Theme: Cyber Science in the era of Artificial Intelligence
Royal Holloway University of London
Central London Campus
Stewart House via Senate House
Malet St, London WC1E 7HU
London, United Kingdom
3-5 June 2026
3-4 June (in-person)
5 June (virtual)
About Cyber Science 2026
Cyber Science 2026 will be a hybrid event, however, we encourage participant to endeaviour to attend in-person.
The International Conference on Cybersecurity, Situational Awareness and Social Media (Cyber Science 2026) is a multidisciplinary conference. It brings academics, researchers, practitioners and participants together to share and discuss new and emerging ideas, concepts and research outcomes. The conference focuses in advancing the principles, methods and applications of cybersecurity, situational awareness and social media.
Cyber Science 2026 invites participants to submit original papers that encompass principles, concepts, analysis, design, methods and applications of cybersecurity, situational awareness and social media.
All submitted papers will be independently peer-reviewed, and accepted papers must be registered and presented at the conference in order to be included in the conference proceedings.
About The Conference Venue
Stewart House, Royal Holloway University of London
Get ready for an exciting day at Royal Holloway University, London, UK on June 3, 2026 at 8:30 AM (BST). Join fellow tech enthusiasts and dive into the latest in cyber science with talks, workshops, and networking. Whether you're a pro or just curious, this event is the perfect place to explore and have fun. Don’t miss out on this awesome opportunity to connect and learn in person!
📍 Senate House, Royal Holloway University - steps away from the British Museum, the British Library, Russell Square, and Oxford Street. Seats are limited. Reserve yours today.
Conference Publication
Cyber Science 2026 will be published by Springer.
The Cyber Science 2026 proceedings will be published in the Springer Proceedings in Complexity book series.
Keynote & Panel Speakers 2026
The speakers at cyber science 2026 are industry leaders and top academics in the field
Dr Carolyn Swinney
Royal Air Force Communications & Electronics Engineering Officer and Executive Fellow at the University of EssexDr Cyril Onwubiko
Business Information Security Officer, BarclaysDr Deepthi Ratnayake
Principal Lecturer in Cyber Security, Cybersecurity & Computing Systems Research Group; University of Hertfordshire (UH)Dr Konstantinos Mersinas, PhD, CISSP
Associate Professor at the Information Security Group, Royal Holloway, University of LondonCall For Papers (CFP)
The deadline for all submissions is 28th February 2026 extended to 30th March 2026.
Cyber Science invites original submissions contributing to research and innovation in Cybersecurity, Situational Awareness, Social Media, and Cyber Incident Response. All papers will undergo independent peer review, and accepted papers must be registered and presented at the conference to be included in the proceedings. Submissions must follow Springer author guidelines, be prepared in PDF or Word, and be submitted via the Microsoft CMT service.
ACKNOWLEDGMENT
The Microsoft CMT service was used for managing the peer-reviewing process for this conference. This service was provided for free by Microsoft and they bore all expenses, including costs for Azure cloud services as well as for software development and support.
About C-MRIC
Pioneering research and innovation in Cyber Situational Awareness, Social Media, Cyber Security and Cyber Incident Response
Cyber Science is the flagship conference of the Centre for Multidisciplinary Research, Innovation and Collaboration (C-MRiC) focusing on pioneering research and innovation in Cyber Situational Awareness, Social Media, Cyber Security and Cyber Incident Response.
Cyber Science aims to encourage participation and promotion of collaborative scientific, industrial and academic inter-workings among individual researchers, practitioners, members of existing associations, academia, standardization bodies, and including government departments and agencies. The purpose is to build bridges between academia and industry, and to encourage interplay of different culture.
Royal Holloway University of London, London, UK
7+ Speakers
3 Main Sponsors
Event Schedule & Agenda
All times shown are UK Time zone: GMT+1
| Morning Session | |
| 08:45 – 09:30 |
Registration & Breakfast (45 minutes) Registration desk closes promptly at 09:30. All delegates are kindly asked to arrive in good time to complete registration before the session begins. |
| 09:30 – 09:50 |
Conference Announcements & Opening of Proceedings Dr Cyril Onwubiko — Founder, C-MRiC "Cyber Science 2026 — the 11th International Conference on Cybersecurity, Situational Awareness and Social Media." |
| 10:00 – 11:00 |
Keynote Session Dr Carolyn Swinney Royal Air Force Communications & Electronics Engineering Officer; Executive Fellow, University of Essex |
| 11:00 – 11:10 | Coffee & Tea Break (10 minutes) |
| 11:10 – 11:35 |
Security Incident Filtering Theory — A Model of Log Analysts’ Prioritizations Teodor Sommestad (Swedish Defence Research Agency)*; Henrik Karlzén (Swedish Defence Research Agency); Max Landauer (Austrian Institute of Technology); Markus Wurzenberger (Austrian Institute of Technology); Florian Skopik (Austrian Institute of Technology) |
| 11:35 – 12:00 |
What Investigators Inherit: Public Corpora as Evidence States for Forensic Readiness Evaluation Belinda Onyeashie (University of the West of England)*; Jonathan Lancelot (University of the West of England); Petra Leimich (Edinburgh Napier University) |
| 12:00 – 13:00 | Group Photograph & Lunch Break (60 minutes) |
| Afternoon Session | |
| 13:10 – 13:35 |
Impact of Import Hash on ML-Based YARA Rule Generation — A PoC Study Ferenc Leitold (Óbuda University)* |
| 13:35 – 14:00 |
CROFv2 — Moving Beyond a General Cyber Resilience Framework Cyril Onwubiko (Research Series)* |
| 14:10 – 14:35 |
A Comparative Analysis of Situational Awareness Support in Cyber Incident Response Ticketing Systems Liberty Kent (University College London)*; Nilufer Tuptuk (University College London); Ingolf Becker (University College London) |
| 15:00 – 15:25 |
ToolProbe: A Two-Stage Evaluation Framework for LLM Agent Safety in MCP Tool-Calling Environments Ramkumar Sundarakalatharan (Zerberus.ai)*; Sriram Gopalakrishnan (Zerberus.ai) |
| 15:25 – 15:55 | Coffee & Tea Break (30 minutes) |
| 16:00 – 16:25 |
The Epistemology of Confident Machines Carolyn Swinney (University of Essex)* |
| 16:30 – 16:55 |
An Artefact-Driven Framework for Embedding Security by Design in the Systems Engineering V-Model Enoch Agyepong (Elbit Systems, UK)* |
| 17:00 – 17:25 |
Quantum Vulnerability as a Financial Impairment Triggering Event: Rethinking Capitalised Systems with Cryptographic Infrastructure Dependencies under IAS 36, IAS 38, ASC 350-40 and ASC 360-10 Tim Williams (Bank of Ireland)* |
| 17:30 – 17:55 |
Hierarchical Detection of Malicious Command Lines Using Random Forest and Context-Aware LSTM Qinzheng Hu (University of Glasgow)*; Yixian Jiang (University of Glasgow); Pavandeep Singh Baxi (University of Glasgow) |
| 18:00 – 21:00 |
Conference Dinner, Drinks & Photographs Antalya Restaurant, London, UK — https://antalyarestaurant.co.uk/ |
| Morning Session | |
| 08:30 – 09:00 | Breakfast — Tea, Coffee & Water (30 minutes) |
| 09:00 – 10:00 |
Keynote Session Dr Konstantinos Mersinas Associate Professor, Information Security Group, Royal Holloway, University of London, UK |
| 10:00 – 10:10 | Break (10 minutes) |
| 10:10 – 10:35 |
PolicyControls: A Web-Based Platform for Cybersecurity Control Assessment and Compliance Management Cyril Onwubiko (Research Series)* |
| 10:35 – 11:00 |
WiFiPenTester: Towards Governed GenAI-Assisted Wireless Penetration Testing Haitham Al-Sinani (RHUL)*; Chris Mitchell (Royal Holloway, University of London); Abdulaziz Al-Hosni (Diwan of Royal Court); Sultan Al-Harrasi (University of Technology and Applied Sciences) |
| 11:00 – 11:30 |
Operational Technology in the Cloud Karin Bernsmed (SINTEF Digital); Martin Gilje Jaatun (SINTEF ICT)*; Maren Istad (SINTEF Energy) |
| 11:30 – 12:00 |
Protecting Against Deepfake Voice Synthesis: A Gradient-Based Approach to Secure Voice Communications Sanaz Kavianpour (Abertay University)*; Marc Kydd (Abertay University); Jordan O’Hara (Naked Energy) |
| 12:00 – 13:00 | Group Photograph & Lunch Break (60 minutes) |
| Afternoon Session | |
| 13:10 – 13:35 |
Know Your Unknowns: A Strategic Johari Game for Cyber Security Management Eckhard Pfluegel (Kingston University)*; Neda Ahmadi (Kingston University); Rehan Usman (Kingston University) |
| 13:35 – 14:00 |
Artificial Intelligence as a Force Multiplier in Social Engineering: An Experiential Learning Approach Aunshul Rege (Temple University)*; Hwanhee Park (Temple University); John Snee (Temple University) |
| 14:10 – 14:35 |
Cybersecurity Economics, PQC and AI — 25 Years Post Anderson (2001) Tim Williams (Bank of Ireland)* |
| 15:00 – 15:25 |
The Rise and Rise of LLM-Powered Penetration Testing Systems: The State of the Art Haitham Al-Sinani (Diwan of Royal Court & German University of Technology in Oman)*; Chris Mitchell (Royal Holloway, University of London); Abdulaziz Al-Hosni (Diwan of Royal Court) |
| 15:25 – 15:55 | Coffee & Tea Break (30 minutes) |
| 16:00 – 16:25 |
HDIT: A Cyber Situational Awareness Framework for Real-Time Behavioural Drift Detection in Autonomous AI Agents Wendi Soto (King’s College London)* |
| 16:30 – 16:55 |
Artificial Intelligence for Cyber Situation Awareness: Trust, Distortion and Human Judgement Ibrahim Maniku (Queen Mary University of London)*; Maria Bada (Queen Mary University of London) |
| 17:00 – 17:25 |
Characterizing Vulnerabilities in the TCP/IP Protocol Stack across Packet Semantics and Control Plane Architectures Omkar Bhalekar (RIT)* |
| 17:30 – 17:55 |
Operationalising Cyber Risk Management Using AI: Connecting Cyber Incidents to MITRE ATT&CK Techniques, Security Controls and Metrics Emad Sherif (De Montfort University)* |
| Morning Session | |
| 08:30 – 09:00 | Breakfast — Tea, Coffee & Water (30 minutes) |
| 09:00 – 10:00 |
Keynote Session Dr Deepthi Ratnayake Principal Lecturer in Cyber Security, Cybersecurity & Computing Systems Research Group, University of Hertfordshire, UK |
| 10:00 – 10:10 | Break (10 minutes) |
| 10:10 – 10:35 |
Alignment vs. Capability: Does Safety Removal Improve Cybersecurity Performance of LLMs? Vignesh Muraleedharan (SRMIST, India) |
| 10:35 – 11:00 |
Reactive Digitalization, Fragmented Security — Insights from Manufacturing Small and Medium-Sized Enterprises Henning Thomsen (Aalborg University)*; Christian Black Jørgensen (University College of Northern Denmark); Bent Rosenkilde (University College of Northern Denmark); Mikkel Graugaard Langdahl Antonsen (University College of Northern Denmark) |
| 11:00 – 11:30 |
Mitigating Skin-Tone Bias in AI-Based Melanoma Detection Using Neural Style Transfer and Adversarial Domain Adaptation Nyasha Samuel Makanza (University of Portsmouth); Intissar Ziani (University of Abdelhamid Mehri); Konstantina Kanta (Beiersdorf); Gueltoum Bendiab (University of Portsmouth); Aikaterini Kanta (University of Portsmouth)* |
| 11:30 – 12:00 |
A Comparative Study of Machine Learning, Deep Learning and Transformer-Based Models for Malware Detection with an Adaptive Mixture-of-Experts Framework Rama Satya CH (Mahindra University)*; Raghu Kisore N (Mahindra University) |
| 12:00 – 13:00 | Group Photograph & Lunch Break (60 minutes) |
| Afternoon Session | |
| 13:10 – 13:35 |
Cyber Threat Intelligence Implementation in Critical Infrastructure: A Malaysian Perspective NURUL NUHA BINTI ABDUL MOLOK (International Islamic University Malaysia (IIUM))*; SHUHAILI BT. TALIB (IIUM); NOOR HAYANI BINTI ABD RAHIM (IIUM); ZAHIDAH BINTI ZULKIFLI (IIUM) |
| 13:35 – 14:00 |
WebShield: Real-Time Detection of Phishing Websites and Dark Patterns Using Machine Learning and a Chrome Extension Venkata Karthik Muppidi (Siddhartha Academy of Higher Education)*; M. Vani Pujitha (SAHE); Jaswanth Potnuri (SAHE); Sandepogu Sudheer (SAHE); Parshav Meghan (SAHE) |
| 14:10 – 14:35 |
PhishShield: A Multi-Modal Gmail Security Extension Using Machine Learning and BERT for Phishing Detection Tharun M R (K.S. Rangasamy College of Technology)*; Pugalendi S (KSRCT); Dinesh Kumar K (KSRCT) |
| 15:00 – 15:25 |
An Intelligent System for Identifying Fraudulent Accounts in Social Media Leveraging Deep Learning Techniques Sanyu Paul Reddy (Malla Reddy University); Sudha Kodi (Malla Reddy University)* |
| 15:25 – 15:55 | Coffee & Tea Break (30 minutes) |
| 16:00 – 16:25 |
CypherTrap: Tracking Threats Through an Integrated Honeypot–IDS Framework Amoghavarsha K (Jain University)*; Likith R (Jain University) |
| 16:30 – 16:55 |
Optimal Spending on Cybersecurity Measures Tara Kissoon (University of London — Alumni Ambassador)* |
| 17:00 – 17:15 |
Conference Closing Remarks Prof. Martin G. Jaatun |
Day 1 — Wednesday, 3 June 2026 | UK Time zone: GMT+0
09:00 Conference day 1
To be decided.
Thursday June 4, 2026 | UK Time zone: GMT+0
09:00 Conference day 2
To be decided.







