Adrian Taylor – Detecting anomalies on the automotive control bus with machine learning

Presented at the SERENE-RISC Workshop, 2017 October.  Detecting anomalies on the automotive control bus with machine learning. Cars are vulnerable to hacking. While automotive cyber attacks are not yet a widespread threat, learning how to detect them will be an important part of future countermeasures. Attacks must be crafted for specific models, so attack detectors must …

Cameron Field – Filling the Gaps: Typological Research, Enhancing Cyber Safety and Data

Presented at the SERENE-RISC Workshop, 2017 October Academics, scientists, private sector and public sector actors have long relied on sociodemographic data, marketing data and other typological clusters to set context, variables and other tools in their respective research efforts. Whether its cutting edge emergency medicine research or dated law enforcement research from the 1970s, sociodemographic …

Thomas J. Holt – Surveying the State of Research On Policing Cybercrime: Local to Transnational Gaps

Presented at the SERENE-RISC Workshop, 2017 October. This presentation will provide an overview of the current state of criminological scholarship on policing cybercrimes. The current body of knowledge regarding line officers’ perceptions of cybercrime will be considered, as well as our knowledge of the specialized roles of forensic examiners. The limitations of this research will be considered, along with possible …

Ryan Duquette – Law Enforcement Challenges in investigating cybercrimes

Presented at the SERENE-RISC Workshop, 2017 October Instances of cybercrime are now a daily occurrence and many of these attacks affect us all. The threat landscape is constantly changing and evolving and the threat actors are no longer “hackers” lurking in the shadows.  Cyber-attacks have been shown to cause mass disruption, widespread panic, and in …

David Jones – The Intersection of Traditional Investigations and Cybercrime Investigations

Presented at the SERENE-RISC Spring Workshop 2016 The intersection of traditional professional investigations and cybercrime investigations. Professional investigators are finding they have to know more about cybercrime investigations and cybercrime investigators are discovering that they have to know more about the law and professional investigations. This presentation will discuss local and multinational investigations, who should …

Impact of Cyber Attacks on Data Integrity in Transient Stability Control

The development of intelligent energy management or smart grid systems are quite weak advanced however the critical nature of this infrastructure means that the reliability and security of the connected components are concerning. Maintaining energy stability across variations in generation and demand depends on the ability of the synchronous generators in the power system to …

Image-Centric Social Discovery Using Neural Network under Anonymity Constraint

A common part of social networks is sharing images. Storing and processing these images to provide engaging services to customers is resource intensive and social networks often rely on cloud services to provide these resources. This creates a potential security risk for the users of the social network platform. Simply encrypting the images before uploading …

Michael Joyce – Enterprise Cybersec101: Bridge the gap between your security policy and your people

Presented at GoSec 2017 Michael Joyce works on the many different aspects of the SERENE-RISC knowledge mobilization operations. He is the person behind the Network online knowledge-sharing platform and one of the driving forces behind the Cybersec 101 training. At SERENE-RISC, Michael is also responsible for the production of the quarterly knowledge digest. Before joining …

CAFC Bulletin: Fraude par Internet / Internet Fraud

Le Centre antifraude du Canada a publié un nouveau bulletin sur la fraude. Pour le mois de la sensibilisation à la cybersécurité, ils mettent en évidence les escroqueries malheureusement trop fréquentes sur Internet: Stratagèmes de rencontre Fraudes électroniques Fraudes par facturation continue Hameçonnage Biens contrefaits, et Options binaires (arnaque d’investissement) Lisez les Bulletins du CAFC …

Dmitry Samosseiko – Ransomware: the great equalizer

Presented at the SERENE-RISC Workshop – 2016 Spring The cyber-attacks targeting individuals and businesses worldwide continue to grow and wreak havoc. But one particular threat type clearly stands out from everything else we see today or had faced before. The file-encrypting ransomware has taken its victims by storm recently. It’s dominating the current threat landscape …