Cyber Incident 2015

June 8-9, 2015, London, UK






Call for Papers

International Conference on Cyber Incident Response, Coordination, Containment & Control (Cyber Incident 2015) is an international referred conference dedicated to the advancement of Cyber Incident Response, Coordination, Containment and Control.

The aim of the Cyber Incident 2015 is to encourage participation and promotion of collaborative scientific, industrial and academic inter-workings among individual researchers, practitioners, members of existing associations, academia, standardisation bodies, and including government departments and agencies. The purpose is to build bridges between academia and industry, and to encourage interplay of different cultures.




Submission Deadline

All Industry track, Posters, Work in Progress track, Research Ideas track and PhD Seminar track will be published in the conference proceedings. Interested participants, please submit your proposal using the Easychair Conference Portal.





Topics of Interest


    • Cyber Incident Analysis
    • Cyber Incident Triage
    • Cyber Incident Correlation and Assessment
    • Coordination
    • Containment
    • Root Cause Analysis (RCA)
    • Timeliness
    • Handling and HandlingProcess
    • Reporting
    • Escalation
    • Cyber Incident Management

    • Decision Control
    • Emergence Services
    • Preparedness
    • Readiness
    • Analysis
    • Risk Management
    • Conditionality
    • Proportionality
    • Prioritisation
    • Decision Making
    • Risk-Based Decision
    • Human in the Loop

    • Training
    • Processes and Procedures
    • Policy and Standards
    • Emergency  Services
    • Chain of Custody
    • Forensic Readiness and Investigations
    • Cyber Incident Notification and Announcements
    • Cyber Incident Management Tool
    • Standardisation
    • Framework and Methodology
    • Expertise,Skills, Knowledge and Resource
    • Maturity Model and Goal Setting
    • Certification and Accreditation
    • Memberships to Cyber Incident Responders, Incident Response Organisation

    • Rule-Based Systems
    • Expert Systems
    • Adaptive Learning Systems
    • Predictive Systems
    • The use of Biometrics to aid Forensic Investigations
    • Speak, audio and voice Recognition for forensics
    • Correlation and cross-correlation for Incident Analysis
    • Cross-Domain Analysis
    • Cross-Channel Incident Analysis
    • Multi-domain Analysis


Speakers

Dr. Cyril Onwubiko

Dr. Cyril Onwubiko

Cyber Security Intelligence, Research Series Limited, London, UK
Professor Frank Wang

Professor Frank Wang

School of Computing, University of Kent, UK
Dr. Thomas Owens

Dr. Thomas Owens

Brunel University, London, UK
Dr. Andrew Lenaghan

Dr. Andrew Lenaghan

The Oxford University CERT (OxCERT), Oxford, UK

Important Dates


    Industry (Proof of Concept / Pilot) Submission January 15, 2015 March 11, 2015
    Notification of Proof of Concept Acceptance/Rejection January 30, 2015 March 15, 2015
    Extended Abstract (Work in Progress) Submission January 15, 2015 March 11, 2015
    Notification of Extended Abstract Acceptance/Rejection January 30, 2015 March 15, 2015
    Full Paper Submission February 25, 2015 March 11, 2015
    Notification of Paper Acceptance/Rejection March 25, 2015 March 31, 2015
    Camera Ready Paper Due April 10, 2015 April 10, 2015
    Workshops and Tutorials Submission Date January 15, 2015 March 11, 2015
    Notification of Workshop and Tutorial Acceptance January 30, 2015 March 15, 2015
    Special Track Submission Date January 25, 2015 March 11, 2015
    Notification of Special Track Acceptance January 30, 2015 March 15, 2015
    Poster/Demo Submission Date January 15, 2015 March 11, 2015
    Notification of Poster/Demo Acceptance January 30, 2015 March 15, 2015
    Early Registration Deadline (Authors only) Before March 15, 2015
    Late Registration Deadline (Authors only) March 16, 2015 – April 15, 2015
    Participants Registration January 01 to June 01, 2015
    Conference Dates June 8-9, 2015


Location


London
United Kingdom



Programme Committee


    • Cyril Onwubiko – Centre for Multidisciplinary Research, Innovation and Collaboration, UK
    • Thomas Owens – Brunel University, London, UK

    • Sotiris Ioannidis – the Institute of Computer Science, Foundation for Research and Technology (FORTH), Greece
    • Uri Blumenthal – MIT Lincoln Laboratory, MIT, USA
    • Nick Savage – University of Portsmouth, UK

    • Cleotilde Gonzalez – Carnegie Mellon University, USA
    • Manish Gupta –  State University of New York, Buffalo, NY, USA
    • Andrew Lenaghan – Flawless Money, Manchester, UK

    • Gareth Niblett – BCS Information Security Specialist Group (ISSG), UK
    • Churchill Ogunewe – Centre for Multidisciplinary Research, Innovation and Collaboration, UK
    • Daniel Zeng – University of Arizona, USA

    • Kirankumar S. Akate – Government Institute of Forensic Science, Aurangabad, India
    • Alex Baruttis – Technognomi Limited, UK
    • Jens Myrup Pedersen – University of Aalborg, Denmark
    • Uwe Glässer – School of Computing Science, Simon Fraser University, Canada
    • Anthony Davies – IEEE
    • Thomas Owens – Brunel University, London, UK
    • Reza Tadayoni – University of Aalborg, Denmark
    • Andrew Lenaghan – Flawless Money, Manchester, UK
    • Chris Tait – CESG, UK
    • Richard McEnvoy – HP, UK
    • Peter J. Hawrylak – The University of Tulsa, USA
    • Subrata Acharya – Towson University, USA
    • Marios Anagnostopoulos – University of the Aegean, Greece
    • Yi Luo – USA
    • Erik Blasch – Fusion Evaluation & Air Force Research LaboratoryUSA
    • Genshe Chen – Fusion, USA
    • Wei Yu – Towson University, USA
    • Joshua W. Haines – MIT, USA
    • William (Bill) Streilein – MIT Lincoln Laboratory, MIT, USA
    • Uri Blumenthal – MIT Lincoln Laboratory, MIT, USA
    • Gerald O’Leary – MIT Lincoln Laboratory, MIT, USA
    • Ciza Thomas – College of Engineering, India
    • N. Balakrishnan – Indian Institute of Science, India
    • Michael Ruiz – Deloitte Consulting LLP, USA
    • Mark Ballora – Pennsylvania State University, USA
    • Stefanos Gritzalis – University of the Aegean, Greece
    • Mike Tyworth – The Pennsylvania State University, USA
    • Eric X. McMillan – The Pennsylvania State University, USA
    • Bechara Al Bouna – Science University, Lebenanon
    • Janne Merete Hagen – Norwegian Defence Research Establishment, Norway
    • Varun Dutt – Indian Institute of Technology Mandi, India
    • Cleotilde Gonzalez – Carnegie Mellon University, USA
    • Khidir M. Ali – Jubail University College, Kingdom of Saudi Arabia
    • Katherine Hamilton – Penn State University, USA
    • Xinyu Yang –  Xi’an Jiaotong University, China
    • Jie Lin – Xi’an Jiaotong University, China
    • Georgios Kambourakis – University of the Aegean, Greece
    • Elisavet Konstantinou – University of the Aegean, Greece
    • Gerardo I. Simari – Universidad Nacional del Sur in Bahia Blanca and CONICET, Argentina
    • Pierre Parrend –  ECAM Strasbourg-Europe, France
    • Abdullahi Arabo –  University of the West of England (UWE), Bristol, UK
    • Mario Godinez IBM – IBM,Toronto, Canada
    • Kelechi Okpara – Royal Holloway University of London, London, UK
    • Sudip Chakraborty – Xypress LLC, Princeton, USA
    • Veena Desai – Gogte Institute of Technology, Belgaum, India
    • Azah Norman – Faculty of Computer Science and Information Technology, University of Malaya, Kuala Lumpur, Malaysia


Conference Programme


    School of Computing, University of Kent, Canterbury, UKKeynote Speaker – Frank is a Professor of Future Computing, and a Fellow of British Computer Society. He serves the High End Computing Panel for Science Foundation Ireland (SFI) and the UK Government EPSRC e-Science Panel. Frank has attracted a number of EC/EPSRC/DTI/Industrial grants, totaling a few million euros. He has been invited to present keynote speeches and other invited talks at Princeton University (USA), Carnegie Mellon University (USA), Oxford University (UK), Edinburgh University (UK), CERN (the European Organization for Nuclear Research, Geneva), Hong Kong University of Science & Technology (Hong Kong), Tsinghua University (Taiwan), Jawaharlal Nehru University (India), Aristotle University (Greece), Helsinki Technology University (Finland), Turkish Government The Ministry of Industry and Commerce, University of Johannesburg (South Africa), Central Philippine University (Philippine), and Princess Sumaya University for Technology (Jordan), etc. Prof Frank Wang is Co-Editor-in-Chief of Encyclopedia of Grid Computing and Co-Editor-in-Chief of International Journal of Grid and High Performance Computing.

    Title of presentation: “Computer Evolution over the Next Decade: Fact or Fiction?” Download presentation
    Brunel University, London, UK

    Keynote Speaker – Tom is Senior Lecturer and Director of Quality at Brunel University. He is the co-editor of the book on Situational Awareness in Computer Network Defense: Principle, Methods and Application, IGI Global, USA. He is currently Project Manager of the IST PSP Project DTV4All & Has been a Project Manager for a number of European Commission projects.

    Title of presentation: “Situational Awareness in routing in Vehicular Ad hoc Networks (VANETs)” Download presentation

    Flawless Money Limited

    Keynote Speaker – Andrew is the Information Security Officer at Flawless Money Ltd, a member of the Information Systems Audit and Control Association (ISACA), and regular contributor to the fraud subcommittee of the Electronic Money Association. “

    Title of presentation: “Situational Awareness in detecting Fraud or Financial Crime” Download presentation

    Intelligence and Security Assurance, E-Security, UK

    Keynote Speaker –  Cyril is Director, Cyber Security and Information Assurance (IA) at Research Series Limited, where he is responsible for directing strategy, IA governance and cyber security. He co-edited the book on “Situational Awareness in Computer Network Defense: Principles, Methods & Applications” published by IGI Global, USA, and has authored several book chapters, including Security Issues to Cloud Computing, in the book on “Cloud Computing: Principles, Systems and Applications” by Springer.  With over 30 articles published in leading and most prestigious academic journals and conferences.

    Title of presentation: “The Role of Situational Awareness in Cyber Security” Download presentation

    Mark John Hall & Devon David Hansen

    Research Engineers

    TX-5 Homeland Security Team, Airbus Group Innovations, UK

    Title of presentation: “Cross-Domain Situational Awareness and Collaborative Working for Cyber Security” Download presentation

     

    Jussi Timonen

    Researcher & PhD Student

    The Finnish Defence Forces, Finland

    Title of presentation: “Improving Situational Awareness of Cyber Physical Systems based on Operator’s Goals” Download presentation

     

    Maria Evangelopoulou

    PhD Student

    University of Glasgow, UK

    Title of presentation: “Situation Awareness Measurement Techniques in Network Defense” Download presentation

     

    Klaus Theuerkauf

    Researcher

    Ifak Institut für Automation und Kommunikation e.V. Magdeburg

    Title of presentation: “On Demand for Situational Awareness for Preventing Attacks on the Smart Grid” Download presentation

     

    Hashem Dehghanniri

    PhD Student

    University College London, UK

    Title of presentation: “Improving Security Decision under Uncertainty: A Multidisciplinary Approach” Download presentation

     

    Dr Christopher Laing

    Sciendum Ltd, UK

    Title of presentation: “Context Informed Intelligent Information Infrastructures for Better Situational Awareness” Download presentation

     

    Dr Muhammad Ali Nasir

    NUCES-FAST, Pakistan

    Title of presentation: “Potential Cyber-attacks against Global Oil Supply Chain” Download presentation

     

    Dr Sarmistha Neogy

    Assistant Professor

    Jadavpur University, India

    Title of presentation: “Developing a Secure Remote Patient Monitoring System” Download presentation

     

    Dr Saad Alaboodi

    Assistant Professor

    Center of Excellence in Information Assurance, King Saud University, Riyadh, Saudi Arabia

    Title of presentation: “Privacy Awareness of Online Social Networking in Saudi Arabia” Download presentation

     

    Dr Sarmistha Neogy

    Assistant Professor

    Jadavpur University, India

    Title of presentation: “Security Management in Wireless Sensor Networks” Download presentation

     

    Dr Eckhard Pfluegel

    Senior Lecturer

    Kingston University, UK

    Title of presentation: “Chaos-Based Image Encryption Using an AONT Mode of Operation” Download presentation

     

    1Steven Strandlund Hansen and 2Alexandre Czech

    1Aalborg University, Denmark

    2Ecole Centrale d’Electronique, Paris, France

    Title of presentation: “Analysis of Malware Behavior: Type Classification using Machine Learning” Download presentation

     

    Adriana-Cristina Enache

    PhD Student

    Military Technical Academy, Bucharest, Romania

    Title of presentation: “An Immune Intelligent Approach for Security Assurance” Download presentation

     

    Giuseppe Settanni

    Researcher

    Austrian Institute of Technology, Austria

    Title of presentation: “Beyond Gut Instincts: Understanding, Rating and Comparing Self-Learning IDSs” Download presentation

     

    Charles Clarke

    PhD Student

    Faculty of SEC, Kingston University, UK

    Title of presentation: “Multi-channel Overlay Protocols: Implementing Ad-hoc Message Authentication in Social Media Platforms” Download presentation

     

    Matija Stevanovic

    PhD Student

    Aalborg University, Denmark

    Title of presentation: “An Analysis of Network Traffic Classification for Botnet Detection” Download presentation

     

    Louai Maghrabi & Dr Eckhard Pfluegel

    Kingston University, UK

    Title of presentation: “Moving Assets to the Cloud: A Game Theoretic Approach Based on Trust” Download presentation

     

    Marcelo Fontenele

    PhD Student

    University of Reading, UK

    Title of presentation: “Talent Discovery for Cyber Security: an organisational perspective” Download presentation

     

    Dr Cyril Onwubiko

    Intelligence and Security Assurance, E-Security, UK

    Title of presentation: “Cyber Security Operations Centre: Security monitoring for protecting Business and supporting Cyber Defense Strategy” Download presentation

     

    Giuseppe Settanni

    Researcher

    Austrian Institute of Technology, Austria

    Title of presentation: “Establishing National Cyber Situational Awareness” Download presentation

     

    Palvi Aggarwal

    PhD Student

    Applied Cognitive Science Laboratory, Indian Institute of Technology, Mandi, India

    Title of presentation: “Cyber Security: A Game-Theoretic Analysis of Defender and Attacker Strategies in Defacing-Website Games” Download presentation

     

    Therese Bjerkestrand

    Researcher

    Kingston University, UK

    Title of presentation: “Evaluation of Feature Selection and Reduction Algorithms for Network IDS Data” Download presentation

     

    Dr Bechara Al Bouna

    Assistant Professor

    Antonine University, Lebanon

    Title of presentation: “An SQL-like Query Tool for Data Anonymization and Outsourcing” Download presentation

Authors Paper Title Type Conference
Jussi Timonen Improving Situational Awareness of Cyber Physical Systems based on Operator’s Goals Full Paper CyberSA 2015
Matija Stevanovic and Jens Myrup Pedersen An Analysis of Network Traffic Classification for Botnet Detection Full Paper CyberSA 2015
Palvi Aggarwal, Antra Grover, Saumya Singh, Zahid Maqbool, V. S. Chandrasekhar Pammi and Varun Dutt Cyber Security: A Game-Theoretic Analysis of Defender and Attacker Strategies in Defacing-Website Games Full Paper CyberSA 2015
Maria Evangelopoulou and Christopher W. Johnson Situation Awareness Measurement Techniques in Network Defense Full Paper CyberSA 2015
Florian Skopik, Markus Wurzenberger, Giuseppe Settanni and Roman Fiedler Establishing National Cyber Situational Awareness through Incident Information Clustering Full Paper CyberSA 2015
Hashem Dehghanniri, Emmanuel Letier and Herve Borrion Improving Security Decision under Uncertainty: A Multidisciplinary Approach Full Paper CyberSA 2015
Adenusi Dauda, Boniface Kayode Alese, Bamidele Moses Kuboye and Betty Aderonke Thompson Development of Cyber Situation Awareness Model [Abstract / WIP] Abstract CyberSA 2015
Moyinoluwa Abidemi Bode, Boniface Kayode Alese, Samuel A. Oluwadareand Aderonke Favour-Bethy Thompson Risk Analysis in Cyber Situation Awareness using Bayesian Statistics Full Paper CyberSA 2015
Mark John Hall, Devon David Hansen and Kevin Jones Cross-Domain Situational Awareness and Collaborative Working for Cyber Security Full Paper CyberSA 2015
Markus Wurzenberger, Florian Skopik, Giuseppe Settanni and Roman Fiedler Beyond Gut Instincts: Understanding, Rating and Comparing Self-Learning IDSs [Abstract / WIP] Abstract CyberSA 2015
Lewis Meehan and Carlene Campbell Threat and Mitigation Awareness Based Upon a Model Network Scenario with BYOD Aspects Full Paper CyberSA 2015
Charles Clarke, Eckhard Pflügel and Dimitris Tsaptsinos Multi-channel Overlay Protocols: Implementing Ad-hoc Message Authentication in Social Media Platforms Full Paper CyberSA 2015
Yegor Shovgenya, Klaus Theuerkauf and Florian Skopik On Demand for Situational Awareness for Preventing Attacks on the Smart Grid Full Paper CyberSA 2015
Zulfiqar Bhutto, Kamran Dahri, Iqra Lakho and Shahzad Memon A Prototype Application for Street Crime Reporting Full Paper CyberSA 2015
Cyril Onwubiko Cyber Security Operations Centre: Security monitoring for protecting Business and supporting Cyber Defense Strategy Full Paper CyberSA 2015
Mohamed Nassar, Adel Al-Rahal Al-Orabi, Marwan Doha and Bechara Al Bouna An SQL-like Query Tool for Data Anonymization and Outsourcing Full Paper CyberSA 2015
Adriana-Cristina Enache and  Valentin Sgârciu An Immune Intelligent Approach for Security Assurance Full Paper CyberSA 2015
Steven Strandlund Hansen, Thor Mark Tampus Larsen, Radu Stefan Pirscoveanu, Alexandre Czech, Matija Stevanovic and Jens Myrup Pedersen Analysis of Malware Behavior: Type Classification using Machine Learning Full Paper CyberSA 2015
Therese Bjerkestrand, Dimitris Tsaptsinos and Eckhard Pfluegel Evaluation of Feature Selection and Reduction Algorithms for Network IDS Data [Abstract / WIP] Abstract CyberSA 2015
Marcelo Fontenele and Lily Sun Talent Discovery for Cyber Security: an organisational perspective Full Paper Cyber Security  2015
Christopher Laing, Paul Vickers, Tom Fairfax, Pam Briggs and Stephen Marsh Context Informed Intelligent Information Infrastructures for Better Situational Awareness Full Paper Cyber Security  2015
Andrius Rickus, Eckhard Pfluegel and Nigel Atkins Chaos-Based Image Encryption Using an AONT Mode of Operation Full Paper Cyber Security  2015
Sarmistha Neogy Security Management in Wireless Sensor Networks Full Paper Cyber Security  2015
Sarmistha Neogy and Sayantani Saha Developing a secure remote patient monitoring system Full Paper Cyber Security  2015
Muhammad Ali Nasir and Shizra Sultan Potential Cyber-attacks against Global Oil Supply Chain Full Paper Cyber Security  2015
Louai Maghrabi and Eckhard Pfluegel Moving Assets to the Cloud: A Game Theoretic Approach Based on Trust Full Paper Cyber Security  2015
Kamran Dahri, Shakeel Rajput, Shahzad Memon and Dr. Lachman Das Dhomeja Smart Activities Monitoring System (SAMS) for Security Applications [Abstract / WIP] Abstract Cyber Security  2015
Jawad Awan, Shahzad Memon, Lachhman Das and Iqra Lakho eGovernment Services Security and Challenges in Pakistan [Abstract / WIP] Abstract Cyber Security  2015
Ruhul Amin, SK Hafizul Islam, G. P. Biswas, Muhammad  Khurram Khan An Efficient Remote Mutual Authentication Scheme using Smart Mobile Phone over Insure Networks Full Paper Cyber Security  2015
Hatoon Alsagri and Saad Alaboodi Privacy Awareness of Online Social Networking in Saudi Arabia Full Paper Social Media 2015
Shahzad Ahmed Memon, Sorath Mahar, Lachhman Das Dhomeja and Farman Pirzado Prospects and Challenges for Social Media in Pakistan Full Paper Social Media 2015