Cyber Threat Intelligence and Adversarial Risk Management (CTI-ARM)

Special Issue with Evolutionary Intelligence

These days cyber security and forensic specialists are supposed to detect, analyse and defend against many cyber threats under real-time conditions. Timely dealing with such a huge number of attacks is not possible without employment of artificial intelligence and machine learning techniques. When a significant amount of data is collected from or generated by different security monitoring solutions; intelligent big-data analytical techniques are necessary to mine, interpret and extract knowledge of those data. The emerging field of cyber threat intelligence is investigating applications of artificial intelligence and machine learning techniques to perceive, reason, learn and act intelligently against advanced cyber attacks.

This Special Issue will focus on cutting-edge research from both academia and industry, with a particular emphasis on providing wider knowledge of the field, novelty of approaches, combination of tools and so forth to perceive, reason, learn and act on a wide range of data collected from different cyber security and forensics solutions.

Specifically, this Special Issue welcomes three categories of papers: (1) invited articles from qualified experts; (2) contributed papers from an open call with the list of addressed topics, and (3) Selected Papers from the 20th IEEE International Conference on Pervasive Intelligence and Computing (PICom 2021), 7th IEEE International Conference on Cloud and Big Data Computing (CBDCom 2021), and from the 2021 IEEE Cyber Science and Technology Congress (CyberSciTech 2021) which will be held August 23-26, 2021 in Calgary, Canada

Topics of interest include but are not limited to:

  • Application of machine learning tools and techniques in cyber security and cyber forensics
  • Threat intelligence techniques for constructing, detecting, and reacting to advanced intrusion campaigns
  • Applying machine learning tools and techniques for malware analysis and fighting against cyber crimes
  • Intelligent analysis of different types of data collected from different layers of network security solutions
  • Threat intelligence in cyber security domain utilising big data solutions such as Hadoop
  • Intelligent methods to manage, share, and receive logs and data relevant to variety of adversary group
  • Interpretation of cyber threats and forensic data utilising intelligent data analysis techniques
  • Generate intelligence of existing cyber security data generated by different monitoring and defence solutions
  • Automated and intelligent methods for generation of adversary groups profile
  • Automated integration of analysed data within incident response and cyber forensics capabilities

Important Dates:

Paper submission due: December 31st, 2021
First-round acceptance notification: March 30, 2022
Revision submission: May 1, 2022
Notification of final decision: June 1, 2022
Submission of final paper: July 15, 2022
Publication date: 4th Quarter of 2022

Guest Editors:

Dr Gautam Srivastava, Brandon University, Canada
Dr Jerry Chun-Wei Lin, WNUAS, Norway
Dr Md Atiqur Rahman Ahad, Osaka University, Japan

All the papers should be formatted in the standard Evolutionary Intelligence format. See the Instructions for Authors at the Journal’s homepage. All submissions should be submitted through online submission system of Evolutionary Intelligence, Editorial Manager.