Cyber Incident 2016

June 13-14, 2016, London, UK






Call for Papers

IEEE is the Technical Co-Sponsor (TCS) of the International Conference on Cyber Incident Response, Coordination, Containment & Control (Cyber Incident 2016) is an international refereed conference dedicated to the advancement of Cyber Incident Response, Coordination, Containment and Control.

 

The aim of the Cyber Incident 2016 is to encourage participation and promotion of collaborative scientific, industrial and academic inter-workings among individual researchers, practitioners, members of existing associations, academia, standardisation bodies, and including government departments and agencies. The purpose is to build bridges between academia and industry, and to encourage interplay of different cultures




Submission Deadline

Deadline for all paper submissions, that is, both full papers and extended abstracts for Poster, WIP, PoC, Research Idea and PhD Seminar presentations is 26th February 2016.

All Industry track, Work in Progress track, Research Ideas track and PhD Seminar track will be published in the conference proceedings. Interested participants, please submit your proposal using the online submission system hosted by Easychair Conference Portal.

Full paper submission should be via Easychair Conference Portal





Topics of Interest


    • Cyber Incident Analysis
    • Cyber Incident Triage
    • Cyber Incident Correlation and Assessment
    • Coordination
    • Containment
    • Root Cause Analysis (RCA)
    • Timeliness
    • Handling and Handling Process
    • Reporting
    • Escalation
    • Cyber Incident Managemen

    • Decision Control
    • Emergence Services
    • Preparedness
    • Readiness
    • Analysis
    • Risk Management
    • Conditionality
    • Proportionality
    • Prioritisation
    • Decision Making
    • Risk-Based Decision
    • Human in the Loop

    • Training
    • Processes and Procedures
    • Policy and Standards
    • Emergency  Services
    • Chain of Custody
    • Forensic Readiness and Investigations
    • Cyber Incident Notification and Announcements
    • Cyber Incident Management Tool
    • Standardisation
    • Framework and Methodology
    • Expertise, Skills, Knowledge and Resource
    • Maturity Model and Goal Setting
    • Certification and Accreditation
    • Memberships to Cyber Incident Responders, Incident Response Organisation

    • Rule-Based Systems
    • Expert Systems
    • Adaptive Learning Systems
    • Predictive Systems
    • The use of Biometrics to aid Forensic Investigations
    • Speak, audio and voice Recognition for forensics
    • Correlation and cross-correlation for Incident Analysis
    • Cross-Domain Analysis
    • Cross-Channel Incident Analysis
    • Multi-domain Analysis


Speakers

Dr. Thomas Owens

Dr. Thomas Owens

Brunel University, London, UK
Professor Olav Lynse

Professor Olav Lynse

Centre for Resilient Networks and Applications (CRNA), Simula, Norway
Dr. Andrew Leneghan

Dr. Andrew Leneghan

The Oxford University CERT (OxCERT), Oxford, UK
Dr. Syed Naqvi

Dr. Syed Naqvi

Cyber Security and Forensics, Birmingham City University, Birmingham, UK
Dr. Janne Hagen

Dr. Janne Hagen

Norwegian Water Resources and Energy Directorate (NVE), Norway
Professor Ali Hessami

Professor Ali Hessami

Chair, IEEE United Kingdom & Republic of Ireland
Dr. Nick Savage

Dr. Nick Savage

School of Computing, University of Portsmouth, Portsmouth, UK
Professor Frank Wang

Professor Frank Wang

School of Computing, University of Kent, UK

Important Dates


    • Industry (Proof of Concept / Pilot) Submission –  February 26, 2016 March 11, 2016
    • Extended Abstract (Work in Progress) – February 26, 2016 March 11, 2016
    • PhD Seminar Submissions – February 26, 2016 March 11, 2016
    • Research Ideas – February 26, 2016 March 11, 2016
    • Poster/Demo Submissions – February 26, 2016 March 11, 2016
    • Special Track Submissions – February 26, 2016 March 11, 2016
    • Workshops and Tutorials Submission – February 26, 2016 March 11, 2016
    • Full Paper Submissions – February 26, 2016 March 11, 2016
    • Notification of Full Paper/Abstract / Special Track Acceptance/Rejection – March 25, 2016
    • Camera Ready Paper Due – April 8, 2016
    • Participants Registration – March 25 – May 25, 2016
    • Conference Date – 13 & 14 June 2016


Location


London
United Kingdom



Programme Committee


    • Cyril Onwubiko – Centre for Multidisciplinary Research, Innovation and Collaboration, UK
    • Thomas Owens – Brunel University, London, UK

    • Sotiris Ioannidis – the Institute of Computer Science, Foundation for Research and Technology (FORTH), Greece
    • Uri Blumenthal – MIT Lincoln Laboratory, MIT, USA
    • Nick Savage – University of Portsmouth, UK

    • Uwe Glässer – School of Computing Science, Simon Fraser University, Canada
    • Manish Gupta – State University of New York, Buffalo, NY, USA
    • Andrew Lenaghan – Oxford University, UK

    • Xuan Zhao – Cylance, California, USA
    • Gareth Niblett – BCS Information Security Specialist Group (ISSG), UK
    • Daniel Zeng – University of Arizona, USA

    • Xavier Bellekens – University of Abertay, Scotland, UK
    • Cyril Onwubiko – Centre for Multidisciplinary Research, Innovation and Collaboration, UK

    • Uri Blumenthal – MIT Lincoln Laboratory, MIT, USA
    • Kirankumar S. Akate – Government Institute of Forensic Science, Aurangabad, India
    • Jens Myrup Pedersen – University of Aalborg, Denmark
    • Uwe Glässer – School of Computing Science, Simon Fraser University, Canada
    • Anthony Davies – IEEE
    • Thomas Owens – Brunel University, London, UK
    • Reza Tadayoni – University of Aalborg, Denmark
    • Subrata Acharya – Towson University, USA
    • Marios Anagnostopoulos – University of the Aegean, Greece
    • Erik Blasch – Fusion Evaluation & Air Force Research LaboratoryUSA
    • Wei Yu – Towson University, USA
    • Ciza Thomas – College of Engineering, India
    • Stefanos Gritzalis – University of the Aegean, Greece
    • Bechara Al Bouna – Science University, Lebenanon
    • Janne Merete Hagen – Norwegian Defence Research Establishment, Norway
    • Varun Dutt – Indian Institute of Technology Mandi, India
    • Cleotilde Gonzalez – Carnegie Mellon University, USA
    • Khidir M. Ali – Jubail University College, Kingdom of Saudi Arabia
    • Katherine Hamilton – Penn State University, USA
    • Xinyu Yang –  Xi’an Jiaotong University, China
    • Jie Lin – Xi’an Jiaotong University, China
    • Georgios Kambourakis – University of the Aegean, Greece
    • Gerardo I. Simari – Universidad Nacional del Sur in Bahia Blanca and CONICET, Argentina
    • Pierre Parrend –  ECAM Strasbourg-Europe, France
    • Abdullahi Arabo –  University of the West of England (UWE), Bristol, UK
    • Veena Desai – Gogte Institute of Technology, Belgaum, India
    • Azah Norman – University of Malaya, Kuala Lumpur, Malaysia


Conference Programme


    • Abdulrahman Alruban, Nathan Clarke, Fudong Li and Steven Furnell. “Proactive Biometric-Enabled Forensic Imprinting
    • Mary Geddes and Pooneh Bagheri Zadeh. “Forensic Analysis of Private Browsing” (Extended Abstract / WIP)
    • Aisha Abubakar, Pooneh Bagheri Zadeh, Richard Howley and Helge Janicke. “Root Cuase Analysis (RCA) as a Preliminary Tool into the Investigation of Identity Theft” (WIP)
    • Taolue Chen, Tingting Han, Florian Kammueller, Ibrahim Nemli and Christian Probst. “Model Based Analysis of Insider Threats” (Extended Abstract)

    • Philip Legg. “Enhancing Cyber Situation Awareness for Non-Expert Users using Visual Analytics
    • Samir Puuska, Matti J. Kortelainen, Viljami Venekoski and Jouko Vankka. “Instant Message Classification in Finnish Cyber Security -Themed Free-Form Discussion
    • Yoram Golandsky. “Cyber Crisis Management, Survival or Extinction?
    • Joe Burton. “Cyber Attacks and Maritime Situational Awareness: Evidence from Japan and Taiwan
    • Jan Ahrend, Marina Jirotka and Kevin Jones. “On the Collaborative Practices of Cyber Threat Intelligence Analysts to Develop and Utilize Tacit Threat and Defence Knowledge
    • Eliana Stavrou and Andreas Pitsillides. “Situation aware intrusion recovery policy in WSNs
    • Michael Davies and Menisha Patel. “Are we managing the risk of sharing Cyber Situational Awareness – A UK Public Sector Case Study
    • Radu-Stefan Pirscoveanu, Matija Stevanovic and Jens Myrup Pedersen. “Clustering Analysis of Malware Behavior using Self Organizing Map
    • Mahesh Bang and Himanshu Saraswat. “Building an effective and efficient continuous Web Application Security Program
    • Xavier Bellekens, Preetila Seeam, Quentin Franssen, Andrew Hamilton, Kamila Nieradzinska and Amar Seeam. “Pervasive eHealth Services A Security and Privacy Risk Awareness Survey
    • Mohamed Chahine Ghanem and Deepthi N. Ratnayake. “Enhancing WPA2-PSK four-way handshaking after re-authentication to deal with de-authentication followed by brute-force attack A novel re-authentication protocol
    • Filippo Sanfilippo. “A Multi-Sensor System for Enhancing Situational Awareness in Offshore Training
    • Palvi Aggarwal, Cleotilde Gonzalez and Varun Dutt. “Looking from the Hacker’s Perspective: Role of Deceptive Strategies in Cyber Security
    • Zahid Maqbool, V.S. Chandrasekhar Pammi and Varun Dutt. “Cybersecurity: Effect of Information Availability in Dynamic Security Games
    • Roman Graf, Florian Skopik and Kenny Whitebloom. “A Decision Support Model for Situational Awareness in National Cyber Operations Centers
    • Shruti Kohli. “Developing Cyber Security Asset Management framework for UK Rail

    • Ryan Heartfield and George Loukas. “Evaluating the reliability of Users as Human Sensors of Social Media Security Threats
    • Jennifer Cole, Chris Watkins and Dorothea Kleine. “Internet Discussion Forums: Maximizing Choice in Health-seeking Behaviour During Public Health Emergencies
    • Paul Baxter and Trevor Wood. “Generating Insight from Data

    • Gaofeng Zhang, Paolo Falcarin, Elena Gómez-Martínez, Christophe Tartary, Shareeful Islam, Bjorn De Sutter and Jerome D’annoville. “Attack Simulation based Software Protection Assessment Method for Protection Optimisation
    • Mohammed Alzaylaee, Suleiman Yerima and Sakir Sezer. “DynaLog: An Automated Dynamic Analysis Framework for characterizing Android Applications
    • Louai Maghrabi, Eckhard Pfluegel and Senna Fathima Noorji. “Designing Utility Functions for Game-Theoretic Cloud Security Assessment: A Case for Using the Common Vulnerability Scoring System
    • Kamile Nur Sevis and Ensar Seker. “Cyber Warfare: Terms, Issues, Laws and Controversies
    • Thomas Mundt and Peter Wickboldt. “Security in building automation systems – A first analysis
    • Fara Yahya, Robert Walters and Gary Wills. “Goal-Based Security Components for Cloud Storage Security Framework: A Preliminary Study
    • Dylan Smyth, Victor Cionca, Sean McSweeney and Donna O’Shea. “Exploiting Pitfalls in Software-Defined Networking Implementation
    • Boojoong Kang, Suleiman Yerima, Kieran Mclaughlin and Sakir Sezer. “N-opcode Analysis for Android Malware Classification and Categorization
    • Muhammad Aminu Ahmad, Steve Woodhead and Diane Gan. “A Countermeasure Mechanism for Fast Scanning Malware
    • Andrea Cullen and Lorna Armitage. “The Social Engineering Attack Spiral (SEAS)
    • Catrin Burrows and Pooneh Bagheri Zadeh. “A Mobile Forensic Investigation into Steganography
    • Egon Kidmose, Matija Stevanovic and Jens Myrup Pedersen. “Correlating intrusion detection alerts on bot malware infections using neural network
    • Zbigniew Hulicki. “The IM System with a Cryptographic Feature
    • Reza Montasari, Pekka Peltola and Victoria Victoria Carpenter. “Gauging the Effectiveness of Computer Misuse Act in Dealing with Cybercrimes
    • Tomáš Sochor, Matej Zuzčák and Petr Bujok. “Statistical Analysis of Attacking Autonomous Systems
    • Marcelo Fontenele and Lily Sun. “Knowledge management of cyber security expertise: an ontological approach to talent discovery
    • Cyril Onwubiko. “Exploring Web Analytics to enhance Cyber Situational Awareness for the Protection of Online Web Services


Previous Conferences