Big Data Cybersecurity Analytics


  As the development of cyber technologies, the risk of cybercrime, cyberespionage, cyberterrorism, and advanced persistent threats is also increasing greatly. In particular, the attack techniques as well as the speed in launching these attacks are rapidly improving. As both volume and complexity of malware attacks increase, traditional analytic tooling and infrastructure have become difficult to keep up. Big data analytics are being developed as a promising way to address these challenges. Due to the characteristics of big data, such as huge amount of data and sheer breadth and coverage, Cybersecurity analytics for big data can provide unprecedented cybersecurity capabilities to proactively monitor, analyze, and mitigate sophisticated and advanced cybersecurity threats and exploitations.
  This workshop aims to exploit big data analytics capabilities including innovative techniques, metrics, and behavior analysis to address the cybersecurity challenges. Contributions that push the state of the art in all facets of big data cybersecurity analytics are encouraged and welcomed.


  Topics of interest include but not limited to:

1.Big data theory for cybersecurity
2.Data aggregation and correlations of big data sensors
3.Big data visualization for cybersecurity
4.Knowledge representation and visualization of behavior of autonomic systems and services
5.Big data cybersecurity computational models
6.Data mining, stochastic analysis and prediction
7.Advanced Persistent Threat (APT) modeling and analysis
8.Data Science and Analytics in Security Informatics
9.Privacy, security, trust, and risk in big data
10.Data integrity, matching, and sharing


  Submitted papers should not have been previously published nor be currently under consideration for publication elsewhere. The papers should be prepared in English and submitted in PDF format (For detailed requirements and template, please visit All accepted papers will appear in the proceedings of the IEEE DSC2017 conference. If accepted, at least one of the authors must attend the workshop to present the work. Accepted papers without presentations will be excluded from the proceedings.

  Submission Link


  Full paper due: April 3, 2017, extended to April 10,2017
  Acceptance notification:April 23, 2017,extended to April 27, 2017
  Camera-ready copy:April 30, 2017,extended to May 12, 2017
  Conference Date: June 26, 2017



Jian WengJinan University


Kui RenJinan University/State University of New York at Buffalo
Liudong XingUniversity of Electronic Science and Technology of China/University of Massachusetts Dartmouth
Yan (Lindsay) SunUniversity of Rhode Island


Chaonan WangJinan University


Xu ChenSun Yat-Sen University
Zhangjie Fu, Nanjing University of Information Science and Technology
Yuchang MoZhejiang Normal University
Hong LiuUniversity of Massachusetts Dartmouth
Cong WangCity University of Hong Kong
Honggang WangUniversity of Massachusetts Dartmouth
Yujie WangUniversity of Electronic Science and Technology of China
Kaimin WeiJinan University
Zhihua XiaNanjing University of Information Science and Technology
Xingliang YuanCity University of Hong Kong