***** Apologies if you receive multiple copies of this announcement *****

                       CALL FOR PAPERS
----------------------------------------------------------------
      Workshop on Data Mining for Cyber Threat Analysis
         http://www-users.cs.umn.edu/~aleks/icdm02w/
                   in conjunction with
        IEEE International Conference on Data Mining
                   December 9-12, 2002
             Maebashi TERRSA, Maebashi City, Japan
----------------------------------------------------------------


People have always depended upon information technology of some type,
beginning with smoke signals in ancient days and turning into network
based computer systems today. Information technology becomes an essential
part of the way various organizations function. Nowadays, the computers
control power, oil and gas delivery, communications, transportation,
banking and financial services. They are used to store and exchange vital
information, from publicly know facts to well kept secrets.

Notwithstanding the tremendous benefits that the emergence of this
technology brings, there is inevitably an escalation of "dark side of the
force" in the form of cyber terrorism. As a form of convergence between
cyberspace and terrorism, cyber terrorism "refers to unlawful attacks and
threats of attack against computers, networks, and the information stored
therein when done to intimidate or coerce a government or its people ..."

As the cost of the information processing and Internet accessibility
falls, more and more organizations will be vulnerable by potential cyber
threats. According to a recent research survey, cyber attacks have
increased by almost 80 percent over the last six months. This indicates
that there is an urgent need to expand efforts in the battle against cyber
terrorism. The key question is whether contemporary computer technologies
such as artificial intelligence and data mining can contribute to this
battle and further enhance defense mechanisms.

The main aim of the workshop on cyber threat analysis is to bring together
leading figures from academia, military, government and industry to assess
the state-of-the-art in the area as well as to explore the applications of
data mining to address the problem of cyber threat analysis.


The format of the workshop will consists of one or two plenary talks by
key people in the field and oral presentations by authors of selected
papers followed by possible panel discussion comprising the best
presenters. The workshop may vary in length with an expected duration
from half a day up to one day.


TOPICS OF INTEREST:
-      Methods to identify the most critical infrastructures
-      Methods to detect cyber terrorist attacks
-      Methods to protect against cyber terrorism
-      Information assurance
-      Intrusion detection and analysis via data mining
-      Data mining in forensic
-      Credit card fraud analysis
-      Economic espionage


WORKSHOP CO-CHAIRS:
Vipin Kumar,           University of Minnesota
Aleksandar Lazarevic,  University of Minnesota


ORGANIZING COMMITTEE: TO BE ANNOUNCED


IMPORTANT DATES:
----------------
September 27, 2002:  Paper Submissions Due
October   30, 2002:  Acceptance Notification
November  15, 2002:  Camera Ready Copy Due
December   9, 2002:  Workshop Day


PAPER FORMAT:
Submissions on the related topics to data mining in cyber threat analysis
are invited. We also encourage submissions, which present early stages of
research work, military and government applications and solutions. Papers
should not be more than 10 pages in 10 point font and single-spaced
(excluding references), with one-inch margins on all sides. Contact author
and email address should be specified on the title page.


ELECTRONIC SUBMISSION:
Electronic submission either in PDF or PS format are strongly encouraged.
Please e-mail electronic submissions with subject "DMCTA2002" to:
[EMAIL PROTECTED]

Reply via email to