Situation Awareness Analysis for Cyberspace Security (SAACS 2023)

Scope

Situation awareness analysis for cyberspace security is the basis and premise of cyber security. Situation awareness analysis for cyberspace security refers to the acquisition, understanding and display of the security elements that cause the change of network situation in the network environment, and the postponement prediction of the development trend of cyber security situation, so as to decide what countermeasures to take.

In recent years, situation awareness analysis for cyberspace security has become a research hotspot in the field of cyber security, which can synthesize all aspects of security factors, dynamically reflect the cyber security situation as a whole, and predict and early warn the development trend of security situation, so as to provide reliable reference for enhancing cyber security. This workshop, collocated with the 8th IEEE International Conference on Data Science in Cyberspace (IEEE DSC2023), will bring big data researchers together to exchange their ideas, innovations, and novel methods for situation awareness analysis and cyberspace security based on big data. Research from various domains, including but not limited to data mining, machine learning, malicious behavior detection and situation awareness analysis for cyberspace security are highly appreciated. Attendees are invited to introduce their latest research results on theories/innovations/models/algorithms/methods of situation awareness analysis and how these innovations can be applied in real-world cyberspace security.


WORKSHOP AREAS

Topic interest include but not limited to:

1. Modelling situation awareness analysis for cyberspace security
2. Standard model and index system of security evaluation
3. Automatic scheme generation and execution technology of security evaluation
4. Security situation evaluation technology for key infrastructures (finance, transportation, energy, smart city, etc.)
5. Security evaluation technology for typical application scenarios (Industrial Internet, Internet of Vehicles, Internet of Things, etc.)
6. Security evaluation of networked systems
7. Situation data acquisition, understanding, analysis, prediction, etc.
8. Construction and reasoning of cyber security knowledge graph
9. Malicious behaviors detection
10. Malicious traffic analysis
11. Malicious code analysis
12. APT attack analysis
13. Trace to the source of cyber attack
14. Data mining for cyberspace security
15. Development tendency of cyberspace security situation


PAPER SUBMISSION

All submissions should be written in English and submitted via our submission system: https://cmt3.research.microsoft.com/SAACS2023. A paper submitted to SAACS 2023 cannot be under review for any other conference or journal during the entire period that it is considered for SAACS 2023, and must be substantially different from any previously published work. Submissions are reviewed in a single-blind manner. Please note that all submissions must strictly adhere to the IEEE templates as provided below. The templates also act as a guideline regarding formatting. In particular, all submissions must use either the LATEX template or the MS-Word template. Please follow exactly the instructions below to ensure that your submission can ultimately be included in the proceedings.


IMPORTANT DATES

Full paper due: June 25, 2023
Acceptance notification: July 25, 2023
Camera-ready copy: August 2, 2023
Conference Date: August 18-20, 2023

ORGANIZATION

WORKSHOP GENERAL CHAIRS

Shudong Li Guangzhou University, Guangdong, China
Aiping Li National University of Defense Technology, Hunan, China
Dawei Zhao Qilu University of Technology, Shandong, China
Yujun Li University of Electronic Science and Technology, Sichuan, China
Qing Liao Harbin Institute of Technology, Shenzhen, China
Weihong Han Peng Cheng Laboratory, Shenzhen, China
Zhaoquan Gu Harbin Institute of Technology, Shenzhen, China

Program Committee

Keke Tang Guangzhou University, Guangdong, China
Chao Gao Northwestern Polytechnical University, Shanxi, China
Lixiang Li Beijing University of Posts and Telecommunications, Beijing, China
Bin Zhou National University of Defense Technology, Hunan, China
Bingwen Feng Jinan University, Guangdong, China
Rong Jiang National University of Defense Technology, Hunan, China
Yongquan Fu National University of Defense Technology, Hunan, China
Peican Zhu Northwestern Polytechnical University, Shanxi, China
Mohan Li Guangzhou University, Guangdong, China
Shengjun Wei Beijing Institute of Technology, Beijing, China



footer