CALL FOR BOOK CHAPTER Big Data and Cyber Threat Intelligence (Submission due January 15th, 2024)

We are pleased to invite you to submit a chapter for inclusion in the upcoming book, “Big Data and Cyber Threat Intelligence,” to be published by Springer. For chapter submissions, the guidelines are as follows: Each chapter should be between 15 and 20 pages in length, formatted as a single-spaced, single-column layout in LaTeX. The content should provide in-depth information aimed at both readers and professionals in the field of cybersecurity, with a particular emphasis on Big Data and Cyber Threat Intelligence. We are interested in chapters that explore the application of Artificial Intelligence (AI) and Machine Learning (ML) concepts, methods, and techniques in the areas of Big Data and Cyber Threat Intelligence, as detailed in our Call for Papers. We also welcome contributions that discuss advanced approaches in Cyber Threat Intelligence and Analytics, including but not limited to Blockchain, Federated Learning, Internet of Things (IoT), and Industrial Internet of Things (IIoT). Chapter contributions should contain 25-30% novel content compared to earlier published work by the authors.

Topics of interest include, but are not limited to, the following:

  • Detection and analysis of advanced threat actors’ tactics, techniques, and procedures
  • Analytics techniques for detection and analysis of cyber threats
  • Leveraging Blockchain technology for secure and transparent cyber threat intelligence sharing
  • Utilizing Blockchain for tamper-proof incident logging and forensic data preservation
  • Application of Federated Learning in creating decentralized, privacy-preserving threat detection models
  • Federated Learning techniques for collaborative but secure data analysis across multiple organizations
  • Utilizing Internet of Things (IoT) devices as data sources for cyber threat intelligence
  • Security and vulnerability assessments of Industrial Internet of Things (IIoT) in the context of advanced threat landscapes
  • Integrating IoT and IIoT data into big data analytics for improved threat awareness and response
  • Application of machine learning tools and techniques in cyber threat intelligence
  • Theories and models for detection and analysis of advanced persistent threats
  • Automated and smart tools for collection, preservation, and analysis of digital evidence
  • Threat intelligence techniques for constructing, detecting, and reacting to advanced intrusion campaigns
  • Applying machine learning tools and techniques for malware analysis and fighting against cyber crimes
  • Intelligent forensics tools, techniques, and procedures for cloud, mobile, and data-centre forensics
  • Intelligent analysis of different types of data collected from different layers of network security solutions
  • Threat intelligence in the cybersecurity domain utilizing big data solutions such as Hadoop
  • Intelligent methods to manage, share, and receive logs and data relevant to a variety of adversary groups
  • Interpretation of cyber threat and forensic data utilizing intelligent data analysis techniques
  • Infer intelligence of existing cybersecurity data generated by different monitoring and defence solutions
  • Automated and intelligent methods for adversary profiling
  • Automated integration of analysed data within incident response and cyber forensics capabilities

This scope not only covers the conventional areas of cyber threat intelligence but also brings in the modern elements of Blockchain, Federated Learning, IoT, and IIoT to make it more comprehensive and future-oriented.

Selection and Evaluation Criteria

  • Relevance to the topics of this book chapter
  • Research novelty (e.g., new techniques) and potential impact
  • Readability

Submission

There are no submission or acceptance fees for manuscripts submitted to this book for publication. All manuscripts are accepted based on a double-blind peer-review editorial process.

Please send your manuscript both *.pdf, and *.tex to the e-mail address of the editor, Abbas Yazdinjad (ayazdine@uoguelph.ca).

Important Dates:

  • Submission deadline: 15th Jan 2024
  • Authors’ notification: 15th Feb 2024
  • Revisions due: 1 Mar 2024
  • Final decision: 1 Apr 2024
  • Camera ready version due: 1 May 2024
  • Tentative publication date: Aug 2024

 

Book Editors:

  1. Ali Dehghantanha, Cyber Science Lab, Canada Cyber Foundry, University of Guelph, ON, Canada
  2. Kim-Kwang Raymond Choo, University of Texas at San Antonio, USA and University of South Australia, Australia
  3. Abbas Yazdinejad, Cyber Science Lab, Canada Cyber Foundry, University of Guelph, ON, Canada