Cyber Incident 2017

June 11-12, 2017, London, UK






Call for Papers

 

IEEE is the Technical Co-Sponsor (TCS) of the International Conference on Cyber Incident Response, Coordination, Containment & Control (Cyber Incident 2017) is an international refereed conference dedicated to the advancement of Cyber Incident Response, Coordination, Containment and Control.

The aim of the Cyber Incident 2017 is to encourage participation and promotion of collaborative scientific, industrial and academic inter-workings among individual researchers, practitioners, members of existing associations, academia, standardisation bodies, and including government departments and agencies. The purpose is to build bridges between academia and industry, and to encourage interplay of different cultures




Submission Deadline

Due to numerous requests, the deadline for all paper submissions, that is, both full papers and extended abstracts for Poster, WIP, PoC, Research Idea and PhD Seminar presentations has now been extended to 28th February 2017.

All Industry track, Work in Progress track, Research Ideas track and PhD Seminar track will be published in the conference proceedings. Interested participants, please submit your proposal using the online submission system hosted by Easychair Conference Portal.

Full paper submission should be via Easychair Conference Portal





Topics of Interest


    • Cyber Incident Analysis
    • Cyber Incident Triage
    • Cyber Incident Correlation and Assessment
    • Coordination
    • Containment
    • Root Cause Analysis (RCA)
    • Timeliness
    • Handling and Handling Process
    • Reporting
    • Escalation
    • Cyber Incident Management

    • Decision Control
    • Emergence Services
    • Preparedness
    • Readiness
    • Analysis
    • Risk Management
    • Conditionality
    • Proportionality
    • Prioritisation
    • Decision Making
    • Risk-Based Decision
    • Human in the Loop

    • Training
    • Processes and Procedures
    • Policy and Standards
    • Emergency  Services
    • Chain of Custody
    • Forensic Readiness and Investigations
    • Cyber Incident Notification and Announcements
    • Cyber Incident Management Tool
    • Standardisation
    • Framework and Methodology
    • Expertise, Skills, Knowledge and Resource
    • Maturity Model and Goal Setting
    • Certification and Accreditation
    • Memberships to Cyber Incident Responders, Incident Response Organisation

    • Rule-Based Systems
    • Expert Systems
    • Adaptive Learning Systems
    • Predictive Systems
    • The use of Biometrics to aid Forensic Investigations
    • Speak, audio and voice Recognition for forensics
    • Correlation and cross-correlation for Incident Analysis
    • Cross-Domain Analysis
    • Cross-Channel Incident Analysis
    • Multi-domain Analysis


Speakers

Dr. Andrew LenaghanOwner

Dr. Andrew LenaghanOwner

The Oxford University CERT (OxCERT), Oxford, UK
Dr. Eckhard Pfluegel Science

Dr. Eckhard Pfluegel Science

Science, Engineering & Computing, Kingston University, London, UK
Dr Mahmoud Hashem Eiza

Dr Mahmoud Hashem Eiza

School of Physical Sciences and Computing, University of Central Lancashire, Preston, UK
Professor Kevin Curran

Professor Kevin Curran

Computer Science, Ulster University, Northern Ireland, UK
Dr. Cyril Onwubiko

Dr. Cyril Onwubiko

Cyber Security Intelligence, Research Series Limited, London, UK
Dr. Janne Hagen

Dr. Janne Hagen

Norwegian Water Resources and Energy Directorate (NVE), Norway

Important Dates


    Industry (Proof of Concept / Pilot) Submission –  January 14, 2017 extended to February 28, 2017

    Extended Abstract (Work in Progress) – January 14, 2017 extended to February 28, 2017

    PhD Seminar Submissions – January 14, 2017 extended to February 28, 2017

    Research Ideas – January 14, 2017 extended to February 28, 2017

    Poster/Demo Submissions – January 14, 2017 extended to February 28, 2017

    Special Track Submissions – January 14, 2017 extended to February 28, 2017

    Workshops and Tutorials Submission – January 14, 2017 extended to February 28, 2017

    Full Paper Submissions – January 14, 2017 extended to February 28, 2017

    Notification of Full Paper/Abstract / Special Track Acceptance/Rejection – March 24, 2017 extended to March 31, 2017

    Camera Ready Paper Due – April 8, 2017 extended to April 14, 2017

    Participants Registration – March 20 – May 25, 2017

    Conference Date – 19 & 20 June 2017


Location


London
United Kingdom



Programme Committee


    • Antti Evesti, Teemu Kanstrén and Tapio Frantti. “Cybersecurity Situational Awareness Taxonomy”
    • Eliana Stavrou. “A situation-aware user interface to assess users’ ability to construct strong passwords: A conceptual architecture”
    • Natalie Nakhla, Kathryn Perrett and Christopher McKenzie. “Automated Computer Network Defence using ARMOUR: Mission-oriented decision support and vulnerability mitigation”
    • Marianne Junger, Lorena Montoya, Pieter Hartel and Maliheh Heydari. “Towards the normalization of crime victimization: A routine activities analysis of cybercrime in Europe”
    • Aunshul Rege, Zoran Obradovic, Nima Asadi, Brian Singer, Nicholas Masceri and Quinn Heath. “A Temporal Assessment of Cyber Intrusion Chains Using Multidisciplinary Frameworks and Methodologies”
    • Patrik Lif, Magdalena Granåsen and Teodor Sommestad. “Development and validation of technique to measure cyber situation awareness”
    • Arnau Erola, Ioannis Agrafiotis, Jassim Happa, Michael Goldsmith, Sadie Creese and Philip Legg. “Improving semi-automated network defences by correlating heterogeneous data sources”
    • Boniface Kayode Alese, Aderonke Favour-Bethy Thompson and Patricia Yetunde Oni. “A Location Privacy System in Mobile Network Using Game Theory”
    • Palvi Aggarwal, Cleotilde Gonzalez and Varun Dutt. “Modeling the Effects of Amount and Timing of Deception in Simulated Network Scenarios”
    • Lynsay Shepherd, Jacqueline Archibald and Robert Ian Ferguson. “Security Awareness and Affective Feedback: Categorical Behaviour vs. Reported Behaviour”
    • Outi-Marja Latvala, Tommi Keränen, Sami Noponen, Niko Lehto, Mirko Sailio, Mikko Valta and Pia Olli. “Visualising network events in a muggle friendly way”
    • Boniface Kayode Alese, Abimbola Akinledele, Folasade M. Dahunsi, Aderonke Favour-Bethy Thompson and Tosin Adesuyi. “A Graphic-based Cryptographic Model for Authentication”
    • David Brosset, Yvon Kermarrec, Pedro Merino Laso, Benjamin Costé and Camille Cavelier. “Cr@ck3n: a cyber alerts visualization object”
    • Pablo Casais Solano and Antonio José Reinoso Peinado. “Socioeconomic factors in Cybercrime”
    • Anthony Arrott, Ivan Macalintal and Ian McMillan. “For cloud services on a user’s multiple devices, how do we measure the trusted zone defended by anti-malware?”
    • Elochukwu Ukwandu, William Buchanan and Gordon Russell. “Performance Evaluation of a Fragmented Secret Share System”
    • Gavin Hales. “Visualisation of Device Datasets to Assist Digital Forensic Investigation”
    • Scott Donaldson, Natalie Coull and David Mcluskie. “A Methodology for Testing Virtualization Security”
    • Sumaia Sabouni, Andrea Cullen and Lorna Armitage. “A Preliminary Radicalisation Framework Based on Social Engineering Techniques”
    • Martyn Weedon, Dimitris Tsaptsinos and James Denholm-Price. “Random Forest Explorations for URL Classification”
    • Ruth Ikwu. “A Multi-dimensional Structural Approach to Proactive Cyber Defence”
    • Anthony Arrott and William Kam. “Measuring cloud-based anti-malware protection for Office 365 user accounts “

    • Taniya Bhatia and Rishabh Kaushal. “Malware Detection in Android based on Dynamic Analysis”
    • Daniel Fraunholz, Daniel Krohmer, Simon Duque Antón and Hans Dieter Schotten. “Investigation of Cyber Crime Conducted by Abusing Weak or Default Passwords with a Medium Interaction Honeypot”
    • Mohammed Alzaylaee, Suleiman Yerima and Sakir Sezer. “Improving Dynamic Analysis of Android Apps Using Hybrid Test Input Generation”
    • Feng Yao, Suleiman Yerima, Boojoong Kang and Sakir Sezer. “Continuous Implicit Authentication for Mobile Devices based on Adaptive Neuro-Fuzzy Inference System”
    • Stephen Singam. “Securing an US$ 2.8B Digital Asset: The movie – Avatar”
    • Louai Maghrabi, Eckhard Pfluegel, Luluwah Al-Fagih, Roman Graf, Florian Skopik and Giuseppe Settanni. “Improved Software Vulnerability Patching Techniques Using CVSS and Game Theory”
    • Yassine Lemmou and El Mamoun Souidi. “PrincessLocker analysis”
    • Kamalakanta Sethi, Amartya Majumdar and Padmalochan Bera. “A Novel Implementation of Parallel Homomorphic Encryption for Secure Data Storage in Cloud”
    • Yuanyuan Grace Zeng. “Identifying Email Threats Using Predictive Analysis”
    • Michelle Omoogun, Preetila Seeam, Visham Ramsurrun, Xavier Bellekens and Amar Seeam. “When eHealth Meets the Internet of Things: Pervasive Security and Privacy Challenges”
    • Vahid Moula and Salman Niksefat. “ROPK++: An enhanced ROP attack detection framework for Linux operating system”
    • Tianhui Meng, Zhihao Shang and Katinka Wolter. “An Empirical Performance and Security Evaluation of Android Container Solutions”
    • Clement Guitton. “Foiling Cyber Attacks”
    • Amala Rajan, Rejitha Ravikumar and Mariam Mohammed Al-Shaer. “UAE Cybercrime Law and Cybercrimes – An Analysis”

    • Jasmina Maric. “The Valleys of Death in Refugee Crisis”
    • Amit Walinjkar and John Woods. “ECG Classification and Prognostic Approach towards Personalized Healthcare”
    • Rana Maher, David Malone and Marie Wallace. “The Impact of Interaction and Algorithm Choice on Identified Communities”
    • Waleed Alabbas, Haider Al-Khateeb, Ali Mansour, Gregory Epiphaniou and Ingo Frommholz. “Classification of Colloquial Arabic Tweets in real-time to detect high-risk floods”
    • Karim Grissa. “How the ‘Uses and Gratifications’ Theory explains the usage of Professional Networking Sites (e.g LinkedIn, Viadeo, Xing, skilledAfricans): Comparison between individual members and company members”
    • Anja Corduan. “Social Media as instrument for customer communications – a comparison of companies in East Asia, Western Europe and the US”

    • Scott Miserendino, Corey Maynard and Jacob Davis. “ThreatVectors: Contextual workflows and visualizations for rapid cyber event triage”
    • Trung Nguyen Hoang. “Robust Anti-swing Control of 3D Crane System using GA-Fuzzy”
    • Mohamed Amoud and Ounsa Roudies. “Dynamic Adaptation and Reconfiguration of Security in Mobile Devices”
    • Alexandria Farár, Hayretdin Bahsi and Bernhards Blumbergs. “A Case Study About the Use and Evaluation of Cyber Deceptive Methods Against Highly Targeted Attacks”

    • Xavier Bellekens – University of Abertay, Scotland, UK
    • Cyril Onwubiko – Centre for Multidisciplinary Research, Innovation and Collaboration, UK

    • Uri Blumenthal – MIT Lincoln Laboratory, MIT, USA
    • Dimitrios Papamartzivanos –  University of the Aegean, Greece
    • Emin Tatli – Türk Telekom R&D Technology Center, Istanbul, Turkey
    • Shahid Shabbir – School of Computing and Digital Technology, Birmingham City University, UK
    • Kirankumar S. Akate – Government Institute of Forensic Science, Aurangabad, India
    • Jens Myrup Pedersen – University of Aalborg, Denmark
    • Uwe Glässer – School of Computing Science, Simon Fraser University, Canada
    • Anthony Davies – IEEE UK & Ireland, IEEE
    • Marco Ivan Ramirez Sosa Moran – Faculty of Science and Technology, University of Westminster, London, UK
    • Lai Bun Lok  –  IEEE UK & Ireland, IEEE
    • Matthew Gream – IEEE UK & Ireland, IEEE
    • Frederick Wamala – Security Architecture & Cyber Security, IBM, UK
    • Thomas Owens – Brunel University, London, UK
    • Reza Tadayoni – University of Aalborg, Denmark
    • Subrata Acharya – Towson University, USA
    • Marios Anagnostopoulos – University of the Aegean, Greece
    • Erik Blasch – Fusion Evaluation & Air Force Research LaboratoryUSA
    • Wei Yu – Towson University, USA
    • Ciza Thomas – College of Engineering, India
    • Stefanos Gritzalis – University of the Aegean, Greece
    • Bechara Al Bouna – Science University, Lebenanon
    • Janne Merete Hagen – Norwegian Defence Research Establishment, Norway
    • Varun Dutt – Indian Institute of Technology Mandi, India
    • Cleotilde Gonzalez – Carnegie Mellon University, USA
    • Khidir M. Ali – Jubail University College, Kingdom of Saudi Arabia
    • Katherine Hamilton – Penn State University, USA
    • Xinyu Yang –  Xi’an Jiaotong University, China
    • Jie Lin – Xi’an Jiaotong University, China
    • Georgios Kambourakis – University of the Aegean, Greece
    • Gerardo I. Simari – Universidad Nacional del Sur in Bahia Blanca and CONICET, Argentina
    • Pierre Parrend –  ECAM Strasbourg-Europe, France
    • Abdullahi Arabo –  University of the West of England (UWE), Bristol, UK
    • Veena Desai – Gogte Institute of Technology, Belgaum, India
    • Azah Norman – University of Malaya, Kuala Lumpur, Malaysia
    • Eliana Stavrou – Computing Department, UCLan Cyprus, Larnaca, Cyprus
    • Reza Montasari – Computing and Mathematics, University of Derby, Derby, UK
    • Tim D Williams – Cyber Security, London, UK
    • Richard Hill – Department of Computing and Mathematics, University of Derby, Derby, UK
    • Fatih Kurugollu – Cyber Security, University of Derby, Derby, UK
    • Kees Leune –  Cybersecurity and privacy, and Internet Of Things (IoT), Adelphi University, USA
    • Daniel Schatz – Cyber Incident Response, UK


Previous Conferences