征稿已开启

查看我的稿件

注册已开启

查看我的门票

已截止
活动简介

The purpose of workshops is to provide a more interactive and focused platform for presenting and discussing new and emerging ideas. The format of paper presentations may include oral presentations, poster presentations, keynote lectures and panels. Depending on the number of presentations, workshops can be scheduled for 1 day or 2 days. All accepted papers will be published in a special section of the conference proceedings book, under an ISBN reference, and on CD-ROM support. All papers presented at the conference venue will be available at the SCITEPRESS Digital Library. SCITEPRESS is a member of CrossRef and every paper is given a DOI (Digital Object Identifier). The proceedings are submitted for indexation by Thomson Reuters Conference Proceedings Citation Index (ISI), INSPEC, DBLP, EI (Elsevier Engineering Village Index) and Scopus.

Insider threats are current or former employees who have or have had privileged access within an organization and who are or may be engaged in malicious behavior associated with fraud, theft of IP, espionage, sabotage, and workplace violence. These employees may cause devastating consequences because of their knowledge of and access to employers’ systems and information. The scope of this workshop is to concentrate on mitigating insider threats through technical approaches rather than behavioral approaches. This workshop will bring together researchers with the aim of sharing algorithms, anomaly detection techniques, creation of reliable test data, software applications for detecting insider threats, active and passive indicators, visualization methods, statistical measures, etc.

征稿信息

重要日期

2016-03-14
初稿截稿日期
2016-06-02
终稿截稿日期

征稿范围

Topics: insider threat detection algorithm active and passive indicators anomaly detection predictive analytics for detecting concerns insider threat detection visualization software Development and testing methods for detecting insider threat Innovate statistical measures to determine effectiveness of technical solutions Novel software based technologies for preventing, detecting, and responding to insider threats Case studies showing proof of concept of technical solutions 

留言
验证码 看不清楚,更换一张
全部留言
重要日期
  • 会议日期

    07月26日

    2016

    07月28日

    2016

  • 03月14日 2016

    初稿截稿日期

  • 06月02日 2016

    终稿截稿日期

  • 07月28日 2016

    注册截止日期

移动端
在手机上打开
小程序
打开微信小程序
客服
扫码或点此咨询