<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=us-ascii">
<meta name="Generator" content="Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
{font-family:"Cambria Math";
panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
{font-family:Calibri;
panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{margin:0cm;
margin-bottom:.0001pt;
font-size:11.0pt;
font-family:"Calibri",sans-serif;
mso-fareast-language:EN-US;}
a:link, span.MsoHyperlink
{mso-style-priority:99;
color:#0563C1;
text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
{mso-style-priority:99;
color:#954F72;
text-decoration:underline;}
span.EmailStyle17
{mso-style-type:personal-compose;
font-family:"Calibri",sans-serif;
color:windowtext;}
.MsoChpDefault
{mso-style-type:export-only;
font-family:"Calibri",sans-serif;
mso-fareast-language:EN-US;}
@page WordSection1
{size:612.0pt 792.0pt;
margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang="EN-AU" link="#0563C1" vlink="#954F72">
<div class="WordSection1">
<p class="MsoNormal">Apologies for cross posting <o:p></o:p></p>
<p class="MsoNormal">######################################################################<o:p></o:p></p>
<p class="MsoNormal"> CALL FOR PAPERS<o:p></o:p></p>
<p class="MsoNormal">International Workshop on Machine Learning Algorithms for Cybersecurity (MLACS'19)
<o:p></o:p></p>
<p class="MsoNormal">in conjunction with the 2019 IEEE/WIC/ACM International Conference on Web Intelligence (WI'19)
<o:p></o:p></p>
<p class="MsoNormal">in Thessaloniki, Greece, October 14, 2019<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">Website: https://tau.usq.edu.au/MLACS2019/<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">######################################################################<o:p></o:p></p>
<p class="MsoNormal">full paper submission: July 10, 2019<o:p></o:p></p>
<p class="MsoNormal">Notification of acceptance: August 10, 2019<o:p></o:p></p>
<p class="MsoNormal">Camera-ready submission: August 20, 2019 <o:p></o:p></p>
<p class="MsoNormal">Workshop date: October 14, 2019<o:p></o:p></p>
<p class="MsoNormal">######################################################################<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">Cyber Security is an area of growth with employment opportunities abound. Many universities in Australia and overseas have started offering niche cyber security programs. Along the same note, there is a growth in the number of research
students in Cyber Security, indicating demand for this upcoming domain. Recent trends indicate that machine learning is a key aspect in Cyber Security due to the volume of information crossing global networks, and the individual data associated with this information.
In this workshop, we will be discussing the modern machine learning algorithm development, implementation and utilisation in business scenarios specific to Cyber Security.<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">+++++++++++++++++++<o:p></o:p></p>
<p class="MsoNormal">Topics of Interest<o:p></o:p></p>
<p class="MsoNormal">+++++++++++++++++++<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">TOPICS AND AREAS INCLUDE, BUT ARE NOT LIMITED TO <o:p></o:p></p>
<p class="MsoNormal">• Machine learning theory on cyber security<o:p></o:p></p>
<p class="MsoNormal">• Advanced machine learning methods on cyber security<o:p></o:p></p>
<p class="MsoNormal">• Applications of machine learning in cyber security<o:p></o:p></p>
<p class="MsoNormal">• Pattern recognition in cyber security<o:p></o:p></p>
<p class="MsoNormal">• Privacy protection and management with machine learning techniques<o:p></o:p></p>
<p class="MsoNormal">• Social engineering with machine learning and cyber security<o:p></o:p></p>
<p class="MsoNormal">• Network and computer security in organizations<o:p></o:p></p>
<p class="MsoNormal">• Combating software and hardware piracy with machine learning techniques<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">++++++++++++++++++++++++++++++++++++<o:p></o:p></p>
<p class="MsoNormal">On-Line Submissions and Publication <o:p></o:p></p>
<p class="MsoNormal">++++++++++++++++++++++++++++++++++++<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">Paper submissions should be limited to 6 pages for regular papers or 4 pages for short papers in ACM 2-column format. All submitted papers will be reviewed by at least 2 program committee members on the basis of technical quality, relevance,
significance, and clarity. Accepted papers will be published in the conference workshop proceedings by ACM and indexed by EI.<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">Submission link: <o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">https://wi-lab.com/cyberchair/2019/wi19/scripts/submit.php?subarea=S09&undisplay_detail=1&wh=/cyberchair/2019/wi19/scripts/ws_submit.php<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">++++++++++++++++++++++++<o:p></o:p></p>
<p class="MsoNormal">Organising Committee<o:p></o:p></p>
<p class="MsoNormal">++++++++++++++++++++++++<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">PROGRAM CO-CHAIRS<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">Dr. Xiaohui Tao University of Southern Queensland, Australia
<o:p></o:p></p>
<p class="MsoNormal">Dr. Xujuan Zhou University of Southern Queensland, Australia<o:p></o:p></p>
<p class="MsoNormal">Prof. Raj Gururajan University of Southern Queensland, Australia<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">PROGRAM COMMITTEE <o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">Fu Lee Wang Caritas Institute of Higher Education, Hong Kong SAR<o:p></o:p></p>
<p class="MsoNormal">Xiaoying Gao Victoria University of Wellington, New Zealand<o:p></o:p></p>
<p class="MsoNormal">Tak-Lam Wong Caritas Institute of Higher Education, Hong Kong SAR<o:p></o:p></p>
<p class="MsoNormal">Zhaoqing Pan Nanjing University of Information Science and Technology, China<o:p></o:p></p>
<p class="MsoNormal">Yiming Zhao Wuhan University, China<o:p></o:p></p>
<p class="MsoNormal">Yongrui Qin University of Huddersfield, UK<o:p></o:p></p>
<p class="MsoNormal">Wenping Zhang Renmin University of China, China<o:p></o:p></p>
<p class="MsoNormal">Bing (Jenny) Zhou Sam Houston State University, United States<o:p></o:p></p>
<p class="MsoNormal">Yuxiang Zhao Wuhan University, China<o:p></o:p></p>
<p class="MsoNormal">Jianming Yong University of Southern Queensland<o:p></o:p></p>
<p class="MsoNormal">KC Chan University of Southern Queensland<o:p></o:p></p>
<p class="MsoNormal">Ravinesh Deo University of Southern Queensland
<o:p></o:p></p>
<p class="MsoNormal">Zhangguang Wu Fujian Chuanzheng Communications College, China<o:p></o:p></p>
<p class="MsoNormal">Jang Bahadur Singh Indian Institute of Management Tiruchirappalli India
<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">++++++++++++++++++++++++<o:p></o:p></p>
<p class="MsoNormal">General Enquiry<o:p></o:p></p>
<p class="MsoNormal">++++++++++++++++++++++++<o:p></o:p></p>
<p class="MsoNormal">MLACS2019@gmail.com<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
</div>
<PRE>
_____________________________________________________________
This email (including any attached files) is confidential and is for the intended recipient(s) only. If you received this email by mistake, please, as a courtesy, tell the sender, then delete this email.
The views and opinions are the originator's and do not necessarily reflect those of the University of Southern Queensland. Although all reasonable precautions were taken to ensure that this email contained no viruses at the time it was sent we accept no liability for any losses arising from its receipt.
The University of Southern Queensland is a registered provider of education with the Australian Government.
(CRICOS Institution Code QLD 00244B / NSW 02225M, TEQSA PRV12081 )
</PRE></body>
</html>