Dr Andrew Lenaghan is a Computer Security Specialist at Oxford University. He is a member of the Computer Emergency Response Team (CERT) responsible for protecting the University’s network infrastructure, and users, from attack. Prior to this, he was a Senior Security Consultant and Information Security Officer in the finance sector for 8 years, advising firms in the UK, Europe and the US. He has been a regular speaker and chair of the Electronic Money Association’s Fraud and IT Security subcommittee; highlighting emerging fraud and IT security issues. As an academic at Kingston University, he was a Principal Lecturer in Data Communications and a founding member of the Networking and Communication research group. Andrew holds a degree in Computer Science, an MSc Human-Computer Interaction and has a doctorate in computer vision and pattern recognition
The 2016 edition of Cyber Science took place in London, UK from June 13-14, 2016.
2016 Keynotes & Industry
Professor Ali Hessami
Professor Ali Hessami1
Professor Ali Hessami is Past Chair of the IEEE United Kingdom and Ireland, and the Director of R&D and Innovation at Vega Systems and Director of System of Systems Engineering Centre at UEL, London. He is an expert in the systems assurance and safety, security, sustainability and knowledge assessment/management methodologies and has a background in design and development of advanced control systems for business and safety critical industrial applications.Ali project managed the safety analysis and assessment of European Rail Traffic Management System’s ETCS for the EU Commission under the ESROG project. He also project managed the development of an advanced and systematic Safety & Risk Management System for EU Commission under SAMRail project,in support of the pan European Railway Safety Directive.He contributed significant original material to CENELEC WGA10 Report TR-50451 on Allocation of Safety Integrity & TR-50506-1 on the Cross-Acceptance of Signalling Systems. He represents UK on CENELEC Railway Standards committees. He was appointed by CENELEC as convenor of WGA11for review of EN50128 Software Safety Standard and Convenor of RG3 in WG14,where he is responsible for update and restructuring of the software,hardware and system safety standards in CENELEC.
Ali also heads the System Safety & Security Technical Committee at IEEE Systems and Cybernetics Society (SMC). Ali is a Visiting Professor at London City University’s Centre for Systems and Control in the School of Engineering & Mathematics and at Beijing Jiaotong University School of Electronics and Information Engineering. He is also a Fellow of Royal Society of Arts (FRSA), Fellow of the IET, a Senior Member of IEEE and a member of the Security Institute.
Professor Olav Lysne
Professor Olav Lysne1
Olav Lysne is Director and founder of the Center for Resilient Networks and Applications (CRNA) at Simula research laboratory, and professor in computer science at Simula and the University of Oslo. He received the Master’s degree in 1988 and Dr. Scient. degree in 1992, both at the University of Oslo. The early research contributions of Lysne were in the field of algebraic specification and term rewriting, with a particular emphasis on automated deduction. While working in this field he was a visiting researcher at Université de Paris-Sud. Later in his career he has been working on resilient computer architecture for supercomputing and cloud infrastructures, routing and switching techniques for IP-networks and measurement of national network infrastructures. Lysne was the leader of the Norwegian Government’s Commission on digital vulnerability, which submitted its report to the Minster of Justice in November 2015.
Professor Frank Wang
Professor Frank Wang1
Frank Z. Wang is a Professor in Future Computing, and Head of School of Computing, University of Kent, UK. The School of Computing was formally opened by Her Majesty the Queen. Professor Wang’s research interests include cloud computing, big data, green computing, brain computing and future computing. He has been invited to deliver keynote speeches and invited talks to report his research worldwide, for example at Princeton University, Carnegie Mellon University, CERN, Hong Kong University of Sci. & Tech., Tsinghua University (Taiwan), Jawaharlal Nehru University, Aristotle University, and University of Johannesburg. In 2004, he was appointed as Chair & Professor, Director of Centre for Grid Computing at CCHPCF (Cambridge-Cranfield High Performance Computing Facility). CCHPCF is a collaborative research facility in the Universities of Cambridge and Cranfield (with an investment size of £40 million). Prof Wang and his team have won an ACM/IEEE Super Computing finalist award. Prof Wang is Chairman (UK & Republic of Ireland Chapter) of the IEEE Computer Society and Fellow of British Computer Society. He has served the Irish Government High End Computing Panel for Science Foundation Ireland (SFI) and the UK Government EPSRC e-Science Panel.
Dr Janne Hagen
Dr Janne Hagen1
Dr Hagen, from April 2016 is employed as Head Engineer at the Norwegian Water Resources and Energy Directorate (NVE), working on cybersecurity in the Energy Sector in Norway. She has previously worked as a Researcher and Consultant, most of the time employed at the Norwegian Defence Research Establishment (FFI) conducting research on societal security and protection of critical infrastructures. Since 2005, her scientific work focused primarily on cybersecurity, and the vulnerability of the digital society, lately with focus on the Energy Sector. She has been member of several expert groups in Norway, including the Norwegian Governmental Committee of Digital Vulnerabilities in Society that delivered an Official Norwegian Report (NOU) to the Ministry of Justice and Public Security in November 2015.
Dr Nick Savage
Dr Nick Savage1
I joined the University in 2000 to work as a researcher on an EPSRC project characterising the indoor communications channel and a Radiocommunications Agency (now OFCOM) sponsored project characterising radiowave propagation through vegetation. I previously worked for a defence contractor and a computer networking company.
I started work as a lecturer in the Department of Electronic and Computer Engineering in 2002 where I became the admissions tutor and programme coordinator for all undergraduate and integrated masters Electronic Engineering, Computer Engineering and Networking degree programmes. I was the course leader for the BSc (Hons) Computer Networks degree programme and the programme manager for the Foundation Degree (FDEng) in Electronic Engineering.
I am now the Head of the School of Computing, responsible for the operational efficiency and effectiveness of the School; as well as leading the School towards realising the University’s strategic vision. I also have a keen research interest in the development of secure systems, identifying vulnerabilities in systems, utilising features to identify users and network protocol analysis.
Dr Thomas Owens
Dr Thomas Owens1
Dr Owens is the co-editor of the book on Situational Awareness in Computer Network Defense: Principle, Methods and Application, IGI Global, USA. He was the project coordinator of the European Commission IST FP5 STREP Project CONFLUENT, of the IST FP6 Integrated Project INSTINCT, and of the FP6 SSA Project PARTAKE. He is currently Project Manager of the IST PSP Project DTV4All, see www.psp-dtv4all.orgAs well as supervising many PhD students, he has extensive experience in a very broad range of administrative and academic roles including undergraduate courses director, postgraduate course director, chairman of MSc examination boards, and elected member of Senate. In 1995/96 he acted as a teaching quality assessor of teaching in Electronic and Electrical Engineering in three Welsh universities for the Higher Education Funding Council for Wales, and in 2007-9 as an external examiner of PhD students. In 2011-13 he was President of the European Advisory Board of the Institute of Studies Brazil Europe, a joint EU Brazil funded initiative. He was Visiting Professor, School of Information and Electronic Engineering, Zhejiang Gongshang University, Hangzhou, China, 8th of September, 2012 to 23rd of September, 2012.
Dr Syed Naqvi
Dr Syed Naqvi1
Syed joined Birmingham City University in August 2014. Previously he worked in the Forensic Technology Solutions (FTS) of PricewaterhouseCoopers Enterprise Advisory. His consultancy assignments included antitrust investigations and litigation support services for corporate disputes. He was mainly involved in the collection and preservation of digital evidences from a range of storage devices and media in forensically sound manner with due legal considerations. He also contributed for the electronic discovery services mainly for the review and analysis of the captured evidence.
Syed has previously worked as a R&D Project Manager at CETIC (Belgian Applied Research Centre in ICT) where he was the Principal Investigator of Digital Forensics. He led the capacity building of Cyber Incident Response initiative. His other major assignments at CETIC include: Project Manager of a European Future Internet Security Research Experiment; Coordination of ICT Security activity of national and European FP6/FP7 projects.
Syed has developed and delivered graduate courses in Computer and Network Security at the Telecommunications School of ParisTech. He is a visiting faculty member of the Business Information System Department at Babeş-Bolyai University since 2008.
Syed has held a Visiting Scientist position at University of Washington at Seattle; and was a Research Fellow at Rutherford Appleton Laboratory of the Science and Technology Facilities Council of UK. He is an external reviewer of a number of international journals and has served several scientific symposia as a technical program committee member.
Accepted Papers, Extended Abstracts and Posters
- Philip Legg. “Enhancing Cyber Situation Awareness for Non-Expert Users using Visual Analytics“
- Samir Puuska, Matti J. Kortelainen, Viljami Venekoski and Jouko Vankka. “Instant Message Classification in Finnish Cyber Security -Themed Free-Form Discussion“
- Yoram Golandsky. “Cyber Crisis Management, Survival or Extinction?“
- Joe Burton. “Cyber Attacks and Maritime Situational Awareness: Evidence from Japan and Taiwan“
- Jan Ahrend, Marina Jirotka and Kevin Jones. “On the Collaborative Practices of Cyber Threat Intelligence Analysts to Develop and Utilize Tacit Threat and Defence Knowledge“
- Eliana Stavrou and Andreas Pitsillides. “Situation aware intrusion recovery policy in WSNs“
- Michael Davies and Menisha Patel. “Are we managing the risk of sharing Cyber Situational Awareness – A UK Public Sector Case Study“
- Radu-Stefan Pirscoveanu, Matija Stevanovic and Jens Myrup Pedersen. “Clustering Analysis of Malware Behavior using Self Organizing Map“
- Mahesh Bang and Himanshu Saraswat. “Building an effective and efficient continuous Web Application Security Program“
- Xavier Bellekens, Preetila Seeam, Quentin Franssen, Andrew Hamilton, Kamila Nieradzinska and Amar Seeam. “Pervasive eHealth Services A Security and Privacy Risk Awareness Survey“
- Mohamed Chahine Ghanem and Deepthi N. Ratnayake. “Enhancing WPA2-PSK four-way handshaking after re-authentication to deal with de-authentication followed by brute-force attack A novel re-authentication protocol“
- Filippo Sanfilippo. “A Multi-Sensor System for Enhancing Situational Awareness in Offshore Training“
- Palvi Aggarwal, Cleotilde Gonzalez and Varun Dutt. “Looking from the Hacker’s Perspective: Role of Deceptive Strategies in Cyber Security“
- Zahid Maqbool, V.S. Chandrasekhar Pammi and Varun Dutt. “Cybersecurity: Effect of Information Availability in Dynamic Security Games“
- Roman Graf, Florian Skopik and Kenny Whitebloom. “A Decision Support Model for Situational Awareness in National Cyber Operations Centers“
- Shruti Kohli. “Developing Cyber Security Asset Management framework for UK Rail“
- Ryan Heartfield and George Loukas. “Evaluating the reliability of Users as Human Sensors of Social Media Security Threats“
- Jennifer Cole, Chris Watkins and Dorothea Kleine. “Internet Discussion Forums: Maximizing Choice in Health-seeking Behaviour During Public Health Emergencies“
- Paul Baxter and Trevor Wood. “Generating Insight from Data“
- Mohammed Alzaylaee, Suleiman Yerima and Sakir Sezer. “DynaLog: An Automated Dynamic Analysis Framework for characterizing Android Applications“
- Louai Maghrabi, Eckhard Pfluegel and Senna Fathima Noorji. “Designing Utility Functions for Game-Theoretic Cloud Security Assessment: A Case for Using the Common Vulnerability Scoring System“
- Kamile Nur Sevis and Ensar Seker. “Cyber Warfare: Terms, Issues, Laws and Controversies“
- Thomas Mundt and Peter Wickboldt. “Security in building automation systems – A first analysis“
- Fara Yahya, Robert Walters and Gary Wills. “Goal-Based Security Components for Cloud Storage Security Framework: A Preliminary Study“
- Dylan Smyth, Victor Cionca, Sean McSweeney and Donna O’Shea. “Exploiting Pitfalls in Software-Defined Networking Implementation“
- Boojoong Kang, Suleiman Yerima, Kieran Mclaughlin and Sakir Sezer. “N-opcode Analysis for Android Malware Classification and Categorization“
- Muhammad Aminu Ahmad, Steve Woodhead and Diane Gan. “A Countermeasure Mechanism for Fast Scanning Malware“
- Andrea Cullen and Lorna Armitage. “The Social Engineering Attack Spiral (SEAS)“
- Catrin Burrows and Pooneh Bagheri Zadeh. “A Mobile Forensic Investigation into Steganography“
- Egon Kidmose, Matija Stevanovic and Jens Myrup Pedersen. “Correlating intrusion detection alerts on bot malware infections using neural network“
- Zbigniew Hulicki. “The IM System with a Cryptographic Feature“
- Reza Montasari, Pekka Peltola and Victoria Carpenter. “Gauging the Effectiveness of Computer Misuse Act in Dealing with Cybercrimes“
- Tomáš Sochor, Matej Zuzčák and Petr Bujok. “Statistical Analysis of Attacking Autonomous Systems“
- Marcelo Fontenele and Lily Sun. “Knowledge management of cyber security expertise: an ontological approach to talent discovery“
- Cyril Onwubiko. “Exploring Web Analytics to enhance Cyber Situational Awareness for the Protection of Online Web Services“
- Gaofeng Zhang, Paolo Falcarin, Elena Gómez-Martínez, Christophe Tartary, Shareeful Islam, Bjorn De Sutter and Jerome D’annoville. “Attack Simulation based Software Protection Assessment Method for Protection Optimisation“