Program of the Workshop 2021

Time (EST)

Time (CET)

Title of the talk




Opening Remarks and Welcome

Andrii Shalaginov



S08201: Template Clustering for the Foundational Analysis of the Dark Web

Viswajit Vinod Nair, Dion Oosterman, and Mark van Staalduinen



S08202: A Convolutional Autoencoder Based Method with SMOTE for Cyber Intrusion Detection

Xinyi She and Yuji Sekiya



S08203: Privacy-Preserving Framework to Facilitate Shared Data Access for Wearable Devices

Dane Troyer, Justin Henry, Hoda Maleki, Gokila Dorai, Bethany Sumner, Gagan Agrawal, and Jon Ingram



S08204: Gun Violence News Information Retrieval using BERT as Sequence Tagging Task

Hung-Yeh Lin, Teng-Sheng Moh, and Bryce Westlake



Coffee Break



S08211: Securing Smart Future: Cyber Threats and Intelligent Means to Respond

Andrii Shalaginov and Tor-Morten Grønli



S08208: Pattern Recognition and Reconstruction: Detecting Malicious Deletions in Textual Communications

Abiodun Abdullahi SOLANKE, Xihui Chen, and Yunior Ramirez-Cruz



S08210: A Semi Supervised Multi-relational Graph Convolutional Network for Uncovering Key Actors on Hackforums

Nikita Saxena and Vinti Agarwal



S08207: AMoC: A Multifaceted Machine Learning-based Toolkit for Analysing Cybercriminal Communities on the Darknet

Chao Chen, Claudia Peersman, Matthew Edwards, Ziauddin Ursani, and Awais Rashid



Coffee Break



Tales from the Cloud

Keynote speaker: Ashwin Ram

Check Point Software Technologies, Australia



N202: Digital Forensics Process of an Attack Vector in ICS environment

Todd Mason and Bing Zhou



Closing Remarks

Andrii Shalaginov


Program v. 22.11.2021 (timeslotes are in EST and CET timezones)

Introduction and Scope

Following the positive feedback and great interest last year, we are delighted to announce the 5th International Workshop on Big Data Analytic for Cybercrime Investigation and Prevention, co-located with IEEE Big Data 2021 conference in Orlando, Florida, USA that takes place VIRTUALLY on December 15-18, 2021.

Covid-19 Information

The safety and well-being of all conference participants is our priority. After evaluating the current COVID-19 situation, the decision has been made to transform face-to-face IEEE Big Data 2021 conference into a digital format – IEEE Big Data 2021 will now be an online event.

The big data paradigm has become an inevitable aspect of today's digital forensics investigations. Acquiring a forensic copy of seized data mediums already takes several hours due to the increasing storage size. In addition are several other time-consuming laboratory analysis steps required, such as evidence identification, corresponding data preprocessing, analysis, linkage, and final reporting. These steps have to be repeated for every physical device examined in the criminal case. Conventional digital forensics data preprocessing and analysis methods struggle when handling the contemporary variety, variability, volume and velocity of case data. Thus, proactive approaches have to be developed and integrated in daily law enforcement operations; for timely detection and prevention of the illegal activities in a data-intensive environments. Thus, there is a need for advanced big data analytics to aid in cyber crime investigations, which requires novel approaches for automated analysis. This workshop is organized to bring together recent development in big data analysis to aid in current challenges in cybercrime investigations.

Research Topics of Interest

The topics of the workshop are as following, but not limited to:

Algorithm areas

- Machine Learning-aided analysis

- Graph-based detection

- Topic modelling

- Improvements of existing methods

- Decision Support Systems


- Novel datasets

- New data formats

- Digital Forensics data simulation

- Anonymised case data

- New data formats and taxonomies


- Secure collaborative platforms

- Distributed storage and processing

- Technologies for data streams

- Hardware / software architectures for large-scale data

Application areas

- Cyber Threats Intelligence

- Network Forensics Readiness

- Malware Analysis & Detection

- Emails mining & Authorship Identification

- Social Network Mining

- Events correlations

- Access Logs analysis

- Mobile Forensics

- Fraud Detection

- Database Forensics

- IoT Forensics

- Blockchain technologies

- Industrial systems

Important dates

Oct 20, 2021 (Oct 1): Due date for full workshop paper submissions

Nov 10, 2021 (Nov 1): Notification of paper acceptance to authors

Nov 20, 2021 (Nov 15): Latest due date for camera-ready of accepted papers

Dec 15-18 , 2021: Workshops and conference

Program Chairs

  • Andrii Shalaginov

    Kristiania University College

  • Asif Iqbal

    KTH Royal Institute of Technology

  • Igor Kotsiuba

    Pukhov Institute for Modelling in Energy Engineering

  • Mamoun Alazab

    Charles Darwin University

Technical Program Committee

Ajit Kumar (Soongsil University)

Aleksandar Jevremovic (Singidunum University)

Andrei Costin (University of Jyväskylä)

Bing Zhou (Sam Houston State University)

Cristian Bucur (Ecole Polytechnique de Montréal)

Gebremariam Assres (Kristiania University College)

Inna Skarga-Bandurova (Pukhov Institute for Modelling in Energy Engineering)

Junaid Arshad (Birmingham City University)

Lester Allan Lasrado (Kristiania University College)

Marko Krstic (Regulatory Agency for Electronic Communications and Postal Service)

Mohamed Abomhara (Norwegian University of Science and Technology)

Naw Safrin Sattar (University of New Orleans)

Ogerta Eleza (University of Tirana)

Olaf M. Maennel (Tallinn University of Technology)

Panagiotis Bellonias (Bournemouth University)

Piotr A. Kowalski (AGH University of Science and Technology)

Raffaele Olivieri (Cyber Security Manager)

Sanjay Kumar (University of Jyväskylä)

Shih-Chieh Su (‎Amazon)

Sule Yildirim Yayilgan (Norwegian University of Science and Technology)

Thippa Reddy G (Vellore Institute Of Technology)

Vasileios Mavroeidis (University of Oslo)

Vasilis Katos (Bournemouth University)

Vinayakumar Ravi (Prince Mohammad Bin Fahd University)

Vinti Agarwal (Birla Institute of Technology & Science)

Keynote Speakers

Ashwin Ram

Check Point Software Technologies, Australia

Title:Tales from the Cloud

Abstract: In this talk, Ashwin Ram, from the Office CTO at Check Point Software Technologies will share insights and lessons from the Check Point Incident Response Team. Ashwin will share the latest techniques and tactics used by threat actors as they target organisations ill equipped to prevent the latest cloud based cyber-attacks. He will also be sharing recommendations that must receive the most urgent attention for any cloud users.

Bio: As a Cyber Security Evangelist with the office of the CTO at Check Point Software Technologies, Ashwin Ram has been helping business leaders make smarter, more insightful cyber-security decisions for over 10 years. He does this by ensuring cyber-security strategies are designed to achieve cyber-resilience and in line with your business strategies. He focuses on both, pre and post infection security controls across corporate networks, cloud, endpoints, mobile and IoT to ensure your cyber-strategy delivers a competitive advantage to your organisation. Ashwin has delivered technical trainings, cyber-security boot camps, assisted with designing and remediating cyber-security solutions across many organisations within APAC. He is passionate about cyber-security and regularly shares his knowledge on the current threat landscape at various cyber-security conferences across the globe.

Paper Submission

The authors are invited to submit: full-length papers (up to 10 pages IEEE 2-column format), short papers (4-6 pages IEEE 2-column format) or abstract papers (up to 4 page IEEE 2-column format) through the online submission system. Page count includes references, figures and tables.

Paper Submission Page

Papers should be formatted to IEEE Computer Society Proceedings Manuscript Formatting Guidelines:


The authors of accepted papers must guarantee their presence at the conference for the papers to be published in the conference proceedings. At least one author of each accepted paper must register for the conference in order to include the paper in the proceedings.


Selected papers will be nominated for submission to the book: Trust, Security and Privacy for Big Data . Extended papers should have at least 60% of new material and will be sent through a review process to ensure the quality of contributions.