Cyber Science 2019

The 2019 edition of Cyber Science took place at the University of Oxford, UK from June 3-4, 2019.

Download a free copy of the Cyber Science 2019 Event Programme.

2019 Keynotes & Industry

Accepted Papers, Extended Abstracts and Posters

  • Jonah Burgess, Domhnall Carlin, Philip O’Kane and Sakir Sezer. MANiC: Multi-step Assessment for Crypto-miners
  • Alan Mills, Theodoros Spyridopoulos and Phil Legg. Efficient and Interpretable Real-Time Malware Detection Using Random-Forest
  • Peyman Kabiri and Mahdieh Chavoshi. Destructive Attacks Detection and Response System for Physical Devices in Cyber-Physical Systems
  • Bernhardt Engerer and Alexiei Dingli. Big Social Data – Predicting Users’ Interests from their Social Networking Activities
  • Chunlei Li, Chunming Rong and Martin Gilje Jaatun. A cost-efficient scheme for Bitcoin-like blockchain
  • Kimberly Tam and Kevin Jones. Forensic Readiness within the Maritime Sector
  • Kimberly Tam and Kevin Jones. Factors Affecting Cyber Risk in Maritime
  • Yogesh Patel, Karim Ouazzane, Vassil Vassilev, Ibrahim Faruqi and George Walker. Keystroke Dynamics using Auto Encoders
  • Theo Lynn, Patricia Takako Endo, Pierangelo Rosati, Ivanovitch Silva, Guto Leoni and Debbie Ging. Detecting Hate Speech Online: A
  • Comparison of Machine Learning Approaches for Automatic Misogyny Detection in Urban Dictionary
  • Aunshul Rege and Scott Vanzant. Examining the Roles of Muhajirahs in the Islamic State via Twitter
  • Olivier Jacq, David Brosset, Yvon Kermarrec and Jacques Simonin. Cyber attacks real time detection: towards a Cyber Situational Awareness for naval systems
  • Cyril Onwubiko and Karim Ouazzane. Cyber Onboarding is ‘Broken’
  • Meha Shukla, Shane Johnson and Peter Jones. Does the NIS implementation strategy effectively address cyber security risks in the UK?
  • Erik Moore, Steven Fulton, Roberta Mancuso, Tristen Amador and Dan Likarish. Collaborative Training and Response Communities – An Alternative to Traditional Cyber Defense Escalation
  • Andrew Mason, Yifan Zhao, Hongmei He, Raymon Gompelman, Srikanth Mandava and Guy Adams. Online Anomaly Detection of Time Series at Scale
  • Yuanyuan Zhu, Mee Chi So and Paul Harrigan. Domain Identification for Commercial Intention-holding Posts on Twitter
  • Leonard Renners, Felix Heine, Carsten Kleiner and Gabi Dreo. Adaptive and Intelligible Prioritization for Network Security Incidents
  • Thomas Daniel Wagner. Cyber Threat Intelligence for “Things”
  • Eszter Oroszi. Security awareness escape room – a possible new method in improving security awareness of users
  • Wenjun Xiong and Robert Lagerström. Threat Modeling of Connected Vehicles: A privacy analysis and extension of vehicleLang
  • Subhi Alrubei, Jonathan Rigelsford, Callum Willis and Edward Ball. Ethereum Blockchain for Securing the Internet of Things: Practical Implementation and Performance Evaluation
  • Muntaha Saleem. Brexit Impact on Cyber Security of United Kingdom
  • Nima Asadi, Aunshul Rege and Zoran Obradovic. Pattern discovery in intrusion chains and adversarial movement
  • Yuxiang Hong and Steven Furnell. Organizational formalization and employee information security behavioral intentions based on an extended TPB model
  • Christopher McDermott and John Isaacs. Towards a Conversational Agent for Threat Detection in the Internet of Things
  • Kamalakanta Sethi, Ankit Pradhan, Punith. R and Padmalochan Bera. A Scalable Attribute Based Encryption for Secure Data Storage and Access in Cloud
  • Aunshul Rege, Katorah Williams and Alyssa Mendlein. A Social Engineering Course Project for Undergraduate Students Across Multiple Disciplines
  • Yunjia Wang and Ishbel Duncan. A Novel Method to Prevent Phishing by using OCR Technology
  • Chern Nam Yap, Rui Tao Kee, Jovan Sie and Rhys Wong. Arithmetic Circuit Homomorphic Encryption and Multiprocessing Enhancements
  • Mahin Talukder, Syed Islam and Paolo Falcarin. Analysis of Obfuscated Code with Program Slicing
  • Pranshu Bajpai, Tyler Olsen, Seth Edgar, Rob McCurdy and Richard Enbody. BATSense: Anomalous Security Event Detection using TBATS Machine Learning
  • Mary C. (Kay) Michel and Michael C. King. The Future of Cyber Analytics: Identity Classification for Systematic and Predictive Insight
  • Zirak Allaf, Mo Adda and Alexandar Gegov. TrapMP: Malicious Process Detection By Utilising Program Phase Detection
  • Marios Ioannou, Eliana Stavrou and Maria Bada. Cybersecurity Culture in Computer Security Incident Response Teams: Investigating difficulties in communication and coordination
  • Florian Skopik and Stefan Filip. Design principles for national cyber security sensor networks: Lessons learned from small-scale demonstrators
  • Phil Legg and Tim Blackman. Tools and Techniques for Improving Cyber Situational Awareness of Targeted Phishing Attacks
  • Martin Lundgren and Erik Bergström. Security-Related Stress: A Perspective on Information Security Risk Management
  • Sikha Bagui, Debarghya Nandi, Subhash Bagui and Robert Jamie White. Classifying Phishing Email Using Machine Learning and Deep Learning
  • Fiona Carroll, Phil Legg and Adam Chakof. What makes for effective visualisation in Cyber Situational Awareness for Non-Expert Users?
  • Jd Work. In wolf’s clothing: Complications of threat emulation in contemporary cyber intelligence practice
  • Belqassim Bouteghrine, Mohammed Rabiai, Camel Tanougast and Said Sadoudi. Hardware Implementation of Secured Socket Communication based on Chaotic Cryptosystem
  • Renate Schubert and Ioana Marinica. Facebook Data: Sharing, Caring, and Selling
  • Wenting Li, Haibo Cheng and Ping Wang. Secure Chaotic Maps-based Authentication Scheme for Real-Time Data Access In Internet of Things
  • Suleiman Yerima and Sarmadullah Khan. Longitudinal performance analysis of machine learning based Android malware detectors
  • Cyril Onwubiko and Austine Onwubiko. Cyber KPI for Return on Security Investment
  • Aguinaldo Bezerra, Gisliany Alves, Ivanovitch Silva, Pierangelo Rosati, Patricia Takako Endo and Theo Lynn. A Preliminary Exploration of Uber Data as an Indicator of Urban Liveability
  • Kamalakanta Sethi, Rahul Kumar, Lingaraj Sethi, Padmalochan Bera and Prashanta Kumar Patra. A Novel Machine Learning Based Malware Detection and Classification Framework
  • Lakshmi Prayaga. Empowering Citizen data Scientists
  • Adam Zibak and Andrew Simpson. Towards Better Understanding of Cyber Security Information Sharing
  • Abraham Althonayan and Alina Andronache. Resiliency under Strategic Foresight: The effects of Cybersecurity Management and Enterprise Risk Management alignment
  • Remy Zgraggen. Cyber Security Supervision in the Insurance Sector: Smart Contracts and Chosen Issues
  • William Claycomb and Daniel Costa. Poster: Leveraging Existing IT Resources for Insider Threat Risk Mitigation
  • William Claycomb and Daniel Costa. Poster: Indicator Development for Insider Threat Risk
  • Adrian Duncan, Sadie Creese and Michael Goldsmith. A Combined Attack-Tree and Kill-Chain Approach to Designing Attack-Detection Strategies for Malicious Insiders in Cloud Computing
  • Ferenc Leitold. Practical approach for maesuring the level of user behavior
  • Bertrand Venard. The determinants of individual cyber security behaviours