“Thinking before posting?” Reducing cyber harassment on social networking sites through a reflective message

Harassment on online social media services or social networking sites is a growing issue and in particular, as there are a large number (1/5th) of Canadian adolescents that suffer victimization it is something that we should be looking at very seriously. Kathleen Van Royen, Karolien Poels and Heidi Vandebosch from Belgium and Philippe Adam from …

Pierre-Luc Vaudry – Feeding the Machine: Data Collection and Other Challenges of Machine Learning for Spam Detection

Presented at the SERENE-RISC Workshop, 2017 October Spam detection software can use both handcrafted rules and machine learning techniques. At ZEROSPAM we are aiming at reducing the need to create or edit rules manually to adapt to constantly evolving email-borne threats. At the same time, the performance of our machine learning tools could be improved …

Adrian Taylor – Detecting anomalies on the automotive control bus with machine learning

Presented at the SERENE-RISC Workshop, 2017 October.  Detecting anomalies on the automotive control bus with machine learning. Cars are vulnerable to hacking. While automotive cyber attacks are not yet a widespread threat, learning how to detect them will be an important part of future countermeasures. Attacks must be crafted for specific models, so attack detectors must …

Cameron Field – Filling the Gaps: Typological Research, Enhancing Cyber Safety and Data

Presented at the SERENE-RISC Workshop, 2017 October Academics, scientists, private sector and public sector actors have long relied on sociodemographic data, marketing data and other typological clusters to set context, variables and other tools in their respective research efforts. Whether its cutting edge emergency medicine research or dated law enforcement research from the 1970s, sociodemographic …

Thomas J. Holt – Surveying the State of Research On Policing Cybercrime: Local to Transnational Gaps

Presented at the SERENE-RISC Workshop, 2017 October. This presentation will provide an overview of the current state of criminological scholarship on policing cybercrimes. The current body of knowledge regarding line officers’ perceptions of cybercrime will be considered, as well as our knowledge of the specialized roles of forensic examiners. The limitations of this research will be considered, along with possible …

Ryan Duquette – Law Enforcement Challenges in investigating cybercrimes

Presented at the SERENE-RISC Workshop, 2017 October Instances of cybercrime are now a daily occurrence and many of these attacks affect us all. The threat landscape is constantly changing and evolving and the threat actors are no longer “hackers” lurking in the shadows.  Cyber-attacks have been shown to cause mass disruption, widespread panic, and in …

David Jones – The Intersection of Traditional Investigations and Cybercrime Investigations

Presented at the SERENE-RISC Spring Workshop 2016 The intersection of traditional professional investigations and cybercrime investigations. Professional investigators are finding they have to know more about cybercrime investigations and cybercrime investigators are discovering that they have to know more about the law and professional investigations. This presentation will discuss local and multinational investigations, who should …

Impact of Cyber Attacks on Data Integrity in Transient Stability Control

The development of intelligent energy management or smart grid systems are quite weak advanced however the critical nature of this infrastructure means that the reliability and security of the connected components are concerning. Maintaining energy stability across variations in generation and demand depends on the ability of the synchronous generators in the power system to …

Image-Centric Social Discovery Using Neural Network under Anonymity Constraint

A common part of social networks is sharing images. Storing and processing these images to provide engaging services to customers is resource intensive and social networks often rely on cloud services to provide these resources. This creates a potential security risk for the users of the social network platform. Simply encrypting the images before uploading …