Cyber Security 2017

June 11-12, 2017, London, UK






Call for Papers

IEEE is the Technical Co-Sponsor (TCS) of the International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2017), an international refereed conference dedicated to the advancement of Cyber Security, information security, network security, application security and business transformation of digital services, and the protection of public digital services, especially high value bearing online services.

The aim of the Cyber Security 2017 is to encourage participation and promotion of collaborative scientific, industrial and academic inter-workings among individual researchers, practitioners, members of existing associations, academia, standardisation bodies, and including government departments and agencies. The purpose is to build bridges between academia and industry, and to encourage interplay of different culture




Submission Deadline

Due to numerous requests, the deadline for all paper submissions, that is, both full papers and extended abstracts for Poster, WIP, PoC, Research Idea and PhD Seminar presentations has now been extended to 28th February 2017.

All Industry track, Work in Progress track, Research Ideas track and PhD Seminar track will be published in the conference proceedings. Interested participants, please submit your proposal using the online submission system hosted by Easychair Conference Portal.

Full paper submission should be via Easychair Conference Portal





Topics of Interest


    • Information Security
    • Computer Network Security
    • Application Security
    • Web Services Security
    • Mobile Security
    • Protective Security
    • Software Security
    • Wireless & Sensor Network Security
    • Software Coding Security
    • Barcode Scanner Security
    • Security in Middleware, Interface and Interaction
    • Security Services in Authentication, Authorisation, Accountability, Automation, Availability, Integrity and Nonrepudiation
    • Security Management
    • Security Operations
    • Digital Trust and Reputation
    • Geographical Location (IP Geolocation) and Cyber Travel
    • Geospatial Intelligence Networks (Centralised, Distributed & Hybrid)
    • Policy, Legal, Legislation & Compliance
    • Security Standardisation
    • Law, Legal and Ethics
    • Web Services
    • Internet Banking
    • E-Booking
    • Cloud Computing
    • E-Government
    • Electronic Commerce
    • Citizens Public Online Services
    • Mobile Commerce
    • E-Postal Services
    • E-Health
    • Online & Virtual Education
    • E-Learning
    • Web Chats
    • Secure Protocols, Coding and Development
    • Security Principles, Theory and Analysis
    • Security Policy, Standards and Procedures
    • Security in Business Processes
    • Security Enforcing Function (SEF) Gateways
    • Intrusion Detection Systems
    • Intrusion Prevention Systems
    • Firewalls
    • Anti-Virus and Anti-Malware Gateways
    • Data Loss Prevention
    • Encryption Services
    • Protection of Business Information Systems
    • Protection of Online Services
    • Public Online Services
    • Internet Banking
    • Security, Trust, Privacy
    • Security in Online Gaming Systems
    • Security in e-Government and Electoral Systems
    • Content Security
    • Protection of Public Online Content Distribution Systems
    • Secure practices, processes and procedures in Public Online Services
    • Cryptography  –  PKI, HSMs, Symmetric and Asymmetric Crypto, Crypto Custodian & Crypto Standards and Practices
    • Digital Forensics and Investigations
    • HoneyPots and Honey Nets
    • Critical National Infrastructures (CNIs)
    • Critical Network Systems (CNS)

Speakers

Dr. Andrew LenaghanOwner

Dr. Andrew LenaghanOwner

The Oxford University CERT (OxCERT), Oxford, UK
Dr. Eckhard Pfluegel Science

Dr. Eckhard Pfluegel Science

Science, Engineering & Computing, Kingston University, London, UK
Dr Mahmoud Hashem Eiza

Dr Mahmoud Hashem Eiza

School of Physical Sciences and Computing, University of Central Lancashire, Preston, UK
Professor Kevin Curran

Professor Kevin Curran

Computer Science, Ulster University, Northern Ireland, UK
Dr. Cyril Onwubiko

Dr. Cyril Onwubiko

Cyber Security Intelligence, Research Series Limited, London, UK
Dr. Janne Hagen

Dr. Janne Hagen

Norwegian Water Resources and Energy Directorate (NVE), Norway

Important Dates


    Industry (Proof of Concept / Pilot) Submission –  January 14, 2017 extended to February 28, 2017

    Extended Abstract (Work in Progress) – January 14, 2017 extended to February 28, 2017

    PhD Seminar Submissions – January 14, 2017 extended to February 28, 2017

    Research Ideas – January 14, 2017 extended to February 28, 2017

    Poster/Demo Submissions – January 14, 2017 extended to February 28, 2017

    Special Track Submissions – January 14, 2017 extended to February 28, 2017

    Workshops and Tutorials Submission – January 14, 2017 extended to February 28, 2017

    Full Paper Submissions – January 14, 2017 extended to February 28, 2017

    Notification of Full Paper/Abstract / Special Track Acceptance/Rejection – March 24, 2017 extended to March 31, 2017

    Camera Ready Paper Due – April 8, 2017 extended to April 14, 2017

    Participants Registration – March 20 – May 25, 2017

    Conference Date – 19 & 20 June 2017


Important Dates


    Industry (Proof of Concept / Pilot) Submission –  January 14, 2017 extended to February 28, 2017

    Extended Abstract (Work in Progress) – January 14, 2017 extended to February 28, 2017

    PhD Seminar Submissions – January 14, 2017 extended to February 28, 2017

    Research Ideas – January 14, 2017 extended to February 28, 2017

    Poster/Demo Submissions – January 14, 2017 extended to February 28, 2017

    Special Track Submissions – January 14, 2017 extended to February 28, 2017

    Workshops and Tutorials Submission – January 14, 2017 extended to February 28, 2017

    Full Paper Submissions – January 14, 2017 extended to February 28, 2017

    Notification of Full Paper/Abstract / Special Track Acceptance/Rejection – March 24, 2017 extended to March 31, 2017

    Camera Ready Paper Due – April 8, 2017 extended to April 14, 2017

    Participants Registration – March 20 – May 25, 2017

    Conference Date – 19 & 20 June 2017


Location


London
United Kingdom



Programme Committee


    • Cyril Onwubiko – Centre for Multidisciplinary Research, Innovation and Collaboration, UK
    • Thomas Owens – Brunel University, London, UK
    • Eckhard Pfluegel  –  Faculty of Science, Engineering and Computing, Kingston University, UK
    • Nick Savage – University of Portsmouth, UK
    • Janne Merete Hagen – Norwegian Defence Research Establishment, Norway
    • Karim Ouazzane  – School of Computing, London Metropolitan University, London, UK
    • Frederick Wamala – Security Architecture & Cyber Security, IBM, UK
    • Andrew Lenaghan – Oxford University, UK
    • Uri Blumenthal  –  MIT Lincoln Laboratory, MIT, USA
    • Tim D Williams – Cyber Security, London, UK
    • Phil Legg  – University of the West of England, UK
    • Gareth Niblett – BCS Information Security Specialist Group (ISSG), UK
    • Daniel Zeng – University of Arizona, USA
    • Xavier Bellekens – University of Abertay, Scotland, UK
    • Cyril Onwubiko – Centre for Multidisciplinary Research, Innovation and Collaboration, UK
    • Andrea Cullen – Director of Cyber Security Interdisciplinary Centre, University of Bradford, UK
    • Wasim Alhamdani – College of Computer Science & Information Technology, University of Dammam, Saudi Arabia
    • David Brosset –  Naval Academy Research Institute, France
    • Paolo Falcarin  –  School of Architecture Computing and Engineering (ACE), University of East London, London, UK
    • Fatih Kurugollu – Cyber Security, University of Derby, Derby, UK
    • Richard Hill – Department of Computing and Mathematics, University of Derby, Derby, UK
    • Marco Ivan Ramirez Sosa Moran – Faculty of Science and Technology, University of Westminster, London, UK
    • Lai Bun Lok  –  IEEE UK & Ireland, IEEE
    • Matthew Gream – IEEE UK & Ireland, IEEE
    • Peter Komisarczuk –  Royal Holloway, University of London, London, UK
    • Deepthi Ratnayake – London Metropolitan University, London, UK
    • Nilay Mistry  – Gujarat Forensic Sciences University, India
    • Uwe Glässer –  School of Computing Science, Simon Fraser University, Canada
    • Manish Gupta –  State University of New York, Buffalo, NY, USA
    • Anthony Davies – IEEE UK & Ireland, IEEE
    • Gerardo I. Simari – Universidad Nacional del Sur in Bahia Blanca and CONICET, Argentina
    • Thomas Owens – Brunel University, London, UK
    • Jens Myrup Pedersen – University of Aalborg, Denmark
    • Subrata Acharya – Towson University, USA
    • Marios Anagnostopoulos – University of the Aegean, Greece
    • Yi Luo – University of Arizona, Tucson, USA
    • Erik Blasch – Fusion Evaluation & Air Force Research LaboratoryUSA
    • Sotiris Ioannidis – The Institute of Computer Science, Foundation for Research and Technology (FORTH), Greece
    • Wei Yu – Towson University, USA
    • Uri Blumenthal – MIT Lincoln Laboratory, MIT, USA
    • Gerald O’Leary – MIT Lincoln Laboratory, MIT, USA
    • Ciza Thomas – College of Engineering, India
    • Stefanos Gritzalis – University of the Aegean, Greece
    • Mike Tyworth –  The Pennsylvania State University, USA
    • Eric X. McMillan – The Pennsylvania State University, USA
    • Bechara Al Bouna – Science University, Lebanon
    • Janne Merete Hagen – Norwegian Defence Research Establishment, Norway
    • Varun Dutt – Indian Institute of Technology Mandi, India
    • Cleotilde Gonzalez – Carnegie Mellon University, USA
    • Khidir M. Ali – Jubail University College, Kingdom of Saudi Arabia
    • Katherine Hamilton – Penn State University, USA
    • Xinyu Yang –  Xi’an Jiaotong University, China
    • Jie Lin – Xi’an Jiaotong University, China
    • Georgios Kambourakis – University of the Aegean, Greece
    • Elisavet Konstantinou – University of the Aegean, Greece
    • Alexandros Kapravelos – Computer Security Group, University of California Santa Barbara
    • Kirankumar S. Akate –  Government Institute of Forensic Science, Aurangabad, India
    • Chinazunwa Uwaoma – Faculty of Science and Technology, The University of the West Indies, Jamaica
    • Theo Dimitrakos  – Security Futures Practice, BT Research & Technology, UK
    • Pierre Parrend –  ECAM Strasbourg-Europe, France
    • Abdullahi Arabo –  University of the West of England (UWE), Bristol, UK
    • Veena Desai – Gogte Institute of Technology, Belgaum, India
    • Azah Norman – Faculty of Computer Science and Information Technology, University of Malaya, Kuala Lumpur, Malaysia
    • Antonis Mouhtaropoulos – Department of Computer Science, University of Warwick, Coventry, UK
    • Paul Fennell – MPS, UK
    • Kingsley Ukaoha – University of Benin, Nigeria
    • Dawuda Alhassan – Tomas Bata University, Zlin, Czech Republic
    • Laribi Boualem – University of Djillali, Bounaama, Algeria
    • Md Ruhul Islam – Sikkim Manipal University India
    • Sujoy Sarkar – IEEE, India
    • Scott Cadzow – Cadzow Communications Consulting Ltd, UK
    • Dalal Azizy – University of Southampton, UK
    • Rauf Malick – DHA Suffa University, Pakistan
    • Xuan Zhao – Cylance, California, USA
    • Amar K. Seeam – Middlesex University (Mauritius Branch Campus), Vacoas, Mauritius
    • Kevin Curran – Faculty of Computing and Engineering, Ulster University, Northern Ireland, UK
    • Matija Stevanovic – Department of Electronic Systems, Aalborg University, Denmark
    • Donna O’Shea – Nimbus Centre, Cork Institute of Technology, Ireland
    • Pooneh Bagheri Zadeh – School of Computing, Creative Technologies & Engineering, Leeds Beckett University, Leeds, UK
    • Mona Ghassemian – IEEE UK and Ireland, London, UK
    • Eliana Stavrou – Computing Department, UCLan Cyprus, Larnaca, Cyprus
    • Reza Montasari – Computing and Mathematics, University of Derby, Derby, UK
    • Tim D Williams – Cyber Security, London, UK
    • Amin Hosseinian-Far – Faculty of Arts, Environment & Technology, Leeds Beckett University, Leeds, UK
    • Frederick Wamala – Security Architecture & Cyber Security, IBM, UK
    • Ngoc Tu Nguyen  – Missouri University of Science and Technology, USA
    • Abdulrahman Alarifi  – Computer Research Institute, King Abdulaziz City for Science and Technology Riyadh, Saudi Arabia
    • Spyros Kokolakis – University of the Aegean, Greece
    • Ioanna Topa – University of the Aegean
    • Eva Papadogiannaki  – Institute of Computer Science, Foundation for Research and Technology (FORTH), Greece
    • Zisis Tsiatsikas  – University of the Aegean, Karlovassi, Greece
    • Michalis Diamantaris  – Institute of Computer Science, Foundation for Research and Technology (FORTH), Greece

Conference Programme


    • Antti Evesti, Teemu Kanstrén and Tapio Frantti. “Cybersecurity Situational Awareness Taxonomy”
    • Eliana Stavrou. “A situation-aware user interface to assess users’ ability to construct strong passwords: A conceptual architecture”
    • Natalie Nakhla, Kathryn Perrett and Christopher McKenzie. “Automated Computer Network Defence using ARMOUR: Mission-oriented decision support and vulnerability mitigation”
    • Marianne Junger, Lorena Montoya, Pieter Hartel and Maliheh Heydari. “Towards the normalization of crime victimization: A routine activities analysis of cybercrime in Europe”
    • Aunshul Rege, Zoran Obradovic, Nima Asadi, Brian Singer, Nicholas Masceri and Quinn Heath. “A Temporal Assessment of Cyber Intrusion Chains Using Multidisciplinary Frameworks and Methodologies”
    • Patrik Lif, Magdalena Granåsen and Teodor Sommestad. “Development and validation of technique to measure cyber situation awareness”
    • Arnau Erola, Ioannis Agrafiotis, Jassim Happa, Michael Goldsmith, Sadie Creese and Philip Legg. “Improving semi-automated network defences by correlating heterogeneous data sources”
    • Boniface Kayode Alese, Aderonke Favour-Bethy Thompson and Patricia Yetunde Oni. “A Location Privacy System in Mobile Network Using Game Theory”
    • Palvi Aggarwal, Cleotilde Gonzalez and Varun Dutt. “Modeling the Effects of Amount and Timing of Deception in Simulated Network Scenarios”
    • Lynsay Shepherd, Jacqueline Archibald and Robert Ian Ferguson. “Security Awareness and Affective Feedback: Categorical Behaviour vs. Reported Behaviour”
    • Outi-Marja Latvala, Tommi Keränen, Sami Noponen, Niko Lehto, Mirko Sailio, Mikko Valta and Pia Olli. “Visualising network events in a muggle friendly way”
    • Boniface Kayode Alese, Abimbola Akinledele, Folasade M. Dahunsi, Aderonke Favour-Bethy Thompson and Tosin Adesuyi. “A Graphic-based Cryptographic Model for Authentication”
    • David Brosset, Yvon Kermarrec, Pedro Merino Laso, Benjamin Costé and Camille Cavelier. “Cr@ck3n: a cyber alerts visualization object”
    • Pablo Casais Solano and Antonio José Reinoso Peinado. “Socioeconomic factors in Cybercrime”
    • Anthony Arrott, Ivan Macalintal and Ian McMillan. “For cloud services on a user’s multiple devices, how do we measure the trusted zone defended by anti-malware?”
    • Elochukwu Ukwandu, William Buchanan and Gordon Russell. “Performance Evaluation of a Fragmented Secret Share System”
    • Gavin Hales. “Visualisation of Device Datasets to Assist Digital Forensic Investigation”
    • Scott Donaldson, Natalie Coull and David Mcluskie. “A Methodology for Testing Virtualization Security”
    • Sumaia Sabouni, Andrea Cullen and Lorna Armitage. “A Preliminary Radicalisation Framework Based on Social Engineering Techniques”
    • Martyn Weedon, Dimitris Tsaptsinos and James Denholm-Price. “Random Forest Explorations for URL Classification”
    • Ruth Ikwu. “A Multi-dimensional Structural Approach to Proactive Cyber Defence”
    • Anthony Arrott and William Kam. “Measuring cloud-based anti-malware protection for Office 365 user accounts “
    • Taniya Bhatia and Rishabh Kaushal. “Malware Detection in Android based on Dynamic Analysis”
    • Daniel Fraunholz, Daniel Krohmer, Simon Duque Antón and Hans Dieter Schotten. “Investigation of Cyber Crime Conducted by Abusing Weak or Default Passwords with a Medium Interaction Honeypot”
    • Mohammed Alzaylaee, Suleiman Yerima and Sakir Sezer. “Improving Dynamic Analysis of Android Apps Using Hybrid Test Input Generation”
    • Feng Yao, Suleiman Yerima, Boojoong Kang and Sakir Sezer. “Continuous Implicit Authentication for Mobile Devices based on Adaptive Neuro-Fuzzy Inference System”
    • Stephen Singam. “Securing an US$ 2.8B Digital Asset: The movie – Avatar”
    • Louai Maghrabi, Eckhard Pfluegel, Luluwah Al-Fagih, Roman Graf, Florian Skopik and Giuseppe Settanni. “Improved Software Vulnerability Patching Techniques Using CVSS and Game Theory”
    • Yassine Lemmou and El Mamoun Souidi. “PrincessLocker analysis”
    • Kamalakanta Sethi, Amartya Majumdar and Padmalochan Bera. “A Novel Implementation of Parallel Homomorphic Encryption for Secure Data Storage in Cloud”
    • Yuanyuan Grace Zeng. “Identifying Email Threats Using Predictive Analysis”
    • Michelle Omoogun, Preetila Seeam, Visham Ramsurrun, Xavier Bellekens and Amar Seeam. “When eHealth Meets the Internet of Things: Pervasive Security and Privacy Challenges”
    • Vahid Moula and Salman Niksefat. “ROPK++: An enhanced ROP attack detection framework for Linux operating system”
    • Tianhui Meng, Zhihao Shang and Katinka Wolter. “An Empirical Performance and Security Evaluation of Android Container Solutions”
    • Clement Guitton. “Foiling Cyber Attacks”
    • Amala Rajan, Rejitha Ravikumar and Mariam Mohammed Al-Shaer. “UAE Cybercrime Law and Cybercrimes – An Analysis”
    • Jasmina Maric. “The Valleys of Death in Refugee Crisis”
    • Amit Walinjkar and John Woods. “ECG Classification and Prognostic Approach towards Personalized Healthcare”
    • Rana Maher, David Malone and Marie Wallace. “The Impact of Interaction and Algorithm Choice on Identified Communities”
    • Waleed Alabbas, Haider Al-Khateeb, Ali Mansour, Gregory Epiphaniou and Ingo Frommholz. “Classification of Colloquial Arabic Tweets in real-time to detect high-risk floods”
    • Karim Grissa. “How the ‘Uses and Gratifications’ Theory explains the usage of Professional Networking Sites (e.g LinkedIn, Viadeo, Xing, skilledAfricans): Comparison between individual members and company members”
    • Anja Corduan. “Social Media as instrument for customer communications – a comparison of companies in East Asia, Western Europe and the US”
    • Scott Miserendino, Corey Maynard and Jacob Davis. “ThreatVectors: Contextual workflows and visualizations for rapid cyber event triage”
    • Trung Nguyen Hoang. “Robust Anti-swing Control of 3D Crane System using GA-Fuzzy”
    • Mohamed Amoud and Ounsa Roudies. “Dynamic Adaptation and Reconfiguration of Security in Mobile Devices”
    • Alexandria Farár, Hayretdin Bahsi and Bernhards Blumbergs. “A Case Study About the Use and Evaluation of Cyber Deceptive Methods Against Highly Targeted Attacks”

Previous Conferences


CyberSA 2022

CyberSA 2021

CyberSA 2020