NexTech 2021 Congress
October 03, 2021 to October 07, 2021 - Barcelona, Spain

  • UBICOMM 2021, The Fifteenth International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies
  • ADVCOMP 2021, The Fifteenth International Conference on Advanced Engineering Computing and Applications in Sciences
  • SEMAPRO 2021, The Fifteenth International Conference on Advances in Semantic Processing
  • AMBIENT 2021, The Eleventh International Conference on Ambient Computing, Applications, Services and Technologies
  • EMERGING 2021, The Thirteenth International Conference on Emerging Networks and Systems Intelligence
  • DATA ANALYTICS 2021, The Tenth International Conference on Data Analytics
  • GLOBAL HEALTH 2021, The Tenth International Conference on Global Health Challenges
  • CYBER 2021, The Sixth International Conference on Cyber-Technologies and Cyber-Systems

SoftNet 2021 Congress
October 03, 2021 to October 07, 2021 - Barcelona, Spain

  • ICSEA 2021, The Sixteenth International Conference on Software Engineering Advances
  • ICSNC 2021, The Sixteenth International Conference on Systems and Networks Communications
  • CENTRIC 2021, The Fourteenth International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services
  • VALID 2021, The Thirteenth International Conference on Advances in System Testing and Validation Lifecycle
  • SIMUL 2021, The Thirteenth International Conference on Advances in System Simulation
  • SOTICS 2021, The Eleventh International Conference on Social Media Technologies, Communication, and Informatics
  • INNOV 2021, The Tenth International Conference on Communications, Computation, Networks and Technologies
  • HEALTHINFO 2021, The Sixth International Conference on Informatics and Assistive Technologies for Health-Care, Medical Support and Wellbeing

NetWare 2021 Congress
November 14, 2021 to November 18, 2021 - Athens, Greece

  • SENSORCOMM 2021, The Fifteenth International Conference on Sensor Technologies and Applications
  • SENSORDEVICES 2021, The Twelfth International Conference on Sensor Device Technologies and Applications
  • SECURWARE 2021, The Fifteenth International Conference on Emerging Security Information, Systems and Technologies
  • AFIN 2021, The Thirteenth International Conference on Advances in Future Internet
  • CENICS 2021, The Fourteenth International Conference on Advances in Circuits, Electronics and Micro-electronics
  • ICQNM 2021, The Fifteenth International Conference on Quantum, Nano/Bio, and Micro Technologies
  • FASSI 2021, The Seventh International Conference on Fundamentals and Advances in Software Systems Integration
  • GREEN 2021, The Sixth International Conference on Green Communications, Computing and Technologies

TrendNews 2021 Congress
November 14, 2021 to November 18, 2021 - Athens, Greece

  • CORETA 2021, Advances on Core Technologies and Applications
  • DIGITAL 2021, Advances on Societal Digital Transformation

 


ThinkMind // CYBER 2016, The First International Conference on Cyber-Technologies and Cyber-Systems

Type: conference

Download: CYBER 2016 cover page

Download: CYBER 2016 foreword page

Download: CYBER 2016 committee page

Download: CYBER 2016 table of contents

Download: CYBER 2016 full proceedings

Notes: IARIA Conference.

Editors:
Thomas Klemas, SimSpace Corporation, Boston, USA
Rainer Falk, Siemens AG, Germany

Event editions: - there are 6 editions.

ISSN: 2519-8599

ISBN: 978-1-61208-512-8

Location: Venice, Italy

Dates: from October 9, 2016 to October 13, 2016

Articles: there are 13 articles

Network Complexity Models for Automated Cyber Range Security Capability Evaluations
Thomas Klemas and Lee Rossey
keywords: Network; network complexity; network theory, graph theory; degree; connectivity; connectance; centrality; degree centrality; hyper-edge; hypergraph; information theory, eigen decomposition; eigen vector; eigen value; eigen centrality; Bonacich centrality;

Advanced Swarm Imaging for Three-Dimensional Mapping
Martin L. Duncan, Paul D. Weil, and Thomas J. Klemas
keywords: Swarm Imaging; Internet-of-Things; cloud services; digital imaging; mapping; data visualization; high-resolution 3D imaging; Web services; APIs; sensemaking

Cyber Assessor: Assessment Framework to Characterize Cyber Aptitudes
Thomas Klemas
keywords: data analytics; cybersecurity; cybersecurity assessment; risk management; NIST; FFIEC; NERC

Intelligent Data Leak Detection Through Behavioural Analysis
Ricardo Costeira and Henrique Santos
keywords: Anomaly Detection; Machine Learning; Data Mining; Support Vector Machines

Quantifiable Measurement Scheme for Mobile Code Vulnerability Based on Machine-Learned API Features
Hyunki Kim, Joonsang Yoo, and Jeong Hyun Yi
keywords: Android; Vulnerability; Application Assessment

Single Sign-On Webservice with Adaptable Multi Factor Authentication
Sandra Kübler, Christian Rinjes, Anton Wiens, and Michael Massoth
keywords: web-based single sign-on; multi factor authentication; digital identity; security levels

Forensic Analysis of the Recovery of Wickr’s Ephemeral Data on Android Platforms
Thomas Edward Allen Barton and M A Hannan Bin Azhar
keywords: wickr; android; ephemeral messaging; forensic analysis; data sanitization; mobile forensics

Designing An IEC 61850 Based Power Distribution Substation Simulation/Emulation Testbed for Cyber-Physical Security Studies
Eniye Tebekaemi and Duminda Wijesekera
keywords: Cyber Security; Communication Protocols; Simulation Testbed; Cyber-Physical Systems; Smart Grid; Power Substation Automation

Exchanging Database Writes with Modern Crypto
Andreas Happe and Thomas Loruenser
keywords: Internet, Network security, Web services

Experiment of Sensor Fault Tolerance Algorithm combined with Cyber System for Coil Tilter on the Smart Hybrid Powerpack
Jaegwang Lee, Janggeol Nam, Buchun Song, Hyeonwoo Kim, Iksu Choi, and Hunmo Kim
keywords: Coil tilter; Smart Hybrid Powerpack (SHP); Electro Hydraulic Actuator (EHA); fault tolerance; Machine GUI; Office GUI; Mobile GUI.

An Approach for Protecting Privacy in the IoT
George O. M. Yee
keywords: privacy; protection; IoT; policy; compliance

Consideration of Security Threats for Identification System in Internet of Things
Daewon Kim, Jeongnyeo Kim, and Yongsung Jeon
keywords: internet of things, identification, object identifier; security threats

Advanced Device Authentication: Bringing Multi-Factor Authentication and Continuous Authentication to the Internet of Things
Rainer Falk and Steffen Fries
keywords: device authentication; Internet of Things, embedded security, cyber security

SERVICES CONTACT
2010 - 2017 © ThinkMind. All rights reserved.
Read Terms of Service and Privacy Policy.