Cyber SA 2015

June 8-9, 2015, London, UK






Call for Papers

The International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA 2015) is an international referred conference dedicated to the advancement of the principles, methods and applications of situational awareness on Cyber Systems, Business Information Systems (BIS), Computer Network Defence (CND), Computer Physical Systems (CPS) and Internet of Things (IoTs).

The aim of the CyberSA 2015 is to encourage participation and promotion of collaborative scientific, industrial and academic inter-workings among individual researchers, practitioners, members of existing associations, academia, standardisation bodies, and including government departments and agencies. The purpose is to build bridges between academia and industry, and to encourage interplay of different cultures




Submission Deadline

All Industry track, Work in Progress track, Research Ideas track and PhD Seminar track will be published in the conference proceedings. Interested participants, please submit your proposal using the online submission system hosted by Easychair Conference Portal.

Full paper submission should be via Easychair Conference Portal.





Topics of Interest


    • Computer Network Defense
    • Cyber Situation Awareness
    • Correlation & Automation

    • Risk Management, Governance and Compliance
    • Trust, Privacy and Anonymity Issues
    • Digital Forensic Information Analysis
    • Enterprise Information Security Policies, Standards and Procedures
    • Risks posed by Wireless Networks, including through the use of Mobile Computing, BYOD, Wearable in CND environment

    • Cyber Attack Scenarios
    • Situation-Aware and Context-Aware Network Applications
    • CERTs and CSIRTs
    • Security Event and Information Management
    • Application Security, Audits and Penetration Testing

    • Information Security
    • Cyber Security
    • Database Security
    • Application Security
    • Law Enforcement and Surveillance
    • Border Protection and Controls
    • Cyber Warfare and Counter Terrorism

    • Attack Graphs
    • Advanced Security Incident Analysis
    • Sensor Correlation and Cross-Correlation
    • Implementing Situational Awareness Systems
    • Information Security Metrics and Measurements

    • Information Data Fusion
    • Sensor Fusion for Security Incident Analysis
    • Security Incident Analysis
    • Data Association & Correlation
    • Security Information Visualisation
    • Data Analytics
    • Security Monitoring

    • Proactive Defense Strategies
    • Instance-Based Learning
    • Adaptive Neural Logic
    • Human-Assisted Decision Control
    • Human in the Loop
    • Automated Self-Responde

    • Situational Awareness in C4ISR
    • Situational Awareness in Cyber Command and Control Centres
    • Situational Awareness in Intrusion Defense
    • Situational Awareness in Cyber Physical Systems (CPS)
    • Situational Awareness for Internet of Things (IoTs)
    • Open Source Applications

    • Collaborative Defense Approach
    • Situation Assessment & Decision Making

    • Fuzzy Logic
    • Rough Set
    • Artificial Neural Networks
    • Artificial Intelligence
    • Genetic Algorithm
    • Evidence Theory (DST)
    • Bayesian Networks & Set Theory
    • Big Data Analytics
    • Game Theory
    • Graph Theory

    • Intrusion Detection Systems
    • Traffic Characterisation Techniques
    • Web Analytics
    • Security Incident Response

    • Military Doctrinal in Situation Awareness
    • C4ISR (Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance)
    • Computer Network Operations
    • Computer Network Defense

    • Workload
    • Perception
    • Stress
    • Knowledge
    • Training and Expertise
    • Risk Assessment and Decision Making
    • Forecasting and Prediction
    • Operator SA
    • Team SA

    • Tools for Metric Optimisation
    • Visualisation and Digital Analytics
    • Data Mining
    • Filtration, Selection, and Risk-Based Prioritisation
    • Metrics for Evaluation and Assessment

    • Functional Requirements for Situation-aware services
    • Non-Functional Requirements for Situation-aware Services and solutions
    • Interface Design
    • Interoperability
    • Dynamism
    • Complexity
    • Performance
    • Automation
    • Realtime Processing

    • Research and development in Situational Awareness
    • Simulation and Testbeds in Cyber Situation Awareness
    • Experimentation & Instrumentation
    • Modelling
    • Knowledge-base
    • Theoretical Underpinnings in Situation Awareness


Speakers

Dr. Cyril Onwubiko

Dr. Cyril Onwubiko

Cyber Security Intelligence, Research Series Limited, London, UK
Professor Frank Wang

Professor Frank Wang

School of Computing, University of Kent, UK
Dr. Thomas Owens

Dr. Thomas Owens

Brunel University, London, UK
Dr. Andrew Lenaghan

Dr. Andrew Lenaghan

The Oxford University CERT (OxCERT), Oxford, UK

Important Dates


    Industry (Proof of Concept / Pilot) Submission January 15, 2015 March 11, 2015
    Notification of Proof of Concept Acceptance/Rejection January 30, 2015 March 15, 2015
    Extended Abstract (Work in Progress) Submission January 15, 2015 March 11, 2015
    Notification of Extended Abstract Acceptance/Rejection January 30, 2015 March 15, 2015
    Full Paper Submission February 25, 2015 March 11, 2015
    Notification of Paper Acceptance/Rejection March 25, 2015 March 31, 2015
    Camera Ready Paper Due April 10, 2015 April 10, 2015
    Workshops and Tutorials Submission Date January 15, 2015 March 11, 2015
    Notification of Workshop and Tutorial Acceptance January 30, 2015 March 15, 2015
    Special Track Submission Date January 25, 2015 March 11, 2015
    Notification of Special Track Acceptance January 30, 2015 March 15, 2015
    Poster/Demo Submission Date January 15, 2015 March 11, 2015
    Notification of Poster/Demo Acceptance January 30, 2015 March 15, 2015
    Early Registration Deadline (Authors only) Before March 15, 2015
    Late Registration Deadline (Authors only) March 16, 2015 – April 15, 2015
    Participants Registration January 01 to June 01, 2015
    Conference Dates June 8-9, 2015


Location


London
United Kingdom



Programme Committee


    • Cyril Onwubiko – Centre for Multidisciplinary Research, Innovation and Collaboration, UK
    • Thomas Owens – Brunel University, London, UK

    • Janne Merete Hagen – Norwegian Defence Research Establishment, Norway
    • Nick Savage – University of Portsmouth, UK
    • Stacy J. Prowell  – U.S. Department for Energy (DOE-OE) Cybersecurity for Energy, USA

    • Uri Blumenthal – MIT Lincoln Laboratory, MIT, USA
    • Andrew Lenaghan – Flawless Money, Manchester, UK

    • Gareth Niblett – BCS Information Security Specialist Group (ISSG), UK
    • Churchill Ogunewe – Centre for Multidisciplinary Research, Innovation and Collaboration, UK
    • Daniel Zeng – University of Arizona, USA
    • Sotiris Ioannidis – the Institute of Computer Science, Foundation for Research and Technology (FORTH), Greece

    • Pierre Parrend –  ECAM Strasbourg-Europe, France
    • Abdullahi Arabo –  University of the West of England (UWE), Bristol, UK
    • Veena Desai –  Gogte Institute of Technology, Belgaum, India
    • Azah Norman –  University of Malaya, Kuala Lumpur, Malaysia
    • Theo Dimitrakos  – Security Futures Practice, BT Research & Technology, UK
    • Gerardo I. Simari –  Universidad Nacional del Sur in Bahia Blanca and CONICET, Argentina
    • Uwe Glässer –  School of Computing Science, Simon Fraser University, Canada
    • Sen Soori  – VSB-The Technical University of Ostrava, The Czech Republic
    • Liam Meany  –  School of Electronic Engineering, Dublin City University, Ireland
    • Stacy J. Prowell  – U.S. Department for Energy (DOE-OE) Cybersecurity for Energy, USA
    • Anthony Davies – Life Member, IEEE UK & Republic of Ireland, IEEE
    • Thomas Owens – Brunel University, London, UK
    • Jens Myrup Pedersen – University of Aalborg, Denmark
    • Reza Tadayoni – University of Aalborg, Denmark
    • Andrew Lenaghan – Flawless Money, Manchester, UK
    • Chris Tait – Layer 7 IT Solutions, UK
    • Peter J. Hawrylak – The University of Tulsa, USA
    • Subrata Acharya – Towson University, USA
    • Marios Anagnostopoulos – University of the Aegean, Greece
    • Yi Luo – Department of Systems and Industrial Engineering, University of Arizona, Tucson, USA
    • Erik Blasch – Fusion Evaluation & Air Force Research LaboratoryUSA
    • Genshe Chen – Fusion, USA
    • Wei Yu – Towson University, USA
    • Joshua W. Haines – MIT, USA
    • William (Bill) Streilein – MIT Lincoln Laboratory, MIT, USA
    • Uri Blumenthal – MIT Lincoln Laboratory, MIT, USA
    • Gerald O’Leary – MIT Lincoln Laboratory, MIT, USA
    • Ciza Thomas – College of Engineering, India
    • N. Balakrishnan – Indian Institute of Science, India
    • Michael Ruiz – Deloitte Consulting LLP, USA
    • Mark Ballora – Pennsylvania State University, USA
    • Stefanos Gritzalis – University of the Aegean, Greece
    • Mike Tyworth – The Pennsylvania State University, USA
    • Eric X. McMillan – The Pennsylvania State University, USA
    • Bechara Al Bouna – Science University, Lebenanon
    • Janne Merete Hagen – Norwegian Defence Research Establishment, Norway
    • Varun Dutt – Indian Institute of Technology Mandi, India
    • Cleotilde Gonzalez – Carnegie Mellon University, USA
    • Khidir M. Ali – Jubail University College, Kingdom of Saudi Arabia
    • Katherine Hamilton – Penn State University, USA
    • Xinyu Yang –  Xi’an Jiaotong University, China
    • Jie Lin – Xi’an Jiaotong University, China
    • Georgios Kambourakis – University of the Aegean, Greece
    • Elisavet Konstantinou – University of the Aegean, Greece
    • Jeffrey Voas –  National Institute of Standards and Technology (NIST), Gaithersburg, USA
    • Kirankumar S. Akate – Government Institute of Forensic Science, Aurangabad, India
    • Manish Gupta –  State University of New York, Buffalo, NY, USA
    • Yuan Gu – Cloakware Advanced Research Center, Irdeto, China
    • Kristina Soukupova  – Aerospace & Defense Practice, I3CAS, UK
    • Panagiotis Trimintzios – Cyber Crisis Cooperation & Exercises Team Operational Security, ENISA, Europe
    • Eckhard Pfluegel  –   Faculty of Science, Engineering and Computing, Kingston University, UK


Conference Programme


    School of Computing, University of Kent, Canterbury, UKKeynote Speaker – Frank is a Professor of Future Computing, and a Fellow of British Computer Society. He serves the High End Computing Panel for Science Foundation Ireland (SFI) and the UK Government EPSRC e-Science Panel. Frank has attracted a number of EC/EPSRC/DTI/Industrial grants, totaling a few million euros. He has been invited to present keynote speeches and other invited talks at Princeton University (USA), Carnegie Mellon University (USA), Oxford University (UK), Edinburgh University (UK), CERN (the European Organization for Nuclear Research, Geneva), Hong Kong University of Science & Technology (Hong Kong), Tsinghua University (Taiwan), Jawaharlal Nehru University (India), Aristotle University (Greece), Helsinki Technology University (Finland), Turkish Government The Ministry of Industry and Commerce, University of Johannesburg (South Africa), Central Philippine University (Philippine), and Princess Sumaya University for Technology (Jordan), etc. Prof Frank Wang is Co-Editor-in-Chief of Encyclopedia of Grid Computing and Co-Editor-in-Chief of International Journal of Grid and High Performance Computing.

    Title of presentation: “Computer Evolution over the Next Decade: Fact or Fiction?” Download presentation
    Brunel University, London, UK

    Keynote Speaker – Tom is Senior Lecturer and Director of Quality at Brunel University. He is the co-editor of the book on Situational Awareness in Computer Network Defense: Principle, Methods and Application, IGI Global, USA. He is currently Project Manager of the IST PSP Project DTV4All & Has been a Project Manager for a number of European Commission projects.

    Title of presentation: “Situational Awareness in routing in Vehicular Ad hoc Networks (VANETs)” Download presentation

    Flawless Money Limited

    Keynote Speaker – Andrew is the Information Security Officer at Flawless Money Ltd, a member of the Information Systems Audit and Control Association (ISACA), and regular contributor to the fraud subcommittee of the Electronic Money Association. “

    Title of presentation: “Situational Awareness in detecting Fraud or Financial Crime” Download presentation

    Intelligence and Security Assurance, E-Security, UK

    Keynote Speaker –  Cyril is Director, Cyber Security and Information Assurance (IA) at Research Series Limited, where he is responsible for directing strategy, IA governance and cyber security. He co-edited the book on “Situational Awareness in Computer Network Defense: Principles, Methods & Applications” published by IGI Global, USA, and has authored several book chapters, including Security Issues to Cloud Computing, in the book on “Cloud Computing: Principles, Systems and Applications” by Springer.  With over 30 articles published in leading and most prestigious academic journals and conferences.

    Title of presentation: “The Role of Situational Awareness in Cyber Security” Download presentation

    Mark John Hall & Devon David Hansen

    Research Engineers

    TX-5 Homeland Security Team, Airbus Group Innovations, UK

    Title of presentation: “Cross-Domain Situational Awareness and Collaborative Working for Cyber Security” Download presentation

     

    Jussi Timonen

    Researcher & PhD Student

    The Finnish Defence Forces, Finland

    Title of presentation: “Improving Situational Awareness of Cyber Physical Systems based on Operator’s Goals” Download presentation

     

    Maria Evangelopoulou

    PhD Student

    University of Glasgow, UK

    Title of presentation: “Situation Awareness Measurement Techniques in Network Defense” Download presentation

     

    Klaus Theuerkauf

    Researcher

    Ifak Institut für Automation und Kommunikation e.V. Magdeburg

    Title of presentation: “On Demand for Situational Awareness for Preventing Attacks on the Smart Grid” Download presentation

     

    Hashem Dehghanniri

    PhD Student

    University College London, UK

    Title of presentation: “Improving Security Decision under Uncertainty: A Multidisciplinary Approach” Download presentation

     

    Dr Christopher Laing

    Sciendum Ltd, UK

    Title of presentation: “Context Informed Intelligent Information Infrastructures for Better Situational Awareness” Download presentation

     

    Dr Muhammad Ali Nasir

    NUCES-FAST, Pakistan

    Title of presentation: “Potential Cyber-attacks against Global Oil Supply Chain” Download presentation

     

    Dr Sarmistha Neogy

    Assistant Professor

    Jadavpur University, India

    Title of presentation: “Developing a Secure Remote Patient Monitoring System” Download presentation

     

    Dr Saad Alaboodi

    Assistant Professor

    Center of Excellence in Information Assurance, King Saud University, Riyadh, Saudi Arabia

    Title of presentation: “Privacy Awareness of Online Social Networking in Saudi Arabia” Download presentation

     

    Dr Sarmistha Neogy

    Assistant Professor

    Jadavpur University, India

    Title of presentation: “Security Management in Wireless Sensor Networks” Download presentation

     

    Dr Eckhard Pfluegel

    Senior Lecturer

    Kingston University, UK

    Title of presentation: “Chaos-Based Image Encryption Using an AONT Mode of Operation” Download presentation

     

    1Steven Strandlund Hansen and 2Alexandre Czech

    1Aalborg University, Denmark

    2Ecole Centrale d’Electronique, Paris, France

    Title of presentation: “Analysis of Malware Behavior: Type Classification using Machine Learning” Download presentation

     

    Adriana-Cristina Enache

    PhD Student

    Military Technical Academy, Bucharest, Romania

    Title of presentation: “An Immune Intelligent Approach for Security Assurance” Download presentation

     

    Giuseppe Settanni

    Researcher

    Austrian Institute of Technology, Austria

    Title of presentation: “Beyond Gut Instincts: Understanding, Rating and Comparing Self-Learning IDSs” Download presentation

     

    Charles Clarke

    PhD Student

    Faculty of SEC, Kingston University, UK

    Title of presentation: “Multi-channel Overlay Protocols: Implementing Ad-hoc Message Authentication in Social Media Platforms” Download presentation

     

    Matija Stevanovic

    PhD Student

    Aalborg University, Denmark

    Title of presentation: “An Analysis of Network Traffic Classification for Botnet Detection” Download presentation

     

    Louai Maghrabi & Dr Eckhard Pfluegel

    Kingston University, UK

    Title of presentation: “Moving Assets to the Cloud: A Game Theoretic Approach Based on Trust” Download presentation

     

    Marcelo Fontenele

    PhD Student

    University of Reading, UK

    Title of presentation: “Talent Discovery for Cyber Security: an organisational perspective” Download presentation

     

    Dr Cyril Onwubiko

    Intelligence and Security Assurance, E-Security, UK

    Title of presentation: “Cyber Security Operations Centre: Security monitoring for protecting Business and supporting Cyber Defense Strategy” Download presentation

     

    Giuseppe Settanni

    Researcher

    Austrian Institute of Technology, Austria

    Title of presentation: “Establishing National Cyber Situational Awareness” Download presentation

     

    Palvi Aggarwal

    PhD Student

    Applied Cognitive Science Laboratory, Indian Institute of Technology, Mandi, India

    Title of presentation: “Cyber Security: A Game-Theoretic Analysis of Defender and Attacker Strategies in Defacing-Website Games” Download presentation

     

    Therese Bjerkestrand

    Researcher

    Kingston University, UK

    Title of presentation: “Evaluation of Feature Selection and Reduction Algorithms for Network IDS Data” Download presentation

     

    Dr Bechara Al Bouna

    Assistant Professor

    Antonine University, Lebanon

    Title of presentation: “An SQL-like Query Tool for Data Anonymization and Outsourcing” Download presentation

Authors Paper Title Type Conference
Jussi Timonen Improving Situational Awareness of Cyber Physical Systems based on Operator’s Goals Full Paper CyberSA 2015
Matija Stevanovic and Jens Myrup Pedersen An Analysis of Network Traffic Classification for Botnet Detection Full Paper CyberSA 2015
Palvi Aggarwal, Antra Grover, Saumya Singh, Zahid Maqbool, V. S. Chandrasekhar Pammi and Varun Dutt Cyber Security: A Game-Theoretic Analysis of Defender and Attacker Strategies in Defacing-Website Games Full Paper CyberSA 2015
Maria Evangelopoulou and Christopher W. Johnson Situation Awareness Measurement Techniques in Network Defense Full Paper CyberSA 2015
Florian Skopik, Markus Wurzenberger, Giuseppe Settanni and Roman Fiedler Establishing National Cyber Situational Awareness through Incident Information Clustering Full Paper CyberSA 2015
Hashem Dehghanniri, Emmanuel Letier and Herve Borrion Improving Security Decision under Uncertainty: A Multidisciplinary Approach Full Paper CyberSA 2015
Adenusi Dauda, Boniface Kayode Alese, Bamidele Moses Kuboye and Betty Aderonke Thompson Development of Cyber Situation Awareness Model [Abstract / WIP] Abstract CyberSA 2015
Moyinoluwa Abidemi Bode, Boniface Kayode Alese, Samuel A. Oluwadareand Aderonke Favour-Bethy Thompson Risk Analysis in Cyber Situation Awareness using Bayesian Statistics Full Paper CyberSA 2015
Mark John Hall, Devon David Hansen and Kevin Jones Cross-Domain Situational Awareness and Collaborative Working for Cyber Security Full Paper CyberSA 2015
Markus Wurzenberger, Florian Skopik, Giuseppe Settanni and Roman Fiedler Beyond Gut Instincts: Understanding, Rating and Comparing Self-Learning IDSs [Abstract / WIP] Abstract CyberSA 2015
Lewis Meehan and Carlene Campbell Threat and Mitigation Awareness Based Upon a Model Network Scenario with BYOD Aspects Full Paper CyberSA 2015
Charles Clarke, Eckhard Pflügel and Dimitris Tsaptsinos Multi-channel Overlay Protocols: Implementing Ad-hoc Message Authentication in Social Media Platforms Full Paper CyberSA 2015
Yegor Shovgenya, Klaus Theuerkauf and Florian Skopik On Demand for Situational Awareness for Preventing Attacks on the Smart Grid Full Paper CyberSA 2015
Zulfiqar Bhutto, Kamran Dahri, Iqra Lakho and Shahzad Memon A Prototype Application for Street Crime Reporting Full Paper CyberSA 2015
Cyril Onwubiko Cyber Security Operations Centre: Security monitoring for protecting Business and supporting Cyber Defense Strategy Full Paper CyberSA 2015
Mohamed Nassar, Adel Al-Rahal Al-Orabi, Marwan Doha and Bechara Al Bouna An SQL-like Query Tool for Data Anonymization and Outsourcing Full Paper CyberSA 2015
Adriana-Cristina Enache and  Valentin Sgârciu An Immune Intelligent Approach for Security Assurance Full Paper CyberSA 2015
Steven Strandlund Hansen, Thor Mark Tampus Larsen, Radu Stefan Pirscoveanu, Alexandre Czech, Matija Stevanovic and Jens Myrup Pedersen Analysis of Malware Behavior: Type Classification using Machine Learning Full Paper CyberSA 2015
Therese Bjerkestrand, Dimitris Tsaptsinos and Eckhard Pfluegel Evaluation of Feature Selection and Reduction Algorithms for Network IDS Data [Abstract / WIP] Abstract CyberSA 2015
Marcelo Fontenele and Lily Sun Talent Discovery for Cyber Security: an organisational perspective Full Paper Cyber Security  2015
Christopher Laing, Paul Vickers, Tom Fairfax, Pam Briggs and Stephen Marsh Context Informed Intelligent Information Infrastructures for Better Situational Awareness Full Paper Cyber Security  2015
Andrius Rickus, Eckhard Pfluegel and Nigel Atkins Chaos-Based Image Encryption Using an AONT Mode of Operation Full Paper Cyber Security  2015
Sarmistha Neogy Security Management in Wireless Sensor Networks Full Paper Cyber Security  2015
Sarmistha Neogy and Sayantani Saha Developing a secure remote patient monitoring system Full Paper Cyber Security  2015
Muhammad Ali Nasir and Shizra Sultan Potential Cyber-attacks against Global Oil Supply Chain Full Paper Cyber Security  2015
Louai Maghrabi and Eckhard Pfluegel Moving Assets to the Cloud: A Game Theoretic Approach Based on Trust Full Paper Cyber Security  2015
Kamran Dahri, Shakeel Rajput, Shahzad Memon and Dr. Lachman Das Dhomeja Smart Activities Monitoring System (SAMS) for Security Applications [Abstract / WIP] Abstract Cyber Security  2015
Jawad Awan, Shahzad Memon, Lachhman Das and Iqra Lakho eGovernment Services Security and Challenges in Pakistan [Abstract / WIP] Abstract Cyber Security  2015
Ruhul Amin, SK Hafizul Islam, G. P. Biswas, Muhammad  Khurram Khan An Efficient Remote Mutual Authentication Scheme using Smart Mobile Phone over Insure Networks Full Paper Cyber Security  2015
Hatoon Alsagri and Saad Alaboodi Privacy Awareness of Online Social Networking in Saudi Arabia Full Paper Social Media 2015
Shahzad Ahmed Memon, Sorath Mahar, Lachhman Das Dhomeja and Farman Pirzado Prospects and Challenges for Social Media in Pakistan Full Paper Social Media 2015