In conjunction with the 14th International Joint Conference on e-Business and Telecommunications - ICETE 2017
Insider threats are a present and growing concern to organizations worldwide. Trusted employees have the capability for inflicting devastating consequences to their employer’s assets, data, and IT infrastructure, primarily because of their detailed knowledge and authorized access these systems. This workshop focuses on technical approaches and applications for detecting and mitigating insider activity, which may include unintentional as well as malicious behavior. We invite researchers with the aim of sharing algorithms, anomaly detection techniques, creation of reliable test data, software applications for detecting suspicious activity, active and passive indicators, visualization methods, statistical measures, and recent results.
Topics include, but are not limited to: malicious behavior detection algorithms, active and passive indicators, anomaly detection, predictive analytics, visualization, software development and testing methods, innovative statistical measures to measure efficacy, realistic data set creation, data sharing techniques, novel software-based technologies, integration of multiple software applications, repurposing of existing technology for insider threat detection, and case studies showing proof of concept of technical solutions.
April 26, 2017
May 15, 2017
Camera Ready and Registration:
May 29, 2017