The 2016 edition of Cyber Science took place in London, UK from June 13-14, 2016.

Cyber Science 2016

2016 Keynotes & Industry

Accepted Papers, Extended Abstracts and Posters

  • Philip Legg. “Enhancing Cyber Situation Awareness for Non-Expert Users using Visual Analytics
  • Samir Puuska, Matti J. Kortelainen, Viljami Venekoski and Jouko Vankka. “Instant Message Classification in Finnish Cyber Security -Themed Free-Form Discussion
  • Yoram Golandsky. “Cyber Crisis Management, Survival or Extinction?
  • Joe Burton. “Cyber Attacks and Maritime Situational Awareness: Evidence from Japan and Taiwan
  • Jan Ahrend, Marina Jirotka and Kevin Jones. “On the Collaborative Practices of Cyber Threat Intelligence Analysts to Develop and Utilize Tacit Threat and Defence Knowledge
  • Eliana Stavrou and Andreas Pitsillides. “Situation aware intrusion recovery policy in WSNs
  • Michael Davies and Menisha Patel. “Are we managing the risk of sharing Cyber Situational Awareness – A UK Public Sector Case Study
  • Radu-Stefan Pirscoveanu, Matija Stevanovic and Jens Myrup Pedersen. “Clustering Analysis of Malware Behavior using Self Organizing Map
  • Mahesh Bang and Himanshu Saraswat. “Building an effective and efficient continuous Web Application Security Program
  • Xavier Bellekens, Preetila Seeam, Quentin Franssen, Andrew Hamilton, Kamila Nieradzinska and Amar Seeam. “Pervasive eHealth Services A Security and Privacy Risk Awareness Survey
  • Mohamed Chahine Ghanem and Deepthi N. Ratnayake. “Enhancing WPA2-PSK four-way handshaking after re-authentication to deal with de-authentication followed by brute-force attack A novel re-authentication protocol
  • Filippo Sanfilippo. “A Multi-Sensor System for Enhancing Situational Awareness in Offshore Training
  • Palvi Aggarwal, Cleotilde Gonzalez and Varun Dutt. “Looking from the Hacker’s Perspective: Role of Deceptive Strategies in Cyber Security
  • Zahid Maqbool, V.S. Chandrasekhar Pammi and Varun Dutt. “Cybersecurity: Effect of Information Availability in Dynamic Security Games
  • Roman Graf, Florian Skopik and Kenny Whitebloom. “A Decision Support Model for Situational Awareness in National Cyber Operations Centers
  • Shruti Kohli. “Developing Cyber Security Asset Management framework for UK Rail
  • Ryan Heartfield and George Loukas. “Evaluating the reliability of Users as Human Sensors of Social Media Security Threats
  • Jennifer Cole, Chris Watkins and Dorothea Kleine. “Internet Discussion Forums: Maximizing Choice in Health-seeking Behaviour During Public Health Emergencies
  • Paul Baxter and Trevor Wood. “Generating Insight from Data
  • Mohammed Alzaylaee, Suleiman Yerima and Sakir Sezer. “DynaLog: An Automated Dynamic Analysis Framework for characterizing Android Applications
  • Louai Maghrabi, Eckhard Pfluegel and Senna Fathima Noorji. “Designing Utility Functions for Game-Theoretic Cloud Security Assessment: A Case for Using the Common Vulnerability Scoring System
  • Kamile Nur Sevis and Ensar Seker. “Cyber Warfare: Terms, Issues, Laws and Controversies
  • Thomas Mundt and Peter Wickboldt. “Security in building automation systems – A first analysis
  • Fara Yahya, Robert Walters and Gary Wills. “Goal-Based Security Components for Cloud Storage Security Framework: A Preliminary Study
  • Dylan Smyth, Victor Cionca, Sean McSweeney and Donna O’Shea. “Exploiting Pitfalls in Software-Defined Networking Implementation
  • Boojoong Kang, Suleiman Yerima, Kieran Mclaughlin and Sakir Sezer. “N-opcode Analysis for Android Malware Classification and Categorization
  • Muhammad Aminu Ahmad, Steve Woodhead and Diane Gan. “A Countermeasure Mechanism for Fast Scanning Malware
  • Andrea Cullen and Lorna Armitage. “The Social Engineering Attack Spiral (SEAS)
  • Catrin Burrows and Pooneh Bagheri Zadeh. “A Mobile Forensic Investigation into Steganography
  • Egon Kidmose, Matija Stevanovic and Jens Myrup Pedersen. “Correlating intrusion detection alerts on bot malware infections using neural network
  • Zbigniew Hulicki. “The IM System with a Cryptographic Feature
  • Reza Montasari, Pekka Peltola and Victoria Carpenter. “Gauging the Effectiveness of Computer Misuse Act in Dealing with Cybercrimes
  • Tomáš Sochor, Matej Zuzčák and Petr Bujok. “Statistical Analysis of Attacking Autonomous Systems
  • Marcelo Fontenele and Lily Sun. “Knowledge management of cyber security expertise: an ontological approach to talent discovery
  • Cyril Onwubiko. “Exploring Web Analytics to enhance Cyber Situational Awareness for the Protection of Online Web Services
  • Gaofeng Zhang, Paolo Falcarin, Elena Gómez-Martínez, Christophe Tartary, Shareeful Islam, Bjorn De Sutter and Jerome D’annoville. “Attack Simulation based Software Protection Assessment Method for Protection Optimisation