Final Call for Papers: 3rd International Workshop on Cyberpatterns, Oxford, UK, April 2014...

Do you have a question? Post it now! No Registration Necessary.  Now with pictures!

Call For Papers: CyberPatterns 2014  

The 3rd International Workshop on Cyberpatterns: From Big Data to Reusable  
at The 8th International Symposium on Service-Oriented System Engineering (
SOSE 2014) ( )  
Oxford, UK. April 7 – 11, 2014  


Paper submissions:  
Jan. 3, 2014  
Jan. 17, 2014  
Camera-ready copies:  
Feb. 7, 2014  

Please see workshop website.  



IEEE Computer Society  
BCS Information Security Specialist Group  
BCS Formal Aspects of Computing Science Specialist Group  
BCS Cybercrime Forensics Specialist Group  


A pattern represents a discernible regularity in the  
world or in manmade designs. In the prescriptive  
view, a pattern is a template from which instances can  
be created; while in the descriptive view, the elements  
of a pattern that repeat in a predictable manner can be  
observed and recognised. Similar to theories in  
sciences, patterns explain and predict regularities in a  
subject domain. In a complicated subject domain like  
cyberspace, there are usually a large number of  
patterns that each describes and predicts a subset of  
recurring phenomena, yet these patterns can interact  
and interfere with each other and be coordinated and  
composed together. The pattern-oriented research  
method studies a subject domain by identifying the  
patterns, classifying and categorising them, organising  
them into pattern languages, scoping their boundaries,  
investigating the interactions between them, devising  
mechanisms and operations for detecting and  
predicting their occurrences, and facilitating their  
instantiation or simulation.  

The workshop is the successor to the two  
Cyberpatterns workshops run in Abingdon, Oxford in  
2012 and 2013. Cyberpatterns 2014 workshop will  
continue with an expanded scope beyond the previous  
focus on security. The theme of the workshop is  
cyberpatterns, i.e. patterns in cyberspace. Typical  
examples of such cyberpatterns include user  
behaviour patterns, server workload patterns, network  
traffic patterns, social network patterns (such as Small  
World and Power Law of scale-free networks),  
recommendation and system usage patterns, Web  
usability patterns, attack patterns, security patterns,  
patterns of vulnerabilities, etc.  

With the availability of large volumes of data that  
are observed and recorded in cyberspace, and the rapid  
development of big data processing techniques and  
facilities, a key scientific and engineering research  
question is how to discover patterns from big data.  
The goal of the workshop is to provide an  
international forum for researchers and practitioners to  
exchange research results, identify practical and  
research problems, and envision research directions  
that address this problem.  


The topics cover all aspects of cyberpatterns,  
including, but not limited to, the following:  

1) Scientific foundation of pattern-oriented research  
methods for systematic analysis of big data in order to  
discover the reusable knowledge.  

2) Engineering practice in the development of  
platforms, algorithms and tools for analysis of big data  
for pattern discovery and applications.  

3) Construction of infrastructure for a sharable  
knowledge-base of cyberpatterns, e.g. in aiding system  
design for practitioners and teaching students, with  
possible tool support to guide usage by developers.  

4) Experiments and case studies in developing and  
using cyberpatterns, as well as experience reports.  

5) Identification of research problems and  
understanding issues that hamper wider adoption of  
cyberpatterns and suggesting remediation measures.  

6) Future vision of the use of cyberpatterns in novel  
cyber domains, such as the cloud or cyberphysical  
systems, and innovative uses of design patterns such  
as in pattern recognition.  

Some indicative topics include, but are not  
restricted to:  
Security, attack, advanced cyber threat and forensic patterns  
Design patterns, dependable and trustworthy patterns  
Enterprise and architectural patterns  
User behavior, system usage, network traffic patterns  
Patterns in social network, cyberphysical and cloud systems  
Big data, data mining, machine learning, statistical data analysis  
Pattern visualization, simulation, anomaly detection  


The submissions must in IEEE Conference  
Proceedings Format. The page limit is 6 pages for full  
papers and 2 pages for position papers.  

Submissions must be in PDF format and uploaded  
to the submission website at the following URL:

Each submission will be reviewed independently  
by three PC members and selected according to its  
technical quality, relevance, originality, significance  
and clarity.


Clive Blackwell,  
Dept of Computing and  
Communication Technologies,  
Oxford Brookes University,  
Oxford OX33 1HX, UK.  
Tel: +44 1784 255871.  

Dr. Daniel Rodriguez,  
Dept of Computer Science,  
University of Alcalá,  
Ctra. Barcelona Km 33.6,  
28871 -Alcalá de Henares,  
Madrid, Spain.  
Tel: +34 91 885 6933.  

Prof. Hong Zhu,  
Dept of Computing and  
Communication Technologies,  
Oxford Brookes University,  
Oxford OX33 1HX, UK.  
Tel: +44 1865 484580.  


The proceedings of the workshop will be  
published as a part of SOSE 2014 conference  
proceedings and included in the IEEE Digital Library.  
Each accepted paper must have an author registered  
for the conference and present the paper at the  
workshop for it to be included in the proceedings.  

Prof. Jonathan Bowen
Professor of Computer Science, Birmingham City University
Emeritus Professor, London South Bank University
Chairman, Museophile Limited

Site Timeline