CONF-MLA 2024

Organizer

Deakin University


Workshop Chair

Dr. Ansam Khraisat
Lecturer in Deakin University

Personal Bio:

Dr. Ansam Khraisat is a cybersecurity lecturer and member of Centre for Cyber Resilience and Trust (CREST). School of Info Technology Deakin University, Australia. She is a cyber security researcher and practitioner with industry and academic experience. She worked as a Postdoctoral Research Fellow at the RMIT Centre of Cyber Security Research and Innovation and as a lecturer of Cyber Security at RMIT University, Australia. Ansam is a cyber security researcher and practitioner with industry and academic experience. She received her PhD degree in cybersecurity from the Federation University of Australia, School of Science, Information Technology and Engineering. Dr. Ansam's research is multidisciplinary that focuses on cyber security with a focus on cybercrime detection and prevention. She is a member of the woman in Cybersecurity. She presented at many invited keynotes talks and panels, at conferences and venues nationally and internationally.

Workshop Committee Members:

Dr. Muna Al-Hawawreh, Deakin University, [email protected]

Workshop Description:


Call for Papers

The workshop "Securing the Future: Empowering Cyber Defense with Machine Learning and Deep Learning" aims to delve into the synergistic potential of machine learning (ML) and deep learning (DL) techniques in fortifying cyber defense mechanisms against the relentless onslaught of cyber threats in today's digital landscape. With the proliferation of interconnected systems and the exponential growth of digital data, traditional cybersecurity paradigms are increasingly challenged to adapt to the evolving tactics of cybercriminals. This workshop serves as a platform to explore how the fusion of AI-driven analytics with cybersecurity can revolutionize threat detection and response strategies, offering organizations dynamic and proactive defenses to safeguard their digital assets.

The goal of this workshop is to equip participants with a comprehensive understanding of ML and DL techniques as applied to cybersecurity, providing them with the knowledge and tools necessary to enhance the effectiveness and efficiency of their defense mechanisms. By leveraging AI algorithms to analyze network traffic, detect anomalies, and predict potential threats in real-time, organizations can bolster their resilience against cyber attacks. Participants will have the opportunity to delve into fundamental concepts of ML and DL, explore practical applications in threat detection and malware analysis, and gain hands-on experience in implementing these techniques in real-world cybersecurity scenarios. Moreover, the workshop will delve into emerging trends and future directions in ML/DL-enabled cybersecurity, empowering participants to stay ahead of evolving cyber threats and safeguard their digital assets with precision and agility.

Keywords

  • Intrusion Detection
  • Cybersecurity
  • Machine Learning
  • Deep Learning
  • Cyber Defense

Background:

The exponential growth of digital data and interconnected systems has fueled a parallel rise in cyber threats, ranging from targeted attacks to sophisticated malware. Traditional cybersecurity methods, reliant on static rules and signatures, often struggle to keep pace with the evolving tactics of cybercriminals. In response, the fusion of artificial intelligence (AI) and cybersecurity has emerged as a potent strategy to fortify defenses. Machine learning (ML) and deep learning (DL) techniques, capable of discerning complex patterns from vast datasets, offer a dynamic and proactive approach to threat detection and mitigation. By leveraging AI algorithms to analyze network traffic, identify anomalies, and predict potential threats, organizations can bolster their resilience against cyber attacks in an increasingly interconnected and digitally reliant world.

Goal/Rationale:

The goal of integrating machine learning and deep learning techniques into cybersecurity is to enhance the effectiveness and efficiency of threat detection and response mechanisms. By harnessing the power of AI-driven analytics, organizations can augment their traditional cybersecurity measures with adaptive and proactive defenses. The rationale behind this approach lies in the recognition that static and rule-based systems are no longer sufficient to combat the ever-evolving landscape of cyber threats. ML and DL techniques offer the capability to analyze vast amounts of data in real-time, identify subtle patterns indicative of malicious activity, and enable rapid response to security incidents. Ultimately, the goal is to empower organizations to stay one step ahead of cyber adversaries and safeguard their digital assets with greater precision and agility.

Scope and Information for Participants:

Participants in this workshop will gain a comprehensive understanding of machine learning and deep learning techniques as applied to cybersecurity. The scope of the workshop covers fundamental concepts in ML and DL, practical applications in threat detection, anomaly detection, and malware analysis, as well as hands-on experience in implementing these techniques in real-world cybersecurity scenarios. Participants will learn best practices for data preprocessing, model selection, and evaluation metrics, equipping them with the knowledge and skills needed to integrate ML/DL into their organization's cybersecurity workflows effectively. Additionally, the workshop will explore emerging trends and future directions in ML/DL-enabled cybersecurity, providing participants with valuable insights into staying ahead of evolving cyber threats.

Submission

Prospective authors are kindly invited to submit full papers that include title, abstract, introduction, tables, figures, conclusion and references. It is unnecessary to submit an abstract in advance. The deadline for general submission is November 26, 2024.

Each paper should be no less than 4 pages. One regular registration can cover a paper of 6 pages, and additional pages will be charged. Please format your paper well according to the conference template below before submission.

Paper Template

Please prepare your paper in both .doc/.docx and .pdf format and submit your full paper by email with both formats attached directly to [email protected].

Workshop Date

October 1st, 2024 (GMT+1)

Submission & Payment

Type Regular Submission
Paper Submission November 26, 2024
Review Process 2 weeks
Revise & Acceptance 2 weeks
Registration & Payment 2 weeks

Fees

Items Amount(VAT Included)
Registration and Publishing Fee (6 pages included) $500
Additional Page $40/extra page

Publication

Accepted papers of this workshop will be published in conference proceedings, and will be submitted to Ei Compendex, Conference Proceedings Citation Index (CPCI), Crossref, Portico, Inspec, Google Scholar, CNKI, and other databases for indexing. The situation may be affected by factors among databases like processing time, workflow, policy, etc.

Participation


Poster

Besides the onsite meeting, this workshop also holds a poster session which allow for a larger number of authors to share their research. The poster session will provide an opportunity for researchers to present their work in a visual and interactive way, allowing for more engagement and discussion with other attendees. Authors of qualified papers will be invited to present their works with digital posters. We believe that this online poster session will still be a great platform for participants to share, discuss, and cooperate.

All accepted authors will receive an invitation email to present a poster at this workshop. Please note that all poster presenters must submit the poster before November 26, 2024.

Guidelines for Poster Presentation

  1. Poster presentations must be prepared using the template provided:
    *Poster layout template for poster presentation (download)
    *Poster layout background (download)
  2. Posters should generally be in A1 size (width: 594mm x height: 841mm) and include the followings:
    Title, author and co-author names, and the affiliation(s) information. Body parts, including "Abstract", "Introduction", "Methods", "Results", "Discussion" and "Conclusions".
  3. Presenters are suggested to set the font size properly and avoid placing anything at the margin part of the poster as it will be difficult to view.
  4. Posters should be well illustrated. All the pictures used should be high quality and with high resolution.
  5. All the posters will be displayed online on the official website. Each poster will have both a small thumbnail and a full-size version.
  6. Posters will be displayed during the online session. After the presentation is over, the full-size version of all posters will become invisible. But thumbnails still can be seen on the website.

(You can refer to the instructions for more detailed information. Additional presentation guidelines may be announced by workshop committees.)

Venue

221 Burwood Highway, Melbourne, Victoria, 3125, Australia

VISA

https://immi.homeaffairs.gov.au/home

In order to ensure the information is correct and up to date, there may be changes which we are not aware of. And different countries have different rules for the visa application. It is always a good idea to check the latest regulations in your country. You should confirm details with your local Consular Office. This page just gives some general information of the visa application.


Australia Visa Information

Do I need a visa to enter Australia?

Unless you are an Australian citizen, you will need a valid Australian visa to enter the country. New Zealand passport holders can apply for a visa upon arrival in the country. All other passport holders, regardless of age, must apply for a visa before leaving home. You can apply for a range of Australian visa types, including tourist visas and working holiday visas, at your nearest Australian Embassy or Consulate. You can also apply for certain types of visas on the Australian Department of Home Affairs website.

Electronic Travel Authority Visa (subclass 601)

This visa allows you to visit Australia as many times as you want, for up to a year, and stay for three months each visit. This visa is available to passport holders from a number of countries and regions, who live outside Australia. A step-by-step guide on how to apply is here.

E-Visitor (subclass 651)

This is a free visa for multiple visits to Australia for tourism or business purposes for up to three months at a time within a 12-month period. This visa is available to passport holders from a number of European countries and it cannot be extended.

Visitor visa (subclass 600)

The Visitor visa allows you to visit Australia, either for tourism or business purposes. It is open to all nationalities. Generally, a period of stay of up to three months is granted, but up to 12 months may be granted in certain circumstances. Applicants will have to pay a fee to submit their application.

How can I apply for an Australian tourist visa?

The application process may differ depending on which visa you need. You can only apply for the Electronic Travel Authority visa (subclass 601) through the Australian ETA app. A step-by-step guide on how to apply is located here.

For other visas, you can apply online by creating an ImmiAccount and completing the application process. Be sure to submit your application well in advance of your travel date to allow enough time for processing. You may be asked to provide further supporting information. You will be notified in writing if your tourist visa is approved and it will be digitally linked to your passport.

For more information on different visa types, and Australian visa requirements including how to apply for an Australian visa, visit the Department of Home Affairs website.