NexTech 2021 Congress
October 03, 2021 to October 07, 2021 - Barcelona, Spain

  • UBICOMM 2021, The Fifteenth International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies
  • ADVCOMP 2021, The Fifteenth International Conference on Advanced Engineering Computing and Applications in Sciences
  • SEMAPRO 2021, The Fifteenth International Conference on Advances in Semantic Processing
  • AMBIENT 2021, The Eleventh International Conference on Ambient Computing, Applications, Services and Technologies
  • EMERGING 2021, The Thirteenth International Conference on Emerging Networks and Systems Intelligence
  • DATA ANALYTICS 2021, The Tenth International Conference on Data Analytics
  • GLOBAL HEALTH 2021, The Tenth International Conference on Global Health Challenges
  • CYBER 2021, The Sixth International Conference on Cyber-Technologies and Cyber-Systems

SoftNet 2021 Congress
October 03, 2021 to October 07, 2021 - Barcelona, Spain

  • ICSEA 2021, The Sixteenth International Conference on Software Engineering Advances
  • ICSNC 2021, The Sixteenth International Conference on Systems and Networks Communications
  • CENTRIC 2021, The Fourteenth International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services
  • VALID 2021, The Thirteenth International Conference on Advances in System Testing and Validation Lifecycle
  • SIMUL 2021, The Thirteenth International Conference on Advances in System Simulation
  • SOTICS 2021, The Eleventh International Conference on Social Media Technologies, Communication, and Informatics
  • INNOV 2021, The Tenth International Conference on Communications, Computation, Networks and Technologies
  • HEALTHINFO 2021, The Sixth International Conference on Informatics and Assistive Technologies for Health-Care, Medical Support and Wellbeing

NetWare 2021 Congress
November 14, 2021 to November 18, 2021 - Athens, Greece

  • SENSORCOMM 2021, The Fifteenth International Conference on Sensor Technologies and Applications
  • SENSORDEVICES 2021, The Twelfth International Conference on Sensor Device Technologies and Applications
  • SECURWARE 2021, The Fifteenth International Conference on Emerging Security Information, Systems and Technologies
  • AFIN 2021, The Thirteenth International Conference on Advances in Future Internet
  • CENICS 2021, The Fourteenth International Conference on Advances in Circuits, Electronics and Micro-electronics
  • ICQNM 2021, The Fifteenth International Conference on Quantum, Nano/Bio, and Micro Technologies
  • FASSI 2021, The Seventh International Conference on Fundamentals and Advances in Software Systems Integration
  • GREEN 2021, The Sixth International Conference on Green Communications, Computing and Technologies

TrendNews 2021 Congress
November 14, 2021 to November 18, 2021 - Athens, Greece

  • CORETA 2021, Advances on Core Technologies and Applications
  • DIGITAL 2021, Advances on Societal Digital Transformation

 


ThinkMind // CYBER 2018, The Third International Conference on Cyber-Technologies and Cyber-Systems

Type: conference

Download: CYBER 2018 cover page

Download: CYBER 2018 foreword page

Download: CYBER 2018 committee page

Download: CYBER 2018 table of contents

Download: CYBER 2018 full proceedings

Notes: IARIA Conference.

Editors:
Steve Chan, Harvard University/Decision Engineering Analysis Laboratory, USA
Tom Klemas, Decision Engineering Analysis Laboratory-Cambridge, USA
Xing Liu, Kwantlen Polytechnic University, Surrey, B.C., Canada
Keith Joiner, Australian Cyber Security Centre (ACSC), University of New
South Wales (UNSW), Canberra, Australia
Michael Massoth, Hochschule Darmstadt - University of Applied Sciences,
Germany

Event editions: - there are 6 editions.

ISSN: 2519-8599

ISBN: 978-1-61208-683-5

Location: Athens, Greece

Dates: from November 18, 2018 to November 22, 2018

Articles: there are 16 articles

A Comparative Evaluation of Automated Vulnerability Scans Versus Manual Penetration Tests on False-negative Errors
Saed Alavi, Niklas Bessler, and Michael Massoth
keywords: Security analysis; penetration test; vulnerability scan.

A Taxonomy of Attacks via the Speech Interface
Mary K. Bispham, Ioannis Agrafiotis, and Michael Goldsmith
keywords: cyber security; human-computer interaction; voice-controlled digital assistants; speech interface.

Cyber Security Using Bayesian Attack Path Analysis
Remish Leonard Minz, Sanjana Pai Nagarmat, Ramesh Rakesh, and Yoshiaki Isobe
keywords: cybersecurity; Bayesian network; attack path analysis; Weka; Py-BBN.

CyberSDnL: A Roadmap to Cyber Security Device Nutrition Label
Abdullahi Arabo
keywords: smart device security; privacy; cyber security; security labels; moving target defense

Prototype Orchestration Framework as a High Exposure Dimension Cyber Defense Accelerant Amidst Ever-Increasing Cycles of Adaptation by Attackers
Steve Chan
keywords: Cyber Attack Accelerants; Orchestration Framework; Uncertainty/Ambiguity Calculus; Deep Belief Network; Generative Adversarial Network.

Prototype Open-Source Software Stack for the Reduction of False Positives and Negatives in the Detection of Cyber Indicators of Compromise and Attack
Steve Chan
keywords: Threat Intelligence Processing Framework (TIPF); Security Orchestration (SO); Log [Analysis] and Correlation Engine (LCE); Container- Orchestration System (COS); Dynamic Service Discovery (DSD).

Prediction of Underground Fire Behavior in South Sumatra: Using Support Vector Machine With Adversarial Neural Network Support
Ika Oktavianti Najib
keywords: forest fire; peatland; smoke; haze; aerial sensor; subsurface sensor.

Countering an Anti-Natural Language Processing Mechanism in the Computer-Mediated Communication of “Trusted” Cyberspace Operations
Steve Chan
keywords: Satire; Natural Language Processing; Deep Learning; Dimensionality Reduction; Bi-Normal Separation Feature Scaling; Modified Association Matrix.

Harnessing Machine Learning, Data Analytics, and Computer-Aided Testing for Cyber Security Applications
Thomas Klemas and Steve Chan
keywords: artificial intelligence; expert systems, machine learning; supervised learning, unsupervised learning, pattern recognition, spectral methods, k-means, modularity, Lagrange multiplier, optimization, anomaly detection, data analytics, data science, networks

A Multi-Agent System Blockchain for a Smart City
André Diogo, Bruno Fernandes, António Silva, José Carlos Faria, José Neves, and Cesar Analide
keywords: blockchain; smart city; sensor data; multi-agent systems.

Threat Analysis using Vulnerability Databases - Matching Attack Cases to Vulnerability Database by Topic Model Analysis -
Umezawa Katsuyuki, Mishina Yusuke, Wohlgemuth Sven, and Takaragi Kazuo
keywords: Threat Analysis; Vulnerability Information; Attack Tree.

Reviewing National Cybersecurity Awareness in Africa: An Empirical Study
Maria Bada, Basie Von Solms, and Ioannis Agrafiotis
keywords: cybersecurity national strategies; cyber threat awareness; risk

Building A Collection of Labs for Teaching IoT Courses
Xing Liu
keywords: Internet of Things; IoT; teaching; courses; labs

IoT-Based Secure Embedded Scheme for Insulin Pump Data Acquisition and Monitoring
Zeyad A. Al-Odat, Sudarshan K. Srinivasan, Eman Al-Qtiemat, Mohana Asha Latha Dubasi, and Sana Shuja
keywords: IoT, Security, Embedded system.

A Methodology For Synthesizing Formal Specification Models From Requirements for Refinement-Based Object Code Verification
Eman Al-Qtiemat, Sudarshan K. Srinivasan, Mohana Asha Latha Dubasi, and Sana Shuja
keywords: requirements analysis; safety-critical IoT embedded devices; formal model; formal verification.

Static Stuttering Abstraction for Object Code Verification
Naureen Shaukat, Sana Shuja, Sudarshan Srinivasan, Shaista Jabeen, and Mohana Asha Latha Dubasi
keywords: Formal verification; static stuttering abstraction; stuttering instructions; refinement map; infusion pump

SERVICES CONTACT
2010 - 2017 © ThinkMind. All rights reserved.
Read Terms of Service and Privacy Policy.