Workshop on 
Data Mining for Cyber Threat Analysis

in conjunction with

IEEE International Conference on Data Mining
December 9-12, 2002
Maebashi TERRSA, Maebashi City, Japan


Aleksandar Lazarevic

University of Minnesota
200 Union Street SE
4-192, EE/CSci Building

Minneapolis, MN 55455

Phone: (612) 626-8096

Fax: (612) 626-1596


Vipin Kumar

University of Minnesota

200 Union Street SE
4-192, EE/CSci Building

University of Minnesota, Minneapolis, MN 55455

Phone: (612) 624-8023

Fax: (612) 625-0572


Jaideep Srivastava

University of Minnesota
200 Union Street SE
4-192, EE/CSci Building

Minneapolis, MN 55455

Phone: (612) 626-8107

Fax: (612) 626-1596











      NEW!!!            Program now available !!!!!

Proceedings of Abstracts now available !!!!! 

Objective and content:

People have always depended upon information technology of some type, beginning with smoke signals in ancient days and turning into network-based computer systems today. Information technology becomes an essential part of the way various organizations function. Nowadays, the computers control power, oil and gas delivery, communications, transportation, banking and financial services. They are used to store and exchange vital information, from publicly know facts to well kept secrets.

Notwithstanding the tremendous benefits that the emergence of this technology brings, there is inevitably an escalation of “dark side of the force” in the form of cyber terrorism. As a form of convergence between cyberspace and terrorism, cyber terrorism “refers to unlawful attacks and threats of attack against computers, networks, and the information stored therein when done to intimidate or coerce a government or its people …”.

As the cost of the information processing and Internet accessibility falls, more and more organizations will be vulnerable by potential cyber threats. According to a recent research survey, cyber attacks have increased by almost 80 percent over the last six months. This indicates that there is an urgent need to expand efforts in the battle against cyber terrorism. The key question is whether contemporary computer technologies such as artificial intelligence and data mining can contribute to this battle and further enhance defense mechanisms.

The main aim of the workshop on cyber threat analysis is to bring together leading figures from academia, military, government and industry to assess the state-of-the-art in the area as well as to explore the applications of data mining to address the problem of cyber threat analysis.

Format of the workshop:

The format of the workshop will consists of one or two plenary talks by key people in the field and oral presentations by authors of selected papers followed by possible panel discussion comprising the best presenters. The workshop may vary in length with an expected duration from half a day up to one day.

 Topics of Interest:

·        Methods to identify the most critical infrastructures

·        Methods to detect cyber terrorist attacks

·        Methods to protect against cyber terrorism

·        Information assurance

·        Intrusion detection and analysis via data mining

·        Data mining in forensic

·        Credit card fraud analysis

·        Economic espionage




Important Dates

October  11, 2002:
Submissions Due
October 30, 2002:
Acceptance Notification
November 15, 2002:
Camera Ready Copy Due
December 9, 2002:
Workshop Day

Paper Format

Submissions on the related topics to data mining in cyber threat analysis are invited. We also encourage submissions, which present early stages of research work, military and government applications and solutions. Papers should not be more than 10 pages in 10 point font and single-spaced (excluding references), with one-inch margins on all sides. Contact author and email address should be specified on the title page.

Electronic Submission

Electronic submission either in PDF or PS format are strongly encouraged.

Please e-mail electronic submissions with subject "DMCTA2002" to: