Co-sponsors:

tl_files/sponser_pic/nict_new.png
tl_files/sponser_pic/uni.jpg

Technical co-sponsors:

tl_files/sponser_pic/XJTLU.jpg
tl_files/sponser_pic/naist.jpg
tl_files/sponser_pic/kisti.png
tl_files/sponser_pic/apnna.gif
tl_files/cfp/image019.png
tl_files/sponser_pic/logo_top_sx.gif

The 2017 International Data Mining and Cybersecurity Workshop

Co-sponsorship: NICT, Unitec 

Technical co-sponsorship: XJTLU, NAIST, KISTI, APNNA, ENNS, INNS

 

You are cordially invited to submit papers to the 2017 Data Mining and Cybersecurity Workshop and participate in the 2017 Cybersecurity Data Mining Competition. The two events are associated with the 24th International Conference on Neural Information Processing (ICONIP 2017), Guangzhou China, November 14−18, 2017. DMC 2017 workshop and CDMC 2017 award ceremony will be both co-held with ICONIP 2017. For more information on venue, accommodation, and travel, please refer to the conference website at http://www.iconip2017.org/.

Objective

The purpose of the 10th International Data Mining and Cybersecurity Workshop is to raise the awareness of cybersecurity, promote the potential of industrial applications, and give young researchers exposure to the main issues related to the topic and to ongoing works in this area. DMC 2017 will provide a forum for researchers, security experts, engineers, and students to present latest research, share ideas, and discuss future directions in the fields of data mining and cybersecurity.

Paper Submission & Publication

Authors are invited to submit papers on novel and mature work, of up to 8 pages in Springer LNCS format (with up to 2 additional pages for an extra charge). Please submit your papers via the ICONIP submission website, indicating the paper is devoted to DMC2017 in the option list. All accepted papers will be published in the proceeding of ICONIP2017, an LNCS publication with Springer.

Important dates

Paper Submission: June 15, 2017
Extended Paper Submission: 30 June, 2017
Notification of Acceptance: July 31, 2017
Camera-ready Submission: August 31, 2017
Workshop Date: November 14-18, 2017

Submission

Online Paper Submission

Instructions for Final Camera-Ready Paper Submission

Please follow the following six steps to prepare your camera-ready paper and submit the required materials in the above online submission system.

I. Revise your paper as soon as possible based on the comments in the reviews sent to you by email. You may also view the reviewers’ ratings, comments, and/or suggestions about the paper in your author’s account of the DMC 2017 Online Submission System. Please take the opportunity to improve the presentation of the paper.

II. Please prepare your paper in the EXACT FORMAT as the sample paper for Lecture Notes in Computer Science (LNCS) including reference format. Failure to do so may result in the exclusion of your paper from the proceedings. In the Information for LNCS Authors site, you are able to download the source files including LaTeX2e class file, sample file, word template.

NOTICE: Each paper is allowed to have 8 pages in the final camera-ready copy without paying extra charges. Each paper can have a MAXIMUM of 10 pages in the final camera-ready copy. If your paper is more than 8 pages in length in the final camera-ready copy without paying extra page charges (US$50/each extra page), we will not publish your paper, and we will not refund your registration payment. Each registration can have one more additional paper. Each additional paper is subject to extra charge. Details see the conference registration page.

III. Fill out the copyright form. A signed Copyright Form must be submitted for each paper. Please download the Copyright Form at Copyright Form for ICONIP2017

NOTICE: Each paper is allowed to have up to 8 pages in the final camera-ready copy without paying extra charges. Each paper can have a MAXIMUM of 10 pages in the final camera-ready copy. If your paper is more than 8 pages in length in the final camera-ready copy without paying extra page charges (US$50/each extra page), we will not publish your paper, and we will not refund your registration payment. Each registration can have one more additional paper. Each additional paper is subject to extra charge. Details see the conference registration page.

IV. Submit the following files for your final submission via the above DMC 2017 Online Paper Submission System:
(1) Scanned signed copyright form.
(2) For LaTeX users, please submit:
i) LaTeX files for the text and PS/EPS or PDF/JPG files for all figures.
ii) Any further style files and fonts you have used together with your source files and that are not generally available at CTAN. iii) Final DVI file (for papers prepared using LaTeX/TeX)
iv) Final PDF file (for reference).
(2') For other users (other than LaTeX/TeX), please submit RTF files and a PDF file.

NOTICE: Please compress all necessary files into one file in the format of ZIP. We highly recommend you use your paper ID as the file name for the compressed file and pdf file. For example, if your paper ID is 35, you can save your files as 35.tex, 35.rar, 35.pdf.

V. If you have not chosen to present your paper(s) orally or by poster, please select one option when you submit your final version paper. If you have done this and decide to change your mind, you still are able to change the method of presentation.

VI. Register for DMC 2017 in the conference registration page. Publication of a paper in the proceedings requires that at least one author for the paper registers for the conference.

Title: The Detection Possibility of Cyber-threats using Big Data Analysis and Machine Learning

Dr. Yuji Sekiya

Associate Professor, Information Technology Center, University of Tokyo

Abstract

Nowadays Cyber threats are increasing and complexed. The detection of threat and incident response are performed by human resources. When a malicious behavior is monitored on security facilities or detected by external resources, the person in charge collects the hopefully helpful logs and makes an investigation. It depends on the knowledge and experience of the person. To achieve more general and off-the-shelf analysis and response, we need a non-heuristic methodology for security analysis and response. In this research, we try to establish the method to assist the analysis of threats and the decision of response. To accomplish the methodology, we try to make clear what kinds of data sets are needed and what kinds of algorithms are useful.

Biography

tl_files/newwebfiels/YujiSekiya.jpgYuji Sekiya was received B.E. from Kyoto University in 1997 and received M.E. from Keio University in 1999, and received Ph.D. from Keio University in 2005. He is an associate professor at the University of Tokyo, Information Technology Center. He is a board member of WIDE Project. He had been working on developing IPv6 protocol stack and DNS measurement, and currently, has been working on cloud computing. SDN, NFV, and Cyber Security.

 

Please be noted that all participants to the DMC 2017 workshop are required to register at ICONIP 2017. For more information about registration, please see here

Coming Soon...

The conference hotel will be the Ramada Pearl Hotel Guangzhou. For more info, please see http://ramadapearlhotel-guangzhou.com/