Cyber Science 2015 Conference Programme - C

Transcription

Cyber Science 2015 Conference Programme - C
2015
Cyber Science 2015
Conference Programme
C-MRiC.ORG
8/06/2015
1
2015 International Conference on Cyber Situational Awareness,
Data Analytics and Assessment (CyberSA 2015)
In conjunction with
International Conference on Social Media, Wearable and Web Analytics
Cyber
Science
2015
(Social Media 2015)
International Conference on Cyber Security and Protection of Digital
Services (Cyber Security 2015)
International Conference on Cyber Incident Response, Coordination,
Containment & Control (Cyber Incident 2015)
London, United Kingdom. June 8 – 9, 2015
Monday, June 8, 2015
08:00 – 09:45
09:45 – 10:00
10:00 – 10:40
10:40 – 11:20
11:20 – 11:30
Registration, Networking and Refreshments in the Kensington Suite
Opening: Welcome Session
Gareth Niblett – Chair, BCS Information Security Specialist Group (ISSG), UK
Invited Speaker: Computer Evolution over the Next Decade: Fact or Fiction?
Professor Frank Wang – Professor of Future Computing & Head of School of Computing,
University of Kent, Canterbury, UK
Keynote: Situation Awareness in Vehicular Ad Hoc Networks
Dr Thomas Owens – Directory of Quality (ECE) & Senior Lecturer in Communications, Brunel
University London, London, UK
Coffee Break & Social Networking
CyberSA 2015
Track 1: Situation Awareness for Collaboration and Decision Making
11:30 – 12:15
Cross-Domain Situational Awareness and Collaborative Working for Cyber Security
Mark John Hall, Devon David Hansen and Kevin Jones
Improving Situational Awareness of Cyber Physical Systems based on Operator’s Goals
Jussi Timonen
Empirical Framework for Situation Awareness Measurement Techniques in Network Defense
Maria Evangelopoulou and Christopher W. Johnson
12: 15 – 12:30
Questions to Panel of Speakers
12:30 – 13:30
Lunch
CyberSA 2015
2
Track 2: Cyber Situation Awareness for Critical Infrastructure Protection
13:30 – 14:15
14:15 – 14:30
14:30 – 14:45
Development of Cyber Situation Awareness Model [Abstract / WIP]
Adenusi Dauda, Boniface Kayode Alese, Bamidele Moses Kuboye and Betty Aderonke Thompson
On Demand for Situational Awareness for Preventing Attacks on the Smart Grid
Yegor Shovgenya, Klaus Theuerkauf and Florian Skopik
Improving Security Decision under Uncertainty: A Multidisciplinary Approach
Hashem Dehghanniri, Emmanuel Letier and Herve Borrion
Questions to Panel of Speakers
Coffee Break & Social Networking
Cyber Security 2015
Track 1: Protection of Digital Services and Applications
14:45 – 16:05
15:50 – 16:05
16:05 – 16.20
Context Informed Intelligent Information Infrastructures for Better Situational Awareness
Christopher Laing and Paul Vickers
Potential Cyber-attacks against Global Oil Supply Chain
Muhammad Ali Nasir, Samia Nefti, Shizra Sultan and Umar Manzoor
Smart Activities Monitoring System (SAMS) for Security Applications [Abstract / WIP]
Kamran Dahri, Shakeel Rajput, Shahzad Memon and Lachman Das Dhomeja
Developing a Secure Remote Patient Monitoring System
Sarmistha Neogy and Sayantani Saha
Questions to Panel of Speakers
Coffee Break & Social Networking
Social Media 2015
Track 1: Social Media for Enhanced Cyber Situation Awareness
16:20 – 16:35
16:35 – 16:40
16:40 – 16:55
Privacy Awareness of Online Social Networking in Saudi Arabia
Hatoon AlSagri and Saad AlAboodi
Questions to Panel of Speakers
Coffee Break & Social Networking
Cyber Security 2015
Track 2: Cyber Security for Wireless Senor Network Applications
16:55 – 17:45
17:45 – 17:55
17:55 -
Security Management in Wireless Sensor Networks
Sarmistha Neogy
Chaos-Based Image Encryption Using an AONT Mode of Operation
Andrius Rickus, Eckhard Pfluegel and Nigel Atkins
An Efficient Remote Mutual Authentication Scheme using Smart Mobile Phone over Insecure
Networks
Ruhul Amin, SK Hafizul Islam, G.P. Biswas and Muhammad Khurram Khan
Questions to Panel of Speakers
Social Event: Drinks, Chat and Social Networking
3
2015 International Conference on Cyber Situational Awareness,
Data Analytics and Assessment (CyberSA 2015)
In conjunction with
International Conference on Social Media, Wearable and Web Analytics
Cyber
Science
2015
(Social Media 2015)
International Conference on Cyber Security and Protection of Digital
Services (Cyber Security 2015)
International Conference on Cyber Incident Response, Coordination,
Containment & Control (Cyber Incident 2015)
London, United Kingdom. June 8 – 9, 2015.
Tuesday, June 9, 2015
08:00 – 09:00
09:00 – 09:10
09:10 – 09:40
09:40 – 10:10
10:10 – 10:25
Day 2
Coffee/Tea, Networking and Refreshments in the Kensington & Chelsea Suite
Opening: Welcome Session
Gareth Niblett – Chair, BCS Information Security Specialist Group (ISSG), UK
Keynote: The Role of Situation Awareness in Cyber Security & Cyber Defence Strategy
Dr Cyril Onwubiko – Chair, Intelligence and Security Assurance, E-Security Group, Research Series,
London, UK
Keynote: Situational Awareness in Detecting Fraud or Financial Crime
Dr Andrew Lenaghan – Information Security Officer (ISO) & Senior Consultant, IT and Network
Security, Flawless Money Limited, Manchester, UK
Coffee Break & Social Networking
CyberSA 2015
Track 3: Cyber Situational Awareness Applications
10:25 – 11:10
11:10 – 11:25
11:25 – 11:40
Analysis of Malware Behavior: Type Classification using Machine Learning
Radu Stefan Pirscoveanu, Steven Strandlund Hansen, Thor Mark Tampus Larsen, Matija Stevanovic,
Jens Myrup Pedersen and Alexandre Czech
An Immune Intelligent Approach for Security Assurance
Adriana-Cristina Enache, Valentin Sgârciu and Ionita
Beyond Gut Instincts: Understanding, Rating and Comparing Self-Learning IDSs [Abstract/WIP]
Markus Wurzenberger, Florian Skopik, Giuseppe Settanni and Roman Fiedler
Questions to Panel of Speakers
Coffee Break & Social Networking
CyberSA 2015
4
Track 4: Cyber Situational Awareness for Cyber Security
11:40 – 12:40
12:25 – 12:40
12:40 – 13:40
Multi-channel Overlay Protocols: Implementing Ad-hoc Message Authentication in Social Media
Platforms
Charles Clarke, Eckhard Pflügel and Dimitris Tsaptsinos
Risk Analysis in Cyber Situation Awareness using Bayesian Statistics
Moyinoluwa Abidemi Bode, Boniface Kayode Alese, Samuel A. Oluwadareand Aderonke FavourBethy Thompson
An Analysis of Network Traffic Classification for Botnet Detection
Matija Stevanovic and Jens Myrup Pedersen
Questions to Panel of Speakers
Lunch
Cyber Security 2015
Track 3: Cyber Security and Digital Services
13:40 – 14:10
Moving Assets to the Cloud: A Game Theoretic Approach Based on Trust
Louai Maghrabi and Eckhard Pfluegel
Talent Discovery for Cyber Security: an organisational perspective
Marcelo Fontenele and Lily Sun
14:10 – 14:20
Questions to Panel of Speakers
14:20 – 14:35
Coffee Break & Social Networking
Social Media 2015
Track 2: Socio, Physiological, Cultural and Neurotic Impacts of Social Media and Advancements
14:35 – 14:50
Prospects and Challenges for Social Media in Pakistan
Shahzad Ahmed Memon, Sorath Mahar, Lachhman Das Dhomeja and Farman Pirzado
14:50 – 14:55
14:55 – 15:10
Questions to Panel of Speakers
Coffee Break & Social Networking
CyberSA 2015
Track 5: National Cyber Situational Awareness
15:10 – 15:55
Cyber Security Operations Centre: Security monitoring for protecting Business and supporting
Cyber Defense Strategy
Cyril Onwubiko
Establishing National Cyber Situational Awareness through Incident Information Clustering
Florian Skopik, Markus Wurzenberger, Giuseppe Settanni and Roman Fiedler
Cyber Security: A Game-Theoretic Analysis of Defender and Attacker Strategies in DefacingWebsite Games
Palvi Aggarwal, Antra Grover, Saumya Singh, Zahid Maqbool, V. S. Chandrasekhar Pammi and
Varun Dutt
5
15:55 – 16:10
Questions to Panel of Speakers
16:10 – 16:25
Coffee Break & Social Networking
CyberSA 2015
Track 6: Cyber Situational Awareness Tools and Techniques
16:25 – 17:10
Evaluation of Feature Selection and Reduction Algorithms for Network IDS Data [Abstract / WIP]
Therese Bjerkestrand, Dimitris Tsaptsinos and Eckhard Pfluegel
An SQL-like Query Tool for Data Anonymization and Outsourcing
Mohamed Nassar, Adel Al-Rahal Al-Orabi, Marwan Doha and Bechara Al Bouna
Social Video Streaming (SVS): A Prototype Application for Street Crime Reporting [Abstract / WIP]
Zulfiqar Bhutto, Kamran Dahri, Iqra Lakho and Shahzad Memon
17:10 – 17:20
Questions to Panel of Speakers
17:20
Thanks & Closing Remarks: Dr Cyril Onwubiko on behalf of Centre for Multidisciplinary Research,
Innovation & Collaboration (C-MRiC.ORG) & IEEE TCS
17:25
Best Paper Awards & Group Conference Photographs