Call For Papers

The 2nd Workshop on Cyber threAt huNTing And inTelligence in heAlthcare (CANTATA) 2024 Co-located with the 6th International Conference on Science of Cyber Security - SciSec 2024, 14-16 August 2024, Copenhagen, Danmark,

The threat landscape in healthcare applications has become wider, and systems are prone to more sophisticated cyberattacks. Better proactive evidence collection, analytics and countermeasures are needed. Threat hunting and intelligence are potential for addressing these challenges. Proactive, adaptive and dynamic threat hunting and intelligence approaches incorporate threat and evidence-driven knowledge to the target systems. This will allow systems to anticipate and mitigate threats well before they are realized and to prevent large-scale cybersecurity incidents in the world where cyberthreats are more and more emphasized and dynamical. The area of cyber threat hunting and intelligence research is evolving, but still lacks widely accepted methods and tools and applicable analysis techniques in healthcare. The effects of cyberthreats in healthcare services are not only restricted to data confidentiality and integrity but also, they may endanger precious lives. Therefore, new solutions for proactive, adaptive and dynamic threat hunting and intelligence are needed. In view of this, a strong research-based innovation and collaboration between healthcare experts, security experts, software architects and system developers are essential.
The workshop will provide a discussion platform for researchers in the field and an opportunity to share novel research on the topic. The outcome of the workshop will be an increased shared understanding of challenges and opportunities in systematic approaches to cyber threat hunting and intelligence, which are needed to support efficient construction and maintenance of secure healthcare systems.
Supported by the International Alliance for Strengthening Cybersecurity and Privacy in Healthcare (CybAlliance – project.

Topics of Interest
Topics of interest (in healthcare) comprise but are not limited to

  • Tackling threat complexity
  • Mitigating the challenges of data growth
  • Proactive gathering of evidence-based knowledge
  • Automation of threat hunting and intelligence
  • Effective threat countermeasures and response methods
  • Adaptive and proactive methods for threat hunting and intelligence
  • Efficient tools for threat-driven decision making
  • Intrusion and vulnerability detection intelligence
  • Threat and security metrics
  • Human factors in threat hunting
  • AI/ML/DL for threat hunting and intelligence
  • Collaborative knowledge and information sharing
  • Cognitive approaches for threat hunting
  • Knowledge transfer methodologies for threat hunting and intelligence
  • Mechanisms for identifying threat actors
  • Data analytics for threat hunting and intelligence

Topics of Interest
Topics of interest (in healthcare) comprise but are not limited to

Important Dates (Tentative)
Paper Submission Deadline: 7 April 2024
Acceptance Notification: 20 May 2024
Camera Ready Due: 30 May 2024
Conference Date: 14-16 August 2024

Paper Submission Guidelines
All papers need to be submitted electronically through the conference submission via the Easychair system with PDF format. At least one author of each accepted paper is required to register and present their work at the workshop; otherwise the paper will not be included in the proceedings.
Submitted papers must not substantially overlap with papers that have been published or that have been simultaneously submitted to a journal or a conference with proceedings. Submissions should be at most 12-15+ pages long (full paper), or 6-11 pages (short paper) including the bibliography and appendices and should follow the CCIS style.
Pre-proceedings will be made available at the workshop. Accepted conference papers are planned to be published by Springer in the CCIS collection.

Workshop Organizers
Reijo Savola
University of Jyväskylä, Finland

Habtamu Abie
Norwegian Computing Center, Norway

Shouhuai Xu
University of Colorado Colorado Springs, USA

Vasileios Mavroeidis
University of Oslo, Norway

Ali Dehghantanha
University of Guelph, Canada

Sandeep Pirbhulal,
Norwegian Computing Center, Norway

Program Committee (tentative)
Tapio Frantti, University of Jyväskylä, Finland
Sokratis Katsikas, Norwegian University of Science and Technology, Norway
Manos Athanatos, Foundation for Research and Technology Hellas, Crete
Dieter Gollmann, Hamburg University of Technology, Germany
Cristina Alcaraz, University of Malaga, Spain
Ilangko Balasingham, Oslo University Hospital, Norway
Kai Rannenberg, Goethe University Frankfurt, Germany
Mauro Conti, University of Padua, Italy
Joaquin Garcia-Alfaro, Telecom SudParis, France
Jari Partanen, Bittium, Finland
Vasileios Gkioulos, Norwegian University of Science and Technology, Norway
Fabio Martinelli, IIT-CNR, Italy
Ankur Shukla, IFE, Norway
Aapo Cederberg, Cyber Watch Finland, Finland
Christos Xenakis, University of Piraeus, Greece
Kurt Tutschku, Blekinge Institute of Technology, Sweden
Marios Anagnostopoulos, Aalborg University, Denmark
Ali Hassan Sodhro, Kristianstad University College, Sweden