CyberScience2020 2020 June 15, 2020 to June 15, 2020, Virtual, Virtual

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Cyber Threat Intelligence and the Cyber Meta-Reality and Cyber Microbiome Joshua Sipper In a cyber meta-reality filled with zero-day exploits, autonomous code, Worms modeled from Stuxnet, andthe ...
Acoustic Emanation of Haptics as a Side-Channel for Gesture-Typing Attacks Jonathan Smith-creasey Abstract—In this paper, we show that analysis of acoustic emanations recorded from haptic feedbackduring gesture-typing ...
A Security Perspective on Unikernels Christos Tachtatzis , Joshua Talbot , Przemek Pikula , Craig Sweetmore , Samuel Rowe , Hanan Hindy , Robert Bellekens Cloud-based infrastructures have grown in popularity over the last decade leveraging virtualisation, server,storage, compute power ...
Vulnerability-Based Impact Criticality Estimation for Industrial Control Systems Uchenna Daniel Ani , Hongmei Tiwari Cyber threats directly affect the critical reliability and availability of modern Industry Control Systems (ICS)in ...
An Empirical Study of CERT Capacity in the North Sea Martin gilje Jaatun , Lars Bodsberg , Tor Moe This paper documents the results of an empirical study of cyber incident response readiness in ...
Automated Vulnerability Testing via Executable Attack Graphs Drew Malzahn , Zachary Birnbaum , And Cimone Wright-hamor Cyber risk assessments are an essential process for analyzing and prioritizing security issues.Unfortunately, many risk ...
Towards a Framework for Measuring the Performance of a Security Operations Center Analyst Enoch Agyepong , Yulia Cherdantseva , Philipp Burnap The past few years have seen several studies reporting on the role of a Security ...
Privacy Protection Behaviours: a diversity of individual strategies Bertrand Venard The aim of the article is to study the determinants of privacy protection behaviours, using ...
Developing a security behavioural assessment approach for cyber rating U.K. MSBs Andrew Patel Micro and small businesses in the U.K. account for over 99% of all U.K. businesses. ...
Using Amazon Alexa APIs as a Source of Digital Evidence Clemens Mckeown With the release of Amazon Alexa and the first Amazon Echo device, the company revolutionised ...
A Taxonomy of Approaches for Integrating Attack Awareness in Applications Tolga Ünlü , Lynsay Shepherd , Natalie Mclean Software applications are subject to an increasing number of attacks, resulting in data breaches andfinancial ...
Cyber-security research by ISPs: A NetFlow and DNS Anonymization Policy Martin Fejrskov Andersen , Jens Vasilomanolakis Internet Service Providers (ISPs) have an economic and operational interest in detecting malicious networkactivity relating ...
Towards Security Attack and Risk Assessment during Early System Design Lukas Gressl , Michael Krisper , Christian Neffe The advent of the Internet of Things (IoT) and Cyber-Physical Systems (CPS) enabled a new ...
Technical codes’ potentialies in cyber security. A contextual approach on the ethics of small digital organizations in France Theo Venard With the proliferation of malware, viruses and phishing attacks, information security has become a majorchallenge ...
Examining the Impact of Implementing Cyber Security Articulation Agreements Between Public and Private Higher Educational Institutions in 9-12 High Schools Thomas Rzemyk Over the past decade, the term cyber security has become quite the buzzword in the ...
Testing and Hardening IoT Devices Against the Mirai Botnet Nikolaos Pitropakis , Christopher Kelly , Sean Lambrinoudakis A large majority of cheap Internet of Things (IoT) devices that arrive brand new, and ...
Sociotechnical Approaches to Cyber Security in Emerging Nations: A Case Study in Risk Management for Rwandan Health Care Joseph Johnson Healthcare is increasingly dependent on digital systems. In emerging nations, it can be particularly hardfor ...
Restricting Data Flows to Secure Against Remote Attack John Laverty Fully securing networks from remote attacks is recognized by the IT industry as a critical ...
Deep Down the Rabbit Hole: On References in Networks of Decoy Elements Daniel Schotten , Daniel Reti , Daniel Fraunholz , Janis Zemitis Deception technology has proven to be a sound approach against threats to information systems. Asidefrom ...
An Empirical Study of Key Generation in Cryptographic Ransomware Pranshu Enbody Ransomware implement a denial-of-access attack on a user’s irreplaceable data achieved by encryptinguser files. Successful ...
Forensic Considerations for the High Efficiency Image File Format (HEIF) Sean Russell The High Efficiency File Format (HEIF) was adopted by Apple in 2017 as their favoured ...
Secure Framework for Anti-Money-Laundering using Machine Learning and Secret Sharing Arman Zand , James Pfluegel Nowadays, the scale of Money Laundering is difficult to estimate in the UK and elsewhere. ...
What Could Possibly Go Wrong? Smart Grid Misuse Case Scenarios Ravishankar Borgaonkar , Inger Anne Tøndel , Martin Frøystad In this paper we present misuse cases related to Smart Grid security in three overall ...
ethVote: Towards Secure Voting with Distributed Ledgers Johannes Vasilomanolakis The topic of performing safe and secure elections is a long-standing debate. Regardless, of the ...
A DLT-based Trust Framework for IoT Ecosystems Ramona Marfievici , Tharindu Ranathunga , Alan Rea An IoT eco-system includes IoT network components, network services and network participants such asorganizations, consumers, ...
Memory Forensics Against Ransomware Pranshu Enbody Ransomware leverages the unique knowledge of cryptographic secrets, such as the encryption key,against the victim. ...
Slave Clock Responses to Precision Time Protocol Attacks: A Case Study Waleed Schukat The IEEE 1588 Precision Time Protocol (PTP) is especially important for many financial and industrialapplications, ...
"What did you say?'': Extracting unintentional secrets from predictive text learning systems Gwyn Legg As a primary form of communication, text is used widely for online communications, including e-mailconversations, ...
Introducing a forensics data type taxonomy of acquirable artefacts from programmable logic controllers Marco Cook , Ioannis Stavrou , Sarah Johnson The understanding of available data artefacts is fundamental to performing digital forensics. There is goodunderstanding ...
Moving Targets: Addressing Concept Drift in Supervised Models for Hacker Communication Detection Andrei Queiroz , Brian Mckeever In this paper, we are investigating the presence of concept drift in machine learning models ...
Smarter Password Guessing Techniques Leveraging Contextual Information and OSINT Aikaterini Kanta , Iwen Scanlon In recent decades, criminals have increasingly used the web to research, assist and perpetrate criminalbehaviour. ...
Epistemological Questions for Cybersecurity Timothy D. Williams The purpose of this theoretical paper is to facilitate interdisciplinary dialogue regarding the roots ofknowledge ...
Privacy Policy – “I agree”?! – Do alternatives to text-based policies increase the awareness of the users? Pascal Faurie , Arghir-nicolae Tal Since GDPR was introduced, there is a reinforcement of the fact that users must give ...
Platform for monitoring and clinical diagnosis of arboviruses using computational models Sebastião Neto , Thomás Oliveira , Vanderson Sampaio , Theo Endo As part of SDG, the members of the UN aim to end epidemics of neglected ...
Evaluation of Machine Learning Algorithms for Anomaly Detection Nebrase Elmrabit , Feixiang Zhou , Fengyin Zhou Malicious attack detection is one of the critical cyber-security challenges in the peer-to-peer smart gridplatforms ...
An Overview of Web Robots Detection Techniques Hanlin Chen , Hongmei Starr Web robots or web crawlers have become the major source of web traffic. While some ...
Cost-Effective OCR Implementation to Prevent Phishing on Mobile Platforms Yang Liu , Yunjia Wang , Tiejun Duncan Phishing is currently defined as a criminal mechanism employing both social engineering and technicalsubterfuge to ...
Automated Artefact Relevancy Determination from Artefact Metadata and Associated Timeline Events Xiaoyu Du , Quan Scanlon Case-hindering, multi-year digital forensic evidence backlogs have become commonplace in lawenforcement agencies throughout the world. ...
Think Smart, Play Dumb: A Game-Theoretic Approach to Study Deception in Hardware Trojan Testing Tapadhir Das , Abdelrahman Sengupta In recent years, integrated circuits (ICs) have become significant for various industries and their securityhas ...
Towards Detecting Human Actions, Intent, and Severity of APT Attacks by Applying Deception Techniques Joel Chacon , Sean Macfarlane Deception techniques and decoy objects, often called honey items, can be useful in intrusion detection,and ...
Assessing the Influencing Factors on the Accuracy of Underage Facial Age Estimation Felix Anda , David Lillis , Brett Becker , Nhien-an Scanlon Swift response to the detection of endangered minors is an ongoing concern for law enforcement ...
Insider Threat Detection: A Solution in Search of a Problem Jordan Thomson Insider threats (IT) reflects a growing concern in the security communities. Despite a rapid increase ...
Introducing & Evaluating ‘Nutrition Facts’ for Online Content Matthew Spradling , Jeremy Strong So-called ‘fake news’ – deceptive online content that attempts to manipulate readers – is a ...
AI Crimes: A Classification Fadi Sibai Intelligent and machine learning systems have infiltrated cyber-physical systems and smart cities withtechnologies such as ...
Social big data: A Twitter text mining approach to the communication of universities during the Lebanese protests Katia Raya , Nicole Chamoun Since October 17, 2019, Lebanon has experienced unprecedented popular protests, demanding thedeparture of the entire ...
Blurring lines between fiction and reality: Perspectives of experts on marketing effectiveness of virtual influencers Evangelos Moustakas , Nishtha Lamba , Dina Ranganathan Virtual influencers are computer generated human avatars with a wide following on social media. Luxurybrands ...
Shouting Through Letterboxes: A study on attack susceptibility to voice assistants Andrew Mccarthy , Benedict Legg Voice assistants such as Amazon Echo and Google Home have become increasingly popular for manyhome ...
Mobile Botnet Detection: A Deep Learning Approach Using Convolutional Neural Networks Suleiman Alzaylaee Android, being the most widespread mobile operating systems is increasingly¬ becoming a target formalware. Malicious ...
The Data that Drives Cyber Insurance: A Study into the Policy Underwriting and Claims Processes Jason Nurse , Louise Axon , Arnau Erola , Ioannis Agrafiotis , Michael Creese Cyber insurance is a key component in risk management, intended to transfer risks and support ...
Naval Cyber-Physical Anomaly Propagation Analysis Based on a Quality Assessed Graph Nicolas Pelissero , Pedro Puentes As any other infrastructure relying on cyber-physical systems (CPS), naval CPS are highly interconnectedand collect ...
Smart Security Audit: Reinforcement Learning with a Deep Neural Network Approximator Vladimir Stankovic , Konstantin Pozdniakov , Eduardo Alonso , Kimberly Jones A significant challenge in modern computer security is the growing skill gap as intruder capabilitiesincrease, ...
Pattern Extraction for Behaviours of Multi-Stage Threats via Unsupervised Learning Ahmed Reger Detection of multi-stage threats such as Advanced Persistent Threats (APT) is extremely challenging dueto their ...
The Visual Design of Network Data to Enhance the Cyber Security Awareness of the Everyday Internet User Fiona Carroll , Phil Bønkel Technology and the use of online services are very much prevalent across much of our ...
Application of the Benford’s law to Social bots and Information Operations activities Lale Hall Benford's Law shows the pattern of behavior in normal systems. It states that in natural ...
Explainable AI in Smart Healthcare Urja O'reilly In recent years, technology is shifting the healthcare paradigm from being disease centered to preventiveand ...
5Es -> 4Cs 21st-century skills learning Jasmina Maric This paper proposes a model which suggests that learning can be relevant and effective, while ...
A Design Exploration Framework for Secure IoT-Systems Lukas Gressl , Alexander Rech , Christian Steger , Andreas Weissnegger Cybersecurity is vital for embedded systems, especially for Internet of Things (IoT) systems. IoT systemshave ...
A Data Extraction Method for Anomaly Detection in Naval Systems Clet Boudehenn , Jean-christophe Boudra With the exponential growth of Cyber-Physical Systems (CPS), new security challenges have emerged.Over the past ...
Focusing on the Recovery Aspects of Cyber Resilience Cyril Onwubiko Advances in technology and emerging cyber security tactics, techniques, and procedures (TTPs) arepillars for the ...
Analysis of the RPL Version Number Attack with Multiple Attackers Ahmet Oktug In this study, we aim to understand the effect of multiple Version Number Attackers (VNA) ...
Self-Attention for Cyberbullying Detection Ankit Pradhan , Venu Bera In recent years, cyberbullying has grown out of proportion due to the increasing usage of ...
Towards an Aggregate Signature-based Authentication for Opportunistic Networks Blaise Cossi Avoussoukpo , Chunxiang Xu , Marius Nabeil Opportunistic Networks are particular networks where independent nodes come together under thesupervision of a Seed ...
Graphical analysis of captured network packets for detection of suspicious network nodes Felix Larbi Aryeh , Boniface Olasehinde The advent of the Internet has yielded the rapid development of Information Technology relatedapplications over ...
Decentralized Identifier Distribution for Moving Target Defense and Beyond Daniel Schotten In this work, we propose a novel approach for decentralized identifier distribution and synchronization innetworks. ...
Cybersecurity Risk Management in Small and Medium-Sized Enterprises: A Systematic Review of Recent Evidence Abdulmajeed Duncan Even though small and medium-sized enterprises (SMEs) have been encouraged to take advantage ofany possible ...
Examining the Cyber Security of a Real World Access Control Implementation Julian J. Teule , Marius F. Hensel , Victor Büttner , Jonathan V. Sørensen , Magnus Olsen As smart cards have become increasingly prevalent in electronic access control systems, this paperinvestigates an ...
Educating multidisciplinary undergraduates on security and privacy Katorah Williams , Mollie Rege As digital services have become more prevalent; the accompanying terms and conditions documents havebeen increasingly ...
Big Fish, Little Fish, Critical Infrastructure: An Analysis of Phineas Fisher and the `Hacktivist' Threat to Critical Infrastructure Peter Mclaughlin The hacktivist threat actor is listed in many risk decision documents. Yet their tactics and ...
Beyond the Prisoner’s Dilemma: the Social Dilemmas of Cybersecurity Jordan Thomson The Prisoner’s Dilemma represents a ubiquitous approach to security modeling that emphasizesadversarial relationships between actors. ...
Implementing the NIS Directive, driving cybersecurity improvements for Essential Services Tania Johnson A review by the National Audit Office of the National Cyber Security Programme recommended a ...
High-Performance Monitoring Sensors for Home Computer Users Security Profiling Farhad Foroughi , Hossein Shafiee Recognising user behaviour in real-time is crucial to provide user critical information about their riskybehaviour ...
Smart Grid Data Security using Practical CP-ABE with Obfuscated Policy and Outsourcing Decryption Ankit Pradhan , Punith. R , Kamalakanta Bera Smart grid consists of multiple different entities related to various energy management systems whichshare fine-grained ...
Application and analysis of record linkage techniques to integrate Brazilian health databases Vanderson Sampaio , Maicon Barros , Morgana Leite , Patricia Takako Endo , And Theo Lynn The amount of data generated by health institutions is abundant and obtaining knowledge and insightsfrom ...
A survey of cyber security in the Swedish manufacturing industry Ulrik Wernberg Manufacturing is being transformed by new technologies. While these technologies are not all digital, theyare ...
Cyber Insurance Market in Israel - What is the Official Policy? Tal Pavel Since 1997, with the first Internet security liability policy (Granato and Polacek, 2019, the cyber ...