Special issue on Cloud Forensics and Security (Journal of Cloud Computing, SpringerOpen)


Posted in Cybercrime, Digital Forensics, Security | Leave a comment

ODBMS Q&A with Data Scientists Interview

See http://www.odbms.org/2016/11/qa-with-data-scientists-richard-j-self/ for the first interview in the ODBMS Q&A with Data Scientists series that I gave on 15 Nov 2016.

This interview comments on aspects of Data Science such as Machine Learning, Predictive Modelling, Data Blending and Data Ingestion into analytical systems.

Posted in Artificial Intelligence, Big Data, Business Value, Cognitive Computing, Data Analytics, Data Science, Governance, Machine Learning, Richard Self | Leave a comment

1st Workshop on The Human Side of Cybersecurity

The Human Side of Cybersecurity: assessment, measurement and modelling (HuSCy:ASM16)

Collocated with 9th IEEE/ACM International Conference on Utility and Cloud Computing

December 6-9, 2016

Tongji University – Shanghai, China

 Call for papers

This workshop intends to pay a closer look into the concept of securing end users as they interact with today’s online technologies. Understanding users’ behaviour in the context of how they are manipulated within the norms and practices of their ecosystems as opposed to technologies in place to provide the protection is the central issue for this workshop. As humans need to be at the centre of such secure systems, the need to understand the characteristics of the interaction between humans and systems is evident. The human aspects of the interaction with systems is predominately visual, auditory and textual. The need to understand how humans fail to secure themselves and protect their well-being is paramount. To constrain a product confines innovation considerably and unexpected and unplanned use of technology has merits, hence security needs to be integrated within technologies to pre-empt possible cyberattacks. Such technologies need to learn and embed user behaviours and learn the ever changing face of cyberattacks.

The scope of this workshop encourages researchers in the areas of cybersecurity, data mining, natural text processing, machine learning, HCI, cognitive psychology, sensors (eye tracking, EEG, ECG, etc.), neuroscience, game theory, criminology and law among others to contribute to this important and evolving area of research.

Authors of best papers accepted for the conference will be encouraged to submit expanded versions of the papers to be included in an edited book by Springer shortly after the conference.

Important dates and Submission

  • Paper Submissions Due:                15th August, 2016
  • Notification of Acceptance:           10th September, 2016
  • Early Registration Deadline:         21st September, 2016

Paper Submission:

Authors are encouraged to submit high-quality, original work that has neither appeared in, nor is under consideration by, other conferences and journals.

The length of the papers should not exceed 6 pages (IEEE Computer Society Proceedings Manuscripts style: two columns, single-spaced), including figures and references, using font size 10, and number each page. All papers will be peer reviewed and the comments will be provided to the authors. The accepted papers will be published in the main proceedings of the IEEE/ACM UCC 2016 by the IEEE Computer Society Press and indexed by EI. At least one of the authors of their accepted paper is requested to register the paper and present the work in the IEEE/ACM UCC 2016.

IEEE Computer Society Proceedings template is available at: http://www.ieee.org/conferences_events/conferences/publishing/templates.html

Submission will be handled through EasyChair. Please find the submission link: https://easychair.org/conferences/?conf=huscyasm2016


Posted in Uncategorized | Leave a comment

CLOUDFOR 2016: Workshop on Cloud Forensics

To be held at UCC in Shanghai, China; 6-9 December 2016.


Posted in Uncategorized | Leave a comment

The 3rd International Workshop on Trust in Cloud Computing (IWTCC 2016)

The 3rd International Workshop on Trust in Cloud Computing

Collocated with 9th IEEE/ACM International Conference on Utility and Cloud Computing

December 6-9, 2016

Tongji University – Shanghai, China

 Call for papers

 Trust is a key requirement for the successful uptake and operation of Utility and Cloud Computing (UCC). Service consumers must have belief that their data is safe and protected and service providers must provide sufficient assurances to satisfy these beliefs. However many challenges need to be overcome before this is possible. A myriad of trust relationships can arise between the different players in the UCC service delivery chain and these need to be understood and described as do the consequential assurance approaches that may be required. Complex, and varying, UCC service delivery environments may require very different and context dependent mechanisms to provide the assurances needed. This workshop aims to explore approaches to the definition and establishment of trust relationships in a dynamic and evolving UCC service environment and to investigate mechanisms, methodologies and technologies to enable the provision of assurances that are needed to fulfil users trust beliefs.

The IWTCC will be held in Shangai, China in December, 2016. It provides a forum for researchers world-wide to present their latest work in privacy, security and trust in the cloud, and to show how this research can be used to enable innovation.


We encourage submissions on theoretical as well as experimental studies related to all aspects of trust and security and privacy in the cloud. Topics of interests include, but are NOT limited to, the following categories:

  • Trust models in UCC.
  • Cryptographic techniques for privacy preservation
  • Identity, Authentication and key management
  • Formal verification for cloud architecture
  • Practical cryptographic protocols for cloud security
  • Intrusion Detection Technologies for cloud contexts
  • SDN Security
  • Provenance and digital forensics
  • Monitoring systems in the cloud
  • Remote attestation mechanisms in clouds
  • Trusted computing technology and clouds
  • Cloud Integrity and Audit
  • Privacy and security in Vehicular cloud
  • Multi-tenancy and trust in cloud computing


Important dates and Submission

  • Paper Submissions Due:                5th August, 2016
  • Notification of Acceptance:           1st September, 2016
  • Early Registration Deadline:         21st September, 2016

Authors are invited to submit papers electronically through Easychair. Manuscripts may not exceed six (6) letter size (8.5 x 11) pages including figures, tables and references using the IEEE format for conference proceedings (print area of 6-1/2 inches (16.51 cm) wide by 8-7/8 inches (22.51 cm) high, two-column format with a 3/8 inch (0.81 cm) space between them, single-spaced 10-point Times fully justified text). Submitted papers must represent original unpublished research that is not currently under review for any other conference or journal. Papers not following these guidelines will be rejected without review and further action may be taken, including (but not limited to) notifications sent to the heads of the institutions of the authors and sponsors of the conference. Additional pages may be purchased (in some circumstances) subject to approval by the proceedings chair. Authors of accepted papers must guarantee that their papers will be presented at the workshop.

Electronic submissions must be in the form of a readable PDF file. Manuscripts must be received by August 5, 2015.

The submission link : https://edas.info/newPaper.php?c=22710

Organising committees

General chairs

Abir Awad, University of South Wales,UK.

Asma Adnane, University of Derby, UK.

Brian Lee, Athlone Institute of Technology, Ireland.

Technical program committee

Ashiq Anjum, University of Derby, UK.

Rafael Timoteo De Sousa Junior, University of Brasilia, Brazil

Christophe Bidan, Supelec, France.

Siraj Shaikh, Coventry University, UK

Minsi Chen, University of Derby, UK.

Eric Filiol, ESIEA, France.

Sara Kadry Hamouda, Athlone Institute of Technology, Ireland.

Ryan Ko, University of Waikato, New Zealand.

Lu Liu, University of Derby, UK.

Theo Lynn, Dulin City University, Ireland.

Sheikh Mahbub Habib, CASED, Darmstadt, Germany.

Ali Miri, Ryerson University, Canada.

John P. Morrison, University College Cork, Ireland.

Kim Smith, University of Derby, UK.

Maryline Laurent, Telecom SudParis, France.

Guy Gogniat, University of Bretagne-Sud, France.

Bachar El Hassan, Libanese University.

Guillaume Hiet, Supelec, France

Kim-Kwang Raymond Choo, University of South Australia.

Qiang Guan, Los Alamos National Laboratory, USA

Kaniz Fatema, Trinity College Dublin.

Posted in Uncategorized | Leave a comment

Keynote Talk at Pan European StrategyForum Retail at Crowne Plaza Barcelona Fira Center, Barcelona 22 April 2016

I am just back from presenting a keynote talk on the topic of “Governance of Big Data and Analytics to Gain Value from Location Services in the Retail Sector“. This was a very interesting conference of senior executives from the European Retail Sector. the majority of the keynote speakers were also senior executives from the sector.

My contribution was to provide an overview of some of the governance questions that organisations need to ask themselves in order to gain the answers that will guide them towards an effective use of analytics and, in particular, the use of location services, through the use of the 12 Vs of Big Data, see http://computing.derby.ac.uk/c/big-data-analytics-analytics-12-vs/ .

The slides are here   and the video can be found here.


Posted in Big Data, Governance, Richard Self, Uncategorized | Leave a comment

Information Security Conferences in 2016

Concise publishes a comprehensive list of information security conferences updated on a daily basis – worth checking:

Posted in Uncategorized | Leave a comment

CYBERSUP’16: Workshop on Cybersecurity Risk and Trust Management across Supply Chains


Posted in Uncategorized | Leave a comment

The 9th International Workshop on Digital Forensics

WSDF 2016 to be held at ARES conference, 31/08-02/09 2016, in Salzburg, Austria.

Posted in Computer Forensic Investigation, Cybercrime | Leave a comment

JDFSL Special issue on Cyberharassment Investigation: Advances and Trends.

Please find the CFP here

Posted in Computer Forensic Investigation, Cybercrime | Leave a comment