IEEECyberScience2020 2020 June 16, 2020 to June 18, 2020, Virtual, Virtual

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
An Empirical Study of CERT Capacity in the North Sea Martin gilje Jaatun , Lars Bodsberg , Tor Moe N/A
Naval cyber-physical anomaly propagation analysis based on a quality assessed graph Nicolas Pelissero , Pedro Puentes N/A
Smart Grid Data Security using Practical CP-ABE with Obfuscated Policy and Outsourcing Decryption Ankit Pradhan , Punith. R , Kamalakanta Bera N/A
Towards a Framework for Measuring the Performance of a Security Operations Center Analyst Enoch Agyepong , Yulia Cherdantseva , Philipp Burna N/A
Developing a security behavioural assessment approach for cyber rating U.K. Msbs Patel N/A
Slave Clock Responses to Precision Time Protocol Attacks: A Case Study Waleed Schukat N/A
Keynote Speech: AI in a Privacy Aware World Dr Ruoyi Zhou N/A
Examining the Cyber Security of a Real World Access Control Implementation Julian J. Teule , Marius F. Hensel , Victor Büttner , Jonathan V. Sørensen , Magnus Olsen N/A
Deep Down the Rabbit Hole: On References in Networks of Decoy Elements Daniel Schotten , Daniel Reti , Daniel Fraunholz , Janis Zemitis N/A
Vulnerability-Based Impact Criticality Estimation for Industrial Control Systems Uchenna Daniel Ani , Hongmei Tiwari N/A
A Data Extraction Method for Anomaly Detection in Naval Systems Clet Boudehenn , Jean-christophe Boudra N/A
What Could Possibly Go Wrong? Smart Grid Misuse Case Scenarios Ravishankar Borgaonkar , Inger Anne Tøndel , Martin Frøystad N/A
Restricting Data Flows to Secure Against Remote Attack John Laverty N/A
Big Fish, Little Fish, Critical Infrastructure: An Analysis of Phineas Fisher and the `Hacktivist' Threat to Critical Infrastructure Peter Mclaughlin N/A
An Overview of Web Robots Detection Techniques Hanlin Chen , Hongmei Star N/A
Automated Artefact Relevancy Determination from Artefact Metadata and Associated Timeline Events Xiaoyu Du , Quan Scanlon N/A
Towards Identifying Human Actions, Intent, and Severity of APT Attacks Applying Deception Techniques - An Experiment Joel Chacon , Sean Macfarlan N/A
Mobile Botnet Detection: A Deep Learning Approach Using Convolutional Neural Networks Suleiman Alzaylaee N/A
Towards an Aggregate Signature-based Authentication for Opportunistic Networks Chunxiang Xu , Cossi Blaise Avoussoukpo , Marius Eltayieb N/A
"What did you say?'': Extracting unintentional secrets from predictive text learning systems Gwyn Legg N/A
The Visual Design of Network Data to Enhance the Cyber Security Awareness of the Everyday Internet User Fiona Carroll , Phil Bønkel N/A
Smart Security Audit: Reinforcement Learning with a Deep Neural Network Approximator Vladimir Stankovic , Konstantin Pozdniakov , Eduardo Alonso , Kimberly Jones N/A
Privacy Policy – “I agree”?! – Do alternatives to text-based policies increase the awareness of the users? Pascal Faurie , Arghir-nicolae Tal N/A
Focusing on the Recovery Aspects of Cyber Resilience Cyril Onwubiko N/A
Beyond the Prisoner’s Dilemma: the Social Dilemmas of Cybersecurity Jordan Thomson N/A
Keynote Speech: When we thought Cyber Science had enough challenges, along came Autonomy and AI. Dr Spencer N/A
Keynote Speech: Exploring the Online Identity: Do the opportunities outweigh the security and privacy risks? Dr Nurse N/A
Shouting Through Letterboxes: A study on attack susceptibility to voice assistants Andrew Mccarthy , Benedict Legg N/A
Self-Attention for Cyberbullying Detection Ankit Pradhan , Venu Bera N/A
Forensic Considerations for the High Efficiency Image File Format (HEIF) Sean Russell N/A
A Security Perspective on Unikernels Christos Tachtatzis , Joshua Talbot , Przemek Pikula , Craig Sweetmore , Samuel Rowe , Hanan Hindy , Robert Bellekens N/A
Using Amazon Alexa APIs as a Source of Digital Evidence Clemens Mckeown N/A
A Taxonomy of Approaches for Integrating Attack Awareness in Applications Tolga Ünlü , Lynsay Shepherd , Natalie Mclean N/A
Introducing a forensics data type taxonomy of acquirable artefacts from programmable logic controllers Marco Cook , Ioannis Stavrou , Sarah Johnson N/A
Cyber-security research by ISPs: A NetFlow and DNS Anonymization Policy Jens Vasilomanolakis , Martin Fejrskov N/A
Keynote Speech Paul C Dwyer N/A
Moving Targets: Addressing Concept Drift in Supervised Models for Hacker Communication Detection Brian Mckeever , Andrei Lima Queiroz N/A
Acoustic Emanation of Haptics as a Side-Channel for Gesture-Typing Attacks Jonathan Smith-creasey N/A
Memory Forensics Against Ransomware Pranshu Enbody N/A
AI Crimes: A Classification Fadi Sibai N/A
An Empirical Study of Key Generation in Cryptographic Ransomware Pranshu Enbody N/A
Cost-Effective OCR Implementation to Prevent Phishing on Mobile Platforms Yang Liu , Yunjia Wang , Tiejun Duncan N/A
Assessing the Influencing Factors on the Accuracy of Underage Facial Age Estimation Felix Anda , David Lillis , Brett Becker , Nhien-an Scanlon N/A
Pattern Extraction for Behaviours of Multi-Stage Threats via Unsupervised Learning Ahmed Reger N/A
Evaluation of Machine Learning Algorithms for Anomaly Detection Nebrase Elmrabit , Feixiang Zhou , Fengyin Zhou N/A
Adapting STPA-sec for Socio-technical Cyber Security Challenges in Emerging Nations: A Case Study in Risk Management for Rwandan HealthCare Joseph Johnson N/A
Implementing the NIS Directive, driving cybersecurity improvements for Essential Services Tania Johnson N/A
Blurring lines between fiction and reality: Perspectives of experts on marketing effectiveness of virtual influencers Evangelos Moustakas , Nishtha Lamba , Dina Ranganathan N/A
Cybersecurity Risk Management in Small and Medium-Sized Enterprises: A Systematic Review of Recent Evidence Abdulmajeed Duncan N/A
Social big data: A Twitter text mining approach to the communication of universities during the Lebanese protests Katia Raya , Nicole Chamoun N/A
Towards Security Attack and Risk Assessment during Early System Design Lukas Gressl , Michael Krisper , Christian Neffe N/A
Introducing & Evaluating ‘Nutrition Facts’ for Online Content Matthew Spradling , Jeremy Strong N/A
Examining the Impact of Implementing Cyber Security Articulation Agreements Between Public and Private Higher Educational Institutions in 9-12 High Schools Thomas J. Rzemyk N/A
Technical codes’ potentialies in cyber security: A contextual approach on the ethics of small digital organizations in France Theo Venard N/A
Educating multidisciplinary undergraduates on security and privacy Katorah Williams , Mollie Rege N/A
Privacy Protection Behaviours: a diversity of individual strategies Bertrand Venard N/A
Think Smart, Play Dumb: A Game-Theoretic Approach to Study Deception in Hardware Trojan Testing Tapadhir Das , Abdelrahman Sengupta N/A
Insider Threat Detection: A Solution in Search of a Problem Jordan Thomson N/A
Epistemological Questions for Cybersecurity Timothy D. Williams N/A
Platform for monitoring and clinical diagnosis of arboviruses using computational models Sebastião Neto , Thomás Oliveira , Vanderson Sampaio , Theo Endo N/A
Industry Panel Discussion - Countering Crime & Fraud using Cyber Threat Intelligence James Chappell , Wayne Bursey N/A
Industry Panel Discussion - IT Security & Governance, Risk & Assurance in the Enterprise post-COVID-19 Vincent Blake , Pearson Plc , Valerie Lyons N/A
Graphical analysis of captured network packets for detection of suspicious network nodes Felix Larbi Aryeh , Boniface Olasehinde N/A
Analysis of the RPL Version Number Attack with Multiple Attackers Ahmet Aris Oktug N/A
Secure Framework for Anti-Money-Laundering using Machine Learning and Secret Sharing Arman Zand , James Pfluegel N/A
Decentralized Identifier Distribution for Moving Target Defense and Beyond Daniel Schotten N/A
Explainable AI in Smart Healthcare Urja O'reilly N/A
Automated Vulnerability Testing via Executable Attack Graphs Drew Malzahn , Zachary Birnbaum , Cimone Wright-hamor N/A
Keynote Speech: DNS, Domains & COVID-19 Dr Siôn Lloyd N/A
A Design Exploration Framework for Secure IoT-Systems Lukas Gressl , Alexander Rech , Christian Steger , Andreas Weissnegger N/A
ethVote: Towards secure voting with distributed ledgers Johannes Vasilomanolakis N/A
Testing And Hardening IoT Devices Against the Mirai Botnet Nikolaos Pitropakis , Christopher Kelly , Sean Lambrinoudakis N/A
A DLT-based Trust Framework for IoT Ecosystems Ramona Marfievici , Tharindu Ranathunga , Alan Rea N/A
Application and analysis of record linkage techniques to integrate Brazilian health databases Maicon Barros , Morgana Leite , Vanderson Endo N/A
Application of the Benford’s law to Social bots and Information Operations activities Lale Hall N/A