|
Start |
Length |
Session |
Topic |
Speaker |
Monday research symposium August 19th 2024
|
9:00 |
30 |
Registration |
|
|
9:30 |
5 |
Session 1.1
|
Welcome |
Karen Renaud (University of Strathclyde, Computer & Informaiton Sciences) |
9:35 |
30 |
IT security and AI |
Andreas Aßmuth (OTH Amberg-Weiden) |
10:05 |
45 |
Human-Centred Security |
Ryan Gibson (University of Strathclyde, Computer & Information Sciences) |
10:50 |
15 |
Break |
|
|
11:05 |
30 |
Session 1.2
|
Automated Detection of Human Trafficking Ads Through Machine Learning |
Richard Frank (Simon Fraser University) |
11:35 |
30 |
AI Security Attacks |
Manmeet Mahinderjit Singh |
12:05 |
15 |
Policy and Capability in Cybersecurity |
Partha Das Chowdhury |
12:20 |
40 |
Lunch |
|
|
13:00 |
30 |
Session 1.3
|
Cybercrime and Digital Harm: Community and Response Policing of Local Cybercrime in Scotland |
Shane Horgan (Edinburgh Napier University) |
13:30 |
30 |
Financially Motivated Sexual Extortion (Sextortion) |
Katarzyna Owczarek (Police Scotland) |
14:00 |
30 |
Identifying Factors that Promote or Deter Cybercrimes Reporting in Scotland |
Juraj Sikra (University of Strathclyde, Computer & Information Sciences) |
14:30 |
15 |
Break |
|
|
14:45 |
30 |
Session 1.4
|
Security Concerns of Cloud Computing |
Mohammad Tayebi (Simon Fraser University) |
15:15 |
30 |
Rethinking Security: Biometric Technologies and Human Rights Protection |
Birgit Schippers (University of Strathclyde, Law) |
15:45 |
30 |
Investigation and evaluation of modern password cracking methods |
Theresa Weber (OTH Amberg-Weiden) |
16:15 |
|
End |
|
|
Tuesday summer school August 20th, 2024
|
9:30 |
10 |
Session 2.1
|
Introductions |
Richard Frank (Simon Fraser University) |
9:40 |
45 |
Data Detectives: The OSINT Workshop
|
Jamie O’Hare (University of Abertay)
|
10:25 |
45 |
11:10 |
15 |
Break |
|
|
11:25 |
45 |
Session 2.2
|
Online Child Sexual Exploitation and Victimisation: A place-based approach |
Christine A. Weirich (University of Leeds, Law) |
12:10 |
45 |
In The Defence of Realm: Challenges of Cyber Security Professionals |
Ali Farooq (University of Strathclyde, Computer & Information Sciences) |
12:55 |
40 |
Lunch |
|
|
13:35 |
45 |
Session 2.3
|
The Evolving Legal Framework for Ransomware Attacks: Targeting Perpetrators, Networks, or Victims? |
Gaia Fiorinelli (Sant'Anna School of Advanced Studies- Pisa) |
14:20 |
45 |
Motivations and decision making of cybercriminals |
John McAlaney (Bournemouth University) |
15:05 |
15 |
Break |
|
|
15:20 |
45 |
Session 2.4 |
Using Data to Disrupt DDoS |
Elliott Peterson (Special agent, DCIS) |
16:05 |
|
End |
|
|
Wednesday summer school August 21st 2024
|
9:30 |
45 |
Session 3.1
|
Sharenting and Surveillance: The Dangers of Sharing Children’s Lives Online |
Chelsea Jarvie (University of Strathclyde, Computer & Information Sciences) |
10:15 |
45 |
Peering Pressure: Social action against cybercrime at Internet scale |
Ben Collier (University of Edinburgh) |
11:00 |
15 |
Break |
|
|
11:15 |
45 |
Session 3.2
|
Cybercrime Perspective in ASEAN countries |
Manmeet Mahinderjit Singh (Universiti Sains Malaysia) |
12:00 |
45 |
Digital Evidence, Prosecutors and Juries. What could possibly go wrong? |
Basil Manoussos (Expert Witness, Digital Forensics & Cybercrime Consultant) |
12:45 |
40 |
Lunch |
|
|
13:25 |
45 |
Session 3.3
|
Penetration Testing 101: Exploring the Basics of Security Testing and Evaluation |
Mohammad Tayebi (Simon Fraser University) |
14:10 |
45 |
Keeping the Lights On: The Challenge of Power Network Security |
James Irvine (University of Strathclyde, Electronic and Electrical Engineering) |
14:55 |
15 |
Break |
|
|
15:10 |
45 |
Session 3.4
|
Cybercrime extortion threat and awareness in Saudi Arabia and Scotland |
Abdulaziz Alzubaidi (Umm Alqura University ) |
15:55 |
45 |
It doesn't end with encryption: A tactical approach to strategic decision making |
Mark Cunningham-Dickie (Quorum Cyber) |
16:40 |
|
End |
|
|
Thursday summer school August 22nd 2024
|
9:30 |
45 |
Session 4.1
|
CHERI and Memory Safety |
Jeremy Singer (University of Glasgow) |
10:15 |
45 |
Data rights as a research methodology |
Tristan Henderson (University of St Andrews) |
11:00 |
15 |
Break |
|
|
11:15 |
45 |
Session 4.2
|
Digital Forensic Evidence in Court – A reflection on two recent cases |
Ian Ferguson (University of Abertay)
|
12:00 |
45 |
|
12:45 |
40 |
Lunch |
|
|
13:25 |
45 |
Session 4.3
|
Phishing Workshop
|
Andreas Aßmuth (OTH Amberg-Weiden) Richard Frank (Simon Fraser University)
|
14:10 |
45 |
14:55 |
15 |
Break |
15:10 |
45 |
Session 4.4
|
15:55 |
45 |
16:40 |
|
End |
|
|
Friday summer school August 23rd 2024
|
9:30 |
30 |
Session 5.1
|
Revealing Privacy Concerns by Designing a Conceptual Framework for Smart Tourism |
Mona Kherees (University of Strathclyde, Computer & Information Sciences) |
10:00 |
30 |
Cognitive processes underpinning children’s password practice |
Maria Lamond (Abertay University) |
10:30 |
30 |
Cybercriminal youth networks |
Joeri Loggen (The Hague University of Applied Sciences) - Zoom |
11:00 |
15 |
Break |
|
|
11:15 |
30 |
Session 5.2
|
Side-Channel Attacks on Physical User Input |
Darren Fürst (OTH Amberg-Weiden) |
11:45 |
45 |
Assessing Singularities in Cloud Based Applications |
Jide Edu (University of Strathclyde, Computer & Information Sciences) |
12:30 |
40 |
Lunch |
|
|
13:10 |
45 |
Session 5.3
|
Distributed Denial of Service attacks |
Daniel Thomas (University of Strathclyde, Computer & Information Sciences) |
13:55 |
45 |
Cumulative Revelations in Personal Data: Some methodological insights |
Emma Nicol (University of Strathclyde, Computer & Information Sciences) |
14:40 |
15 |
Break |
|
|
14:55 |
45 |
Session 5.4
|
Type-Driven Trustworthy System Design |
Jan De Muijnck-Hughes (University of Strathclyde, Computer & Information Sciences) |
15:40 |
45 |
Closing thoughts |
Richard Frank (Simon Fraser University) |
16:25 |
|
End |
|
|