Tentative Program
Date | Time | Program | Venue |
---|---|---|---|
June 12, 2016 (Sunday) | 1800 - 2100 hrs | Cocktail Reception | Room 1400-1420 Harbour Centre |
June 13, 2016 (Monday) | 08:00 | Registration and coffee | ICBC Concourse |
0845 hrs | Opening Ceremony Chair Prof. Neil Boyd | Asia Pacific Hall | |
0900 - 0955 hrs | Keynote: Thomas J. Holt (School of Criminal Justice, Michigan State University, USA): Comparing the Practices of Open and Dark Web Markets For Stolen Data Chair: Martin Bouchard | Asia Pacific Hall | |
1000 - 1100 hrs | Parallel Session 1A - Social Issues and Perspectives Chair: Martin Bouchard | Wosk 320 | |
• Aunshul Rege. Incorporating the Human Element in Anticipatory and Dynamic Cyber Defense | |||
• Lennon Chang, Lena Zhong and Peter Grabosky, Citizen Co-production of Cyber Security: Self-Help, Vigilantes, and Cybercrime | |||
• Suleman Ibrahim, Social and Contextual Taxonomies of Cybercrime | |||
1000 - 1100 hrs | Parallel Session 1B - Security and Digital Forensics Chair: Bob Gill | Wosk 420 | |
• Rick Sarre, Metadata and the Surveillance Imperative | |||
• Oluwasola Mary Adedayo, Big Data and Digital Forensics: Rethinking Digital Forensics | |||
• Masaya Yoshikawa and Yusuke Nozaki. Electromagnetic Analysis Attacks for a Lightweight Cipher PRINCE | |||
1000 - 1100 hrs | Parallel Session 1C - Student Panel Chair: Gregor Urbas | Asia Pacific Hall | |
• Om Agarwal, Stop being Bullied Part-2 (A Novel Approach to Ease Bullying) | |||
• Harriet Slee (University of Canberra), Cyberstalking | |||
• Reeva Mittal (University of Canberra), Cyberbullying and online defamation | |||
1100 - 1115 hrs | Coffee | ICBC Concourse | |
1115 - 1215 hrs | Parallel Session 2A - Child Exploitation Chair: Patrick Neal | Wosk 320 | |
• Gregor Urbas, Covert Investigation of Online Child Exploitation: New Crimes, Methods And Challenges | |||
• Bryce Westlake and Richard Frank, Seeing the Forest Through the Trees: Identifying Key Players in the Online Distribution of Child Sexual Exploitation Material | |||
1115 - 1215 hrs | Parallel Session 2B - Law, Detection and Reporting Chair: Laurie Lau | Wosk 420 | |
• Morvareed Bidgoli and Jens Grossklags, End User Cybercrime Reporting: What We Know and What We Can Do to Improve It | |||
• Nicola Chemello, Correlating CDR with Other Data Sources: Succeeding Against Anti-Forensics | |||
1215 - 1315 hrs | Lunch | ICBC Concourse | |
1315 - 1410 hrs | Keynote: Benoît Dupont (Scientific Director – Smart Cybersecurity Network (SERENE-RISC), Université de Montréal, Canada): The Hackers’ Dilemma Chair: Martin Bouchard | Asia Pacific Hall | |
1415 - 1515 hrs | Parallel Session 3A - Language-based Approaches Chair: Ljiljana Trajkovic | Wosk 320 | |
• George Weir and Patrick Neal, Methods and Risks of Textual Steganography | |||
• Elinor Forsman, Fredrik Johansson and Lisa Kaati, Semantic Technologies for Detecting Names of New Drugs on Darknets | |||
• Katie Cohen, Lisa Kaati and Amendra Shrestha, Linguistic Analysis of Lone Offender Manifestos | |||
1415 - 1515 hrs | Parallel Session 3B - Technical Approaches to Cybercrime and Cybersecurity Chair: Lennon Chang | Wosk 420 | |
• Yachi Chang and Junlong Chen, Biometrics: The Bigger Brother | |||
• Hua-An Zhao and Kazuma Uchida, A De-noising Algorithm for Voice Recognition with Low SNR | |||
• Venkata Sai Manikanta Manugula and Magesh S, A Method to Enhance the Security of Kerberos by using Quantum Cryptography | |||
1415 - 1515 hrs | Parallel Session 3C - Student Panel Chair: Richard Frank | Asia Pacific Hall | |
• Tim Dingwall (University of Canberra), Compelled law enforcement assistance | |||
• Nell Shipley (University of Canberra), Revenge Porn | |||
• Caitlin Saunders (University of Canberra), Child pornography | |||
• Gideon Sua (University of Canberra), Online copyright piracy | |||
1515 - 1530 hrs | Coffee | ICBC Concourse | |
1530 - 1630 hrs | Parallel Session 4A - Cybercrime Chair: Gregor Urbas | Wosk 320 | |
• Alana Maurushat, The Role of Private Cybercrime Companies in Tackling Online Fraud and the Trade of Counterfeit Goods Online | |||
• John McMullan, Cyber Crime, Online Gambling and Money Laundering | |||
• Cassandra Cross, Combating Online Fraud Victimisation Through the Use of Financial Intelligence: An Australian Case Study | |||
1530 - 1630 hrs | Parallel Session 4B - Social Networks Chair: Laurie Lau | Wosk 420 | |
• Abhishek Parakh. A New Metric for Understanding Social Networks | |||
• Mitch Macdonald, Richard Frank and Martin Bouchard, Shuffle Up and Deal: Estimating the Size and Sustainability of Online Fraud Networks | |||
• Alejandro Diaz, Jongeun Choi, Tomas Holt, Steven Chermak and Joshua Freilich, Data-Driven System Identification of the Social Network Dynamics in Online Postings of an Extremist Group | |||
1900 - 2200 hrs | Ting Forum Open to the public (free of charge) through advance registration at: http://at.sfu.ca/MhAlHV Chair: Dr Barry Cartwright | Asia Pacific Hall | |
Dr. George Weir, University of Strathclyde, UK Cybersecurity as a health issue | |||
Dr. Gregor Urbas, University of Canberra, Australia Anti-Social Media | |||
Dr. Lennon Chang, Monash University, Australia Cybercrime as an infectious disease in the virtual world | |||
June 14, 2016 (Tuesday) | 0830 - 0900 hrs | Registration and coffee | ICBC Concourse |
0900 - 0955 hrs | Keynote: Michael Levi (School of Social Sciences, Cardiff University, UK): Police, Third Party Policing and the Dilemmas of Responding to Economic Cybercrimes Chair: George Weir | Asia Pacific Hall | |
1000 - 1100 hrs | Parallel Session 5A - Law, Detection and Reporting Chair: George Weir | Wosk 320 | |
• Barry Cartwright, Cyberbullying and Cyber Law: A Canadian perspective | |||
• Brianna O'Shea, Roberta Julian, Jeremy Prichard and Sally Kelty, The Investigation and Prosecution of Cyberstalking in Australia | |||
• David Décary-Hétu and Mathieu Lavoie, Follow the Leaders: Tracking Offenders through their Bitcoin Wallets | |||
1000 - 1100 hrs | Parallel Session 5B – Extremism and Darknet Chair: Laurie Lau | Wosk 420 | |
• Gary Lafree and Tom Holt, Social Learning and Social Control in the Off and Online Pathways to Hate and Extremist Violence | |||
• Bryan Monk, Julie Mitchell and Richard Frank, Analyzing Extremism on Tor using Social Network Analysis through Automated Data Capture | |||
• George Weir, Richard Frank, Barry Cartwright and Emanuel dos Santos, Positing the Problem: Enhancing Classification of Extremist Web Content Through Textual Analysis | |||
1100 - 1115 hrs | Coffee | ICBC Concourse | |
1115 - 1215 hrs | Parallel Session 6A - Domain-Specific Issues Chair: Barry Cartwright | Wosk 320 | |
• Nick McDonald, Youry Khmelevsky, Rob Bartlett, Alex Needham, David Leader and Cheng-Kao Chiang, A New On-Line Tool for Gamer Network Performance Analysis | |||
• Laurie Lau, Aqua-fi: Risks and Responses | |||
• Gaétan Hains, Youry Khmelevsky, Rob Bartlett and Alex Needham, Gamers Private Network Performance: An Analytical Model(s) for Very-Large Scale Simulation | |||
1115 - 1215 hrs | Parallel Session 6B - Social Issues and Perspectives Chair: Patrick Neal | Wosk 420 | |
• Regner Sabillon, Jeimy Cano, Victor Cavaller and Jordi Serra, Cybercriminals, Cyberattacks and Cybercrime: Privacy, Security and Control | |||
• David Lacey and Cassandra Cross. (Social Science Stream): The Long and Winding Road: Exploring a Victim’s Perspective of Identity Theft Restoration | |||
• Samar Albladi and George Weir, Vulnerability to Social Engineering in Social Networks: A User-Centric Framework | |||
1215 - 1330 hrs | Lunch | ICBC Concourse | |
1330 - 1425 hrs | Keynote: Tim McCreight (Above Security): Developing a Forensics Program Executives Understand Chair: Laurie Lau | Asia Pacific Hall | |
1430 - 1530 hrs | Parallel Session 7A - Extremism and Darknet Chair: George Weir | Wosk 320 | |
• Ahmed Zulkarnine and Richard Frank, Challenges of studying Tor Network for Illicit and Terrorist Contents | |||
• Anastasia Powell, Gender-Based Hate in Cyberspace: Responding to Technology Facilitated Violence Against Women | |||
• Ryan Scrivens, Garth Davies and Richard Frank, Predicting Online Sentiment in a “Hornet’s Nest:” An Analysis of Prolific Users on Stormfront | |||
1430 - 1530 hrs | Parallel Session 7B - Cloud Chair: Ljiljana Trajkovic | Wosk 420 | |
• Nick McDonald, Daniel Atkinson and Youry Khmelevsky, Personal and Corporate Biomedic Data Initial Processing and Secure Storage in the Cloud | |||
• Najla Etaher and George Weir, Understanding Children’s Mobile Device Usage | |||
1530 - 1545 hrs | Coffee | ICBC Concourse | |
1545 - 1645 hrs | Parallel Session 8A - Social Issues and Perspectives Chair: Barry Cartwright | Wosk 320 | |
• Mandeep Pannu, Bob Gill and Robert Bird, Exploring Proxy Detection Methodology | |||
• Suleman Ibrahim, Causes of Socioeconomic Cybercrime in Nigeria | |||
1545 - 1645 hrs | Parallel Session 8B - Digital forensics and Cybercrime Chair: George Weir | Wosk 420 | |
• Alexander Mikhaylov, Mitch Macdonald and Richard Frank, CC, Plastic or “Karton”: Comparative Analysis of English- and Russian-speaking Carding Forums | |||
• Stephanie Lau, Forget about the Offender, It’s All about the Money: A Closer Examination of Credit Card Fraud and Security through a Qualitative Lens | |||
• Liza Ahmad, Farkhund Iqbal and Omar Alfandi, Cloud Storage Forensics in Tablets: Dropbox, OneCloud and Google Drive as a Case Study | |||
1545 - 1645 hrs | Parallel Session 8C – The Wider Context Chair: Bob Gill | Asia Pacific Hall | |
• Andreea Bendovschi and Ameer Al-Nemrat, Security Countermeasures in the Cyber-World | |||
• Khulood Ali Al Zaabi, Android Device Hacking Tricks and Countermeasures | |||
• Nicholas Athey, "Trafficking on Steroids": Learning to be An International Drug Smuggler Through Online Discussion Boards | |||
1710 hrs | Closing conference address Chair: Laurie Lau | Asia Pacific Hall | |
1800 - 2100 hrs | Gala Dinner | Kirin Restaurant, 1172 Alberni Street |
Program is subject to change. Only presented papers by registered delegates will be indexed by IEEE Xplore.