional page (5-page 
total) for that camera ready version that accounts for reviewer comments. 
Authors should use supplementary material only for minor details that do not 
fit in the 4 pages, but enhance the scientific reproducibility of the work 
(e.g., model parameters). Since all reviews are double-blind, and author names 
and affiliations should NOT be listed. For accepted papers, at least one author 
must attend the workshop to present the work. Based on the reviews received, 
accepted papers will be designated as a contributed talk (four total, 15 
minutes each), or as a poster. All accepted papers will be posted on the 
workshop website and will be indexed in the ACM Digital Library.



Workshop Organizers:

  *   Dr. Sagar Samtani (ssamt...@iu.edu<mailto:ssamt...@iu.edu>): Assistant 
Professor and Grant Thornton Scholar, Operations and Decision Technologies, 
Indiana University
  *   Dr. Jay Yang (jay.y...@rit.edu<mailto:jay.y...@rit.edu>): Professor, 
Computer Engineering, Rochester Institute of Technology
  *   Dr. Hsinchun Chen (hsinchun@ 
arizona.edu<mailto:hsinc...@email.arizona.edu>): Regents’ Professor, Department 
of Management Information Systems, University of Arizona



--------

S. Jay Yang, Ph.D.

Professor, Department of Computer Engineering

Director of Global Outreach, Global Cybersecurity Institute

Rochester Institute of Technology

1 585.475.6434 • rit.edu/cybersecurity • linkedin.com/in/s-jay-yang • 
people.rit.edu/sjyeec


_______________________________________________
uai mailing list
uai@engr.orst.edu
https://it.engineering.oregonstate.edu/mailman/listinfo/uai

Reply via email to