BEGIN:VCALENDAR PRODID:-//Microsoft Corporation//Outlook MIMEDIR//EN VERSION:1.0 BEGIN:VEVENT DTSTART:20121114T003000Z DTEND:20121114T020000Z LOCATION:250-AB DESCRIPTION;ENCODING=QUOTED-PRINTABLE:ABSTRACT: Cyber security increases in complexity and network connectivity every day. Todays problems are no longer limited to malware using hash functions. Interesting problems, such as coordinated cyber events, involve hundreds of millions to billions of nodes and similar or more edges. Nodes and edges go beyond single attribute objects to become multivariate entities depicting complex relationships with varying degree of importance. To unravel cyber securitys big data, novel and efficient algorithms are needed to investigate graphs and signatures. We bring together domain experts from various research communities to talk about current techniques and grand challenges being researched to foster discussion. SUMMARY:Cyber Securitys Big Data, Graphs, and Signatures PRIORITY:3 END:VEVENT END:VCALENDAR BEGIN:VCALENDAR PRODID:-//Microsoft Corporation//Outlook MIMEDIR//EN VERSION:1.0 BEGIN:VEVENT DTSTART:20121114T003000Z DTEND:20121114T020000Z LOCATION:250-AB DESCRIPTION;ENCODING=QUOTED-PRINTABLE:ABSTRACT: Cyber security increases in complexity and network connectivity every day. Todays problems are no longer limited to malware using hash functions. Interesting problems, such as coordinated cyber events, involve hundreds of millions to billions of nodes and similar or more edges. Nodes and edges go beyond single attribute objects to become multivariate entities depicting complex relationships with varying degree of importance. To unravel cyber securitys big data, novel and efficient algorithms are needed to investigate graphs and signatures. We bring together domain experts from various research communities to talk about current techniques and grand challenges being researched to foster discussion. SUMMARY:Cyber Securitys Big Data, Graphs, and Signatures PRIORITY:3 END:VEVENT END:VCALENDAR