Call for Papers
November 9-10, 2016, London, UK
International Conference on Tools for Analytics, Visualisation and Data Mining (Tools 2016) is an international referred conference dedicated to the advancement of Tools for analytics, visualisation and data mining, analysis of security incidents, alerts and the use of analysis techniques such as visualisation and data mining.
The aim of the Tools 2016 is to encourage participation and promotion of collaborative scientific, industrial and academic inter-workings among individual researchers, practitioners, members of existing associations, academia, standardisation bodies, and including government departments and agencies. The purpose is to build bridges between academia and industry, and to encourage interplay of different cultures.
Tools 2016 invites researchers and industry practitioners to submit papers that encompass principles, analysis, design, methods and applications. All submitted papers are independently peer-reviewed.
Tools 2016 is co-located with other conferences part of Security Management 2016.
- Posters will be presented during the conference.
- An Industry track is available for discussing and publishing pilot and proof of concepts.
- A Work in Progress track is available for preliminary work.
- A Research Ideas track is available for ideas in early stages assessment.
- A PhD Seminar track is available for discussing and publishing early PhD thesis research.
Full paper submission should be via Easychair Conference Site
Topics of Interest
Original papers are invited on recent advances in Tools and Techniques for analytics, visualisation and data mining for the protection of business information processing systems. The main themes in Tools 2016 include but not limited to:
Tools for Analytics and Visualisation
- Analysis Tools and Techniques
- Open Source Tools
- Techniques and Algorithms
- Visual Analytic Tools
- Security Monitoring & Visual Analytic Tools
Tools for Data Mining
- Data Mining
- Neural Networks
- Knowledge-based Learning
- Social Networks
- Graph Theory
- Data Fusion
- Rule-Based Systems
- Adaptive Learning Systems
- Tools Optimisation and Efficiency
- Tools Interface Requirement and Operation
- Security in Open Source Tools
- Penetration Testing and Methodologies
- Vulnerability Assessment Tools and Methodologies
- Tools for Threat Profiling and Analysis
All the accepted papers will appear in the proceedings!
The best paper of each section will be selected and their author(s) will receive a corresponding Award Certificate.
Authors of the Best 20%-25% papers presented at the conference will be invited to adapt their papers for their publication in one of the special issues peer reviewed journals.