The 2018 edition of Cyber Science took place in Scotland from June 11-12, 2018.

2018 Keynotes & Industry

Accepted Papers, Extended Abstracts and Posters

  • Anthony Arrott, Arun Lakhotia, Ferenc Leitold and Ledoux Charles – Cluster analysis for deobfuscation of malware variants during ransomware attacks
  • Patrik Lif, Teodor Sommestad and Dennis GranåsenDevelopment and evaluation of information elements for simplified cyber-incident reports
  • Christopher McDermott, Andrei Petrovski and Farzan MajdaniTowards Situational Awareness of Botnet Activity in the Internet of Things
  • Zahid Maqbool, V.S. Chandrasekhar Pammi and Varun DuttCybersecurity: Influence of patching vulnerabilities on the decision-making of hackers and analysts
  • Adam Zibak and Andrew Simpson –  Can We Evaluate the Impact of Cyber Security Information Sharing?
  • Wei Xu, Yaodong Tao and Xin GuanThe Landscape of ICS Devices on the Internet
  • Sungyoung Cho, Insung Han, Hyunsook Jeong, Jinsoo Kim, Sungmo Koo, Haengrok Oh and Moosung ParkCyber Kill Chain based Threat Taxonomy and its Application on Cyber Common Operational Picture
  • Yara Bayoumy, Per Håkon Meland and Guttorm Sindre – A Netnographic Study on the Dark Net Ecosystem for Ransomware
  • Yogachandran Rahulamathavan, Xuewen Yao, Rahulamathavan Sutharsini, Muttukrishnan Rajarajan and Kanapathippillai CumananRedesign of Gaussian Mixture Model for Efficient and Privacy-preserving Speaker Recognition
  • Shane Miller, Kevin Curran and Tom LunneyMultilayer Perceptron Neural Network for Detection of Encrypted VPN Network Traffic
  • Karen Renaud and Lynsay ShepherdHow to Make Privacy Policies both GDPR-Compliant and Usable
  • Eliana StavrouEnhancing Cyber Situational Awareness Tools: A New Perspective of Password Auditing
  • Nima Asadi, Aunshul Rege and Zoran Obradovic – Analysis of Adversarial Movement Through Characteristics of Graph Topological Ordering
  • Kay Michel and Michael King – Towards An Adaptable System-based Classification Design for Cyber Identity
  • Arun LakhotiaMalware Economics and its Implication to Anti-Malware Situational Awareness
  • Hanan Hindi, Elike Hodo, Ethan Bayne, Amar Seeam, Robert Atkinson and Xavier BellekensA Taxonomy of Malicious Traffic for Intrusion Detection Systems
  • Zachary Hills, David Arppe, Amin Ibrahim and Khalil El-KhatibCompound Password System for Mobile
  • Andrea Cullen and Lorna Armitage – A Human Vulnerability Assessment Methodology
  • Cyril Onwubiko –  CoCoa: An Ontology for Cybersecurity Operations Centre Analysis Process
  • Domhnall Carlin, Phillip O’Kane and Sakir Sezer – Dynamic Opcode Analysis of Ransomware
  • Ensar Seker and Hasan Huseyin OzbenliThe Concept of Cyber Defence Exercises: Planning, Execution, Evaluation
  • Sean Mckeown, Gordon Russell and Petra LeimichSub-file Hashing Strategies for Fast Contraband Detection
  • André Sørensen, Maxime Jerome Remy, Nicolaj Kjettrup, Rasmi Vlad Mahmoud and Jens Myrup PedersenAn Approach to Detect and Prevent Cybercrime in Large Complex Networks
  • Shuai Fu and Nizar BouguilaAn Intrusion Detection Model based on Asymmetric Gaussian mixtures with Reversible Jump MCMC
  • Andres Robles-Durazno, Naghmeh Moradpoor, James McWhinnie and Gordon RussellA supervised energy monitoring-based machine learning approach for anomaly detection in a clean water supply system
  • Mahdi Madani and Camel TanougastCombined and Robust SNOW-ZUC Algorithm Based on Chaotic System
  • Egon Kidmose, Matija Stevanovic and Jens Myrup PedersenDetection of malicious domains through lexical analysis
  • Dimitrios Kavallieros, Christina Chalanouli, Georgios Kokkinis, Anastasios Papathanasiou, Efthimios Lissaris, Georgios Leventakis, Georgios Giataganas and Georgios GermanosSearching for crime on the web: Legal and Ethical perspectives
  • Halldis Søhoel, Martin Gilje Jaatun and Colin BoydOWASP Top 10 – Do Startups Care?
  • Anastasios Balaskas and Virginia N. L. FranqueiraAnalytical Tools for Blockchain: Review, Taxonomy and Open Challenges
  • Baskoro Adi Pratomo, Pete Burnap and George TheodorakopoulosUnsupervised Approach for Detecting Low Rate Attacks on Network Traffic with Autoencoder
  • Paul Wortman, Fatemeh Tehranipoor and John ChandyAn Adversarial Risk-based Approach for Network Architecture Security Modeling and Design
  • Martin Gilje Jaatun, Marie Moe and Per Erik NordbøCyber Security Considerations for Self-healing Smart Grid Networks
  • Vladimir Eliseev and Olga EliseevaLightweight Distributed Attack Detection and Prevention for the Safe Internet of Things
  • Bob DuncanAttackers Constantly Threaten the Survival of Organisations, but there is a New Shark in the Water: Carcharodon Carcharias Moderator Europa Universalis
  • Kimberly Tam and Kevin JonesCyber-Risk Assessment for Autonomous Ships
  • Yassine Lemmou and El Mamoun SouidiInfection, Self-reproduction and Overinfection in Ransomware: The Case of TeslaCrypt
  • Mirko Bottarelli, Gregory Epiphaniou, Dhouha Kbaier Ben Ismail, Petros Karadimas and Haider Al-Khateeb Quantisation feasibility and performance of RSS-based secret key extraction in VANETs
  • Daniel Fraunholz, Daniel Krohmer, Carolina Nogueira and Hans Dieter SchottenIntroducing Falcom: A Multifunctional High-Interaction Honeypot Framework for Industrial and Embedded Applications
  • Martin Span, Logan Mailloux and Michael Grimaila A Systems Security Approach for Requirements Analysis of Complex Cyber-Physical Systems
  • Santhosh Parampottupadam and Arghir-Nicolae MoldovanCloud-based Real-time Network Intrusion Detection Using Deep Learning
  • Farhad Foroughi and Peter LukschObservation Measures To Profile User Security Behaviour
  • Obinna Omego, Eckhard Pfluegel, Martin Tunnicliffe and Charles ClarkeEnsuring Message Freshness in A Multi-Channel SMS Steganographic Banking Protocol
  • Sean Mckeown, Gordon Russell and Petra LeimichReducing the Impact of Network Bottlenecks on Remote Contraband Detection
  • Jason Koepke and Siddarth KazaInformation flow on Twitter surrounding regional events
  • Terézia Mézešová and Hayretdin Bahsi –  Expert Knowledge Elicitation for Skill Level Categorization of Attack Paths
  • Basil AlothmanNetwork Traffic Data Preparation for Automatic Botnet Detection by Incident Response Teams
  • Ganbayar Uuganbayar, Artsiom Yautsiukhin and Fabio MartinelliCyber Insurance and Security Interdependence: Friends or Foes?
  • Per Håkon Meland and Fredrik SeehusenWhen to Treat Security Risks with Cyber Insurance
  • Daniel W. Woods and Andrew C. Simpson –  Towards Integrating Insurance Data into Information Security Investment Decision Making
  • Erin Kenneally, Lucien Randazzese and David BalensonCyber Risk Economics Capability Gaps Research Strategy