Home      Log In      Contacts      FAQs      INSTICC Portal
Workshop on Technical Approaches for Insider Mitigation - TAIM 2017

24 - 26 July, 2017 - Madrid, Spain

In conjunction with the 14th International Joint Conference on e-Business and Telecommunications - ICETE 2017


Jason Clark
Carnegie Mellon University / SEI
United States
Brief Bio
Dr. Jason W. Clark is a researcher at Carnegie Mellon University’s Software Engineering Institute (SEI). His main area of interests are cyber-security with a focus on insider threats, specifically prediction, detection, and mitigation. He completed his Ph.D in Information Technology from George Mason University, where he specialized in cyber-crime and anonymous searching of the Internet. Prior to joining the SEI in 2012, Jason worked at the Institute for Defense Analyses (IDA) as a lead information security analyst and from 2003-2007 at the United States Census Bureau writing and reviewing security documentation and policy. He also teaches part-time undergraduate and graduate courses.
William Claycomb
Carnegie Mellon University
United States
Brief Bio
Bill Claycomb is a Senior Member of Technical Staff at Carnegie Mellon University’s (CMU) Software Engineering Institute (SEI), where he leads multidisciplinary research projects related to cyber security and human behavior. His portfolio of previous work represents a broad range of topics such as malware detection, cloud security, wireless and mobile security, enterprise architecture, and identity management.


Insider threats are a present and growing concern to organizations worldwide. Trusted employees have the capability for inflicting devastating consequences to their employer’s assets, data, and IT infrastructure, primarily because of their detailed knowledge and authorized access these systems. This workshop focuses on technical approaches and applications for detecting and mitigating insider activity, which may include unintentional as well as malicious behavior. We invite researchers with the aim of sharing algorithms, anomaly detection techniques, creation of reliable test data, software applications for detecting suspicious activity, active and passive indicators, visualization methods, statistical measures, and recent results.
Topics include, but are not limited to: malicious behavior detection algorithms, active and passive indicators, anomaly detection, predictive analytics, visualization, software development and testing methods, innovative statistical measures to measure efficacy, realistic data set creation, data sharing techniques, novel software-based technologies, integration of multiple software applications, repurposing of existing technology for insider threat detection, and case studies showing proof of concept of technical solutions.


Paper Submission: April 26, 2017 (expired)
Authors Notification: May 15, 2017 (expired)
Camera Ready and Registration: May 29, 2017 (expired)


Available soon.


Prospective authors are invited to submit papers in any of the topics listed above.
Instructions for preparing the manuscript (in Word and Latex formats) are available at: Paper Templates
Please also check the Guidelines.
Papers must be submitted electronically via the web-based submission system using the appropriated button on this page.


After thorough reviewing by the workshop program committee, all accepted papers will be published in the workshop proceedings book, under an ISBN reference and on digital support.
All papers presented at the conference venue will be available at the SCITEPRESS Digital Library (http://www.scitepress.org/DigitalLibrary/).
SCITEPRESS is a member of CrossRef (http://www.crossref.org/) and every paper is given a DOI (Digital Object Identifier).


ICETE Workshops - TAIM 2017
e-mail: icete.secretariat@insticc.org