In response to Covid-19 & in line with directives from international, national and local public health authorities and advisors, CMRiC made the decision to host Cyber Science 2020 virtually from 15-19 June. Our first virtual conference was an overwhelming success, featuring:

Co-located conferences

CyberSA 2020

International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA 2020)

Social Media 2020

International Conference on Social Media, Wearable and Web Analytics (Social Media 2020)

Cyber Security 2020

International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2020)

Cyber Incident 2020

International Conference on Cyber Incident Response, Coordination, Containment & Control (Cyber Incident 2020)

Accepted Papers, Extended Abstracts and Posters

  • Martin Gilje Jaatun, Lars Bodsberg, Tor Olav Grøtan and Marie Moe. An Empirical Study of CERT Capacity in the North Sea
  • Andrew Rae and Asma Patel. Developing a security behavioural assessment approach for cyber rating UK MSBs
  • Uchenna Daniel Ani, Hongmei He and Ashutosh Tiwari. Vulnerability-Based Impact Criticality Estimation for Industrial Control Systems
  • Inger Anne Tøndel, Ravishankar Borgaonkar, Martin Gilje Jaatun and Christian Frøystad. What Could Possibly Go Wrong? Smart Grid Misuse Case Scenarios
  • Xiaoyu Du, Quan Le and Mark Scanlon. Automated Artefact Relevancy Determination from Artefact Metadata and Associated Timeline Events
  • Enoch Agyepong, Yulia Cherdantseva, Philipp Reinecke and Pete Burnap. Towards a Framework for Measuring the Performance of a Security Operations Center Analyst
  • Waleed Alghamdi and Michael Schukat. Slave Clock Responses to Precision Time Protocol Attacks: A Case Study
  • Daniel Reti, Daniel Fraunholz, Janis Zemitis, Daniel Schneider and Hans Dieter Schotten. Deep Down the Rabbit Hole: On References in Networks of Decoy Elements
  • John Oraw and David Laverty. Restricting Data Flows to Secure Against Remote Attack
  • Hanlin Chen, Hongmei He and Andrew Starr. An Overview of Web Robots Detection Techniques
  • Joel Chacon, Sean McKeown and Richard Macfarlane. Towards Identifying Human Actions, Intent, and Severity of APT Attacks Applying Deception Techniques – An Experiment
  • Gwyn Wilkinson and Phil Legg. “What did you say?”: Extracting unintentional secrets from predictive text learning systems
  • Pascal Faurie, Arghir-Nicolae Moldovan and Irina Tal. Privacy Policy – “I agree”?! – Do alternatives to text-based policies increase the awareness of the users?
  • Aikaterini Kanta, Iwen Coisel and Mark Scanlon. Smarter Password Guessing Techniques Leveraging Contextual Information and OSINT
  • Joshua Sipper. Cyber Threat Intelligence and the Cyber Meta-Reality and Cyber Microbiome
  • Andrew McCarthy, Benedict Gaster and Phil Legg. Shouting Through Letterboxes: A study on attack susceptibility of voice assistants
  • Sean McKeown and Gordon Russell. Forensic Considerations for the High Efficiency Image File Format (HEIF)
  • Clemens Krueger and Sean McKeown. Using Amazon Alexa APIs as a Source of Digital Evidence
  • Marco Cook, Ioannis Stavrou, Sarah Dimmock and Christopher Johnson. Introducing a forensics data type taxonomy of acquirable artefacts from programmable logic controllers
  • Joshua Talbot, Przemek Pikula, Craig Sweetmore, Samuel Rowe, Hanan Hindy, Christos Tachtatzis, Robert Atkinson and Xavier Bellekens. A Security Perspective on Unikernels
  • Tolga Ünlü, Lynsay Shepherd, Natalie Coull and Colin McLean. A Taxonomy of Approaches for Integrating Attack Awareness in Applications
  • Martin Fejrskov, Emmanouil Vasilomanolakis and Jens Myrup Pedersen. Cyber-security research by ISPs: A NetFlow and DNS Anonymization Policy
  • Andrei Queiroz, Brian Keegan and Susan Mckeever. Moving Targets: Addressing Concept Drift in Supervised Models for Hacker Communication Detection
  • Pranshu Bajpai and Richard Enbody. Memory Forensics Against Ransomware
  • Pranshu Bajpai and Richard Enbody. An Empirical Study of Key Generation in Cryptographic Ransomware
  • Felix Anda, Brett Becker, David Lillis, Nhien-An Le-Khac and Mark Scanlon. Assessing the Influencing Factors on the Accuracy of Underage Facial Age Estimation
  • Jonathan Francis Roscoe and Max Smith-Creasey. Acoustic Emanation of Haptics as a Side-Channel for Gesture-Typing Attacks
  • Fadi Sibai. AI Crimes: A Classification
  • Yunjia Wang, Yang Liu, Tiejun Wu and Ishbel Duncan. Cost-Effective OCR Implementation to Prevent Phishing on Mobile Platforms
  • Nebrase Elmrabit, Feixiang Zhou, Fengyin Li and Huiyu Zhou. Evaluation of Machine Learning Algorithms for Anomaly Detection
  • Joseph Kaberuka and Christopher Johnson. Adapting STPA-sec for Socio-technical Cyber Security Challenges in Emerging Nations: A Case Study in Risk Management for Rwandan Health Care
  • Lukas Gressl, Michael Krisper, Christian Steger and Ulrich Neffe. Towards Security Attack and Risk Assessment during Early System Design
  • Evangelos Moustakas, Nishtha Lamba, C Ranganathan and Dina Mahmoud. Blurring lines between fiction and reality: Perspectives of experts on marketing effectiveness of virtual influencers
  • Katia Raya, Nicole D’Almeida and Maroun Chamoun. Social big data: A Twitter text mining approach to the communication of universities during the Lebanese protests
  • Matthew Spradling, Jeremy Straub and Jay Strong. Introducing & Evaluating `Nutrition Facts’ for Online Content
  • Tapadhir Das, Abdelrahman Eldosouky and Shamik Sengupta. Think Smart, Play Dumb: Analyzing Deception in Hardware Trojan Detection Using Game Theory
  • Timothy D. Williams. Epistemological Questions for Cybersecurity
  • Théo Simon and Bertrand Venard. Technical codes’ potentialities in cybersecurity. A contextual approach on the ethics of small digital organizations in France.
  • Bertrand Venard. Privacy Protection Behaviours: a diversity of individual strategies
  • Jordan Schoenherr and Robert Thomson. Insider Threat Detection: A Solution in Search of a Problem
  • Sebastião Rogério da Silva Neto, Thomás Tabosa de Oliveira, Vanderson de Souza Sampaio, Theo Lynn and Patricia Takako Endo. Platform for monitoring and clinical diagnosis of arboviruses using computational models
  • Arman Zand, James Orwell and Eckhard Pfluegel. Secure Framework for Anti-Money-Laundering using Machine Learning and Secret Sharing
  • Drew Malzahn, Zachary Birnbaum and Cimone Wright-Hamor. Automated Vulnerability Testing via Executable Attack Graphs
  • Christopher Kelly, Nikolaos Pitropakis, Sean Mckeown and Costas Lambrinoudakis. Testing And Hardening IoT Devices Against the Mirai Botnet
  • Johannes Mols and Emmanouil Vasilomanolakis. ethVote: Towards secure voting with distributed ledgers
  • Tharindu Ranathunga, Ramona Marfievici, Alan McGibney and Susan Rea. A DLT-based Trust Framework for IoT Ecosystems