Keynote Presentations

 

Professor Frank Wang

School of Computing, University of Kent, Canterbury, UK

Keynote Speaker - Frank is a Professor of Future Computing, and a Fellow of British Computer Society. He serves the High End Computing Panel for Science Foundation Ireland (SFI) and the UK Government EPSRC e-Science Panel. Frank has attracted a number of EC/EPSRC/DTI/Industrial grants, totaling a few million euros. He has been invited to present keynote speeches and other invited talks at Princeton University (USA), Carnegie Mellon University (USA), Oxford University (UK), Edinburgh University (UK), CERN (the European Organization for Nuclear Research, Geneva), Hong Kong University of Science & Technology (Hong Kong), Tsinghua University (Taiwan), Jawaharlal Nehru University (India), Aristotle University (Greece), Helsinki Technology University (Finland), Turkish Government The Ministry of Industry and Commerce, University of Johannesburg (South Africa), Central Philippine University (Philippine), and Princess Sumaya University for Technology (Jordan), etc. Prof Frank Wang is Co-Editor-in-Chief of Encyclopedia of Grid Computing and Co-Editor-in-Chief of International Journal of Grid and High Performance Computing.

Title of presentation: "Computer Evolution over the Next Decade: Fact or Fiction?" Download presentation

 

Dr Thomas Owens

Brunel University, London, UK

Keynote Speaker - Tom is Senior Lecturer and Director of Quality at Brunel University. He is the co-editor of the book on Situational Awareness in Computer Network Defense: Principle, Methods and Application, IGI Global, USA. He is currently Project Manager of the IST PSP Project DTV4All & Has been a Project Manager for a number of European Commission projects.

Title of presentation: "Situational Awareness in routing in Vehicular Ad hoc Networks (VANETs)" Download presentation

 

Dr Andrew Lenaghan

Flawless Money Limited

Keynote Speaker - Andrew is the Information Security Officer at Flawless Money Ltd, a member of the Information Systems Audit and Control Association (ISACA), and regular contributor to the fraud subcommittee of the Electronic Money Association. "

Title of presentation: "Situational Awareness in detecting Fraud or Financial Crime" Download presentation

 

Dr Cyril Onwubiko

Intelligence and Security Assurance, E-Security, UK

Keynote Speaker -  Cyril is Director, Cyber Security and Information Assurance (IA) at Research Series Limited, where he is responsible for directing strategy, IA governance and cyber security. He co-edited the book on "Situational Awareness in Computer Network Defense: Principles, Methods & Applications" published by IGI Global, USA, and has authored several book chapters, including Security Issues to Cloud Computing, in the book on "Cloud Computing: Principles, Systems and Applications" by Springer.  With over 30 articles published in leading and most prestigious academic journals and conferences.

Title of presentation: "The Role of Situational Awareness in Cyber SecurityDownload presentation

 

 Paper Presentations

Mark John Hall & Devon David Hansen

Research Engineers

TX-5 Homeland Security Team, Airbus Group Innovations, UK

Title of presentation: "Cross-Domain Situational Awareness and Collaborative Working for Cyber Security" Download presentation

 

Jussi Timonen

Researcher & PhD Student

The Finnish Defence Forces, Finland

Title of presentation: "Improving Situational Awareness of Cyber Physical Systems based on Operator’s Goals" Download presentation

 

Maria Evangelopoulou

PhD Student

University of Glasgow, UK

Title of presentation: "Situation Awareness Measurement Techniques in Network Defense" Download presentation

 

Klaus Theuerkauf

Researcher

Ifak Institut für Automation und Kommunikation e.V. Magdeburg

Title of presentation: "On Demand for Situational Awareness for Preventing Attacks on the Smart Grid" Download presentation

 

Hashem Dehghanniri

PhD Student

University College London, UK

Title of presentation: "Improving Security Decision under Uncertainty: A Multidisciplinary Approach" Download presentation

 

Dr Christopher Laing

Sciendum Ltd, UK

Title of presentation: "Context Informed Intelligent Information Infrastructures for Better Situational Awareness" Download presentation

 

Dr Muhammad Ali Nasir

NUCES-FAST, Pakistan

Title of presentation: "Potential Cyber-attacks against Global Oil Supply Chain" Download presentation

 

Dr Sarmistha Neogy

Assistant Professor

Jadavpur University, India

Title of presentation: "Developing a Secure Remote Patient Monitoring System" Download presentation

 

Dr Saad Alaboodi

Assistant Professor

Center of Excellence in Information Assurance, King Saud University, Riyadh, Saudi Arabia

Title of presentation: "Privacy Awareness of Online Social Networking in Saudi Arabia" Download presentation

 

Dr Sarmistha Neogy

Assistant Professor

Jadavpur University, India

Title of presentation: "Security Management in Wireless Sensor Networks" Download presentation

 

Dr Eckhard Pfluegel

Senior Lecturer

Kingston University, UK

Title of presentation: "Chaos-Based Image Encryption Using an AONT Mode of Operation" Download presentation

 

1Steven Strandlund Hansen and 2Alexandre Czech

1Aalborg University, Denmark

2Ecole Centrale d’Electronique, Paris, France

Title of presentation: "Analysis of Malware Behavior: Type Classification using Machine Learning" Download presentation

 

Adriana-Cristina Enache

PhD Student

Military Technical Academy, Bucharest, Romania

Title of presentation: "An Immune Intelligent Approach for Security Assurance" Download presentation

 

Giuseppe Settanni

Researcher

Austrian Institute of Technology, Austria

Title of presentation: "Beyond Gut Instincts: Understanding, Rating and Comparing Self-Learning IDSs" Download presentation

 

Charles Clarke

PhD Student

Faculty of SEC, Kingston University, UK

Title of presentation: "Multi-channel Overlay Protocols: Implementing Ad-hoc Message Authentication in Social Media Platforms" Download presentation

 

Matija Stevanovic

PhD Student

Aalborg University, Denmark

Title of presentation: "An Analysis of Network Traffic Classification for Botnet Detection" Download presentation

 

Louai Maghrabi & Dr Eckhard Pfluegel

Kingston University, UK

Title of presentation: "Moving Assets to the Cloud: A Game Theoretic Approach Based on Trust" Download presentation

 

Marcelo Fontenele

PhD Student

University of Reading, UK

Title of presentation: "Talent Discovery for Cyber Security: an organisational perspective" Download presentation

 

Dr Cyril Onwubiko

Intelligence and Security Assurance, E-Security, UK

Title of presentation: "Cyber Security Operations Centre: Security monitoring for protecting Business and supporting Cyber Defense Strategy" Download presentation

 

Giuseppe Settanni

Researcher

Austrian Institute of Technology, Austria

Title of presentation: "Establishing National Cyber Situational Awareness" Download presentation

 

Palvi Aggarwal

PhD Student

Applied Cognitive Science Laboratory, Indian Institute of Technology, Mandi, India

Title of presentation: "Cyber Security: A Game-Theoretic Analysis of Defender and Attacker Strategies in Defacing-Website Games" Download presentation

 

Therese Bjerkestrand

Researcher

Kingston University, UK

Title of presentation: "Evaluation of Feature Selection and Reduction Algorithms for Network IDS Data" Download presentation

 

Dr Bechara Al Bouna

Assistant Professor

Antonine University, Lebanon

Title of presentation: "An SQL-like Query Tool for Data Anonymization and Outsourcing" Download presentation

 

Conference Programme

Cyber Science 2015 Conference Programme -  Download a copy of the Cyber Science 2015 conference programme.

 

List of Accepted Papers

Authors

Paper Title

Type

Conference

Jussi Timonen

Improving Situational Awareness of Cyber Physical Systems based on Operator’s Goals

Full Paper

CyberSA 2015

Matija Stevanovic and Jens Myrup Pedersen

An Analysis of Network Traffic Classification for Botnet Detection

Full Paper

CyberSA 2015

Palvi Aggarwal, Antra Grover, Saumya Singh, Zahid Maqbool, V. S. Chandrasekhar Pammi and Varun Dutt

Cyber Security: A Game-Theoretic Analysis of Defender and Attacker Strategies in Defacing-Website Games

Full Paper

CyberSA 2015

Maria Evangelopoulou and Christopher W. Johnson

Situation Awareness Measurement Techniques in Network Defense

Full Paper

CyberSA 2015

Florian Skopik, Markus Wurzenberger, Giuseppe Settanni and Roman Fiedler

Establishing National Cyber Situational Awareness through Incident Information Clustering

Full Paper

CyberSA 2015

Hashem Dehghanniri, Emmanuel Letier and Herve Borrion

Improving Security Decision under Uncertainty: A Multidisciplinary Approach

Full Paper

CyberSA 2015

Adenusi Dauda, Boniface Kayode Alese, Bamidele Moses Kuboye and Betty Aderonke Thompson

Development of Cyber Situation Awareness Model [Abstract / WIP]

Abstract

CyberSA 2015

Moyinoluwa Abidemi Bode, Boniface Kayode Alese, Samuel A. Oluwadareand Aderonke Favour-Bethy Thompson

Risk Analysis in Cyber Situation Awareness using Bayesian Statistics

Full Paper

CyberSA 2015

Mark John Hall, Devon David Hansen and Kevin Jones

Cross-Domain Situational Awareness and Collaborative Working for Cyber Security

Full Paper

CyberSA 2015

Markus Wurzenberger, Florian Skopik, Giuseppe Settanni and Roman Fiedler

Beyond Gut Instincts: Understanding, Rating and Comparing Self-Learning IDSs [Abstract / WIP]

Abstract

CyberSA 2015

Lewis Meehan and Carlene Campbell

Threat and Mitigation Awareness Based Upon a Model Network Scenario with BYOD Aspects

Full Paper

CyberSA 2015

Charles Clarke, Eckhard Pflügel and Dimitris Tsaptsinos

Multi-channel Overlay Protocols: Implementing Ad-hoc Message Authentication in Social Media Platforms

Full Paper

CyberSA 2015

Yegor Shovgenya, Klaus Theuerkauf and Florian Skopik

On Demand for Situational Awareness for Preventing Attacks on the Smart Grid

Full Paper

CyberSA 2015

Zulfiqar Bhutto, Kamran Dahri, Iqra Lakho and Shahzad Memon

A Prototype Application for Street Crime Reporting

Full Paper

CyberSA 2015

Cyril Onwubiko

Cyber Security Operations Centre: Security monitoring for protecting Business and supporting Cyber Defense Strategy

Full Paper

CyberSA 2015

Mohamed Nassar, Adel Al-Rahal Al-Orabi, Marwan Doha and Bechara Al Bouna

An SQL-like Query Tool for Data Anonymization and Outsourcing

Full Paper

CyberSA 2015

Adriana-Cristina Enache and  Valentin Sgârciu

An Immune Intelligent Approach for Security Assurance

Full Paper

CyberSA 2015

Steven Strandlund Hansen, Thor Mark Tampus Larsen, Radu Stefan Pirscoveanu, Alexandre Czech, Matija Stevanovic and Jens Myrup Pedersen

Analysis of Malware Behavior: Type Classification using Machine Learning

Full Paper

CyberSA 2015

Therese Bjerkestrand, Dimitris Tsaptsinos and Eckhard Pfluegel

Evaluation of Feature Selection and Reduction Algorithms for Network IDS Data [Abstract / WIP]

Abstract

CyberSA 2015

Marcelo Fontenele and Lily Sun

Talent Discovery for Cyber Security: an organisational perspective

Full Paper

Cyber Security  2015

Christopher Laing, Paul Vickers, Tom Fairfax, Pam Briggs and Stephen Marsh

Context Informed Intelligent Information Infrastructures for Better Situational Awareness

Full Paper

Cyber Security  2015

Andrius Rickus, Eckhard Pfluegel and Nigel Atkins

Chaos-Based Image Encryption Using an AONT Mode of Operation

Full Paper

Cyber Security  2015

Sarmistha Neogy

Security Management in Wireless Sensor Networks

Full Paper

Cyber Security  2015

Sarmistha Neogy and Sayantani Saha

Developing a secure remote patient monitoring system

Full Paper

Cyber Security  2015

Muhammad Ali Nasir and Shizra Sultan

Potential Cyber-attacks against Global Oil Supply Chain

Full Paper

Cyber Security  2015

Louai Maghrabi and Eckhard Pfluegel

Moving Assets to the Cloud: A Game Theoretic Approach Based on Trust

Full Paper

Cyber Security  2015

Kamran Dahri, Shakeel Rajput, Shahzad Memon and Dr. Lachman Das Dhomeja

Smart Activities Monitoring System (SAMS) for Security Applications [Abstract / WIP]

Abstract

Cyber Security  2015

Jawad Awan, Shahzad Memon, Lachhman Das and Iqra Lakho

eGovernment Services Security and Challenges in Pakistan [Abstract / WIP]

Abstract

Cyber Security  2015

Ruhul Amin, SK Hafizul Islam, G. P. Biswas, Muhammad  Khurram Khan

An Efficient Remote Mutual Authentication Scheme using Smart Mobile Phone over Insure Networks

Full Paper

Cyber Security  2015

Hatoon Alsagri and Saad Alaboodi

Privacy Awareness of Online Social Networking in Saudi Arabia

Full Paper

Social Media 2015

Shahzad Ahmed Memon, Sorath Mahar, Lachhman Das Dhomeja and Farman Pirzado

Prospects and Challenges for Social Media in Pakistan

Full Paper

Social Media 2015