Photo: Wikipedia

Call for Papers and Submission Guidelines

The irreversible dependence on computing technology has paved the way for cybersecurity’s rapid emergence as one of modern society’s grand challenges. To combat the ever-evolving, highly-dynamic threat landscape numerous academics and industry professionals are systematically searching through billions of log files, social media platforms (e.g., Dark Web), malware files, and other data sources to preemptively identify, mitigate, and remediate emerging threats and key threat actors. Artificial Intelligence (AI)-enabled analytics has started to play a pivotal role in sifting through large quantities of these heterogeneous cybersecurity data to execute fundamental cybersecurity tasks such as asset management, vulnerability prioritization, threat forecasting, and controls allocations. However, the volume, veracity, and variety of cybersecurity data sharply contrasts with conventional data sources. Moreover, industry and academic AI-enabled cybersecurity analytics are often siloed. To this end, this workshop aims to being to gather academic and practitioners to share, disseminate, and communicate completed research papers, work in progress, and review articles pertaining to AI-enabled cybersecurity analytics. Areas of interest include, but are not limited to:

Each manuscript must clearly articulate their data (e.g., key metadata, statistical properties, etc.), analytical procedures (e.g., representations, algorithm details, etc.), and evaluation set up and results (e.g., performance metrics, statistical tests, case studies, etc.). Providing these details will help reviewers better assess the novelty, technical quality, and potential impact. Making data, code, and processes publicly available to facilitate scientific reproducibility is not required. However, it is strongly encouraged, as it can help facilitate a culture of data/code sharing in this quickly developing discipline.

All submissions must be in PDF format and formatted according to the new Standard ACM Conference Proceedings Template. Submissions are limited to a 4-page initial submission, excluding references or supplementary materials. Upon acceptance, the authors are allowed to include an additional page (5-page total) for that camera ready version that accounts for reviewer comments. Authors should use supplementary material only for minor details that do not fit in the 4 pages, but enhance the scientific reproducibility of the work (e.g., model parameters). Since all reviews are double-blind, and author names and affiliations should NOT be listed. For accepted papers, at least one author must attend the workshop to present the work. Based on the reviews received, accepted papers will be designated as a contributed talk (four total, 15 minutes each), or as a poster. All accepted papers will be posted on the workshop website (will not appear in proceedings per ACM KDD Workshop regulations).

Program Agenda

This workshop will be held on 8/15 at 11 PM – 3 AM Singapore time. The Zoom link for the event will be available on the workshop webpage before the event. An agenda for the workshop is as follows (all times Singapore):

  • 11:00 AM – 11:15 AM – Workshop Introduction from Co-Chairs
  • 11:15 AM – 12:15 PM – Keynote Address (Speaker TBA)
  • 12:15 PM – 1:45 PM – Full Paper Sessions (15 minute presentations with five minute Q&A time for each presentation)
  • 1:45 PM – 2:00 PM – Break
  • 2:00 PM – 2:30 PM – Poster Sessions (5 minutes with 2 minutes of Q&A for each poster)
  • 2:30 PM – 3:00 PM – Workshop Discussion and Wrap-Up from Workshop Chairs


Key Dates

All deadlines are at 11:59PM Pacific Daylight Time.

  • Workshop paper submissions: May 10, 2021
  • Workshop paper notification: June 10, 2021
  • Conference Dates: August 14-18, 2021
  • Workshop Dates: August 14-18, 2021


Submission Site

Submission Site: Easy Chair Submission

Workshop Co-Chairs

Dr. Sagar Samtani
Indiana University

Dr. Jay Yang
Rochester Institute of Technology

Dr. Hsinchun Chen
University of Arizona

Program Committee

Accepted Full Papers

  • SAGE: Intrusion Alert-driven Attack Graph Extractor; Azqa Nadeem, Sicco Verwer, Stephen Moskal and Shanchieh Jay Yang.
  • Linking Common Vulnerabilities and Exposures to the MITRE ATT&CK Framework: A Self-Distillation Approach; Benjamin Ampel, Sagar Samtani, Steven Ullman and Hsinchun Chen.
  • University Data Can Fuel AI/ML Cybersecurity Research: A Vision with an OmniSOC Proofpoint; Von Welch, Ryan Kiser and Brad Wheeler.
  • Political News Propagation Headline Matching: A Deep Learning-Based Short Text Matching Approach; Zara Ahmad-Post, Sagar Samtani, Hongyi Zhu and Susan Brown.
  • CatBERT: Context-Aware Tiny BERT for Detecting Targeted Social Engineering Emails; Younghoo Lee, Joshua Saxe and Richard Harang.
  • Argumentatively Phony? Detecting Misinformation via ArgumentMining; Muheng Yan, Yu-Ru Lin and Diane Litman.

Accepted Workshop Papers

  • Alert Correlation Mining From Temporal Attack Behaviors; Gordon Werner and Shanchieh Yang.
  • Using a Collated Cybersecurity Dataset for Machine Learning and Artificial Intelligence; Erik Hemberg and Unamay Oreilly.
  • An Anatomy of Tweets Around COVID-19 Conspiracies; Hamad Alsaleh and Lina Zhou.