Cyber Security 2016

June 13-14, 2016, London, UK






Call for Papers

IEEE is the Technical Co-Sponsor (TCS) of the International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2016), an international refereed conference dedicated to the advancement of Cyber Security, information security, network security, application security and business transformation of digital services, and the protection of public digital services, especially high value bearing online services.

The aim of the Cyber Security 2016 is to encourage participation and promotion of collaborative scientific, industrial and academic inter-workings among individual researchers, practitioners, members of existing associations, academia, standardisation bodies, and including government departments and agencies. The purpose is to build bridges between academia and industry, and to encourage interplay of different culture.




Submission Deadline

Deadline for all paper submissions, that is, both full papers and extended abstracts for Poster, WIP, PoC, Research Idea and PhD Seminar presentations is 26th February 2016.

All Industry track, Work in Progress track, Research Ideas track and PhD Seminar track will be published in the conference proceedings. Interested participants, please submit your proposal using the online submission system hosted by Easychair Conference Portal.

Full paper submission should be via Easychair Conference Portal.





Topics of Interest


    • Information Security
    • Computer Network Security
    • Application Security
    • Web Services Security
    • Mobile Security
    • Protective Security
    • Software Security
    • Wireless & Sensor Network Security
    • Software Coding Security
    • Barcode Scanner Security
    • Security in Middleware, Interface and Interaction
    • Security Services in Authentication, Authorisation, Accountability, Automation, Availability, Integrity and Nonrepudiation
    • Security Management
    • Security Operations
    • Digital Trust and Reputation
    • Geographical Location (IP Geolocation) and Cyber Travel
    • Geospatial Intelligence Networks (Centralised, Distributed & Hybrid)
    • Policy, Legal, Legislation & Compliance
    • Security Standardisation
    • Law, Legal and Ethics

    • Web Services
    • Internet Banking
    • E-Booking
    • Cloud Computing
    • E-Government
    • Electronic Commerce
    • Citizens Public Online Services
    • Mobile Commerce
    • E-Postal Services
    • E-Health
    • Online & Virtual Education
    • E-Learning
    • Web Chats
    • Secure Protocols, Coding and Development
    • Security Principles, Theory and Analysis
    • Security Policy, Standards and Procedures
    • Security in Business Processes
    • Security Enforcing Function (SEF) Gateways
    • Intrusion Detection Systems
    • Intrusion Prevention Systems
    • Firewalls
    • Anti-Virus and Anti-Malware Gateways
    • Data Loss Prevention
    • Encryption Services

    • Protection of Business Information Systems
    • Protection of Online Services
    • Public Online Services
    • Internet Banking
    • Security, Trust, Privacy
    • Security in Online Gaming Systems
    • Security in e-Government and Electoral Systems
    • Content Security
    • Protection of Public Online Content Distribution Systems
    • Secure practices, processes and procedures in Public Online Services
    • Cryptography  –  PKI, HSMs, Symmetric and Asymmetric Crypto, Crypto Custodian & Crypto Standards and Practices
    • Digital Forensics and Investigations
    • HoneyPots and Honey Nets
    • Critical National Infrastructures (CNIs)
    • Critical Network Systems (CNS)


Speakers

Dr. Thomas Owens

Dr. Thomas Owens

Brunel University,London,UK
Professor Olav Lysne

Professor Olav Lysne

Centre for Resilient Networks and Applications (CRNA), Simula, Norway
Dr. Andrew Lenaghan

Dr. Andrew Lenaghan

The Oxford University CERT (OxCERT), Oxford, UK
Dr. Syed Naqvi

Dr. Syed Naqvi

Cyber Security and Forensics, Birmingham City University, Birmingham, UK
Dr. Janne Hagen

Dr. Janne Hagen

Norwegian Water Resources and Energy Directorate (NVE), Norway
Professor Ali Hessami

Professor Ali Hessami

FRSA – Chair, IEEE United Kingdom & Republic of Ireland
Dr. Nick Savage

Dr. Nick Savage

School of Computing, University of Portsmouth, Portsmouth, UK
Professor Frank Wang

Professor Frank Wang

School of Computing, University of Kent, UK

Important Dates


    Industry (Proof of Concept / Pilot) Submission –  February 26, 2016 March 11, 2016

    Extended Abstract (Work in Progress) – February 26, 2016 March 11, 2016

    PhD Seminar Submissions – February 26, 2016 March 11, 2016

    Research Ideas – February 26, 2016 March 11, 2016

    Poster/Demo Submissions – February 26, 2016 March 11, 2016

    Special Track Submissions – February 26, 2016 March 11, 2016

    Workshops and Tutorials Submission – February 26, 2016 March 11, 2016

    Full Paper Submissions – February 26, 2016 March 11, 2016

    Notification of Full Paper/Abstract / Special Track Acceptance/Rejection – March 25, 2016

    Camera Ready Paper Due – April 8, 2016

    Participants Registration – March 25 – May 25, 2016

    Conference Date – 13 & 14 June 2016


Location


London
United Kingdom



Programme Committee


    • Cyril Onwubiko – Centre for Multidisciplinary Research, Innovation and Collaboration, UK
    • Thomas Owens – Brunel University, London, UK

    • Eckhard Pfluegel  –  Faculty of Science, Engineering and Computing, Kingston University, UK
    • Nick Savage – University of Portsmouth, UK
    • Janne Merete Hagen – Norwegian Defence Research Establishment, Norway
    • Karim Ouazzane  – School of Computing, London Metropolitan University, London, UK

    • Andrew Lenaghan – Oxford University, UK
    • Uri Blumenthal  –  MIT Lincoln Laboratory, MIT, USA

    • Phil Legg  – University of the West of England, UK
    • Gareth Niblett – BCS Information Security Specialist Group (ISSG), UK
    • Daniel Zeng – University of Arizona, USA

    • Xavier Bellekens – University of Abertay, Scotland, UK
    • Cyril Onwubiko – Centre for Multidisciplinary Research, Innovation and Collaboration, UK

    • Peter Komisarczuk –  Royal Holloway, University of London, London, UK
    • Deepthi Ratnayake  – London Metropolitan University, London, UK
    • Nilay Mistry  – Gujarat Forensic Sciences University, India
    • Reza Tadayoni – University of Aalborg, Denmark
    • Uwe Glässer –  School of Computing Science, Simon Fraser University, Canada
    • Manish Gupta –  State University of New York, Buffalo, NY, USA
    • Reza Tadayoni – University of Aalborg, Denmark
    • Anthony Davies – IEEE UK & Republic of Ireland, IEEE
    • Gerardo I. Simari – Universidad Nacional del Sur in Bahia Blanca and CONICET, Argentina
    • Thomas Owens – Brunel University, London, UK
    • Jens Myrup Pedersen – University of Aalborg, Denmark
    • Andrew Lenaghan – Flawless Money, Manchester, UK
    • Chris Tait – Layer 7 Technologies, UK
    • Peter J. Hawrylak – The University of Tulsa, USA
    • Subrata Acharya – Towson University, USA
    • Marios Anagnostopoulos – University of the Aegean, Greece
    • Yi Luo – University of Arizona, Tucson, USA
    • Erik Blasch – Fusion Evaluation & Air Force Research LaboratoryUSA
    • Sotiris Ioannidis – The Institute of Computer Science, Foundation for Research and Technology (FORTH), Greece
    • Wei Yu – Towson University, USA
    • Uri Blumenthal – MIT Lincoln Laboratory, MIT, USA
    • Gerald O’Leary – MIT Lincoln Laboratory, MIT, USA
    • Ciza Thomas – College of Engineering, India
    • Stefanos Gritzalis – University of the Aegean, Greece
    • Mike Tyworth –  The Pennsylvania State University, USA
    • Eric X. McMillan – The Pennsylvania State University, USA
    • Bechara Al Bouna – Science University, Lebanon
    • Janne Merete Hagen – Norwegian Defence Research Establishment, Norway
    • Varun Dutt – Indian Institute of Technology Mandi, India
    • Cleotilde Gonzalez – Carnegie Mellon University, USA
    • Khidir M. Ali – Jubail University College, Kingdom of Saudi Arabia
    • Katherine Hamilton – Penn State University, USA
    • Xinyu Yang –  Xi’an Jiaotong University, China
    • Jie Lin – Xi’an Jiaotong University, China
    • Georgios Kambourakis – University of the Aegean, Greece
    • Elisavet Konstantinou – University of the Aegean, Greece
    • Alexandros Kapravelos – Computer Security Group, University of California Santa Barbara
    • Kirankumar S. Akate –  Government Institute of Forensic Science, Aurangabad, India
    • Chinazunwa Uwaoma – Faculty of Science and Technology, The University of the West Indies, Jamaica
    • Theo Dimitrakos  – Security Futures Practice, BT Research & Technology, UK
    • Pierre Parrend –  ECAM Strasbourg-Europe, France
    • Abdullahi Arabo –  University of the West of England (UWE), Bristol, UK
    • Veena Desai – Gogte Institute of Technology, Belgaum, India
    • Azah Norman – Faculty of Computer Science and Information Technology, University of Malaya, Kuala Lumpur, Malaysia
    • Antonis Mouhtaropoulos – Department of Computer Science, University of Warwick, Coventry, UK
    • Paul Fennell – MPS, UK
    • Kingsley Ukaoha – University of Benin, Nigeria
    • Dawuda Alhassan – Tomas Bata University, Zlin, Czech Republic
    • Laribi Boualem – University of Djillali, Bounaama, Algeria
    • Md Ruhul Islam – Sikkim Manipal University India
    • Sujoy Sarkar – IEEE, India
    • Scott Cadzow – Cadzow Communications Consulting Ltd, UK
    • Dalal Azizy – University of Southampton, UK
    • Rauf Malick – DHA Suffa University, Pakistan
    • Xuan Zhao – Cylance, California, USA
    • Amar K. Seeam – Middlesex University (Mauritius Branch Campus), Vacoas, Mauritius


Conference Programme


    • Gaofeng Zhang, Paolo Falcarin, Elena Gómez-Martínez, Christophe Tartary, Shareeful Islam, Bjorn De Sutter and Jerome D’annoville. “Attack Simulation based Software Protection Assessment Method for Protection Optimisation
    • Mohammed Alzaylaee, Suleiman Yerima and Sakir Sezer. “DynaLog: An Automated Dynamic Analysis Framework for characterizing Android Applications
    • Louai Maghrabi, Eckhard Pfluegel and Senna Fathima Noorji. “Designing Utility Functions for Game-Theoretic Cloud Security Assessment: A Case for Using the Common Vulnerability Scoring System
    • Kamile Nur Sevis and Ensar Seker. “Cyber Warfare: Terms, Issues, Laws and Controversies
    • Thomas Mundt and Peter Wickboldt. “Security in building automation systems – A first analysis
    • Fara Yahya, Robert Walters and Gary Wills. “Goal-Based Security Components for Cloud Storage Security Framework: A Preliminary Study
    • Dylan Smyth, Victor Cionca, Sean McSweeney and Donna O’Shea. “Exploiting Pitfalls in Software-Defined Networking Implementation
    • Boojoong Kang, Suleiman Yerima, Kieran Mclaughlin and Sakir Sezer. “N-opcode Analysis for Android Malware Classification and Categorization
    • Muhammad Aminu Ahmad, Steve Woodhead and Diane Gan. “A Countermeasure Mechanism for Fast Scanning Malware
    • Andrea Cullen and Lorna Armitage. “The Social Engineering Attack Spiral (SEAS)
    • Catrin Burrows and Pooneh Bagheri Zadeh. “A Mobile Forensic Investigation into Steganography
    • Egon Kidmose, Matija Stevanovic and Jens Myrup Pedersen. “Correlating intrusion detection alerts on bot malware infections using neural network
    • Zbigniew Hulicki. “The IM System with a Cryptographic Feature
    • Reza Montasari, Pekka Peltola and Victoria Carpenter. “Gauging the Effectiveness of Computer Misuse Act in Dealing with Cybercrimes
    • Tomáš Sochor, Matej Zuzčák and Petr Bujok. “Statistical Analysis of Attacking Autonomous Systems
    • Marcelo Fontenele and Lily Sun. “Knowledge management of cyber security expertise: an ontological approach to talent discovery
    • Cyril Onwubiko. “Exploring Web Analytics to enhance Cyber Situational Awareness for the Protection of Online Web Services

    • Abdulrahman Alruban, Nathan Clarke, Fudong Li and Steven Furnell. “Proactive Biometric-Enabled Forensic Imprinting
    • Mary Geddes and Pooneh Bagheri Zadeh. “Forensic Analysis of Private Browsing” (Extended Abstract / WIP)
    • Aisha Abubakar, Pooneh Bagheri Zadeh, Richard Howley and Helge Janicke. “Root Cuase Analysis (RCA) as a Preliminary Tool into the Investigation of Identity Theft” (WIP)
    • Taolue Chen, Tingting Han, Florian Kammueller, Ibrahim Nemli and Christian Probst. “Model Based Analysis of Insider Threats” (Extended Abstract)

    • Philip Legg. “Enhancing Cyber Situation Awareness for Non-Expert Users using Visual Analytics
    • Samir Puuska, Matti J. Kortelainen, Viljami Venekoski and Jouko Vankka. “Instant Message Classification in Finnish Cyber Security -Themed Free-Form Discussion
    • Yoram Golandsky. “Cyber Crisis Management, Survival or Extinction?
    • Joe Burton. “Cyber Attacks and Maritime Situational Awareness: Evidence from Japan and Taiwan
    • Jan Ahrend, Marina Jirotka and Kevin Jones. “On the Collaborative Practices of Cyber Threat Intelligence Analysts to Develop and Utilize Tacit Threat and Defence Knowledge
    • Eliana Stavrou and Andreas Pitsillides. “Situation aware intrusion recovery policy in WSNs
    • Michael Davies and Menisha Patel. “Are we managing the risk of sharing Cyber Situational Awareness – A UK Public Sector Case Study
    • Radu-Stefan Pirscoveanu, Matija Stevanovic and Jens Myrup Pedersen. “Clustering Analysis of Malware Behavior using Self Organizing Map
    • Mahesh Bang and Himanshu Saraswat. “Building an effective and efficient continuous Web Application Security Program
    • Xavier Bellekens, Preetila Seeam, Quentin Franssen, Andrew Hamilton, Kamila Nieradzinska and Amar Seeam. “Pervasive eHealth Services A Security and Privacy Risk Awareness Survey
    • Mohamed Chahine Ghanem and Deepthi N. Ratnayake. “Enhancing WPA2-PSK four-way handshaking after re-authentication to deal with de-authentication followed by brute-force attack A novel re-authentication protocol
    • Filippo Sanfilippo. “A Multi-Sensor System for Enhancing Situational Awareness in Offshore Training
    • Palvi Aggarwal, Cleotilde Gonzalez and Varun Dutt. “Looking from the Hacker’s Perspective: Role of Deceptive Strategies in Cyber Security
    • Zahid Maqbool, V.S. Chandrasekhar Pammi and Varun Dutt. “Cybersecurity: Effect of Information Availability in Dynamic Security Games
    • Roman Graf, Florian Skopik and Kenny Whitebloom. “A Decision Support Model for Situational Awareness in National Cyber Operations Centers
    • Shruti Kohli. “Developing Cyber Security Asset Management framework for UK Rail

    • Ryan Heartfield and George Loukas. “Evaluating the reliability of Users as Human Sensors of Social Media Security Threats
    • Jennifer Cole, Chris Watkins and Dorothea Kleine. “Internet Discussion Forums: Maximizing Choice in Health-seeking Behaviour During Public Health Emergencies
    • Paul Baxter and Trevor Wood. “Generating Insight from Data


Previous Conferences