CoNeSec2019: Complex Networks Monitoring and Security and Fraud Detection for Enterprises
Conference Track @28th IEEE WETICE Conference
Villa Orlandi, Anacapri, Capri Island (Naples), Italy June 12-14, 2019
As fraud and security breaches are becoming more frequent and sophisticated, traditional security solutions are not able to protect company assets. The problems which musts be solved to provide high security level for data and users of enterprise computer systems is related to analysis and correlation of large amounts of real-time data from network and security devices. The high level context of data is often crucial element on the way of successful management of internal and external security threats or improvement of incident response time and compliance reporting. The network monitoring can be performed by various types of intrusion Detection systems which monitor and analyze network traffic to detect, identify, and report on suspicious activity or intrusions. But new security threats can be recognized only when we provide efficient way for pattern/anomaly recognition on larger volumes and greater variety of data. Another critical issue for each enterprise is to detect and prevent fraudulent activities by internal or external parties. This is why for security application we need new methods and tools to Improve risk assessment and associated scoring by building sophisticated machine learning models that can take into account hundreds or even thousands of indicators and complex patterns introduced by cooperation of systems and people and detectable only on using higher levels of network dependencies.
The purpose of this track is two-fold: Firstly, the track offers a forum for scientists and engineers to exchange ideas on novel analytical techniques using network log data. Secondly, the track has a thematic focus on emerging technology for complex network, security and privacy. We seek publications on all theoretical and practical work in areas related to the theme above.
The list of topics includes (but not limited to):
- Anomaly detection
- Security Information and Event Management (SIEM)
- Application Log Monitoring
- Fraud Detection
- Risk Modeling
- Complex network monitoring
- Predictive models and analytics
- Monitoring and surveillance on social networks
- Social login and authentication
- Analysis of communication graphs
- Smart grid, wireless sensor networks and Internet of things
- Critical infrastructure security
- IT/OT security
The paper submission procedure is carried out using the EasyChair conference management system.
Papers should contain original contributions not published or submitted elsewhere, and references to related state-of-the art work. Please submit your papers in PDF format. Authors of accepted papers are expected to present their papers at the conference. Papers up to six pages (including figures, tables and references) can be submitted. Papers should follow the IEEE conference format, which is single-spaced, two columns, 10pt Times/Roman font. Papers should include a title, the name and affiliation of each author, an abstract of up to 150 words and no more than eight keywords. All submitted papers will be peer-reviewed by a minimum of three program committee members. The accepted papers will be published in the conference proceedings, and will be published by the IEEE Computer Society Press.
Krzysztof Juszczyszyn (Wroclaw University of Science and Technology)
Grzegorz Kołaczek (Wroclaw University of Science and Technology)
- Mirosław Kurkowski (Cardinal Stefan Wyszyński University in Warsaw)
- Krzysztof Cabaj (Warsaw University of Technology)
- Krzysztof Szczypiorski (Warsaw University of Technology)
- Jun Liu (Ulster University)
- Luis Martínez López (University of Jaen)
- Katarzyna Musiał (King’s College London)
- Marcin Budka (Bournemouth University)
- Anna Kobusińska (Poznań University of Technology)
Krzysztof Juszczyszyn, Krzysztof.Juszczyszyn@pwr.edu.pl
Grzegorz Kołaczek, Grzegorz.Kolaczek@pwr.edu.pl