Data Science for Cyber-Security
25-27th September 2017, Imperial College London, U.K.
DSCS 25-27th Sep 2017


Alejandro Correa Bahnsen Fraud Detection by Stacking Cost-Sensitive Decision Trees [slides]
John Conroy Graph Classification for the Red Team Event of the Los Alamos Authentication Graph [slides]
Mark Patrick Roeling Stochastic Blockmodels as an unsupervised approach to detect botnet infected clusters in networked data [slides]
Eirini Spyropoulou Anomaly Detection on User Agent Strings [slides]
Shi Zhou Detection of Twitter botnets based on abnormal features [slides]
Matt Price-Williams Self-exciting models for computer network event time data [slides]
Chris Schon Clustering and monitoring edge behaviour in enterprise network traffic [slides]
Marina Evangelou Statistical Anomaly Detection Framework for Cyber-Security [slides]
Luis Munoz Gonzalez Poisoning Attacks against Machine Learning Systems with Back-gradient Optimization [slides]
Jordan Noble Real-time Network Anomaly Detection via Correlation Change [slides]
Josh Plasse An Adaptive Modeling Framework for Bivariate Data Streams with Applications to Change Detection in Cyber-Physical Systems [slides]
Jonathan Spring Towards automating reasoning over cybersecurity data [slides]
Paul Lewis Real World Cyber Security Use Cases for Machine Learning and Artifical Intelligence within Financial Services [slides]
Xin Hong Evidential Alert Correlation for Network Intrusion Detection [slides]
Lorenzo Cavallaro Transcend: Detecting Concept Drift in Malware Classification Models [slides]
Greg Shannon Advancing the Foundations of Data Science for Cybersecurity [slides]


Silvia Metelli New edge activity in large computer networks
Xinyu Zhang Latent Feature Models for Cyber-Security
Francesco Sanna Passino Predicting and detecting anomalous edges in large computer networks
Matthew Price-Williams Time of day anomaly detection for user credentials
Elizabeth Riddle-Workman Streaming Anomaly Detection within Network Data Sources
Henry Clausen TBA
Jonathan Roscoe Bitcoin Transaction Analysis with Machine Learning
Gerard Briscoe Designing Digital Omnitemporality: Tyranny of Surveillance
Ilia Nouretdinov Sequential binning privacy model for data with prior knowledge of feature dependencies
Yipeng Cheng Machine Assisted Cyber Threat Hunting