Home // CYBER

CYBER 2016, The First International Conference on Cyber-Technologies and Cyber-Systems

Type: conference

Notes: IARIA Conference.

Editors:
Thomas Klemas, SimSpace Corporation, Boston, USA
Rainer Falk, Siemens AG, Germany

ISSN: 2519-8599

ISBN: 978-1-61208-512-8

Location: Venice, Italy

Dates: from October 9, 2016 to October 13, 2016

Articles: there are 13 articles

Network Complexity Models for Automated Cyber Range Security Capability Evaluations
Thomas Klemas and Lee Rossey
keywords: Network; network complexity; network theory, graph theory; degree; connectivity; connectance; centrality; degree centrality; hyper-edge; hypergraph; information theory, eigen decomposition; eigen vector; eigen value; eigen centrality; Bonacich centrality;

Advanced Swarm Imaging for Three-Dimensional Mapping
Martin L. Duncan, Paul D. Weil, and Thomas J. Klemas
keywords: Swarm Imaging; Internet-of-Things; cloud services; digital imaging; mapping; data visualization; high-resolution 3D imaging; Web services; APIs; sensemaking

Cyber Assessor: Assessment Framework to Characterize Cyber Aptitudes
Thomas Klemas
keywords: data analytics; cybersecurity; cybersecurity assessment; risk management; NIST; FFIEC; NERC

Intelligent Data Leak Detection Through Behavioural Analysis
Ricardo Costeira and Henrique Santos
keywords: Anomaly Detection; Machine Learning; Data Mining; Support Vector Machines

Quantifiable Measurement Scheme for Mobile Code Vulnerability Based on Machine-Learned API Features
Hyunki Kim, Joonsang Yoo, and Jeong Hyun Yi
keywords: Android; Vulnerability; Application Assessment

Single Sign-On Webservice with Adaptable Multi Factor Authentication
Sandra Kübler, Christian Rinjes, Anton Wiens, and Michael Massoth
keywords: web-based single sign-on; multi factor authentication; digital identity; security levels

Forensic Analysis of the Recovery of Wickr’s Ephemeral Data on Android Platforms
Thomas Edward Allen Barton and M A Hannan Bin Azhar
keywords: wickr; android; ephemeral messaging; forensic analysis; data sanitization; mobile forensics

Designing An IEC 61850 Based Power Distribution Substation Simulation/Emulation Testbed for Cyber-Physical Security Studies
Eniye Tebekaemi and Duminda Wijesekera
keywords: Cyber Security; Communication Protocols; Simulation Testbed; Cyber-Physical Systems; Smart Grid; Power Substation Automation

Exchanging Database Writes with Modern Crypto
Andreas Happe and Thomas Loruenser
keywords: Internet, Network security, Web services

Experiment of Sensor Fault Tolerance Algorithm combined with Cyber System for Coil Tilter on the Smart Hybrid Powerpack
Jaegwang Lee, Janggeol Nam, Buchun Song, Hyeonwoo Kim, Iksu Choi, and Hunmo Kim
keywords: Coil tilter; Smart Hybrid Powerpack (SHP); Electro Hydraulic Actuator (EHA); fault tolerance; Machine GUI; Office GUI; Mobile GUI.

An Approach for Protecting Privacy in the IoT
George O. M. Yee
keywords: privacy; protection; IoT; policy; compliance

Consideration of Security Threats for Identification System in Internet of Things
Daewon Kim, Jeongnyeo Kim, and Yongsung Jeon
keywords: internet of things, identification, object identifier; security threats

Advanced Device Authentication: Bringing Multi-Factor Authentication and Continuous Authentication to the Internet of Things
Rainer Falk and Steffen Fries
keywords: device authentication; Internet of Things, embedded security, cyber security