In response to Covid-19 & in line with directives from international, national and local public health authorities and advisors, CMRiC made the decision to host Cyber Science 2020 virtually from 15-19 June. Our first virtual conference was an overwhelming success, featuring:
- 74 paper presentations
- 5 keynote speeches
- 2 industry panels
- 200+ attendees
Co-located conferences
Accepted Papers, Extended Abstracts and Posters
- Martin Gilje Jaatun, Lars Bodsberg, Tor Olav Grøtan and Marie Moe. An Empirical Study of CERT Capacity in the North Sea
- Andrew Rae and Asma Patel. Developing a security behavioural assessment approach for cyber rating UK MSBs
- Uchenna Daniel Ani, Hongmei He and Ashutosh Tiwari. Vulnerability-Based Impact Criticality Estimation for Industrial Control Systems
- Inger Anne Tøndel, Ravishankar Borgaonkar, Martin Gilje Jaatun and Christian Frøystad. What Could Possibly Go Wrong? Smart Grid Misuse Case Scenarios
- Xiaoyu Du, Quan Le and Mark Scanlon. Automated Artefact Relevancy Determination from Artefact Metadata and Associated Timeline Events
- Enoch Agyepong, Yulia Cherdantseva, Philipp Reinecke and Pete Burnap. Towards a Framework for Measuring the Performance of a Security Operations Center Analyst
- Waleed Alghamdi and Michael Schukat. Slave Clock Responses to Precision Time Protocol Attacks: A Case Study
- Daniel Reti, Daniel Fraunholz, Janis Zemitis, Daniel Schneider and Hans Dieter Schotten. Deep Down the Rabbit Hole: On References in Networks of Decoy Elements
- John Oraw and David Laverty. Restricting Data Flows to Secure Against Remote Attack
- Hanlin Chen, Hongmei He and Andrew Starr. An Overview of Web Robots Detection Techniques
- Joel Chacon, Sean McKeown and Richard Macfarlane. Towards Identifying Human Actions, Intent, and Severity of APT Attacks Applying Deception Techniques – An Experiment
- Gwyn Wilkinson and Phil Legg. “What did you say?”: Extracting unintentional secrets from predictive text learning systems
- Pascal Faurie, Arghir-Nicolae Moldovan and Irina Tal. Privacy Policy – “I agree”?! – Do alternatives to text-based policies increase the awareness of the users?
- Aikaterini Kanta, Iwen Coisel and Mark Scanlon. Smarter Password Guessing Techniques Leveraging Contextual Information and OSINT
- Joshua Sipper. Cyber Threat Intelligence and the Cyber Meta-Reality and Cyber Microbiome
- Andrew McCarthy, Benedict Gaster and Phil Legg. Shouting Through Letterboxes: A study on attack susceptibility of voice assistants
- Sean McKeown and Gordon Russell. Forensic Considerations for the High Efficiency Image File Format (HEIF)
- Clemens Krueger and Sean McKeown. Using Amazon Alexa APIs as a Source of Digital Evidence
- Marco Cook, Ioannis Stavrou, Sarah Dimmock and Christopher Johnson. Introducing a forensics data type taxonomy of acquirable artefacts from programmable logic controllers
- Joshua Talbot, Przemek Pikula, Craig Sweetmore, Samuel Rowe, Hanan Hindy, Christos Tachtatzis, Robert Atkinson and Xavier Bellekens. A Security Perspective on Unikernels
- Tolga Ünlü, Lynsay Shepherd, Natalie Coull and Colin McLean. A Taxonomy of Approaches for Integrating Attack Awareness in Applications
- Martin Fejrskov, Emmanouil Vasilomanolakis and Jens Myrup Pedersen. Cyber-security research by ISPs: A NetFlow and DNS Anonymization Policy
- Andrei Queiroz, Brian Keegan and Susan Mckeever. Moving Targets: Addressing Concept Drift in Supervised Models for Hacker Communication Detection
- Pranshu Bajpai and Richard Enbody. Memory Forensics Against Ransomware
- Pranshu Bajpai and Richard Enbody. An Empirical Study of Key Generation in Cryptographic Ransomware
- Felix Anda, Brett Becker, David Lillis, Nhien-An Le-Khac and Mark Scanlon. Assessing the Influencing Factors on the Accuracy of Underage Facial Age Estimation
- Jonathan Francis Roscoe and Max Smith-Creasey. Acoustic Emanation of Haptics as a Side-Channel for Gesture-Typing Attacks
- Fadi Sibai. AI Crimes: A Classification
- Yunjia Wang, Yang Liu, Tiejun Wu and Ishbel Duncan. Cost-Effective OCR Implementation to Prevent Phishing on Mobile Platforms
- Nebrase Elmrabit, Feixiang Zhou, Fengyin Li and Huiyu Zhou. Evaluation of Machine Learning Algorithms for Anomaly Detection
- Joseph Kaberuka and Christopher Johnson. Adapting STPA-sec for Socio-technical Cyber Security Challenges in Emerging Nations: A Case Study in Risk Management for Rwandan Health Care
- Lukas Gressl, Michael Krisper, Christian Steger and Ulrich Neffe. Towards Security Attack and Risk Assessment during Early System Design
- Evangelos Moustakas, Nishtha Lamba, C Ranganathan and Dina Mahmoud. Blurring lines between fiction and reality: Perspectives of experts on marketing effectiveness of virtual influencers
- Katia Raya, Nicole D’Almeida and Maroun Chamoun. Social big data: A Twitter text mining approach to the communication of universities during the Lebanese protests
- Matthew Spradling, Jeremy Straub and Jay Strong. Introducing & Evaluating `Nutrition Facts’ for Online Content
- Tapadhir Das, Abdelrahman Eldosouky and Shamik Sengupta. Think Smart, Play Dumb: Analyzing Deception in Hardware Trojan Detection Using Game Theory
- Timothy D. Williams. Epistemological Questions for Cybersecurity
- Théo Simon and Bertrand Venard. Technical codes’ potentialities in cybersecurity. A contextual approach on the ethics of small digital organizations in France.
- Bertrand Venard. Privacy Protection Behaviours: a diversity of individual strategies
- Jordan Schoenherr and Robert Thomson. Insider Threat Detection: A Solution in Search of a Problem
- Sebastião Rogério da Silva Neto, Thomás Tabosa de Oliveira, Vanderson de Souza Sampaio, Theo Lynn and Patricia Takako Endo. Platform for monitoring and clinical diagnosis of arboviruses using computational models
- Arman Zand, James Orwell and Eckhard Pfluegel. Secure Framework for Anti-Money-Laundering using Machine Learning and Secret Sharing
- Drew Malzahn, Zachary Birnbaum and Cimone Wright-Hamor. Automated Vulnerability Testing via Executable Attack Graphs
- Christopher Kelly, Nikolaos Pitropakis, Sean Mckeown and Costas Lambrinoudakis. Testing And Hardening IoT Devices Against the Mirai Botnet
- Johannes Mols and Emmanouil Vasilomanolakis. ethVote: Towards secure voting with distributed ledgers
- Tharindu Ranathunga, Ramona Marfievici, Alan McGibney and Susan Rea. A DLT-based Trust Framework for IoT Ecosystems