
International Conference on Cyber Incident Response, Coordination, Containment & Control (Cyber Incident 2015) is an international referred conference dedicated to the advancement of Cyber Incident Response, Coordination, Containment and Control.
The aim of the Cyber Incident 2015 is to encourage participation and promotion of collaborative scientific, industrial and academic inter-workings among individual researchers, practitioners, members of existing associations, academia, standardisation bodies, and including government departments and agencies. The purpose is to build bridges between academia and industry, and to encourage interplay of different cultures.
All Industry track, Posters, Work in Progress track, Research Ideas track and PhD Seminar track will be published in the conference proceedings. Interested participants, please submit your proposal using the Easychair Conference Portal.
Industry (Proof of Concept / Pilot) Submission | January 15, 2015 March 11, 2015 |
Notification of Proof of Concept Acceptance/Rejection | January 30, 2015 March 15, 2015 |
Extended Abstract (Work in Progress) Submission | January 15, 2015 March 11, 2015 |
Notification of Extended Abstract Acceptance/Rejection | January 30, 2015 March 15, 2015 |
Full Paper Submission | February 25, 2015 March 11, 2015 |
Notification of Paper Acceptance/Rejection | March 25, 2015 March 31, 2015 |
Camera Ready Paper Due | April 10, 2015 April 10, 2015 |
Workshops and Tutorials Submission Date | January 15, 2015 March 11, 2015 |
Notification of Workshop and Tutorial Acceptance | January 30, 2015 March 15, 2015 |
Special Track Submission Date | January 25, 2015 March 11, 2015 |
Notification of Special Track Acceptance | January 30, 2015 March 15, 2015 |
Poster/Demo Submission Date | January 15, 2015 March 11, 2015 |
Notification of Poster/Demo Acceptance | January 30, 2015 March 15, 2015 |
Early Registration Deadline (Authors only) | Before March 15, 2015 |
Late Registration Deadline (Authors only) | March 16, 2015 – April 15, 2015 |
Participants Registration | January 01 to June 01, 2015 |
Conference Dates | June 8-9, 2015 |
Keynote Speaker – Tom is Senior Lecturer and Director of Quality at Brunel University. He is the co-editor of the book on Situational Awareness in Computer Network Defense: Principle, Methods and Application, IGI Global, USA. He is currently Project Manager of the IST PSP Project DTV4All & Has been a Project Manager for a number of European Commission projects.
Title of presentation: “Situational Awareness in routing in Vehicular Ad hoc Networks (VANETs)” Download presentation
Keynote Speaker – Andrew is the Information Security Officer at Flawless Money Ltd, a member of the Information Systems Audit and Control Association (ISACA), and regular contributor to the fraud subcommittee of the Electronic Money Association. ”
Title of presentation: “Situational Awareness in detecting Fraud or Financial Crime” Download presentation
Keynote Speaker – Cyril is Director, Cyber Security and Information Assurance (IA) at Research Series Limited, where he is responsible for directing strategy, IA governance and cyber security. He co-edited the book on “Situational Awareness in Computer Network Defense: Principles, Methods & Applications” published by IGI Global, USA, and has authored several book chapters, including Security Issues to Cloud Computing, in the book on “Cloud Computing: Principles, Systems and Applications” by Springer. With over 30 articles published in leading and most prestigious academic journals and conferences.
Title of presentation: “The Role of Situational Awareness in Cyber Security” Download presentation
Research Engineers
TX-5 Homeland Security Team, Airbus Group Innovations, UK
Title of presentation: “Cross-Domain Situational Awareness and Collaborative Working for Cyber Security” Download presentation
Jussi Timonen
Researcher & PhD Student
The Finnish Defence Forces, Finland
Title of presentation: “Improving Situational Awareness of Cyber Physical Systems based on Operator’s Goals” Download presentation
Maria Evangelopoulou
PhD Student
University of Glasgow, UK
Title of presentation: “Situation Awareness Measurement Techniques in Network Defense” Download presentation
Klaus Theuerkauf
Researcher
Ifak Institut für Automation und Kommunikation e.V. Magdeburg
Title of presentation: “On Demand for Situational Awareness for Preventing Attacks on the Smart Grid” Download presentation
Hashem Dehghanniri
PhD Student
University College London, UK
Title of presentation: “Improving Security Decision under Uncertainty: A Multidisciplinary Approach” Download presentation
Dr Christopher Laing
Sciendum Ltd, UK
Title of presentation: “Context Informed Intelligent Information Infrastructures for Better Situational Awareness” Download presentation
Dr Muhammad Ali Nasir
NUCES-FAST, Pakistan
Title of presentation: “Potential Cyber-attacks against Global Oil Supply Chain” Download presentation
Dr Sarmistha Neogy
Assistant Professor
Jadavpur University, India
Title of presentation: “Developing a Secure Remote Patient Monitoring System” Download presentation
Dr Saad Alaboodi
Assistant Professor
Center of Excellence in Information Assurance, King Saud University, Riyadh, Saudi Arabia
Title of presentation: “Privacy Awareness of Online Social Networking in Saudi Arabia” Download presentation
Dr Sarmistha Neogy
Assistant Professor
Jadavpur University, India
Title of presentation: “Security Management in Wireless Sensor Networks” Download presentation
Dr Eckhard Pfluegel
Senior Lecturer
Kingston University, UK
Title of presentation: “Chaos-Based Image Encryption Using an AONT Mode of Operation” Download presentation
1Steven Strandlund Hansen and 2Alexandre Czech
1Aalborg University, Denmark
2Ecole Centrale d’Electronique, Paris, France
Title of presentation: “Analysis of Malware Behavior: Type Classification using Machine Learning” Download presentation
Adriana-Cristina Enache
PhD Student
Military Technical Academy, Bucharest, Romania
Title of presentation: “An Immune Intelligent Approach for Security Assurance” Download presentation
Giuseppe Settanni
Researcher
Austrian Institute of Technology, Austria
Title of presentation: “Beyond Gut Instincts: Understanding, Rating and Comparing Self-Learning IDSs” Download presentation
Charles Clarke
PhD Student
Faculty of SEC, Kingston University, UK
Title of presentation: “Multi-channel Overlay Protocols: Implementing Ad-hoc Message Authentication in Social Media Platforms” Download presentation
Matija Stevanovic
PhD Student
Aalborg University, Denmark
Title of presentation: “An Analysis of Network Traffic Classification for Botnet Detection” Download presentation
Louai Maghrabi & Dr Eckhard Pfluegel
Kingston University, UK
Title of presentation: “Moving Assets to the Cloud: A Game Theoretic Approach Based on Trust” Download presentation
Marcelo Fontenele
PhD Student
University of Reading, UK
Title of presentation: “Talent Discovery for Cyber Security: an organisational perspective” Download presentation
Dr Cyril Onwubiko
Intelligence and Security Assurance, E-Security, UK
Title of presentation: “Cyber Security Operations Centre: Security monitoring for protecting Business and supporting Cyber Defense Strategy” Download presentation
Giuseppe Settanni
Researcher
Austrian Institute of Technology, Austria
Title of presentation: “Establishing National Cyber Situational Awareness” Download presentation
Palvi Aggarwal
PhD Student
Applied Cognitive Science Laboratory, Indian Institute of Technology, Mandi, India
Title of presentation: “Cyber Security: A Game-Theoretic Analysis of Defender and Attacker Strategies in Defacing-Website Games” Download presentation
Therese Bjerkestrand
Researcher
Kingston University, UK
Title of presentation: “Evaluation of Feature Selection and Reduction Algorithms for Network IDS Data” Download presentation
Dr Bechara Al Bouna
Assistant Professor
Antonine University, Lebanon
Title of presentation: “An SQL-like Query Tool for Data Anonymization and Outsourcing” Download presentation
Authors | Paper Title | Type | Conference |
Jussi Timonen | Improving Situational Awareness of Cyber Physical Systems based on Operator’s Goals | Full Paper | CyberSA 2015 |
Matija Stevanovic and Jens Myrup Pedersen | An Analysis of Network Traffic Classification for Botnet Detection | Full Paper | CyberSA 2015 |
Palvi Aggarwal, Antra Grover, Saumya Singh, Zahid Maqbool, V. S. Chandrasekhar Pammi and Varun Dutt | Cyber Security: A Game-Theoretic Analysis of Defender and Attacker Strategies in Defacing-Website Games | Full Paper | CyberSA 2015 |
Maria Evangelopoulou and Christopher W. Johnson | Situation Awareness Measurement Techniques in Network Defense | Full Paper | CyberSA 2015 |
Florian Skopik, Markus Wurzenberger, Giuseppe Settanni and Roman Fiedler | Establishing National Cyber Situational Awareness through Incident Information Clustering | Full Paper | CyberSA 2015 |
Hashem Dehghanniri, Emmanuel Letier and Herve Borrion | Improving Security Decision under Uncertainty: A Multidisciplinary Approach | Full Paper | CyberSA 2015 |
Adenusi Dauda, Boniface Kayode Alese, Bamidele Moses Kuboye and Betty Aderonke Thompson | Development of Cyber Situation Awareness Model [Abstract / WIP] | Abstract | CyberSA 2015 |
Moyinoluwa Abidemi Bode, Boniface Kayode Alese, Samuel A. Oluwadareand Aderonke Favour-Bethy Thompson | Risk Analysis in Cyber Situation Awareness using Bayesian Statistics | Full Paper | CyberSA 2015 |
Mark John Hall, Devon David Hansen and Kevin Jones | Cross-Domain Situational Awareness and Collaborative Working for Cyber Security | Full Paper | CyberSA 2015 |
Markus Wurzenberger, Florian Skopik, Giuseppe Settanni and Roman Fiedler | Beyond Gut Instincts: Understanding, Rating and Comparing Self-Learning IDSs [Abstract / WIP] | Abstract | CyberSA 2015 |
Lewis Meehan and Carlene Campbell | Threat and Mitigation Awareness Based Upon a Model Network Scenario with BYOD Aspects | Full Paper | CyberSA 2015 |
Charles Clarke, Eckhard Pflügel and Dimitris Tsaptsinos | Multi-channel Overlay Protocols: Implementing Ad-hoc Message Authentication in Social Media Platforms | Full Paper | CyberSA 2015 |
Yegor Shovgenya, Klaus Theuerkauf and Florian Skopik | On Demand for Situational Awareness for Preventing Attacks on the Smart Grid | Full Paper | CyberSA 2015 |
Zulfiqar Bhutto, Kamran Dahri, Iqra Lakho and Shahzad Memon | A Prototype Application for Street Crime Reporting | Full Paper | CyberSA 2015 |
Cyril Onwubiko | Cyber Security Operations Centre: Security monitoring for protecting Business and supporting Cyber Defense Strategy | Full Paper | CyberSA 2015 |
Mohamed Nassar, Adel Al-Rahal Al-Orabi, Marwan Doha and Bechara Al Bouna | An SQL-like Query Tool for Data Anonymization and Outsourcing | Full Paper | CyberSA 2015 |
Adriana-Cristina Enache and Valentin Sgârciu | An Immune Intelligent Approach for Security Assurance | Full Paper | CyberSA 2015 |
Steven Strandlund Hansen, Thor Mark Tampus Larsen, Radu Stefan Pirscoveanu, Alexandre Czech, Matija Stevanovic and Jens Myrup Pedersen | Analysis of Malware Behavior: Type Classification using Machine Learning | Full Paper | CyberSA 2015 |
Therese Bjerkestrand, Dimitris Tsaptsinos and Eckhard Pfluegel | Evaluation of Feature Selection and Reduction Algorithms for Network IDS Data [Abstract / WIP] | Abstract | CyberSA 2015 |
Marcelo Fontenele and Lily Sun | Talent Discovery for Cyber Security: an organisational perspective | Full Paper | Cyber Security 2015 |
Christopher Laing, Paul Vickers, Tom Fairfax, Pam Briggs and Stephen Marsh | Context Informed Intelligent Information Infrastructures for Better Situational Awareness | Full Paper | Cyber Security 2015 |
Andrius Rickus, Eckhard Pfluegel and Nigel Atkins | Chaos-Based Image Encryption Using an AONT Mode of Operation | Full Paper | Cyber Security 2015 |
Sarmistha Neogy | Security Management in Wireless Sensor Networks | Full Paper | Cyber Security 2015 |
Sarmistha Neogy and Sayantani Saha | Developing a secure remote patient monitoring system | Full Paper | Cyber Security 2015 |
Muhammad Ali Nasir and Shizra Sultan | Potential Cyber-attacks against Global Oil Supply Chain | Full Paper | Cyber Security 2015 |
Louai Maghrabi and Eckhard Pfluegel | Moving Assets to the Cloud: A Game Theoretic Approach Based on Trust | Full Paper | Cyber Security 2015 |
Kamran Dahri, Shakeel Rajput, Shahzad Memon and Dr. Lachman Das Dhomeja | Smart Activities Monitoring System (SAMS) for Security Applications [Abstract / WIP] | Abstract | Cyber Security 2015 |
Jawad Awan, Shahzad Memon, Lachhman Das and Iqra Lakho | eGovernment Services Security and Challenges in Pakistan [Abstract / WIP] | Abstract | Cyber Security 2015 |
Ruhul Amin, SK Hafizul Islam, G. P. Biswas, Muhammad Khurram Khan | An Efficient Remote Mutual Authentication Scheme using Smart Mobile Phone over Insure Networks | Full Paper | Cyber Security 2015 |
Hatoon Alsagri and Saad Alaboodi | Privacy Awareness of Online Social Networking in Saudi Arabia | Full Paper | Social Media 2015 |
Shahzad Ahmed Memon, Sorath Mahar, Lachhman Das Dhomeja and Farman Pirzado | Prospects and Challenges for Social Media in Pakistan | Full Paper | Social Media 2015 |