AOH :: IS1997.HTM

CSI-KDD 2009: ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics




CSI-KDD 2009: ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics
CSI-KDD 2009: ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics



  This message is in MIME format.  The first part should be readable text,
  while the remaining parts are likely unreadable without MIME-aware tools.

--1457021584-979376907-1240240268=:5361
Content-Type: TEXT/PLAIN; CHARSET=UTF-8
Content-Transfer-Encoding: QUOTED-PRINTABLE
Content-ID:  

Forwarded from: "Gerhard Paa=C3=9F" 

[We apologize in advance for repeated reception of this message]
[Please feel free to forward it to anyone who can be interested]


               *** CALL FOR PAPERS ***

                     CSI-KDD 2009
                                  
                ACM SIGKDD Workshop on
      CyberSecurity and Intelligence Informatics

              Paris, France, June 28, 2009
              Held in conjunction with KDD

URL: http://www.csi-kdd.org/ 

Computer supported communication and infrastructure are integral parts 
of modern economy. Their security is of incredible importance to a wide 
variety of practical domains ranging from Internet service providers to 
the banking industry and e-commerce, from corporate networks to the 
intelligence community.

Of interest to this workshop are novel knowledge discovery methods 
addressing these issues as well as innovative applications demonstrating 
the effectiveness of data mining in solving real-world security 
problems. The challenge for novel methods originates from the emergence 
of new types of contents and protocols, and only an integrated view on 
all modes promises optimal results. Innovative applications are 
essential as IT-communication as well as computer-supported technical 
and social infrastructure have an extremely complex structure and 
require a comprehensive approach to prevent criminal activities.

Topics of Interest
Novel Knowledge Discovery Methods for the Security Domain:

    * Knowledge discovery integrating heterogeneous data sources, such 
      as text, web-sites, program code, video, audio, biometrics, and 
      speech.

    * Knowledge discovery for the joint detection, monitoring or 
      understanding of intrusion, deception, fraud and criminal 
      activity.

    * Advanced data mining approaches for spam and phishing detection, 
      and filtering of web pages to discover illegal content.

    * Active, adaptive or anticipatory knowledge discovery approaches to 
      keep filters up to date.

    * Data and graph mining of network structures and communication 
      patterns.

    * Adversarial knowledge discovery, e.g. for randomized/perturbed 
      attacks.

    * Knowledge discovery for the attack attribution problem, e.g. by 
      the analysis of traffic, log and protocol under the umbrella of 
      e-forensics techniques.

    * Quantification of threats imposed by data mining techniques to 
      privacy/security and possible remedies like privacy preserving 
      multi-party data mining.

    * Knowledge discovery techniques applied to malware analysis or to 
      any contextual information related to the malware problem.

Innovative Techniques and Applications in Intelligence Informatics:

    * Terrorism Informatics: terrorism knowledge portals and database, 
      forecasting and countering terrorism, terrorism root cause 
      analysis and social network analysis.

    * Infrastructure protection: public health and bioterrorism 
      information infrastructure, transportation and communication 
      infrastructure, border safety, intrusion detection.

    * Emergency response: disaster prevention, detection and management, 
      communication and decision support for search and rescue.

    * Criminal data mining and network analysis, intelligence-related 
      knowledge discovery.

    * Deception and intent detection, authorship analysis and 
      identification.

    * Cyber-crime detection and analysis, web-based intelligence 
      monitoring and analysis.

    * Criminal/intelligence information sharing, visualization, policy 
      and governance.

    * Enterprise risk management and information system security: fraud 
      detection, accounting and IT auditing, corporate sentiment 
      surveillance, market influence analytics and media intelligence.

The workshop will bring together researchers working on advanced data 
mining approaches for CyberSecurity as well as large-scale security 
applications. In addition we anticipate practitioners from large 
enterprises, internet service providers, law enforcement and 
intelligence experts, and government agencies who want to be informed 
about the state of the art in CyberSecurity and Intelligence 
Informatics. Finally the workshop may be of interest to general data 
mining researchers, who want to apply their techniques to this domain.

-- 

Dr. Gerhard Paass
Fraunhofer Institute for Intelligent Analysis and Information Systems (IAIS)
Schloss Birlinghoven
53754 Sankt Augustin
Department Knowledge Discovery,
www.iais.fraunhofer.de 
email: gerhard.paass (at) iais.fraunhofer.de
phone  (+49)2241-14-2698    fax    (+49)2241-14-2072


--1457021584-979376907-1240240268=:5361
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________      
Best Selling Security Books and More!
http://www.shopinfosecnews.org/ 

--1457021584-979376907-1240240268=:5361--

Site design & layout copyright © 1986-2014 CodeGods