Dr Cyril Onwubiko is the Secretary – IEEE UK & Ireland, and Director, Cyber Security and Intelligence at Research Series Limited, where he is responsible for directing strategy, IA governance and cyber security. Prior to Research Series, he had worked in the Financial Services, Telecommunication, Health, Government and Public services Sectors. He is experienced in Cyber Security, Security Information and Event Management, Data Fusion, Intrusion Detection Systems and Computer Network Security; and vastly knowledgeable in Information Assurance, Risk Assessment & Management. He holds a PhD in Computer Network Security from Kingston University, London, UK; MSc in Internet Engineering, from University of East London, London, UK, and BSc, first class honours, in Computer Science & Mathematics. He has authored several books including “Security Framework for Attack Detection in Computer Networks” and “Concepts in Numerical Methods.”, and edited books such as “Situational Awareness in Computer Network Defense: Principles, Methods & Applications“, and Cyber Science 2015 – International Conference on Cyber Situational Awareness, Data Analytics and Assessment. He has over 30 articles published in leading and most prestigious academic journals and conferences.
The 2017 edition of Cyber Science took place in London, UK from June 19-20, 2017.
2017 Keynotes & Industry
Dr Cyril Onwubiko
Secretary – IEEE UK & Ireland, and Director, Cyber Security and Intelligence at Research Series Limited
Dr Cyril OnwubikoSecretary – IEEE UK & Ireland, and Director, Cyber Security and Intelligence at Research Series Limited
Dr Eckhard Pfluegel
Dr Eckhard Pfluegel1
Dr Pfluegel obtained a Ph.D. in Computer Science at Université Joseph Fourier, Grenoble (France) in 1999 after graduating with a First Class degree (“Diplom”) in Computer Science (Equivalent of UK Honours and Master’s degree) in 1999 at Universität Karlsruhe (now known as KIT), Karlsruhe (Germany). An experienced Senior Lecturer with 3 years of industrial practice in software engineering and over 13 years of research expertise, teaching responsibilities and professional practice, his current main area of specialism is network and cyber security. He has an active and continuous portfolio of over 40 peer-reviewed international journal and conference publications, serves as member of several technical programme committees and regularly reviews for international journals. Dr Pfluegel is leading an educational programme in cyber and network security at postgraduate level and frequently gives public lectures and talks on the topic of cyber and computer security awareness. He particularly enjoys research-informed teaching in order to bring in cutting-edge knowledge from his research into his lectures.
Dr Janne Hagen
Dr Janne Hagen1
Dr Hagen, from April 2016 is employed as Head Engineer at the Norwegian Water Resources and Energy Directorate (NVE), working on cybersecurity in the Energy Sector in Norway. She has previously worked as a Researcher and Consultant, most of the time employed at the Norwegian Defence Research Establishment (FFI) conducting research on societal security and protection of critical infrastructures. Since 2005, her scientific work focused primarily on cybersecurity, and the vulnerability of the digital society, lately with focus on the Energy Sector. She has been member of several expert groups in Norway, including the Norwegian Governmental Committee of Digital Vulnerabilities in Society that delivered an Official Norwegian Report (NOU) to the Ministry of Justice and Public Security in November 2015.
Professor Kevin Curran
Professor Kevin Curran1
Kevin Curran joined the School of Computing and Intelligent Systems in 1999. Kevin’s research and teaching interests are in the areas of Computer Networks, Location Determination Technologies and Security.
Kevin’s achievements include winning and managing UK & European Framework projects and Technology Transfer Schemes. Kevin hasmade significant contributions to advancing the knowledge and understanding of computer networking and systems, evidenced by over 800 published works. He is perhaps most well-known for his work on location positioning within indoor environments and Internet security. His expertise has been acknowledged by invitations to present his work at international conferences, overseas universities and research laboratories. He is a regular contributor to print, online, radio & TV news on computing & security issues. He was the recipient of an Engineering and Technology Board Visiting Lectureship for Exceptional Engineers and is an IEEE Technical Expert for Internet/Security matters since 2008. He is a member of the EPSRC Peer Review College.
Professor Curran has chaired sessions and participated in organising committees for many highly-respected international conferences and workshops. He was the founding Editor in Chief of the International Journal of Ambient Computing and Intelligence and is also a member of numerous Journal Editorial boards and international conference organising committees. He has authored a number of books and is the recipient of various patents. He has served as an advisor to the British Computer Society in regard to the computer industry standards and is a member of BCS and IEEE Technology Specialist Groups and various other professional bodies.
Dr Mahmoud Eiza
Dr Mahmoud Eiza1
Dr Mahmoud Hashem Eiza is a Lecturer in Computing (Computer and Network Security) at the School of Physical Sciences and Computing, University of Central Lancashire. He received his Ph.D. in Electronic and Computer Engineering from Brunel University London, U.K., in 2015. His research interests include computer and network security, with specific interests in quality-of-service and wireless network security and privacy in Vehicular Networks, Smart Grids, Cloud Computing, and Internet of Things.
Dr Andrew Lenaghan
Dr Andrew Lenaghan1
Dr Andrew Lenaghan is a Computer Security Specialist at Oxford University. He is a member of the Computer Emergency Response Team (CERT) responsible for protecting the University’s network infrastructure, and users, from attack. Prior to this, he was a Senior Security Consultant and Information Security Officer in the finance sector for 8 years, advising firms in the UK, Europe and the US. He has been a regular speaker and chair of the Electronic Money Association’s Fraud and IT Security subcommittee; highlighting emerging fraud and IT security issues. As an academic at Kingston University, he was a Principal Lecturer in Data Communications and a founding member of the Networking and Communication research group. Andrew holds a degree in Computer Science, an MSc Human-Computer Interaction and has a doctorate in computer vision and pattern recognition
Accepted Papers, Extended Abstracts and Posters
- Antti Evesti, Teemu Kanstrén and Tapio Frantti. “Cybersecurity Situational Awareness Taxonomy”
- Eliana Stavrou. “A situation-aware user interface to assess users’ ability to construct strong passwords: A conceptual architecture”
- Natalie Nakhla, Kathryn Perrett and Christopher McKenzie. “Automated Computer Network Defence using ARMOUR: Mission-oriented decision support and vulnerability mitigation”
- Marianne Junger, Lorena Montoya, Pieter Hartel and Maliheh Heydari. “Towards the normalization of crime victimization: A routine activities analysis of cybercrime in Europe”
- Aunshul Rege, Zoran Obradovic, Nima Asadi, Brian Singer, Nicholas Masceri and Quinn Heath. “A Temporal Assessment of Cyber Intrusion Chains Using Multidisciplinary Frameworks and Methodologies”
- Patrik Lif, Magdalena Granåsen and Teodor Sommestad. “Development and validation of technique to measure cyber situation awareness”
- Arnau Erola, Ioannis Agrafiotis, Jassim Happa, Michael Goldsmith, Sadie Creese and Philip Legg. “Improving semi-automated network defences by correlating heterogeneous data sources”
- Boniface Kayode Alese, Aderonke Favour-Bethy Thompson and Patricia Yetunde Oni. “A Location Privacy System in Mobile Network Using Game Theory”
- Palvi Aggarwal, Cleotilde Gonzalez and Varun Dutt. “Modeling the Effects of Amount and Timing of Deception in Simulated Network Scenarios”
- Lynsay Shepherd, Jacqueline Archibald and Robert Ian Ferguson. “Security Awareness and Affective Feedback: Categorical Behaviour vs. Reported Behaviour”
- Outi-Marja Latvala, Tommi Keränen, Sami Noponen, Niko Lehto, Mirko Sailio, Mikko Valta and Pia Olli. “Visualising network events in a muggle friendly way”
- Boniface Kayode Alese, Abimbola Akinledele, Folasade M. Dahunsi, Aderonke Favour-Bethy Thompson and Tosin Adesuyi. “A Graphic-based Cryptographic Model for Authentication”
- David Brosset, Yvon Kermarrec, Pedro Merino Laso, Benjamin Costé and Camille Cavelier. “Cr@ck3n: a cyber alerts visualization object”
- Pablo Casais Solano and Antonio José Reinoso Peinado. “Socioeconomic factors in Cybercrime”
- Anthony Arrott, Ivan Macalintal and Ian McMillan. “For cloud services on a user’s multiple devices, how do we measure the trusted zone defended by anti-malware?”
- Elochukwu Ukwandu, William Buchanan and Gordon Russell. “Performance Evaluation of a Fragmented Secret Share System”
- Gavin Hales. “Visualisation of Device Datasets to Assist Digital Forensic Investigation”
- Scott Donaldson, Natalie Coull and David Mcluskie. “A Methodology for Testing Virtualization Security”
- Sumaia Sabouni, Andrea Cullen and Lorna Armitage. “A Preliminary Radicalisation Framework Based on Social Engineering Techniques”
- Martyn Weedon, Dimitris Tsaptsinos and James Denholm-Price. “Random Forest Explorations for URL Classification”
- Ruth Ikwu. “A Multi-dimensional Structural Approach to Proactive Cyber Defence”
- Anthony Arrott and William Kam. “Measuring cloud-based anti-malware protection for Office 365 user accounts “
- Taniya Bhatia and Rishabh Kaushal. “Malware Detection in Android based on Dynamic Analysis”
- Daniel Fraunholz, Daniel Krohmer, Simon Duque Antón and Hans Dieter Schotten. “Investigation of Cyber Crime Conducted by Abusing Weak or Default Passwords with a Medium Interaction Honeypot”Mohammed Alzaylaee, Suleiman Yerima and Sakir Sezer. “Improving Dynamic Analysis of Android Apps Using Hybrid Test Input Generation”
- Feng Yao, Suleiman Yerima, Boojoong Kang and Sakir Sezer. “Continuous Implicit Authentication for Mobile Devices based on Adaptive Neuro-Fuzzy Inference System”
- Stephen Singam. “Securing an US$ 2.8B Digital Asset: The movie – Avatar”
- Louai Maghrabi, Eckhard Pfluegel, Luluwah Al-Fagih, Roman Graf, Florian Skopik and Giuseppe Settanni. “Improved Software Vulnerability Patching Techniques Using CVSS and Game Theory”
- Yassine Lemmou and El Mamoun Souidi. “PrincessLocker analysis”
- Kamalakanta Sethi, Amartya Majumdar and Padmalochan Bera. “A Novel Implementation of Parallel Homomorphic Encryption for Secure Data Storage in Cloud”
- Yuanyuan Grace Zeng. “Identifying Email Threats Using Predictive Analysis”
- Michelle Omoogun, Preetila Seeam, Visham Ramsurrun, Xavier Bellekens and Amar Seeam. “When eHealth Meets the Internet of Things: Pervasive Security and Privacy Challenges”
- Vahid Moula and Salman Niksefat. “ROPK++: An enhanced ROP attack detection framework for Linux operating system”
- Tianhui Meng, Zhihao Shang and Katinka Wolter. “An Empirical Performance and Security Evaluation of Android Container Solutions”
- Clement Guitton. “Foiling Cyber Attacks”
- Amala Rajan, Rejitha Ravikumar and Mariam Mohammed Al-Shaer. “UAE Cybercrime Law and Cybercrimes – An Analysis”