Cyber Security 2015

June 13-14, 2015, London, UK






Call for Papers

IEEE is the Technical Co-Sponsor (TCS) of the International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2016), an international refereed conference dedicated to the advancement of Cyber Security, information security, network security, application security and business transformation of digital services, and the protection of public digital services, especially high value bearing online services.

The aim of the Cyber Security 2016 is to encourage participation and promotion of collaborative scientific, industrial and academic inter-workings among individual researchers, practitioners, members of existing associations, academia, standardisation bodies, and including government departments and agencies. The purpose is to build bridges between academia and industry, and to encourage interplay of different culture.




Submission Deadline

Deadline for all paper submissions, that is, both full papers and extended abstracts for Poster, WIP, PoC, Research Idea and PhD Seminar presentations is 26th February 2016.

All Industry track, Work in Progress track, Research Ideas track and PhD Seminar track will be published in the conference proceedings. Interested participants, please submit your proposal using the online submission system hosted by Easychair Conference Portal.

Full paper submission should be via Easychair Conference Portal





Topics of Interest


    • Information Security
    • Computer Network Security
    • Application Security
    • Web Services Security
    • Mobile Security
    • Protective Security
    • Software Security
    • Wireless & Sensor Network Security
    • Software Coding Security
    • Barcode Scanner Security
    • Security in Middleware, Interface and Interaction
    • Security Services in Authentication, Authorisation, Accountability, Automation, Availability, Integrity and Nonrepudiation
    • Security Management
    • Security Operations
    • Digital Trust and Reputation
    • Geographical Location (IP Geolocation) and Cyber Travel
    • Geospatial Intelligence Networks (Centralised, Distributed & Hybrid)
    • Policy, Legal, Legislation & Compliance
    • Security Standardisation
    • Law, Legal and Ethics

    • Web Services
    • Internet Banking
    • E-Booking
    • Cloud Computing
    • E-Government
    • Electronic Commerce
    • Citizens Public Online Services
    • Mobile Commerce
    • E-Postal Services
    • E-Health
    • Online & Virtual Education
    • E-Learning
    • Web Chats
    • Secure Protocols, Coding and Development
    • Security Principles, Theory and Analysis
    • Security Policy, Standards and Procedures
    • Security in Business Processes
    • Security Enforcing Function (SEF) Gateways
    • Intrusion Detection Systems
    • Intrusion Prevention Systems
    • Firewalls
    • Anti-Virus and Anti-Malware Gateways
    • Data Loss Prevention
    • Encryption Services

    • Protection of Business Information Systems
    • Protection of Online Services
    • Public Online Services
    • Internet Banking
    • Security, Trust, Privacy
    • Security in Online Gaming Systems
    • Security in e-Government and Electoral Systems
    • Content Security
    • Protection of Public Online Content Distribution Systems
    • Secure practices, processes and procedures in Public Online Services
    • Cryptography  –  PKI, HSMs, Symmetric and Asymmetric Crypto, Crypto Custodian & Crypto Standards and Practices
    • Digital Forensics and Investigations
    • HoneyPots and Honey Nets
    • Critical National Infrastructures (CNIs)
    • Critical Network Systems (CNS


Speakers

Dr. Cyril Onwubiko

Dr. Cyril Onwubiko

Cyber Security Intelligence, Research Series Limited, London, UK
Professor Frank Wang

Professor Frank Wang

School of Computing, University of Kent, UK
Dr. Thomas Owens

Dr. Thomas Owens

Brunel University, London, UK
Dr. Andrew Lenaghan

Dr. Andrew Lenaghan

The Oxford University CERT (OxCERT), Oxford, UK

Important Dates


    • Industry (Proof of Concept / Pilot) Submission –  February 26, 2016 March 11, 2016
    • Extended Abstract (Work in Progress) – February 26, 2016 March 11, 2016
    • PhD Seminar Submissions – February 26, 2016 March 11, 2016
    • Research Ideas – February 26, 2016 March 11, 2016
    • Poster/Demo Submissions – February 26, 2016 March 11, 2016
    • Special Track Submissions – February 26, 2016 March 11, 2016
    • Workshops and Tutorials Submission – February 26, 2016 March 11, 2016
    • Full Paper Submissions – February 26, 2016 March 11, 2016
    • Notification of Full Paper/Abstract / Special Track Acceptance/Rejection – March 25, 2016
    • Camera Ready Paper Due – April 8, 2016
    • Participants Registration – March 25 – May 25, 2016
    • Conference Date – 13 & 14 June 2016


Location


London
United Kingdom



Programme Committee


    • Cyril Onwubiko – Centre for Multidisciplinary Research, Innovation and Collaboration, UK
    • Thomas Owens – Brunel University, London, UK

    • Eckhard Pfluegel  –  Faculty of Science, Engineering and Computing, Kingston University, UK
    • Nick Savage – University of Portsmouth, UK
    • Janne Merete Hagen – Norwegian Defence Research Establishment, Norway
    • Karim Ouazzane  – School of Computing, London Metropolitan University, London, UK

    • Andrew Lenaghan – Oxford University, UK
    • Uri Blumenthal  –  MIT Lincoln Laboratory, MIT, USA

    • Phil Legg  – University of the West of England, UK
    • Gareth Niblett – BCS Information Security Specialist Group (ISSG), UK
    • Daniel Zeng – University of Arizona, USA

    • Xavier Bellekens – University of Abertay, Scotland, UK
    • Cyril Onwubiko – Centre for Multidisciplinary Research, Innovation and Collaboration, UK

    • Peter Komisarczuk –  Royal Holloway, University of London, London, UK
    • Deepthi Ratnayake  – London Metropolitan University, London, UK
    • Nilay Mistry  – Gujarat Forensic Sciences University, India
    • Reza Tadayoni – University of Aalborg, Denmark
    • Uwe Glässer –  School of Computing Science, Simon Fraser University, Canada
    • Manish Gupta –  State University of New York, Buffalo, NY, USA
    • Reza Tadayoni – University of Aalborg, Denmark
    • Anthony Davies – IEEE UK & Republic of Ireland, IEEE
    • Gerardo I. Simari – Universidad Nacional del Sur in Bahia Blanca and CONICET, Argentina
    • Thomas Owens – Brunel University, London, UK
    • Jens Myrup Pedersen – University of Aalborg, Denmark
    • Andrew Lenaghan – Flawless Money, Manchester, UK
    • Chris Tait – Layer 7 Technologies, UK
    • Peter J. Hawrylak – The University of Tulsa, USA
    • Subrata Acharya – Towson University, USA
    • Marios Anagnostopoulos – University of the Aegean, Greece
    • Yi Luo – University of Arizona, Tucson, USA
    • Erik Blasch – Fusion Evaluation & Air Force Research LaboratoryUSA
    • Sotiris Ioannidis – The Institute of Computer Science, Foundation for Research and Technology (FORTH), Greece
    • Wei Yu – Towson University, USA
    • Uri Blumenthal – MIT Lincoln Laboratory, MIT, USA
    • Gerald O’Leary – MIT Lincoln Laboratory, MIT, USA
    • Ciza Thomas – College of Engineering, India
    • Stefanos Gritzalis – University of the Aegean, Greece
    • Mike Tyworth –  The Pennsylvania State University, USA
    • Eric X. McMillan – The Pennsylvania State University, USA
    • Bechara Al Bouna – Science University, Lebanon
    • Janne Merete Hagen – Norwegian Defence Research Establishment, Norway
    • Varun Dutt – Indian Institute of Technology Mandi, India
    • Cleotilde Gonzalez – Carnegie Mellon University, USA
    • Khidir M. Ali – Jubail University College, Kingdom of Saudi Arabia
    • Katherine Hamilton – Penn State University, USA
    • Xinyu Yang –  Xi’an Jiaotong University, China
    • Jie Lin – Xi’an Jiaotong University, China
    • Georgios Kambourakis – University of the Aegean, Greece
    • Elisavet Konstantinou – University of the Aegean, Greece
    • Alexandros Kapravelos – Computer Security Group, University of California Santa Barbara
    • Kirankumar S. Akate –  Government Institute of Forensic Science, Aurangabad, India
    • Chinazunwa Uwaoma – Faculty of Science and Technology, The University of the West Indies, Jamaica
    • Theo Dimitrakos  – Security Futures Practice, BT Research & Technology, UK
    • Pierre Parrend –  ECAM Strasbourg-Europe, France
    • Abdullahi Arabo –  University of the West of England (UWE), Bristol, UK
    • Veena Desai – Gogte Institute of Technology, Belgaum, India
    • Azah Norman – Faculty of Computer Science and Information Technology, University of Malaya, Kuala Lumpur, Malaysia
    • Antonis Mouhtaropoulos – Department of Computer Science, University of Warwick, Coventry, UK
    • Paul Fennell – MPS, UK
    • Kingsley Ukaoha – University of Benin, Nigeria
    • Dawuda Alhassan – Tomas Bata University, Zlin, Czech Republic
    • Laribi Boualem – University of Djillali, Bounaama, Algeria
    • Md Ruhul Islam – Sikkim Manipal University India
    • Sujoy Sarkar – IEEE, India
    • Scott Cadzow – Cadzow Communications Consulting Ltd, UK
    • Dalal Azizy – University of Southampton, UK
    • Rauf Malick – DHA Suffa University, Pakistan
    • Xuan Zhao – Cylance, California, USA
    • Amar K. Seeam – Middlesex University (Mauritius Branch Campus), Vacoas, Mauritius


Conference Programme


    School of Computing, University of Kent, Canterbury, UKKeynote Speaker – Frank is a Professor of Future Computing, and a Fellow of British Computer Society. He serves the High End Computing Panel for Science Foundation Ireland (SFI) and the UK Government EPSRC e-Science Panel. Frank has attracted a number of EC/EPSRC/DTI/Industrial grants, totaling a few million euros. He has been invited to present keynote speeches and other invited talks at Princeton University (USA), Carnegie Mellon University (USA), Oxford University (UK), Edinburgh University (UK), CERN (the European Organization for Nuclear Research, Geneva), Hong Kong University of Science & Technology (Hong Kong), Tsinghua University (Taiwan), Jawaharlal Nehru University (India), Aristotle University (Greece), Helsinki Technology University (Finland), Turkish Government The Ministry of Industry and Commerce, University of Johannesburg (South Africa), Central Philippine University (Philippine), and Princess Sumaya University for Technology (Jordan), etc. Prof Frank Wang is Co-Editor-in-Chief of Encyclopedia of Grid Computing and Co-Editor-in-Chief of International Journal of Grid and High Performance Computing.

    Title of presentation: “Computer Evolution over the Next Decade: Fact or Fiction?” Download presentation
    Brunel University, London, UK

    Keynote Speaker – Tom is Senior Lecturer and Director of Quality at Brunel University. He is the co-editor of the book on Situational Awareness in Computer Network Defense: Principle, Methods and Application, IGI Global, USA. He is currently Project Manager of the IST PSP Project DTV4All & Has been a Project Manager for a number of European Commission projects.

    Title of presentation: “Situational Awareness in routing in Vehicular Ad hoc Networks (VANETs)” Download presentation

    Flawless Money Limited

    Keynote Speaker – Andrew is the Information Security Officer at Flawless Money Ltd, a member of the Information Systems Audit and Control Association (ISACA), and regular contributor to the fraud subcommittee of the Electronic Money Association. “

    Title of presentation: “Situational Awareness in detecting Fraud or Financial Crime” Download presentation

    Intelligence and Security Assurance, E-Security, UK

    Keynote Speaker –  Cyril is Director, Cyber Security and Information Assurance (IA) at Research Series Limited, where he is responsible for directing strategy, IA governance and cyber security. He co-edited the book on “Situational Awareness in Computer Network Defense: Principles, Methods & Applications” published by IGI Global, USA, and has authored several book chapters, including Security Issues to Cloud Computing, in the book on “Cloud Computing: Principles, Systems and Applications” by Springer.  With over 30 articles published in leading and most prestigious academic journals and conferences.

    Title of presentation: “The Role of Situational Awareness in Cyber Security” Download presentation

    Mark John Hall & Devon David Hansen

    Research Engineers

    TX-5 Homeland Security Team, Airbus Group Innovations, UK

    Title of presentation: “Cross-Domain Situational Awareness and Collaborative Working for Cyber Security” Download presentation

     

    Jussi Timonen

    Researcher & PhD Student

    The Finnish Defence Forces, Finland

    Title of presentation: “Improving Situational Awareness of Cyber Physical Systems based on Operator’s Goals” Download presentation

     

    Maria Evangelopoulou

    PhD Student

    University of Glasgow, UK

    Title of presentation: “Situation Awareness Measurement Techniques in Network Defense” Download presentation

     

    Klaus Theuerkauf

    Researcher

    Ifak Institut für Automation und Kommunikation e.V. Magdeburg

    Title of presentation: “On Demand for Situational Awareness for Preventing Attacks on the Smart Grid” Download presentation

     

    Hashem Dehghanniri

    PhD Student

    University College London, UK

    Title of presentation: “Improving Security Decision under Uncertainty: A Multidisciplinary Approach” Download presentation

     

    Dr Christopher Laing

    Sciendum Ltd, UK

    Title of presentation: “Context Informed Intelligent Information Infrastructures for Better Situational Awareness” Download presentation

     

    Dr Muhammad Ali Nasir

    NUCES-FAST, Pakistan

    Title of presentation: “Potential Cyber-attacks against Global Oil Supply Chain” Download presentation

     

    Dr Sarmistha Neogy

    Assistant Professor

    Jadavpur University, India

    Title of presentation: “Developing a Secure Remote Patient Monitoring System” Download presentation

     

    Dr Saad Alaboodi

    Assistant Professor

    Center of Excellence in Information Assurance, King Saud University, Riyadh, Saudi Arabia

    Title of presentation: “Privacy Awareness of Online Social Networking in Saudi Arabia” Download presentation

     

    Dr Sarmistha Neogy

    Assistant Professor

    Jadavpur University, India

    Title of presentation: “Security Management in Wireless Sensor Networks” Download presentation

     

    Dr Eckhard Pfluegel

    Senior Lecturer

    Kingston University, UK

    Title of presentation: “Chaos-Based Image Encryption Using an AONT Mode of Operation” Download presentation

     

    1Steven Strandlund Hansen and 2Alexandre Czech

    1Aalborg University, Denmark

    2Ecole Centrale d’Electronique, Paris, France

    Title of presentation: “Analysis of Malware Behavior: Type Classification using Machine Learning” Download presentation

     

    Adriana-Cristina Enache

    PhD Student

    Military Technical Academy, Bucharest, Romania

    Title of presentation: “An Immune Intelligent Approach for Security Assurance” Download presentation

     

    Giuseppe Settanni

    Researcher

    Austrian Institute of Technology, Austria

    Title of presentation: “Beyond Gut Instincts: Understanding, Rating and Comparing Self-Learning IDSs” Download presentation

     

    Charles Clarke

    PhD Student

    Faculty of SEC, Kingston University, UK

    Title of presentation: “Multi-channel Overlay Protocols: Implementing Ad-hoc Message Authentication in Social Media Platforms” Download presentation

     

    Matija Stevanovic

    PhD Student

    Aalborg University, Denmark

    Title of presentation: “An Analysis of Network Traffic Classification for Botnet Detection” Download presentation

     

    Louai Maghrabi & Dr Eckhard Pfluegel

    Kingston University, UK

    Title of presentation: “Moving Assets to the Cloud: A Game Theoretic Approach Based on Trust” Download presentation

     

    Marcelo Fontenele

    PhD Student

    University of Reading, UK

    Title of presentation: “Talent Discovery for Cyber Security: an organisational perspective” Download presentation

     

    Dr Cyril Onwubiko

    Intelligence and Security Assurance, E-Security, UK

    Title of presentation: “Cyber Security Operations Centre: Security monitoring for protecting Business and supporting Cyber Defense Strategy” Download presentation

     

    Giuseppe Settanni

    Researcher

    Austrian Institute of Technology, Austria

    Title of presentation: “Establishing National Cyber Situational Awareness” Download presentation

     

    Palvi Aggarwal

    PhD Student

    Applied Cognitive Science Laboratory, Indian Institute of Technology, Mandi, India

    Title of presentation: “Cyber Security: A Game-Theoretic Analysis of Defender and Attacker Strategies in Defacing-Website Games” Download presentation

     

    Therese Bjerkestrand

    Researcher

    Kingston University, UK

    Title of presentation: “Evaluation of Feature Selection and Reduction Algorithms for Network IDS Data” Download presentation

     

    Dr Bechara Al Bouna

    Assistant Professor

    Antonine University, Lebanon

    Title of presentation: “An SQL-like Query Tool for Data Anonymization and Outsourcing” Download presentation

Authors Paper Title Type Conference
Jussi Timonen Improving Situational Awareness of Cyber Physical Systems based on Operator’s Goals Full Paper CyberSA 2015
Matija Stevanovic and Jens Myrup Pedersen An Analysis of Network Traffic Classification for Botnet Detection Full Paper CyberSA 2015
Palvi Aggarwal, Antra Grover, Saumya Singh, Zahid Maqbool, V. S. Chandrasekhar Pammi and Varun Dutt Cyber Security: A Game-Theoretic Analysis of Defender and Attacker Strategies in Defacing-Website Games Full Paper CyberSA 2015
Maria Evangelopoulou and Christopher W. Johnson Situation Awareness Measurement Techniques in Network Defense Full Paper CyberSA 2015
Florian Skopik, Markus Wurzenberger, Giuseppe Settanni and Roman Fiedler Establishing National Cyber Situational Awareness through Incident Information Clustering Full Paper CyberSA 2015
Hashem Dehghanniri, Emmanuel Letier and Herve Borrion Improving Security Decision under Uncertainty: A Multidisciplinary Approach Full Paper CyberSA 2015
Adenusi Dauda, Boniface Kayode Alese, Bamidele Moses Kuboye and Betty Aderonke Thompson Development of Cyber Situation Awareness Model [Abstract / WIP] Abstract CyberSA 2015
Moyinoluwa Abidemi Bode, Boniface Kayode Alese, Samuel A. Oluwadareand Aderonke Favour-Bethy Thompson Risk Analysis in Cyber Situation Awareness using Bayesian Statistics Full Paper CyberSA 2015
Mark John Hall, Devon David Hansen and Kevin Jones Cross-Domain Situational Awareness and Collaborative Working for Cyber Security Full Paper CyberSA 2015
Markus Wurzenberger, Florian Skopik, Giuseppe Settanni and Roman Fiedler Beyond Gut Instincts: Understanding, Rating and Comparing Self-Learning IDSs [Abstract / WIP] Abstract CyberSA 2015
Lewis Meehan and Carlene Campbell Threat and Mitigation Awareness Based Upon a Model Network Scenario with BYOD Aspects Full Paper CyberSA 2015
Charles Clarke, Eckhard Pflügel and Dimitris Tsaptsinos Multi-channel Overlay Protocols: Implementing Ad-hoc Message Authentication in Social Media Platforms Full Paper CyberSA 2015
Yegor Shovgenya, Klaus Theuerkauf and Florian Skopik On Demand for Situational Awareness for Preventing Attacks on the Smart Grid Full Paper CyberSA 2015
Zulfiqar Bhutto, Kamran Dahri, Iqra Lakho and Shahzad Memon A Prototype Application for Street Crime Reporting Full Paper CyberSA 2015
Cyril Onwubiko Cyber Security Operations Centre: Security monitoring for protecting Business and supporting Cyber Defense Strategy Full Paper CyberSA 2015
Mohamed Nassar, Adel Al-Rahal Al-Orabi, Marwan Doha and Bechara Al Bouna An SQL-like Query Tool for Data Anonymization and Outsourcing Full Paper CyberSA 2015
Adriana-Cristina Enache and  Valentin Sgârciu An Immune Intelligent Approach for Security Assurance Full Paper CyberSA 2015
Steven Strandlund Hansen, Thor Mark Tampus Larsen, Radu Stefan Pirscoveanu, Alexandre Czech, Matija Stevanovic and Jens Myrup Pedersen Analysis of Malware Behavior: Type Classification using Machine Learning Full Paper CyberSA 2015
Therese Bjerkestrand, Dimitris Tsaptsinos and Eckhard Pfluegel Evaluation of Feature Selection and Reduction Algorithms for Network IDS Data [Abstract / WIP] Abstract CyberSA 2015
Marcelo Fontenele and Lily Sun Talent Discovery for Cyber Security: an organisational perspective Full Paper Cyber Security  2015
Christopher Laing, Paul Vickers, Tom Fairfax, Pam Briggs and Stephen Marsh Context Informed Intelligent Information Infrastructures for Better Situational Awareness Full Paper Cyber Security  2015
Andrius Rickus, Eckhard Pfluegel and Nigel Atkins Chaos-Based Image Encryption Using an AONT Mode of Operation Full Paper Cyber Security  2015
Sarmistha Neogy Security Management in Wireless Sensor Networks Full Paper Cyber Security  2015
Sarmistha Neogy and Sayantani Saha Developing a secure remote patient monitoring system Full Paper Cyber Security  2015
Muhammad Ali Nasir and Shizra Sultan Potential Cyber-attacks against Global Oil Supply Chain Full Paper Cyber Security  2015
Louai Maghrabi and Eckhard Pfluegel Moving Assets to the Cloud: A Game Theoretic Approach Based on Trust Full Paper Cyber Security  2015
Kamran Dahri, Shakeel Rajput, Shahzad Memon and Dr. Lachman Das Dhomeja Smart Activities Monitoring System (SAMS) for Security Applications [Abstract / WIP] Abstract Cyber Security  2015
Jawad Awan, Shahzad Memon, Lachhman Das and Iqra Lakho eGovernment Services Security and Challenges in Pakistan [Abstract / WIP] Abstract Cyber Security  2015
Ruhul Amin, SK Hafizul Islam, G. P. Biswas, Muhammad  Khurram Khan An Efficient Remote Mutual Authentication Scheme using Smart Mobile Phone over Insure Networks Full Paper Cyber Security  2015
Hatoon Alsagri and Saad Alaboodi Privacy Awareness of Online Social Networking in Saudi Arabia Full Paper Social Media 2015
Shahzad Ahmed Memon, Sorath Mahar, Lachhman Das Dhomeja and Farman Pirzado Prospects and Challenges for Social Media in Pakistan Full Paper Social Media 2015