Data Science for Cyber-Security
25-27th September 2017, Imperial College London, U.K.
DSCS 25-27th Sep 2017

Talks

Alejandro Correa Bahnsen Fraud Detection by Stacking Cost-Sensitive Decision Trees
John Conroy Graph Classification for the Red Team Event of the Los Alamos Authentication Graph
Mark Patrick Roeling Stochastic Blockmodels as an unsupervised approach to detect botnet infected clusters in networked data
Eirini Spyropoulou Anomaly Detection on User Agent Strings
Shi Zhou Detection of Twitter botnets based on abnormal features
Matt Price-Williams Self-exciting models for computer network event time data
Chris Schon Clustering and monitoring edge behaviour in enterprise network traffic
Marina Evangelou Statistical Anomaly Detection Framework for Cyber-Security
Luis Munoz Gonzalez Poisoning Attacks against Machine Learning Systems with Back-gradient Optimization
Jordan Noble Real-time Network Anomaly Detection via Correlation Change
Josh Plasse An Adaptive Modeling Framework for Bivariate Data Streams with Applications to Change Detection in Cyber-Physical Systems
Jonathan Spring Towards automating reasoning over cybersecurity data
Paul Lewis Real World Cyber Security Use Cases for Machine Learning and Artifical Intelligence within Financial Services
Xin Hong Evidential Alert Correlation for Network Intrusion Detection
Lorenzo Cavallaro Transcend: Detecting Concept Drift in Malware Classification Models
Natallia Katenka Browser-based malware spread analysis of university computer network with partially observed traffic
Greg Shannon Advancing the Foundations of Data Science for Cybersecurity

Posters

Silvia Metelli New edge activity in large computer networks
Xinyu Zhang Latent Feature Models for Cyber-Security
Francesco Sanna Passino Predicting and detecting anomalous edges in large computer networks
Matthew Price-Williams Time of day anomaly detection for user credentials
Elizabeth Riddle-Workman Streaming Anomaly Detection within Network Data Sources
Henry Clausen TBA
Jonathan Roscoe Bitcoin Transaction Analysis with Machine Learning
Gerard Briscoe Designing Digital Omnitemporality: Tyranny of Surveillance
Ilia Nouretdinov Sequential binning privacy model for data with prior knowledge of feature dependencies
Yipeng Cheng Machine Assisted Cyber Threat Hunting