Cyber Science 2015 Conference Programme - C
Transcription
Cyber Science 2015 Conference Programme - C
2015 Cyber Science 2015 Conference Programme C-MRiC.ORG 8/06/2015 1 2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA 2015) In conjunction with International Conference on Social Media, Wearable and Web Analytics Cyber Science 2015 (Social Media 2015) International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2015) International Conference on Cyber Incident Response, Coordination, Containment & Control (Cyber Incident 2015) London, United Kingdom. June 8 – 9, 2015 Monday, June 8, 2015 08:00 – 09:45 09:45 – 10:00 10:00 – 10:40 10:40 – 11:20 11:20 – 11:30 Registration, Networking and Refreshments in the Kensington Suite Opening: Welcome Session Gareth Niblett – Chair, BCS Information Security Specialist Group (ISSG), UK Invited Speaker: Computer Evolution over the Next Decade: Fact or Fiction? Professor Frank Wang – Professor of Future Computing & Head of School of Computing, University of Kent, Canterbury, UK Keynote: Situation Awareness in Vehicular Ad Hoc Networks Dr Thomas Owens – Directory of Quality (ECE) & Senior Lecturer in Communications, Brunel University London, London, UK Coffee Break & Social Networking CyberSA 2015 Track 1: Situation Awareness for Collaboration and Decision Making 11:30 – 12:15 Cross-Domain Situational Awareness and Collaborative Working for Cyber Security Mark John Hall, Devon David Hansen and Kevin Jones Improving Situational Awareness of Cyber Physical Systems based on Operator’s Goals Jussi Timonen Empirical Framework for Situation Awareness Measurement Techniques in Network Defense Maria Evangelopoulou and Christopher W. Johnson 12: 15 – 12:30 Questions to Panel of Speakers 12:30 – 13:30 Lunch CyberSA 2015 2 Track 2: Cyber Situation Awareness for Critical Infrastructure Protection 13:30 – 14:15 14:15 – 14:30 14:30 – 14:45 Development of Cyber Situation Awareness Model [Abstract / WIP] Adenusi Dauda, Boniface Kayode Alese, Bamidele Moses Kuboye and Betty Aderonke Thompson On Demand for Situational Awareness for Preventing Attacks on the Smart Grid Yegor Shovgenya, Klaus Theuerkauf and Florian Skopik Improving Security Decision under Uncertainty: A Multidisciplinary Approach Hashem Dehghanniri, Emmanuel Letier and Herve Borrion Questions to Panel of Speakers Coffee Break & Social Networking Cyber Security 2015 Track 1: Protection of Digital Services and Applications 14:45 – 16:05 15:50 – 16:05 16:05 – 16.20 Context Informed Intelligent Information Infrastructures for Better Situational Awareness Christopher Laing and Paul Vickers Potential Cyber-attacks against Global Oil Supply Chain Muhammad Ali Nasir, Samia Nefti, Shizra Sultan and Umar Manzoor Smart Activities Monitoring System (SAMS) for Security Applications [Abstract / WIP] Kamran Dahri, Shakeel Rajput, Shahzad Memon and Lachman Das Dhomeja Developing a Secure Remote Patient Monitoring System Sarmistha Neogy and Sayantani Saha Questions to Panel of Speakers Coffee Break & Social Networking Social Media 2015 Track 1: Social Media for Enhanced Cyber Situation Awareness 16:20 – 16:35 16:35 – 16:40 16:40 – 16:55 Privacy Awareness of Online Social Networking in Saudi Arabia Hatoon AlSagri and Saad AlAboodi Questions to Panel of Speakers Coffee Break & Social Networking Cyber Security 2015 Track 2: Cyber Security for Wireless Senor Network Applications 16:55 – 17:45 17:45 – 17:55 17:55 - Security Management in Wireless Sensor Networks Sarmistha Neogy Chaos-Based Image Encryption Using an AONT Mode of Operation Andrius Rickus, Eckhard Pfluegel and Nigel Atkins An Efficient Remote Mutual Authentication Scheme using Smart Mobile Phone over Insecure Networks Ruhul Amin, SK Hafizul Islam, G.P. Biswas and Muhammad Khurram Khan Questions to Panel of Speakers Social Event: Drinks, Chat and Social Networking 3 2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA 2015) In conjunction with International Conference on Social Media, Wearable and Web Analytics Cyber Science 2015 (Social Media 2015) International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2015) International Conference on Cyber Incident Response, Coordination, Containment & Control (Cyber Incident 2015) London, United Kingdom. June 8 – 9, 2015. Tuesday, June 9, 2015 08:00 – 09:00 09:00 – 09:10 09:10 – 09:40 09:40 – 10:10 10:10 – 10:25 Day 2 Coffee/Tea, Networking and Refreshments in the Kensington & Chelsea Suite Opening: Welcome Session Gareth Niblett – Chair, BCS Information Security Specialist Group (ISSG), UK Keynote: The Role of Situation Awareness in Cyber Security & Cyber Defence Strategy Dr Cyril Onwubiko – Chair, Intelligence and Security Assurance, E-Security Group, Research Series, London, UK Keynote: Situational Awareness in Detecting Fraud or Financial Crime Dr Andrew Lenaghan – Information Security Officer (ISO) & Senior Consultant, IT and Network Security, Flawless Money Limited, Manchester, UK Coffee Break & Social Networking CyberSA 2015 Track 3: Cyber Situational Awareness Applications 10:25 – 11:10 11:10 – 11:25 11:25 – 11:40 Analysis of Malware Behavior: Type Classification using Machine Learning Radu Stefan Pirscoveanu, Steven Strandlund Hansen, Thor Mark Tampus Larsen, Matija Stevanovic, Jens Myrup Pedersen and Alexandre Czech An Immune Intelligent Approach for Security Assurance Adriana-Cristina Enache, Valentin Sgârciu and Ionita Beyond Gut Instincts: Understanding, Rating and Comparing Self-Learning IDSs [Abstract/WIP] Markus Wurzenberger, Florian Skopik, Giuseppe Settanni and Roman Fiedler Questions to Panel of Speakers Coffee Break & Social Networking CyberSA 2015 4 Track 4: Cyber Situational Awareness for Cyber Security 11:40 – 12:40 12:25 – 12:40 12:40 – 13:40 Multi-channel Overlay Protocols: Implementing Ad-hoc Message Authentication in Social Media Platforms Charles Clarke, Eckhard Pflügel and Dimitris Tsaptsinos Risk Analysis in Cyber Situation Awareness using Bayesian Statistics Moyinoluwa Abidemi Bode, Boniface Kayode Alese, Samuel A. Oluwadareand Aderonke FavourBethy Thompson An Analysis of Network Traffic Classification for Botnet Detection Matija Stevanovic and Jens Myrup Pedersen Questions to Panel of Speakers Lunch Cyber Security 2015 Track 3: Cyber Security and Digital Services 13:40 – 14:10 Moving Assets to the Cloud: A Game Theoretic Approach Based on Trust Louai Maghrabi and Eckhard Pfluegel Talent Discovery for Cyber Security: an organisational perspective Marcelo Fontenele and Lily Sun 14:10 – 14:20 Questions to Panel of Speakers 14:20 – 14:35 Coffee Break & Social Networking Social Media 2015 Track 2: Socio, Physiological, Cultural and Neurotic Impacts of Social Media and Advancements 14:35 – 14:50 Prospects and Challenges for Social Media in Pakistan Shahzad Ahmed Memon, Sorath Mahar, Lachhman Das Dhomeja and Farman Pirzado 14:50 – 14:55 14:55 – 15:10 Questions to Panel of Speakers Coffee Break & Social Networking CyberSA 2015 Track 5: National Cyber Situational Awareness 15:10 – 15:55 Cyber Security Operations Centre: Security monitoring for protecting Business and supporting Cyber Defense Strategy Cyril Onwubiko Establishing National Cyber Situational Awareness through Incident Information Clustering Florian Skopik, Markus Wurzenberger, Giuseppe Settanni and Roman Fiedler Cyber Security: A Game-Theoretic Analysis of Defender and Attacker Strategies in DefacingWebsite Games Palvi Aggarwal, Antra Grover, Saumya Singh, Zahid Maqbool, V. S. Chandrasekhar Pammi and Varun Dutt 5 15:55 – 16:10 Questions to Panel of Speakers 16:10 – 16:25 Coffee Break & Social Networking CyberSA 2015 Track 6: Cyber Situational Awareness Tools and Techniques 16:25 – 17:10 Evaluation of Feature Selection and Reduction Algorithms for Network IDS Data [Abstract / WIP] Therese Bjerkestrand, Dimitris Tsaptsinos and Eckhard Pfluegel An SQL-like Query Tool for Data Anonymization and Outsourcing Mohamed Nassar, Adel Al-Rahal Al-Orabi, Marwan Doha and Bechara Al Bouna Social Video Streaming (SVS): A Prototype Application for Street Crime Reporting [Abstract / WIP] Zulfiqar Bhutto, Kamran Dahri, Iqra Lakho and Shahzad Memon 17:10 – 17:20 Questions to Panel of Speakers 17:20 Thanks & Closing Remarks: Dr Cyril Onwubiko on behalf of Centre for Multidisciplinary Research, Innovation & Collaboration (C-MRiC.ORG) & IEEE TCS 17:25 Best Paper Awards & Group Conference Photographs