Organised by:


The Second International Workshop on 

 

Cyberpatterns

 

Unifying Design Patterns with Security, Attack and Forensic Patterns

8-9 July 2013,  Abingdon, Oxfordshire , UK

In association with:

Program


Home
Topics
Program
Local Info
PC Members
CFP
Registration
Submission
Click here for a pdf version of the timetable

Monday 8 July 

Time

Topic

10.00

Registration and coffee

10.45

Introduction to Cyberpatterns

Session 1

Digital Forensics Chair: Benjamin Aziz (Portsmouth University)

10.55

Digital Records Forensics: Integrating Archival Science into a General Model of the Digital Forensics Process – Corinne Rogers (University of British Columbia)

11.25

Early Forensic Detection on Cyber Crimes Based on Social Networks – Ffion Mai Roberts and Liangxiu Han (Manchester Metropolitan University)

11.50

Digital Forensonomics – the Economics of Digital Forensics – Richard Overill (King’s College, London)

12.15

Lunch

Session 2

Cybersecurity Chair: Richard Overill (King’s College, London)

1.15

Invited talk: Utilising Human Factors in the Science of Security – Adam Beautement (UCL)

2.00

Using a Penetration Testing Framework to Develop Attack Syndromes – Clive Blackwell and Aaron Greetham (Oxford Brookes)

2.25

External Validity and Referential Ambiguity in Geospatial Patterns – Harjinder Lallie (Warwick University)

2.50

Coffee

Session 3

Cybersecurity 2 Chair: David Llewellyn-Jones (Liverpool John Moores University)

3.10

Critique of the STIX Threat Representation Framework – Clive Blackwell (Oxford Brookes)

3.35

Online Communities: Visualization and Formalization – Jonathan Bowen (Museophile Limited)

4.00

Small group discussions guided by domain experts in security, forensics and patterns

5.00

Close

7.00

Dinner

Tuesday 9 July

Time

Topic

Session 1

Patterns Chair: Hong Zhu (Oxford Brookes)

9.00

Keynote talk: Security Pattern Assurance through Round-trip Engineering – Amnon Eden (University of Essex)

10.00

Issues Affecting the Adoption of Security Patterns – Jan de Muijnck-Hughes and Ishbel Duncan (St. Andrews)

10.30

Coffee

Session 2

Patterns 2 Chair: Ian Bayley (Oxford Brookes)

11.00

Requirements for Composite Security Pattern Specification – David Llewellyn-Jones, Muhammad Asim, Qi Shi and Madjid Merabti (Liverpool John Moores University)

11.30

Multi-Stage Attack Modelling – Zhan Cui, Ian Herwono and Paul Kearney (British Telecom)

12.00

Use of KAOS in Operational Digital Forensic Investigations – Benjamin Aziz (Portsmouth University) and Clive Blackwell (Oxford Brookes)

12.30

Lunch

Session 3

Patterns 3 Chair: Paul Kearney (British Telecom)

1.30

A Multilevel Approach Towards Challenge Detection in Cloud Computing – Noorulhassan Shirazi (Lancaster University)

1.55

Security Patterns Considered Harmful? – Shamal Faily (Oxford University)

2.20

Coffee

Session 4

Discussion groups

2.45

Forensics group for further dialogue and potential collaboration

Patterns group for further dialogue and potential collaboration

4.30

Close


Back to Top

Last updated: May 03, 2013.