previous arrow
Block
next arrow

Theme: Cyber Science in the era of Artificial Intelligence

Royal Holloway University of London
Central London Campus

Stewart House via Senate House
Malet St, London WC1E 7HU
London, United Kingdom

3-5 June 2026

3-4 June (in-person)
5 June (virtual)

Cyber Science 2026 will be a hybrid event, however, we encourage participant to endeaviour to attend in-person. 

The International Conference on Cybersecurity, Situational Awareness and Social Media (Cyber Science 2026) is a multidisciplinary conference. It brings academics, researchers, practitioners and participants together to share and discuss new and emerging ideas, concepts and research outcomes. The conference focuses in advancing the principles, methods and applications of cybersecurity, situational awareness and social media. 

Cyber Science 2026 invites participants to submit original papers that encompass principles, concepts, analysis, design, methods and applications of cybersecurity, situational awareness and social media. 

All submitted papers will be independently peer-reviewed, and accepted papers must be registered and presented at the conference in order to be included in the conference proceedings. 

About The Conference Venue

Stewart House, Royal Holloway University of London

Get ready for an exciting day at Royal Holloway University, London, UK on June 3, 2026 at 8:30 AM (BST). Join fellow tech enthusiasts and dive into the latest in cyber science with talks, workshops, and networking. Whether you're a pro or just curious, this event is the perfect place to explore and have fun. Don’t miss out on this awesome opportunity to connect and learn in person!

📍 Senate House, Royal Holloway University - steps away from the British Museum, the British Library, Russell Square, and Oxford Street. Seats are limited. Reserve yours today.

×

Conference Publication

Cyber Science 2026 will be published by Springer.
The Cyber Science 2026 proceedings will be published in the Springer Proceedings in Complexity book series.

Keynote & Panel Speakers 2026

The speakers at cyber science 2026 are industry leaders and top academics in the field

Dr Carolyn Swinney

Royal Air Force Communications & Electronics Engineering Officer and Executive Fellow at the University of Essex

Dr Cyril Onwubiko

Business Information Security Officer, Barclays

Dr Deepthi Ratnayake

Principal Lecturer in Cyber Security, Cybersecurity & Computing Systems Research Group; University of Hertfordshire (UH)

Dr Konstantinos Mersinas, PhD, CISSP

Associate Professor at the Information Security Group, Royal Holloway, University of London

Call For Papers (CFP)

The deadline for all submissions is 28th February 2026 extended to 30th March 2026.

Cyber Science invites original submissions contributing to research and innovation in Cybersecurity, Situational Awareness, Social Media, and Cyber Incident Response. All papers will undergo independent peer review, and accepted papers must be registered and presented at the conference to be included in the proceedings. Submissions must follow Springer author guidelines, be prepared in PDF or Word, and be submitted via the Microsoft CMT service.

ACKNOWLEDGMENT
The Microsoft CMT service was used for managing the peer-reviewing process for this conference. This service was provided for free by Microsoft and they bore all expenses, including costs for Azure cloud services as well as for software development and support.

About C-MRIC

Pioneering research and innovation in Cyber Situational Awareness, Social Media, Cyber Security and Cyber Incident Response

Cyber Science is the flagship conference of the Centre for Multidisciplinary Research, Innovation and Collaboration (C-MRiC) focusing on pioneering research and innovation in Cyber Situational Awareness, Social Media, Cyber Security and Cyber Incident Response.

Cyber Science aims to encourage participation and promotion of collaborative scientific, industrial and academic inter-workings among individual researchers, practitioners, members of existing associations, academia, standardization bodies, and including government departments and agencies. The purpose is to build bridges between academia and industry, and to encourage interplay of different culture.

Royal Holloway University of London, London, UK

7+ Speakers

3 Main Sponsors

Event Schedule & Agenda

All times shown are UK Time zone: GMT+1
Moderator: Konstantinos Mersinas
In-person only
Morning Session
08:45 – 09:30 Registration & Breakfast (45 minutes)
Registration desk closes promptly at 09:30. All delegates are kindly asked to arrive in good time to complete registration before the session begins.
09:30 – 09:50 Conference Announcements & Opening of Proceedings
Dr Cyril Onwubiko — Founder, C-MRiC
"Cyber Science 2026 — the 11th International Conference on Cybersecurity, Situational Awareness and Social Media."
10:00 – 11:00 Keynote Session
Dr Carolyn Swinney
Royal Air Force Communications & Electronics Engineering Officer; Executive Fellow, University of Essex
11:00 – 11:10Coffee & Tea Break (10 minutes)
11:10 – 11:35 Security Incident Filtering Theory — A Model of Log Analysts’ Prioritizations
Teodor Sommestad (Swedish Defence Research Agency)*; Henrik Karlzén (Swedish Defence Research Agency); Max Landauer (Austrian Institute of Technology); Markus Wurzenberger (Austrian Institute of Technology); Florian Skopik (Austrian Institute of Technology)
11:35 – 12:00 What Investigators Inherit: Public Corpora as Evidence States for Forensic Readiness Evaluation
Belinda Onyeashie (University of the West of England)*; Jonathan Lancelot (University of the West of England); Petra Leimich (Edinburgh Napier University)
12:00 – 13:00Group Photograph & Lunch Break (60 minutes)
Afternoon Session
13:10 – 13:35 Impact of Import Hash on ML-Based YARA Rule Generation — A PoC Study
Ferenc Leitold (Óbuda University)*
13:35 – 14:00 CROFv2 — Moving Beyond a General Cyber Resilience Framework
Cyril Onwubiko (Research Series)*
14:10 – 14:35 A Comparative Analysis of Situational Awareness Support in Cyber Incident Response Ticketing Systems
Liberty Kent (University College London)*; Nilufer Tuptuk (University College London); Ingolf Becker (University College London)
15:00 – 15:25 ToolProbe: A Two-Stage Evaluation Framework for LLM Agent Safety in MCP Tool-Calling Environments
Ramkumar Sundarakalatharan (Zerberus.ai)*; Sriram Gopalakrishnan (Zerberus.ai)
15:25 – 15:55Coffee & Tea Break (30 minutes)
16:00 – 16:25 The Epistemology of Confident Machines
Carolyn Swinney (University of Essex)*
16:30 – 16:55 An Artefact-Driven Framework for Embedding Security by Design in the Systems Engineering V-Model
Enoch Agyepong (Elbit Systems, UK)*
17:00 – 17:25 Quantum Vulnerability as a Financial Impairment Triggering Event: Rethinking Capitalised Systems with Cryptographic Infrastructure Dependencies under IAS 36, IAS 38, ASC 350-40 and ASC 360-10
Tim Williams (Bank of Ireland)*
17:30 – 17:55 Hierarchical Detection of Malicious Command Lines Using Random Forest and Context-Aware LSTM
Qinzheng Hu (University of Glasgow)*; Yixian Jiang (University of Glasgow); Pavandeep Singh Baxi (University of Glasgow)
18:00 – 21:00 Conference Dinner, Drinks & Photographs
Antalya Restaurant, London, UK — https://antalyarestaurant.co.uk/
Moderator: Martin Gilje Jaatun
In-person only
Morning Session
08:30 – 09:00Breakfast — Tea, Coffee & Water (30 minutes)
09:00 – 10:00 Keynote Session
Dr Konstantinos Mersinas
Associate Professor, Information Security Group, Royal Holloway, University of London, UK
10:00 – 10:10Break (10 minutes)
10:10 – 10:35 PolicyControls: A Web-Based Platform for Cybersecurity Control Assessment and Compliance Management
Cyril Onwubiko (Research Series)*
10:35 – 11:00 WiFiPenTester: Towards Governed GenAI-Assisted Wireless Penetration Testing
Haitham Al-Sinani (RHUL)*; Chris Mitchell (Royal Holloway, University of London); Abdulaziz Al-Hosni (Diwan of Royal Court); Sultan Al-Harrasi (University of Technology and Applied Sciences)
11:00 – 11:30 Operational Technology in the Cloud
Karin Bernsmed (SINTEF Digital); Martin Gilje Jaatun (SINTEF ICT)*; Maren Istad (SINTEF Energy)
11:30 – 12:00 Protecting Against Deepfake Voice Synthesis: A Gradient-Based Approach to Secure Voice Communications
Sanaz Kavianpour (Abertay University)*; Marc Kydd (Abertay University); Jordan O’Hara (Naked Energy)
12:00 – 13:00Group Photograph & Lunch Break (60 minutes)
Afternoon Session
13:10 – 13:35 Know Your Unknowns: A Strategic Johari Game for Cyber Security Management
Eckhard Pfluegel (Kingston University)*; Neda Ahmadi (Kingston University); Rehan Usman (Kingston University)
13:35 – 14:00 Artificial Intelligence as a Force Multiplier in Social Engineering: An Experiential Learning Approach
Aunshul Rege (Temple University)*; Hwanhee Park (Temple University); John Snee (Temple University)
14:10 – 14:35 Cybersecurity Economics, PQC and AI — 25 Years Post Anderson (2001)
Tim Williams (Bank of Ireland)*
15:00 – 15:25 The Rise and Rise of LLM-Powered Penetration Testing Systems: The State of the Art
Haitham Al-Sinani (Diwan of Royal Court & German University of Technology in Oman)*; Chris Mitchell (Royal Holloway, University of London); Abdulaziz Al-Hosni (Diwan of Royal Court)
15:25 – 15:55Coffee & Tea Break (30 minutes)
16:00 – 16:25 HDIT: A Cyber Situational Awareness Framework for Real-Time Behavioural Drift Detection in Autonomous AI Agents
Wendi Soto (King’s College London)*
16:30 – 16:55 Artificial Intelligence for Cyber Situation Awareness: Trust, Distortion and Human Judgement
Ibrahim Maniku (Queen Mary University of London)*; Maria Bada (Queen Mary University of London)
17:00 – 17:25 Characterizing Vulnerabilities in the TCP/IP Protocol Stack across Packet Semantics and Control Plane Architectures
Omkar Bhalekar (RIT)*
17:30 – 17:55 Operationalising Cyber Risk Management Using AI: Connecting Cyber Incidents to MITRE ATT&CK Techniques, Security Controls and Metrics
Emad Sherif (De Montfort University)*
Moderator: Cyril Onwubiko
Remote only
Morning Session
08:30 – 09:00Breakfast — Tea, Coffee & Water (30 minutes)
09:00 – 10:00 Keynote Session
Dr Deepthi Ratnayake
Principal Lecturer in Cyber Security, Cybersecurity & Computing Systems Research Group, University of Hertfordshire, UK
10:00 – 10:10Break (10 minutes)
10:10 – 10:35 Alignment vs. Capability: Does Safety Removal Improve Cybersecurity Performance of LLMs?
Vignesh Muraleedharan (SRMIST, India)
10:35 – 11:00 Reactive Digitalization, Fragmented Security — Insights from Manufacturing Small and Medium-Sized Enterprises
Henning Thomsen (Aalborg University)*; Christian Black Jørgensen (University College of Northern Denmark); Bent Rosenkilde (University College of Northern Denmark); Mikkel Graugaard Langdahl Antonsen (University College of Northern Denmark)
11:00 – 11:30 Mitigating Skin-Tone Bias in AI-Based Melanoma Detection Using Neural Style Transfer and Adversarial Domain Adaptation
Nyasha Samuel Makanza (University of Portsmouth); Intissar Ziani (University of Abdelhamid Mehri); Konstantina Kanta (Beiersdorf); Gueltoum Bendiab (University of Portsmouth); Aikaterini Kanta (University of Portsmouth)*
11:30 – 12:00 A Comparative Study of Machine Learning, Deep Learning and Transformer-Based Models for Malware Detection with an Adaptive Mixture-of-Experts Framework
Rama Satya CH (Mahindra University)*; Raghu Kisore N (Mahindra University)
12:00 – 13:00Group Photograph & Lunch Break (60 minutes)
Afternoon Session
13:10 – 13:35 Cyber Threat Intelligence Implementation in Critical Infrastructure: A Malaysian Perspective
NURUL NUHA BINTI ABDUL MOLOK (International Islamic University Malaysia (IIUM))*; SHUHAILI BT. TALIB (IIUM); NOOR HAYANI BINTI ABD RAHIM (IIUM); ZAHIDAH BINTI ZULKIFLI (IIUM)
13:35 – 14:00 WebShield: Real-Time Detection of Phishing Websites and Dark Patterns Using Machine Learning and a Chrome Extension
Venkata Karthik Muppidi (Siddhartha Academy of Higher Education)*; M. Vani Pujitha (SAHE); Jaswanth Potnuri (SAHE); Sandepogu Sudheer (SAHE); Parshav Meghan (SAHE)
14:10 – 14:35 PhishShield: A Multi-Modal Gmail Security Extension Using Machine Learning and BERT for Phishing Detection
Tharun M R (K.S. Rangasamy College of Technology)*; Pugalendi S (KSRCT); Dinesh Kumar K (KSRCT)
15:00 – 15:25 An Intelligent System for Identifying Fraudulent Accounts in Social Media Leveraging Deep Learning Techniques
Sanyu Paul Reddy (Malla Reddy University); Sudha Kodi (Malla Reddy University)*
15:25 – 15:55Coffee & Tea Break (30 minutes)
16:00 – 16:25 CypherTrap: Tracking Threats Through an Integrated Honeypot–IDS Framework
Amoghavarsha K (Jain University)*; Likith R (Jain University)
16:30 – 16:55 Optimal Spending on Cybersecurity Measures
Tara Kissoon (University of London — Alumni Ambassador)*
17:00 – 17:15 Conference Closing Remarks
Prof. Martin G. Jaatun
All times shown are UK Time (GMT+1). Programme subject to minor changes.
© 2026 Centre for Multidisciplinary Research, Innovation and Collaboration (C-MRiC) | c-mric.org
Day 1 — Wednesday, 3 June 2026 | UK Time zone: GMT+0

09:00 Conference day 1

To be decided.

Thursday June 4, 2026 | UK Time zone: GMT+0

09:00 Conference day 2

To be decided.

Official Sponsors & Partners

Thank you to our sponsors!

Proceedings will be submitted for indexation by