The 2nd International Workshop on Big Data analytics, Security and Privacy

BiDAS 2018


  • URL: http://netys.net/bidas2018
  • Event Date: 2018-05-08 ~ 2018-05-08
  • Abstract Submission Date: 2018-01-07
  • Submission Date: 2018-01-14

Computer Security & Cryptography Security & Trust & Testing



* Scope and Objectives *
Big Data systems are complex and heterogeneous, and their security must be fundamentally approached. Moreover, Big Data Systems lead to the integration of different technologies that introduce new security issues that must be properly addressed. In addition, the ongoing digitalization of the business world is putting companies and users at risk of cyberattacks more than ever before. Big data analysis has the potential to offer protection against these attacks. Therefore, the goal of the workshop is two-fold: First, it addresses security issues of big data systems while considering: the infrastructure security, the data privacy, the data management, and the integrity and reactive security. Second, the workshop will address the innovative techniques, metrics, and behavior analysis that can exploit big data analytics capabilities to address the cybersecurity challenges facing cyberspace resources and services.
Topics of interest of the workshop include, but are not limited to:
* Big Data Security
-- Infrastructure Security
- - - Security for Hadoop clusters
- - - Security for Big Data ecosystems
- - - Architecture security
- - - Availability
- - - Authentication
- - - Communication security
-- Data Privacy
- - - Cryptography
- - - Access control
- - - Confidentiality
- - -Privacy-preserving requests
- - - Privacy in social networks
- - - Anonymization
- - - Differential privacy
-- Data Management
- - - Security in collecting and storing data
- - - Sharing algorithms
- - - Policies, Laws, or Government
-- Integrity and Reactive Security
- - - Integrity
- - - Attack detection
- - - Recovery from a disaster
* Big Data Analytics for Cybersecurity
-- Cyber intelligence and attack detection
-- Cyber intelligence and cyber situational awareness
-- Platforms for cybersecurity and defense
-- Big Data cybersecurity computational models
-- Cyber threats in social networks
-- Parallel/distributed Algorithms and techniques
-- Data Streaming and Real time analysis
-- Data acquisition for web mining/opinion mining/sentiment analysis
-- Machine learning for cyber threat and security
-- Log management
-- New-generation intrusion detection/prevention systems
-- Real-time monitoring of computer and network systems
-- Visualization for cyber intelligence and security/defense
-- Visualization for web mining/opinion mining/sentiment analysis
-- Vulnerability analysis and modeling
* Submission Instructions *
BiDAS 2018 seeks submissions from diverse communities, including academic and corporate researchers, open-source projects, standardization institutes, and application domain professionals and experts. Regular papers should be at most 10 pages in the Springer’s LNCS template. Since a major goal of the workshop is to explore new directions and approaches, we especially encourage the submission of short Position papers and Works in progress . Such papers are limited to at most 5 pages, and must clearly state “Position Paper” or “Work in Progress” in the title section of the paper.
Submissions are to be made via the Easy Chair submission web site at: https://easychair.org/conferences/?conf=bidas2018
* Workshop Format *
The workshop will include talks from accepted full papers, position papers, work in progress, invited talks and panels. Some position papers may be organized as a panel based on the nature of the topics.