NexTech 2021 Congress
October 03, 2021 to October 07, 2021 - Barcelona, Spain

  • UBICOMM 2021, The Fifteenth International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies
  • ADVCOMP 2021, The Fifteenth International Conference on Advanced Engineering Computing and Applications in Sciences
  • SEMAPRO 2021, The Fifteenth International Conference on Advances in Semantic Processing
  • AMBIENT 2021, The Eleventh International Conference on Ambient Computing, Applications, Services and Technologies
  • EMERGING 2021, The Thirteenth International Conference on Emerging Networks and Systems Intelligence
  • DATA ANALYTICS 2021, The Tenth International Conference on Data Analytics
  • GLOBAL HEALTH 2021, The Tenth International Conference on Global Health Challenges
  • CYBER 2021, The Sixth International Conference on Cyber-Technologies and Cyber-Systems

SoftNet 2021 Congress
October 03, 2021 to October 07, 2021 - Barcelona, Spain

  • ICSEA 2021, The Sixteenth International Conference on Software Engineering Advances
  • ICSNC 2021, The Sixteenth International Conference on Systems and Networks Communications
  • CENTRIC 2021, The Fourteenth International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services
  • VALID 2021, The Thirteenth International Conference on Advances in System Testing and Validation Lifecycle
  • SIMUL 2021, The Thirteenth International Conference on Advances in System Simulation
  • SOTICS 2021, The Eleventh International Conference on Social Media Technologies, Communication, and Informatics
  • INNOV 2021, The Tenth International Conference on Communications, Computation, Networks and Technologies
  • HEALTHINFO 2021, The Sixth International Conference on Informatics and Assistive Technologies for Health-Care, Medical Support and Wellbeing

NetWare 2021 Congress
November 14, 2021 to November 18, 2021 - Athens, Greece

  • SENSORCOMM 2021, The Fifteenth International Conference on Sensor Technologies and Applications
  • SENSORDEVICES 2021, The Twelfth International Conference on Sensor Device Technologies and Applications
  • SECURWARE 2021, The Fifteenth International Conference on Emerging Security Information, Systems and Technologies
  • AFIN 2021, The Thirteenth International Conference on Advances in Future Internet
  • CENICS 2021, The Fourteenth International Conference on Advances in Circuits, Electronics and Micro-electronics
  • ICQNM 2021, The Fifteenth International Conference on Quantum, Nano/Bio, and Micro Technologies
  • FASSI 2021, The Seventh International Conference on Fundamentals and Advances in Software Systems Integration
  • GREEN 2021, The Sixth International Conference on Green Communications, Computing and Technologies

TrendNews 2021 Congress
November 14, 2021 to November 18, 2021 - Athens, Greece

  • CORETA 2021, Advances on Core Technologies and Applications
  • DIGITAL 2021, Advances on Societal Digital Transformation

 


ThinkMind // CYBER 2019, The Fourth International Conference on Cyber-Technologies and Cyber-Systems

Type: conference

Download: CYBER 2019 cover page

Download: CYBER 2019 foreword page

Download: CYBER 2019 committee page

Download: CYBER 2019 table of contents

Download: CYBER 2019 full proceedings

Notes: IARIA Conference.

Editors:
Anne Coull, University of New South Wales, Information and Engineering, Australia
Steve Chan, Decision Engineering Analysis Laboratory, USA
Rainer Falk, Siemens AG, Corporate Technology, Germany

Event editions: - there are 6 editions.

ISSN: 2519-8599

ISBN: 978-1-61208-743-6

Location: Porto, Portugal

Dates: from September 22, 2019 to September 26, 2019

Articles: there are 16 articles

Towards Secure Robot Process Automation Environments
Petri Jurmu
keywords: robot process automation; RPA; cyber security; mobiilimittari

Enhancing Attack Resilience by Protecting the Physical-World Interface of Cyber-Physical Systems
Rainer Falk and Steffen Fries
keywords: cyber security; cyber resilience; system integrity; cyber physical systems; industrial automation and control system; Internet of Things

A Fraud Detection Framework Using Machine Learning Approach
Aderonke Thompson, Oghenerukvwe Oyinloye, Leon Aborisade, and Esther Odeniyi
keywords: fraud; credit cards; Multi-layer perceptron

How Much Cyber Security is Enough?
Anne Coull
keywords: cyber security; risk management; penetration testing; threat; vulnerability; control; NIST; ASD; APRA; ISO27001; ISO27002; defence in depth

Cyber Security Controls
Leonie Shepherd
keywords: APRA; CPS234; policy; engagement

Detecting Spectre Vulnerabilities by Sound Static Analysis
Daniel Kästner, Laurent Mauborgne, Christian Ferdinand, and Henrik Theiling
keywords: Spectre; taint analysis; abstract interpretation; static analysis; embedded software; operating systems; safety; cybersecurity

Hardware Implementation of Lightweight Chaos-Based Stream Cipher
Guillaume Gautier, Maguy Le Glatin, Safwan El Assad, Wassim Hamidouche, Olivier Deforges, Sylvain Guilley, and Adrien Facon
keywords: Chaos-based stream ciphers; Hardware implementation; Lightweight stream cipher; Computational performance.

Eavesdropping Hackers: Detecting Software Vulnerability Communication on Social Media Using Text Mining
Andrei Lima Queiroz, Susan Mckeever, and Brian Keegan
keywords: cyber security threat intelligence; software vulnerability; machine learning; text mining; social media, hacker communication

A Secure Storage Scheme for Healthcare Data Over the Cloud Based on Multiple Authorizations
Zeyad A. Al-Odat, Sudarshan K. Srinivasan, Eman M. Al-Qtiemat, and Sana Shuja
keywords: Healthcare, Security, Shamir's Secret Sharing, Authorization

Annealed Cyber Resiliency: Cyber Discernment for the Launch Providers of Space Systems
Steve Chan, and Steve Chan
keywords: space systems; strategic infrastructure; critical infrastructure; advanced persistent threats; outside-the-wire

Surveying and Enhancing Grid Resilience Sensor Communications: An Amalgam of Narrowband, Broadband, and Hybridizing Spread Spectrum
Steve Chan, Ika Oktavianti Najib, and Verlly Puspita
keywords: Grid resilience; broadband; narrowband; hybridizing techniques; spread spectrum; communication network; expeditious outage response capabilities.

Fast Training of Support Vector Machine for Forest Fire Prediction
Steve Chan, Ika Oktavianti Najib, and Verlly Puspita
keywords: Fast training of support vector machine; support vector regression; sequential minimal optimization; stochastic gradient descent; forest fire prediction.

Context-Referenced Telemetry Data for Distribution Utilities: Quality Assurance/Quality Control by Lateral Sensors
Steve Chan, Ika Oktavianti Najib, and Verlly Puspita
keywords: lateral sensor; electrical grid; weather monitoring system; 3D-printed technology; generative adversarial network.

Refinement Checker for Embedded Object Code Verification
Mohana Asha Latha Dubasi, Sudarshan K. Srinivasan, Sana Shuja, and Zeyad A. Al-Odat
keywords: embedded devices; formal verification; refinementbased verification; verification of object code, WFS refinement

Comparisons of Forensic Tools to Recover Ephemeral Data from iOS Apps Used for Cyberbullying
Aimee Chamberlain and M A Hannan Bin Azhar
keywords: Mobile forensics; NIST measurements; Oxygen Forensics; MOBILedit forensic; Ephemeral APPS; Cyberbullying.

Recovery of Forensic Artefacts from a Smart Home IoT Ecosystem
M A Hannan Bin Azhar and Samuel Benjamin Louis Bate
keywords: Internet of Things Forensics; Internet of Things ecosystem forensics; Digital forensics; Smart Home; Internet of Things; Amazon Alexa; Nest Camera; Smart-Bulb.

SERVICES CONTACT
2010 - 2017 © ThinkMind. All rights reserved.
Read Terms of Service and Privacy Policy.