![]() |
Workshop
on
|
![]() |
|||||
WORKSHOP CO-CHAIRS: Aleksandar
Lazarevic University
of Minnesota Minneapolis, MN 55455 Phone: (612) 626-8096 Fax: (612) 626-1596 E-mail: aleks@cs.umn.edu Vipin
Kumar University of Minnesota 200
Union Street SE University of Minnesota, Minneapolis, MN 55455 Phone: (612) 624-8023 Fax: (612) 625-0572 E-mail: kumar@cs.umn.edu Jaideep Srivastava University
of Minnesota Minneapolis, MN 55455 Phone: (612) 626-8107 Fax: (612) 626-1596 E-mail:srivasta@cs.umn.edu
|
NEW!!! Program now available !!!!! Proceedings of Abstracts now available !!!!! Objective and content: People have always depended upon information technology of some type, beginning with smoke signals in ancient days and turning into network-based computer systems today. Information technology becomes an essential part of the way various organizations function. Nowadays, the computers control power, oil and gas delivery, communications, transportation, banking and financial services. They are used to store and exchange vital information, from publicly know facts to well kept secrets. Notwithstanding the tremendous benefits that the emergence of this technology brings, there is inevitably an escalation of “dark side of the force” in the form of cyber terrorism. As a form of convergence between cyberspace and terrorism, cyber terrorism “refers to unlawful attacks and threats of attack against computers, networks, and the information stored therein when done to intimidate or coerce a government or its people …”. As the cost of the information processing and Internet accessibility falls, more and more organizations will be vulnerable by potential cyber threats. According to a recent research survey, cyber attacks have increased by almost 80 percent over the last six months. This indicates that there is an urgent need to expand efforts in the battle against cyber terrorism. The key question is whether contemporary computer technologies such as artificial intelligence and data mining can contribute to this battle and further enhance defense mechanisms. The main aim of the workshop on cyber threat analysis is to bring together leading figures from academia, military, government and industry to assess the state-of-the-art in the area as well as to explore the applications of data mining to address the problem of cyber threat analysis. Format of
the workshop: The format of the workshop will consists of one or two plenary talks by key people in the field and oral presentations by authors of selected papers followed by possible panel discussion comprising the best presenters. The workshop may vary in length with an expected duration from half a day up to one day. Topics
of Interest: · Methods to identify the most critical infrastructures · Methods to detect cyber terrorist attacks · Methods to protect against cyber terrorism · Information assurance · Intrusion detection and analysis via data mining · Data mining in forensic · Credit card fraud analysis · Economic espionage
|
|
Important Dates
Paper Format
Electronic Submission
|