• Home
  • About Us
    Organizers Program Committee Previous ICMLAs Organize ICMLA'24
  • Key Dates
  • Contributes
    Call for Papers Call for Special Sessions and Tutorials Call for ICMLA Challenges How to Submit
  • Programs
    Keynotes Schedule Special Sessions Challenges
  • Participants
    Accepted Papers Registration Posters Awards
  • Locations
    Accommodation Conference Location Places of Interest
  • Sponsors

Sidebar[Skip]



Welcome to the ICMLA'23 Official Web Site


Virtual Special Session 13:
Cyber Security and Big Data


Big data represent a new challenge to cyber security. For instance, self-driving cars are predicted to produce 4000 GB of data per hour of driving. Furthermore, the Internet of Things is expected to generate 400 zettabytes (ZB) of data a year. In this emerging context, big data analytics represent a emerging analytical technology with the potential to offer the capability to collect, store, process, and visualize these vast amounts of data.

Big Data Analytics in cyber security examines security challenges surrounding big data and provides actionable insights that can be considered in order to improve the current practices related to the plethora of aspect cyber security related, for instance from the network operators, administrators and end users point of view.

The application of big data analytics in cyber security is critical. By exploiting data from infrastructure, computers, cyber physical systems, big data analysts are able to discover useful information from data in order to securize system also from both administrators and end users. Decision makers can make more informative and conscious decisions through this kind of emerging analysis, including what actions need to be performed, and improvement recommendations to policies, guidelines, procedures, tools, and other aspects of the security processes.

Scope and Topics:

Submissions are expected from, but not limited to the following topics:

  • Analysis, Design and Assessment of secure systems
  • Security and privacy in Internet of Things (IoT)
  • Securing private data on mobile devices
  • Security in Cyber Physical Systems
  • Security in Smart Grid
  • Security in Cloud Computing environments
  • Security in Social Networks
  • Intrusion Detection
  • Cyber Insurance
  • Malware analysis
  • Forensics
  • Network security and Verification and Validation of Critical Infrastructures
  • Design and validation of malware detection approaches and systems
  • Security issues in Complex System and Environment
  • Methodologies to the development and the analysis of secure systems

Chair: Francesco Mercaldo, University of Molise, Campobasso, Italy and IIT-CNR, Pisa, Italy

Bio: Francesco Mercaldo received his master degree in computer engineering from the University of Sannio (Benevento, Italy), with a thesis in software testing. He obtained his Ph.D. in 2015 with a dissertation on malware analysis using machine learning techniques. The research areas of Francesco are software testing, verification, and validation, with the emphasis on the application of empirical methods. Currently, he is working as Researcher at the University of Molise, Campobasso, Italy. He is also a Research Associate at the Institute for Informatics and Telematics, National Council Research of Italy (CNR) in Pisa (Italy).

Technical Committee (tentative)

  • Fabio Di Troia, San Jose State University, United States
  • Alberto Ferrante, Università della Svizzera Italiana, Switzerland
  • Vincenzo Gulisano, Chalmers University of Technology, Sweden
  • Giacomo Iadarola, IIT-CNR, Italy
  • Longquan Jiang, Macrowing, China
  • Andrea De Lorenzo, University of Trieste, Italy
  • Ilaria Matteucci, Istituto di Informatica e Telematica, CNR, Italy
  • Eric Medvet, University of Trieste, Italy
  • Xuan Sun, Sanda University, Shanghai, China
  • P. Vinod, Cochin university of science and technology, India

Paper Submission Instructions

All papers will be double-blind reviewed and must present original work.

  • CMT Submission Site
  • Select the track: Virtual Special Session 13: Cyber Security and Big Data

Papers submitted for reviewing should conform to IEEE specifications. Manuscript templates can be downloaded from:

  • IEEE website

Keydates

  • Submission due date: September 5, 2023
  • Notification of Acceptance: September 25, 2023
  • Camera Ready Papers: October 5, 2023
  • Pre-registration: October 15, 2023
  • Conference: December 15-17, 2023

Registration

In order for your paper to be presented in the virtual session and published in the proceedings you must register to the conference.

Paper Presentation Instructions

The papers submitted to this track will be presented in the virtual part of the conference. There is no in-person presentation for this session.

If you decide to participate in-person to the conference you must have an adequate internet connection for your presentation and to participate in this special session.





ICMLA'23