Special Issue: Special Issue on “Behavior Data Analytics for Cybersecurity”

Call for Papers

Journal of Internet Technology

(http://jit.niu.edu.tw/, Indexed by SCI-E)


Special Issue onBehavior Data Analytics for Cybersecurity

Theme and Scope

Moving towards digital nation and smart cities, cyberspace is becoming an increasingly important platform for innovation and

prosperity, and the means to improve general welfare and productivity. Due to the loosely coupled and lightly regulated digital

infrastructure for collaboration and sharing, greater risks and new cybersecurity challenges result. Furthermore, as the scale

and complexity of this cyberspace grow, big data approach has generally been proven to be a promising direction to understand

what is on-going inside, both at the macroscopic and microscopic levels. As the same time, behavior analytics, in particular

using  domain  knowledge  and  semantics  to  assist  data mining  and  pattern  discovery,  is  also  found  to  be  very  effective  in understanding not only the transactional behavior patterns of entities in the cyberspace, but also the causations behind these patterns  as  well  as  the  quantification  of  their  cognitive  experience.  When  these  two  areas  are  put  together,  it  creates  a promising direction to address new cybersecurity challenges. It also opens up new fundamental research questions in both fields,  data  analytics, and cybersecurity. This  special  session  will  include  papers  based  on the presentation at the  18th International  Conference  on  Information  and  Communications  Security,  ICICS  2016  (http://www.icics2016.org)  and  papers submitted for this call for papers. All submitted papers are subjected to the same review process as those papers accepted for publication in the regular issues.


Topics include but are not limited to:

l  Affective computing

l  Attack behavior analysis

l  Attribute-oriented analysis

l  Behavior models and theories

l  Behavior analytics service platform

l  Cognitive cyber-infrastructure

l  Distributed systems security

l  Multi-dimensional data models and optimization

l  Next generation security operation centre

l  Ontologies in behavior informatics

l  Risk evaluation and security

l  Security information and event management

l  Semantics for functions and behaviors

l  Semantics-inspired data mining and pattern discovery

l  Service composition, horizontal and vertical

l  Use cases and applications in cybersecurity analytics

Instructions for Manuscripts

Each paper, written in English, should be no more than 5000 Words, including references and illustrations. More information

can be found at http://jit.niu.edu.tw/preparation2.php. All submitted papers will be reviewed by at leastthree reviewers and

selected  based  on  their  originality,  significance,  relevance,  and  clarity  of  presentation.  Papers  extended  from

conference/workshop versions should be clearly stated and should have at least 30% different materialsfrom their original

versions. The covering letter should indicate the names of the authors and their affiliations, addresses, faxes, and e-mails.

Prospective authors should submit full manuscripts electronically by e-mail to chihung.chi@csiro.au,by January 08, 2017.


Important dates

Manuscript submission deadline:                          January 08, 2017

Notification of Acceptance/Rejection/Revision:       March 12, 2017

2nd round check:                                                April 30, 2017

Final Manuscript Due:                                          June 18, 2017

Tentative Publication Date:                                   September 30, 2018

Guest Editors


Dr. Chi-Hung Chi


Tasmania, Australia 7005

E-mail: chihung.chi@csiro.au


Prof. Kwok-yan Lam

School of Computer Science and Engineering, Nanyang Technological Univeresity, Singapore

Email: kwokyan.lam@ntu.edu.sg


Prof. Raymond Wong

School of Computer Science and Engineering

University of New South Wales, Sydney, Australia  

E-mail: wong@cse.unsw.edu.au